home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
ftp.wwiv.com
/
ftp.wwiv.com.zip
/
ftp.wwiv.com
/
pub
/
BBS
/
IM140G.ZIP
/
IMAIL.DOC
< prev
next >
Wrap
Text File
|
1993-05-29
|
219KB
|
5,221 lines
█┐ █▀▀▀█┐ █▀▀█┐ █┐ █┐
█│ █│█┐█│ █│▀█│ █│ █│
█│ █│└┘█│ █│ █│ █│ █│
█│ █│ █│ █│ █│ █│ █▄▄▄┐
└┘ └┘ └┘ └┘ └┘ └┘ └──┘
The "Semi-Intuitive" Mail Processor
V e r s i o n 1 . 4 0 Gamma
Copyright 1992/1993
IMAIL INC.
Stefan Kaspar, Andreas Klein, Markus Lomb,
Frank Prade and Stefan Rubner
All Rights Reserved
══ TABLE OF CONTENTS ══
1. INTRODUCTION
2. WARRANTY AND REGISTRATION INFORMATION
a. Standard Disclaimer
3. ACKNOWLEDGEMENTS
a. Copyrights
4. INSTALLATION
a. Environment Variables
1) IMAIL
2) POINTNET
3) TASK
b. System Requirements
1) Hardware
2) Software
3) Networks and File Sharing
c. Upgrading from Previous Versions
5. IMSETUP
a. General Configuration
1) System Addresses
2) Domains
- Domain
- Outbound Directory
- Zone List
- AKA List
3) Subdirectories
- Hudson Message Base
- Net Mail Message
- Inbound Net Files
- Temp Inbound Packets
- Outbound Net Files
- Temp Outbound Packets
- Netmail Semaphore File
- Semaphore Directory
- IMAIL Log File Name
- Areas Action Log
- Log Format
4) AreaLink Options
- Keep AreaLink Reply
- Keep AreaLink Request
- Password Expiration Days
- Forward Link Requests
- AreaLink Help Text
- Forward every request
- Remote Maint Help Text
- Unlink Requests
- Forward Link Requests Data
5) Product Codes
6) No Import
7) Other Parameters
- ARCmail 0.6 Compatibility
- Number of Dupe Records
- Auto-add New Areas
- Multi-Tasking
- Semaphore Time-out
- Max Packet Size
- Max Arcmail Size
- Max Message Size
- Dupe Ring Handling
- Circular Path Detection
- Kill dead echos
- Environment
- Truncate/Delete Sent ARCmail
- Single Bundle Extract
- Send Return Receipt
- Forward For Other Systems
- Delete empty netmails (TOSS)
- Swap Options
- Add Via Lines
- Use FTSC Product Names
- Check for personal mail
- Before Toss
- Sysop Name
- Default Origin
9) Group Manager
b. Compression Programs
c. Decompression Programs
d. Area Manager
1) Editing Keys
- F1: Edit
- F2: Find
- F3: Global
- F4: Browse
- ESC/F10: Exit
- Ins: Add
- Del: Delete
- Home: First
- End: Last
- PgUp/PgDn: Previous/Next
2) The Message Area Record
- Area Name
- Comment
- Origin Line
- Active
- Group
- Secure
- Msg Base Type
- Type
- Board
- Path
- # Days
- # Msgs
- Hide
- Unlinked
- Auto Maint
- Mandatory
- Read only
- Origin Address
- Seen-Bys
- Linked systems
e. Node Manager
1) Editing Keys
- F1: Edit
- F2: Find
- F4: Browse
- F10: Save
- Ins: Add
- Del: Delete
- Home: First
- End: Last
- ESC: Exit
- PgUp/PgDn: Previous/Next
2) Address
3) Sysop
4) Domain
5) AreaLink Password
6) Packet Password
7) Groups
8) Notify
9) Remote Maint
10) Rescan OK
11) Add to New
12) Forward Requests
13) Create New Areas
14) New Areas Group
15) Uplink
16) Program Name
17) FSC-0057 compatible
18) Message Status
19) Attach Status
20) Packer
21) Capability
22) Cap Handling
f. Pack Routing
g. Import/Export Functions
1) Export Areas.Bbs
2) Export GoldED Areafile
6. IMAIL COMMAND LINE OPTIONS
a. /? - Help
b. TOSS - Toss Incoming Mail
1) /B - Check Bad Message Board
3) /X - No Compression
c. SCAN - Scan for Outgoing Mail
1) /D - Disable Dupe Checking
2) /F - Force Complete SCAN
3) /Q - Only Hudson
4) /S - Only MSG/Squish
5) /X - No Compression
7. IMPACK - Pack Net Mail Messages
a. /N - No Default Pack Routing
b. /C - Pack Crash Messages
c. /D - Pack Direct Messages
d. /H - Pack Hold Messages
e. /R - Pack Route Direct
f. /X - No Compression
g. /? - Help
8. IMALNK
a. Format of the Request
b. Meta-Commands
1) %COMPRESS
2) %FROM
3) %HELP
4) %LIST
5) %NOTE
6) %PAUSE
7) %PWD
8) %QUERY
9) %RESCAN
10) %RESUME
11) %UNLINKED
12) %INFO
c. AreaLink Replies
d. Forward Link Requests
e. Remote Delete Request (%DROP)
f. Remote Create Request (%ADD)
g. Remote Change Request (%CHANGE)
h. Local Maintenance
1) /N<address> - Node to Make Changes For
2) /+<area> - Link Node to Area
3) /-<area> - Unlink Node from Area
4) /=<area> - Update Node in Area
5) /I - General Information
6) /L - List Available Areas
7) /Q - Query - List Linked Echos
8) /U - List Available but Unlinked Echos
9) /R - Rescan
10) /H - Send Help
11) /P - Pause
12) /S - Resume Sending
13) /D<area> - Delete Echo Area
14) /C<area:area> - Change Echo Name
9. IMTHINGS
a. IMPORT - Import Net Mail Messages [MQS]
1) /S - Strip crash bit from imported messages
b. INDEX - Rebuild index files [-Q-]
c. KILL - Delete messages from an area [MQS]
1) /A<areaname>
2) /B<board>
3) /D<days>
4) /K<days>
5) /N<number>
6) /Q - Hudson Only
7) /S - MSG/Squish Only
8) /U - Use Default Information
9) /O - Delete messages in undefined boards
10) /! - Allow All Messages to be Killed
d. LINK - Link Messages in Message Base [MQS]
1) /C - Clean
2) /Q - Hudson only
3) /S - MSG/Squish only
e. MOVE - Move Message Area [MQS]
1) /R<src area>
2) /S<src board>
3) /F<src path>
4) /T<dst area>
5) /D<dst board>
6) /P<dst path>
f. NOTIFY - Send list of linked echos [---]
1) /N - No node manager
2) /P - Notify AreaLink Password
3) /W - Only Warn of Password Expiration
g. PACK - Compress message base [MQS]
1) /B - Keep backup
2) /P - Pack IMAIL.AR
3) /Q - Hudson Only
4) /R - Renumber
5) /S - *.MSG/Squish Only
6) /U - do not change USERS.BBS
h. POST - Post message in echo area [MQS]
1) /F<filename>
2) /A<areaname>
3) /B<board>
4) /W<to_who>
5) /R<from_who>
6) /S<subject>
i. RECOVER ....- Unerase messages [-Q-]
1) /A<areaname>
2) /B<board>
3) /U - Automatic Mode
j. SEND ....- Send a file [---]
1) /F<filename>
2) /A<address>
3) /W<to_who>
4) /T<text>
5) /C - Crash
6) /H - Hold
7) /D - Direct
8) /K - Kill/Sent
9) /E - Delete/Sent
10) /Y<days> - Newer than
11) /N<0-15> - Alternate Address or AKA
12) /! - send message without attach
k. SORT - Sort the Message Base [-Q-]
1) /L - Link Messages after Sort
2) /Q - "Quick" Sort
3) /U - do not change USERS.BBS
10. AN OVERVIEW OF ECHOMAIL
a. What is Echo Mail?
b. How it Works
c. Echo Mail Message Control Information
1) Area Line
2) Tear Line
3) Origin Line
4) SEEN-BY Lines
5) PATH Lines
d. Methods of Sending Echo Mail
e. Topology
f. Why a PATH line?
g. Gating of Echo Mail
11. KLUDGE LINES
a. EID
b. FLAGS
1) DIR
2) IMM
3) TFS
4) KFS
5) CFM
6) RRQ
c. FMPT
d. INTL
e. MSGID
f. PID
g. REPLY
h. RESCANNED
i. TID
j. TOPT
12. BATCH FILE EXAMPLE
13. MISCELLANEOUS INFORMATION
a. A Note about Capability
b. Defaults for Compression/Decompression
1) Compression
2) Decompression
c. Files Maintained by IMAIL
d. Exit Codes
14. IMAIL REGISTRATION SITES
a. Headquarters
b. Australia
c. C.I.S. (ex-USSR)
d. Europe
e. North America
f. Italy
g. Sweden
h. Turkey
1. INTRODUCTION
IMAIL is an echo mail processor. In other words, it moves incoming
mail received by your mailer to a local message base and is also
able to forward echo mail to other systems (this is called
TOSSing). It scans the message base for locally entered messages
and will create packets for your uplink and the other connected
systems, so your mailer can transmit them (this is the SCAN
function).
IMAIL is FTSC-compatible, and written for those who use any
combination of the "Hudson" message base (QuickBBS, RemoteAccess or
fully compatible), an *.MSG message base (for example Opus) or the
Squish message base (Maximus). It can be used with mailers which
implement the file attach method of mail transfer (such as
FrontDoor), or with systems which use "flow files" (such as
Binkley or Portal of Power). Support for the D'Bridge Queue system
is planned for one of the next versions.
It also features full Zone and Point support, eliminating the need
to use the "fake address" method of sending mail to and from points
(IMAIL however still supports the point net addressing).
If you are new to FidoNet mail processing, we suggest you
familiarize yourself with the documentation for the mailer you will
be using, and read "An Overview of Echo mail", Chapter 10.
2. WARRANTY AND REGISTRATION INFORMATION
This software and anything enclosed in the original archive are
protected by both German and international copyright law and treaty
provisions.
IMAIL is NOT Public-Domain or Freeware, it is released
as Shareware. If you intend to use this program after
a trial period of THIRTY (30) days, you must register
your copy of IMAIL or stop using it.
You are entitled and encouraged to give this program together with
its original documentation to anybody, if you do not change the
contents of the archive or the program itself. Distributing of
modified versions is prohibited.
IMAIL has no restricted features, everything can be used with one
exception (via lines). But unregistered users only get a minimal
support by the developers and support/registration sites.
Only registered users will get full support.
The base registration cost is US$35.00 for "normal" nodes, US$30.00
for points. For specific rates, contact the registration site
closest to you, the addresses of which appear in Chapter 14.
When you register, send a cheque or money order to the registration
site, and the registration form you can find at the registration
sites.
When the registration fee is received, you shall be sent a net mail
message indicating where you can pick up the key. Once you have
received the key file, copy it to your IMAIL "home" directory,
renaming it to IMAIL.KEY. Note: if you copy the file, be sure to
use the /B switch, otherwise it may not be copied correctly.
IMAIL is in no way a crippled program, nor will it stop working
after a certain amount of time. We don't like this concept in
ShareWare programs.
This software is provided AS IS without any warranty, expressed or
implied, including but not limited to fitness for a particular
purpose.
The authors will not be liable for any direct or consequential
damages due to loss of data or any other reason, the person using
the software bears all risk as to the quality and performance of
of the software.
We will however do our best to fix any bugs reported to us, as long
as we have enough information to do this.
If your local laws do not permit any of the statements made above,
or if you do not agree with any of them yourself, then you are not
licensed to use this program!
a. Standard Disclaimer
This product is meant for educational purposes only. Any
resemblance to real persons, living or dead is purely
coincidental. Void where prohibited. Some assembly required.
List each check separately by bank number. Batteries not
included. Contents may settle during shipment. Use only as
directed. No other warranty expressed or implied. Do not use
while operating a motor vehicle or heavy equipment. Postage will
be paid by addressee. Subject to CAB approval. This is not an
offer to sell securities. Apply only to affected area. May be
too intense for some viewers. Do not stamp. Use other side for
additional listings. For recreational use only. Do not disturb.
All models over 18 years of age. If condition persists, consult
your physician. No user-serviceable parts inside. Freshest if
eaten before date on carton. Subject to change without notice.
Times approximate. Simulated picture. No postage necessary if
mailed in Antarctica. Breaking seal constitutes acceptance of
agreement. For off-road use only. As seen on TV. One size fits
all. Many suitcases look alike. Contains a substantial amount of
non-tobacco ingredients. Colours may, in time, fade. We have
sent the forms which seem to be right for you. Slippery when
wet. For office use only. Not affiliated with the Red Cross.
Drop in any mailbox. Edited for television. Keep cool; process
promptly. Post office will not deliver without postage. List was
current at time of printing. Return to sender, no forwarding
order on file, unable to forward. Not responsible for direct,
indirect, incidental or consequential damages resulting from any
defect, error or failure to perform. At participating locations
only. Not the Beatles. Penalty for private use. See label for
sequence. Substantial penalty for early withdrawal. Do not write
below this line. Falling rock. Lost ticket pays maximum rate.
Your cancelled check is your receipt. Add toner. Place stamp
here. Avoid contact with skin. Sanitized for your protection. Be
sure each item is properly endorsed. Sign here without admitting
guilt. Employees and their families are not eligible. Beware of
dog. Contestants have been briefed on some questions before the
show. Limited time offer, call now to insure prompt delivery.
You must be present to win. No passes accepted for this
engagement. No purchase necessary. Processed at location stamped
in code at top of carton. Shading within a garment may occur.
Use only in well-ventilated area. Keep away from fire or flame.
Replace with same type. Approved for veterans. Booths for two or
more. Check here if tax deductible. Some equipment shown is
optional. Price does not include taxes. Not recommended for
children. Prerecorded for this time zone. Reproduction strictly
prohibited. No solicitors. No alcohol, dogs, or horses. No
anchovies unless otherwise specified. Restaurant package, not
for resale. List at least two alternate dates. First pull up,
then pull down. Call toll free before digging. Driver does not
carry cash. Some of the trademarks mentioned in this product
appear for identification purposes only. Record additional
transactions on back of previous stub.
3. ACKNOWLEDGEMENTS
IMSETUP makes use of the C eXtended Library (CXL) version 5.2 by
Mike Smedley and the Squish MSGAPI by Scott J. Dudley.
IMAIL uses Lingua (c) Sichemsoft, Wageningen, Netherlands for
multi-language support (yet not fully implemented).
Our deepest gratitude to the Beta Testers, who risked seeing their
message base grunged by our program, and for having had patience
when we released buggy betas.
Very special thanks to:
Fabiano Fabris, Udo Fleckenstein, Henk Heidema, Roelof Heuvel
and last but not least Bob Snowdon.
a. Copyrights
The following copyrighted programs are mentioned in this
document:
Arc System Enhancement Associates
Arj Robert K. Jung
Binkley Bit Bucket Software Co
D'Bridge Chris Irwin
DesqView Quarterdeck Office Systems
FrontDoor Joaquim Homrighausen
LANtastic Artisoft Inc.
LHarc/LHA Haruyasu Yoshizaki
Maximus Scott J. Dudley
MS-DOS Microsoft Corporation
Novell Netware Novell
OS/2 IBM Corporation
Opus Wynn Wagner III
PAK NoGate Consulting
PC-DOS IBM Corporation
PKZIP PKWARE Inc.
PKarc/PKpak PKWARE Inc.
Portal of Power The Portal Team
QuickBBS Richard Creighton &
Steve Grabilowitz
RemoteAccess Andrew Milner
SQZ J. I. Hammarberg
Squish Scott J. Dudley
SuperBBS Aki Antman & Risto Virkkala
TosScan Joaquim Homrighausen
Validate McAfee Associates
XRS Mike Ratledge
Zoo Rhaul Dhesi
If we have forgotten someone, or have made any mistakes, our
most sincere apologies! Drop us a line and it will be rectified
for the next release.
4. INSTALLATION
IMAIL is supplied in a single compressed file which should contain
the following files:
IMAIL.EXE The mail processor
IMALNK.EXE The AreaLink
IMPACK.EXE The net mail packer program
IMSETUP.EXE The setup program
IMTHINGS.EXE The external utilities
IMCVT.EXE Config Conversion tool from 1.30/1.35/1.35a
IMAIL.ETF The language file
IMAIL.DOC The documentation
CHANGES.140 Summary of changes since the last release
IMAILREG.ARJ Information concerning registration.
FTSCPROG.048 The FTS-product code list
There may also be a README file which includes last minute
information. Please refer to it before installing.
Copy all the executable files to the same directory. Set the IMAIL
environment variable (see below) to point to a directory where you
want your configuration files to be stored (usually the same
directory as that in which the program "resides", it is known as
the IMAIL "home" directory) and run IMSETUP. Also make sure that
the IMAIL.ETF file is in this directory.
a. Environment Variables
1) IMAIL
An environment variable should be set to point to the
directory containing IMAIL's configuration files. This is not
required, but strongly recommended, in order to avoid
problems in case of errors in your batch file. The variable
may be set by including an instruction such as the following
in your AUTOEXEC.BAT file:
SET IMAIL=C:\IMAIL
Please note that IMAIL and its companion programs do not make
use of any other program's configuration files.
2) POINTNET
If you are a "boss" node and have point running software
which cannot handle 4D addressing, you will have assigned
them a point net (sometimes called a fakenet) address. You
should inform IMAIL of this point net by setting the POINTNET
environment variable, so that TOSS and SCAN can remove
addresses containing the point net from the SEEN-BYs in echo
mail messages.
For example, if you were using a point net of 31339, you
would set the POINTNET variable with:
SET POINTNET=31339
3) TASK
This environment variable is needed in a FrontDoor network/
multitasking environment, it is used for the FrontDoor CRC
semaphore.
SET TASK=99
The variable is used to determine by the program on which
system (in a multitasking/network environment) it is running
when creating the FD 2.10 CRC semaphores. If you use the same
variable on different computers/tasks you will experience
problems.
b. System Requirements
1) Hardware
IBM PC/AT/386/486, or fully compatible
Mono or color display
Hard disk
2) Software
MS-DOS (or PC-DOS) 3.10 or greater
An FTSC-0001 compatible mailer
One or more compression programs, selected from:
ARC by System Enhancement Associates;
Arj by Robert K. Jung
LHarc by Haruyasu Yoshizaki;
PKARC/PKPAK by PKWARE Inc.;
PAK by NoGate Consulting;
PKZip by PKWARE Inc.;
SQZ by J. I. Hammarberg
ZOO by Rhaul Dhesi.
3) Networks and File Sharing
IMAIL has been extensively tested in the NetWare and LANtastic
environments, as well as under DESQview and OS/2 2.x.
IMAIL implements file sharing as "expected" by RemoteAccess
V 1.0X. What this means is that it will open all files in
sharing mode, and will lock MSGINFO.BBS just before writing
to any of the message base files.
Note that SHARE.EXE =must= be loaded in order for this to
work correctly, unless you are using IMAIL in a network
environment, which supports the MS-DOS file sharing
functions.
However, IMTHINGS (beside the LINK function) does =not= make
use of RemoteAccess file sharing. It is expected that message
base utilities will not be run while a user is on line, or
while some other program is making use of the message base.
Damage can result if you try to use IMTHINGS together with
another program.
If you are using IMAIL in a multi-tasking or network environ-
ment, please set the Multi-Tasking flag in IMSETUP (see Chap-
ter 5. section a. para 7)).
In this case IMAIL fully supports the multi-tasking/network
capabilities of FrontDoor 2.10 and Binkley. IMAIL indicates
when it is accessing the arcmail bundles for a certain system
and checks whether a session is currently running to avoid
file sharing problems.
There are situations where it can be necessary to stop IMAIL
or one of the other executables as soon as possible if for
the server of a network detects a power failure.
Whenever checking for CTRL-C or CTRL-Break from the keyboard,
IMAIL also checks for the semaphore file IMAIL.BRK in the
semaphore directory (or in its home directory if no semaphore
directory is given). If this file is found, IMAIL behaves as
when the user has pressed CTRL-C.
c. Upgrading from Previous Versions
If you are upgrading IMAIL from a previous version, please see
the file CHANGES.140 for information on new features since the
last public release.
If you are using a previous version of IMAIL, you will need a
conversion program because the internal structures have been
changed.
IMCVT.EXE, supplied with this version, upgrades your IMAIL 1.30/
1.35(a) configuration to the IMAIL 1.40 structures.
If you are still using IMAIL 1.10 or IMAIL 1.20/1.21(a), you
should contact the next support/registration site where conver-
sion tools should be available. There is one tool for upgrading
from 1.10 to 1.20 and one tool for upgrading from 1.2X to 1.3X.
5. IMSETUP
The program IMSETUP is used to configure the various options used
by IMAIL. In this chapter, each option will be examined in detail.
If any of the options are not clear, or their meaning and use is
"obscure", you can generally leave them in their default setting.
You can get help in any of the IMAIL support echos, or by sending
net mail to the author or to the support sites listed at the end of
this documentation.
A complete new version of IMSETUP with context-sensitive help is
in work but not yet ready.
IMSETUP can be given one or more command line options, selected
from the following:
/M Force 'mono' color set
/C Force 'color' color set
/D Force direct screen writes
/S Force CGA snow elimination
Naturally, /D and /S have exactly opposite effects, so it makes no
sense to use them together.
Note: Should you wish IMSETUP to create and/or look for the
configuration files in a directory which is different from the one
in which you ran it, set the IMAIL environment variable to point to
this directory. Otherwise, IMSETUP will look for its configuration
files in the current working directory, whatever that happens to
be.
a. General Configuration
This options leads to another menu which allows various
system-wide parameters to be set. Please read this section
carefully!
1) System Addresses
The "System Addresses" menu allows you to define up to 16
network addresses. The first of the addresses is known as
your primary address. It should be the same as the one
defined as your primary in your mailer and/or BBS program.
The other addresses given are your system's AKAs (or
aliases).
Addresses should be given in the form:
zone:net/node.point
Addresses may be in different zones, and even in different
domains (or networks). At least the primary address must be
specified.
Note that if you make changes to the list of addresses in an
existing configuration, it is advisable that you then enter
the Area Manger to check your Origin and SEEN-BY addresses.
2) Domains
In this menu the domain(s) to which you belong are specified.
The word "domain" is used to distinguish between different
amateur networks such as SIGnet and FidoNet.
Here, you should indicate the domains of which you are a
part, the zones belonging to these domains, your AKAs in this
domain, and the outbound directory for each domain. You
should also specify those domains to which you do not belong,
but with which you exchange mail.
IMAIL uses this information for MSGID kludges when generating
net mail messages. More importantly, outbound mail for a
specific domain will be placed in the directory you specify
here.
If you are in doubt of which zone you belong to, or which
domain, please contact your nearest Coordinator or Host.
- Domain
Specify the name of the domain. No universally accepted
standard seems to exist, but some examples are: FidoNet for
zone 1 to 6, IntlNet for zone 56 through 58, and so on.
- Outbound Directory
If you belong to more than one domain, it might be wise to
keep the outbound mail for each domain separate. In this
case, specify each directory here. In Binkley mode, mail
for points will be place "under" these directories.
If this field is left empty, IMAIL will default to the
directory specified as Outbound Net Files (see below).
- Zone List
Specify all the zones which belong to this domain. For
example, for IntlNet, these would be 56, 57, 58 and 59.
- AKA List
Select those of your addresses which belong to each domain.
3) Subdirectories
In this menu, specify the paths to the various files IMAIL
needs to use during execution. Most of the fields are
required and you should NOT use the same physical directories
for more than one entry. It's also NOT useful if other
programs use the IMAIL temporary directories (especially the
FrontDoor packet directory may not be used by IMAIL).
When specifying subdirectories, you may omit the trailing
backslash.
- Hudson Message base
Specify the path to the Hudson format message base files.
These message base files are searched for outgoing messages
when you run the IMAIL SCAN function. If you are not using
a Hudson message base, this field may be left empty.
- Net Mail Message
The path to where your mailer stores its net mail message
(*.MSG) files. IMAIL will use this when searching for
existing file attaches, when creating new file attach
messages, or when it generates outgoing net mail of its
own.
This field is required.
- Inbound Net Files
This is where your mailer stores inbound compressed mail
files and packets. IMAIL will look here when you run the
TOSS function.
NOTE: Please do =not= run IMAIL from this directory!
This field is required.
- Temp Inbound Packets
This directory is used by IMAIL TOSS to store packets as
they are extracted from ARCmail files, and before they are
processed.
This field is required.
- Outbound Net Files
This subdirectory is where your mailer normally looks for
outbound compressed files. These files may be generated by
all of IMAIL's functions.
This CANNOT be the same subdirectory as the Inbound Net
Files directory, otherwise IMAIL will process the files as
if they were FOR your system.
Note that if you are running in a Binkley environment, this
will be the subdirectory in which outgoing mail for your
PRIMARY zone will be placed. Mail addressed to other zones
will be placed in other subdirectories, having the same
root name as the one specified in this field, but with a
3-digit hexadecimal extension (the zone of the destination
address). For more details, please refer to the Binkley
documentation.
This subdirectory will be used whenever you do not specify
an outgoing subdirectory in the Domains menu (see above).
This field is required.
- Temp Outbound Packets
This is the directory in which IMAIL and IMPACK will build
outbound packets prior to compression into ARCmail files.
This directory must NOT be the same as your mailers
temporary packet directory, nor may it be the same as
IMAIL's Temporary Inbound Packet directory. If omitted,
IMAIL will default to the Outbound Net Files directory.
This field is required.
- Semaphore Directory
This directory is used to store and create all semaphores.
Also the mailer rescan semaphore as defined below will be
created in this directory.
For FrontDoor 2.10, this is the semaphore directory as
defined in the FrontDoor setup, for FrontDoor 2.02 this is
the directory where the FD environment variable points to.
- Netmail Semaphore File
If IMAIL should tell your mailer that netmails have been
created or updated, you should specify the name of the
necessary semaphore file here. IMAIL will create it in the
semaphore directory if necessary.
For FrontDoor this is FDRESCAN.NOW
- IMAIL Log File Name
Is you wish IMAIL to log its activity to file, you may
specify the name of the log file here. If a path is not
specified, the file will be written to the current working
directory.
- Areas Action Log
In this file, IMAIL stores the following actions:
Autoadding of an area ADD
Forward link request REQUEST
Unlink request UNLINK
Deletion of a dead area DEAD
Remote deletion of an area REMOVE
Here a small batch which allows you to post a notification
whenever a new echo has been arrived.
%IMAIL% is the IMAIL environment variable.
NEWAREAS.LOG is the name as entered in IMSETUP for the
areas action areas log.
AREA.NEW is used to store the file after posting it.
-----------[ BEGIN ]----------
REM
REM BATCHFILE, POST A MESSAGE CONTAINING NEW AREA'S ONCE...
REM
IF NOT EXIST %IMAIL%\NEWAREAS.LOG GOTO NONEWMAINT
%IMAIL%\IMTHINGS POST /F%IMAIL%\NEWAREAS.LOG /ALOCAL.SYS
/WSysop /SNew_areas
COPY %IMAIL%\AREA.NEW+%IMAIL%\NEWAREAS.LOG %IMAIL%\AREA.NEW
DEL %IMAIL%\NEWAREAS.LOG
:NONEWMAINT
REM
-----------[ END ]----------
- Log Format
If you have specified that IMAIL should create a log file,
here you may indicate how much information you wish to be
written to the log file.
There are two possible choices:
N: Normal. This will log only important information,
errors and final stats to the log.
V: Verbose. Complete information will be logged,
including all echo areas scanned or tossed.
4) AreaLink Options
The options in this menu regard IMAIL's area manager, called
AREALINK. This function will do for IMAIL what AreaFix does
for other systems.
Your downlinks will be able to request that new areas be sent
to them, or that areas no longer be sent. Besides this, they
may request information on which echos are available to them,
and have a list of the echos they are currently receiving.
AreaLink can also request areas not available on your system
from your uplinks, thus further automating your system.
For information on how AreaLink is used, see Chapter 8.
- Keep AreaLink Reply
If you enable this option (set it to 'Y'), then IMAIL will
not mark its outgoing messages as KILL/SENT. In other
words, once the message has been sent, it will remain in
your net mail directory for you to see it. Note that this
is valid only for the messages generated by AreaLink, but
not for those it has processed.
- Keep AreaLink Request
If you enable this option (set it to 'Y'), then IMAIL will
not delete incoming requests, they will remain in your net
mail directory for you to see it. Note that this is valid
only for the messages processed by AreaLink, but not for
those it has created.
- Password Expiration Days
This allows you to specify that your downlinks should
change their AreaLink password after a specified number of
days. If set to 0, this feature is disabled. AreaLink will
still allow a system to use AreaLink if the deadline has
passed, but it will add a warning saying that the password
should be changed. A sysop may change his password
automatically by using the %PWD meta-command; see Chapter
8. section b. for more information on this.
- Allow Forward Link Requests
This allows you to specify whether AreaLink should execute
forward link requests to one of the uplinks defined in the
data section.
A detailed explanation of Forward Link Requests can be
found below.
- AreaLink Help Text
In this field you may specify the name of a text file to
send if a user requests help with AreaLink (see Chapter 8.
Section b.) If no name is specified, then AreaLink will
respond to a request for help by saying that none is
available. If the file does not exist, IMSETUP will prompt
you for the creation of a default help text.
If a file is specified, it must be located in the directory
pointed to by the IMAIL environment variable, or in the
directory which is current when IMAIL is run.
- Forward every request
If this field is set to yes, IMAIL forwards area requests
where the area cannot be found in one of the lists given
in the Forward Link Request Manager to the first uplink
defined in this manager.
- Remote Maint Help Text
In this field you may specify the name of a text file to
send if a user requests help with AreaLink (see Chapter 8.
Section b.) if this users has remote maintenance rights on
your system. If no name is specified, then AreaLink will
take the file specified under AreaLink Help Text.
If a file is specified, it must be located in the directory
pointed to by the IMAIL environment variable, or in the
directory which is current when IMAIL is run.
- Unlink Requests
Here you can specify whether AreaLink should check areas
(whenever one user requests to unlink from an echo and at
least once per day after midnight during the statistic
update) whether you have areas with only one system in the
list of linked systems.
If this single system is also listed in the forward link
requests data section, then IMAIL marks this area unlinked
and sends an unlink request to this system.
You can specify whether this function should only affect
passthrough echos or all echos. Moreover you can exclude
single areas from this function in the Area Manager.
Using this feature you can prevent echos from being tossed
into the NUL device and consequently reducing the amount of
mail.
The Area Manager allows you to exclude single area from
this function (Auto Maint).
- Forward Link Requests Data
Forward Link Requests are a method to have IMAIL
automatically request areas from your echo uplinks. If
AreaLink processes a request for an echo area which is not
listed in your configuration, it will search the files you
have defined for this area. If found, it will send a
request for that area to the system listed. See Chapter 8.
section d. for more information.
In the "Uplink" column, specify the network address of the
system to which the request should be sent. The "Areas
file" column indicates the file name of an AREAS.BBS type
file containing the list of echo areas available on that
system.
In the "Areas File" column, indicate the name of the
AREAS.BBS-type file which AreaLink should search. This file
should be located in the directory pointed to by the IMAIL
environment variable (if set), or in the directory from
which IMAIL is run if the IMAIL variable is not set.
The format of the AREAS.BBS file is the same as that used
by most programs. Each line is composed of three fields.
The first is a board number or a subdirectory name, and
must be present in order for IMAIL to correctly extract the
information it needs. The second field is the name of the
echo area. The third field is the list of export addresses;
this field is not required. Note that IMAIL will discard
the first line of the file, as well as any beginning with a
semi-colon (';').
The "Send to" column should contain the name of the program
to which the net mail message will be sent, such as for
example AREAFIX, AREAMGR or IMAIL. If you are unsure of
what to put here, contact your uplink. Note that AreaLink
will behave a bit differently if AREAFIX is specified
instead of another name.
The last column, "Password", indicates the password the
uplink has assigned to your system. You will need to
contact your uplink to have one assigned to you.
5) Product Codes
This small and apparently insignificant menu is really very
important. It allows you to indicate programs which produce
Type 2+ information in the packet header. (For more
information about this and the Capability Word, see Chapter
13. Section a.)
With this information, IMAIL TOSS will know how to correctly
process incoming mail. If it finds a packet with no
capability word, it will scan the list of product codes
defined in this menu to see if the packet really contains
zone and point information. If the packet was produced by one
of the programs whose code is listed here, then it will treat
the packet as it is fully Type 2+. Otherwise it will be
treated as "Stone Age".
Note that the product codes must be entered in hexadecimal.
6) No Import
In this screen, you specify the names of persons (or
programs) which IMTHINGS IMPORT should ignore. For example,
if you wish messages addressed to AreaLink not to be imported
into your net mail area, you would specify AREALINK here
(case is not significant). Similarly, if you do not want net
mail addressed to you to be imported, specify your name in
this menu.
If you specify a '*' wildcard at the end of a name, anything
starting with that name will not be imported.
See Chapter 9. Section a. for information on IMTHINGS IMPORT.
7) Other Parameters
This menu is a "catch all" for various options which control
how IMAIL operates.
Most of the options available are of the "on/off" type; in
other words, specifying 'Y' will enable the option, while 'N'
will disable it.
- ARCmail 0.6 Compatibility
If this option is set, IMAIL will generate compressed mail
bundles that conform to the ARCmail 0.6 naming standard
when sending to systems marked in the node manager as
"Stone Age", or to systems not listed in the node manager.
Systems listed as "Type 2+" will have a special naming
scheme. (See Chapter 5. section e. for information on the
Capability Word).
If this is set to "No", then IMAIL will always use its own
internal method for the naming of outbound compressed
files.
Note that the setting of this flag will be ignored when
IMAIL generates ARCmail to point addresses.
- Number of Dupe Records
This field indicates how many dupe records IMAIL will save
in the file IMAIL.DP for dupe checking. If the number is
set to zero, no dupe checking will be performed; this will
make a bit IMAIL faster, but certainly less secure.
- Auto-add New Areas
Enable this if you want IMAIL to automatically create a new
area record whenever an echo mail message arrives in an
undefined area. The area record created will be marked as
Auto-Added; the node which originated the message (or
better, your uplink) will be inserted in the export list
for the new area.
If you allow the creation of these areas, please check the
Node Manager (to configure the system which are allowed to
create areas) and the Group Manager to specify some default
settings for these new areas.
- Multi-Tasking
If you are running in a multi-tasking or network environ-
ment, then set this to Yes. It will force IMAIL to make
more checks for locked files; the IMAIL semaphore will only
be created if this flag is enabled.
- Max Packet Size
With this option, you can specify the maximum size of the
packet files (*.PKT) that IMAIL will create. Use this if
your up and/or down links are short on disk space.
The number should indicate a size in kilobytes. If a zero
(0) is specified, there will be no limit imposed.
- Max Arcmail Size
Setting this to a non-zero value tells IMAIL not to add
further arcmail PKTs to a compressed arcmail bundle if its
size is bigger than specified.
Using this feature you can limit the size of the arcmail
bundles and therefore reducing the time which is needed to
transfer the bundle again if a session was interrupted.
- Max Message Size
Here you can specify the maximum message size of messages
generated by IMAIL. The value entered here should be around
10-15 kB. If it is too small, IMAIL will produce lots of
mails and if it is too high, some mail processors will get
trouble with these mails.
Currently this value is only used by IMALNK and by IMTHINGS
POST.
- Dupe Ring Handling
This option tells IMAIL how to handle echo mail if one of
the downlinks is already listed in the SEEN-BYs of this
mail. You have four options:
N Disable this check
W Write a warning to the logfile
Z Do not export to this downlink except in
zonegated echos
K Do not export to this downlink
If you use the options W, Z or K, IMAIL imports such a
message also into the dupe message area.
For further information on echo mail topology and related
problems see the section about echo mail below.
- Circular Path Detection
Here you can specify whether IMAIL should check also the
PATH lines of each message for circular paths.
IMAIL then searches the PATH line for you origin address in
this echo. If it finds your origin address, it also checks
whether the system before and after your address can be
found in the export list of this echo. If this is the case,
a circular path has been detected.
You have the following four options:
N Disable this check
W Write a warning to the logfile
K Do not export this message
If you use the options W or K, IMAIL imports such a message
also into the dupe message area.
For further information on echo mail topology and related
problems see the section about echo mail below.
- Kill dead echos
IMAIL allows you to delete echos without traffic after a
definable number of days. During the midnight maintenance
IMAIL marks echos without traffic.
A value of 0 disables this function, single echos can be
excluded by setting the field Auto Maint in the Area
Manager to No.
Dead echos are marked in the Area Manager, do not forget
that this check is only done during midnight maintenance
and the Area Manager shows only full days.
- Environment
This field will accept either a 'B' or an 'F', which
indicate respectively Binkley or FrontDoor.
By selecting Binkley, IMAIL will create "flow files" in
your outbound directory, containing lists of files which
the mailer should send.
If you select FrontDoor, IMAIL will generate file attach
messages. This method can be used for other mailers which
use file attach messages rather than "flow files".
This setting will also control the style of the IMAIL log
file.
- Truncate/Delete Sent ARCmail
Normally, when ARCmail has been sent by your mailer, the
file is truncated (that is, its length is set to zero).
This allows IMAIL to generate a new file name if it
processes more outbound mail for the same system.
If for any reason you want the mailer to delete the file
instead of truncating it, set this option to 'D'. However,
it is NOT suggested that this be done! Use this option with
caution!
- Single Bundle Extract
When enabled, IMAIL will try to extract one bundle or
packet at a time from compressed mail files.
This option should be used only on systems where disk space
is tight, because it will slow down the execution of the
program noticeably.
Currently, this option will extract the packets in a single
compressed file before processing, but it will extract ALL
the packets. In a future version, IMAIL will be able to
extract a single packet from the compressed file, process
it and then go on to the next.
- Send Return Receipt
If a net mail messages arrives with the "Request Return
Receipt" flag set, IMAIL will automatically generate a net
mail message to the originating system, stating that the
message arrived.
Note that the FLAGS RRQ kludge is not supported by IMAIL in
the current version. Since the message attribute is
defined, we decided to support it.
- Forward For Other Systems
If this option is enabled, IMAIL will forward mail
addressed to other system, by simply moving the packet to
your outbound packet directory. Otherwise, it will process
the packet as if it were addressed to you. Thus your normal
mail routing commands can take effect.
Note that if this option is disabled, it will become
impossible to route echo mail packets, because they will be
processed by IMAIL, and the messages will probably end up
in your Bad Message board.
- Delete empty netmails (TOSS)
While extracting netmails from inbound PKTs, IMAIL TOSS
checks whether they are empty netmails and deletes them if
this option is set to Yes.
- Swap Options
Before calling any external programs (compression or
decompression programs), IMAIL and IMPACK will swap most of
themselves out of memory, to leave room for the program
called. Once the program has completed, IMAIL (or IMPACK)
will be reloaded into memory and continue execution.
E - EMS. If you specify EMS, IMAIL will try to allocate
a certain number of EMS pages to try to swap itself
into. If this fails, it will swap to disk
X - Extended memory. If you specify this option, IMAIL
will try to swap to extended memory. If this fails, it
will swap to disk. (Note: Extended memory here refers to
XMS; in other words, you will need a driver such as
HIMEM.SYS in order for it to work.)
B - Both. This indicates that IMAIL should try both EMS
and extended memory, in that order. If both fail,
swapping to disk will occur.
D - Disk. IMAIL will swap its overlay buffers to disk
when needed. This is the default, and also the slowest
of the options.
- Add Via Lines
Registered users of IMAIL may disable the insertion of a
Via kludge in forwarded net mail by setting this option to
N (None) Via lines NOT added,
E (Export) Via lines added by IMPACK when
pack-routing netmail,
I (Import) VIA lines added by IMAIL TOSS when
netmail is found in inbound mail-bundles,
B (Both) Import and Export enabled (see above).
- Use FTSC Product Names
This options controls whether or not IMAIL TOSS will
display product names when processing inbound packets of
mail. If enabled, TOSS will show the name of the program
used to create the PKT file; otherwise, it will simply show
the program's product code.
In order to use this option, you must have a file called
FTSCPROD.??? available in the IMAIL home directory; if
found, IMAIL will compile this file into IMAIL.PR (after
which you may remove the FTSCPROD file). If the FTSCPROD
file is not available for compilation, IMAIL will behave as
if you had set this option to No.
The newest version of the FTSC product code list is
distributed by the FidoNet Standard Committee, it can be
requested at many systems (FTSCPROD.A??).
- Check for personal mail
While tossing, IMAIL has the possibility to check whether
there are new messages for the user defined as sysop. You
have four options
N (None) Disable this feature
L (Log) Write a log entry if a message was found
M (Mail) Create a netmail containing the headers
of the new messages
C (Copy) Copy each new message to a special area
The last option requires a special area PERSMAIL defined
in the Area Manager.
- Before Toss
This option was included to allow sysops to run a "mail
mangler" on extracted packets before IMAIL processes them.
If you wish to use this feature, then specify the full path
name of the executable program here, including arguments.
If you need to give the name of the PKT file, then place a
%P on the command line. For example:
MY_PROG.EXE %P /ZAP
The %P will expand to the name of the packet file.
Note that the program called MUST NOT delete the packet
file!
If you specify a batch file as Before Toss command, IMAIL
will automatically call the command processor by using
the environment variable COMSPEC (or COMMAND.COM if COMSPEC
is undefined).
- Sysop Name
This field is required, as it is used by IMAIL for the
generation of automatic messages and so on. IMAIL also uses
it to validate your registration key.
- Default Origin
This is the Origin line which IMAIL will use if one or more
of your echo areas have no Origin line defined.
You can define an own Origin line for each area in the Area
Manager.
8) Group Manager
The Group Manager has two functions. It allows you to assign
descriptions to the various groups which can be accessed from
the Area Manager and from the Node Manager. Moreover you can
define the default settings which should be used if a new
area arrives and is automatically created by IMAIL.
You can assign each system which is allowed to create areas a
"New area group". Each area created by this system will get
this group and the defaults of this group as defined in the
Group Manager.
- Comment
Here you can enter a short description of the group, it is
used when you select groups in the Area Manager and in the
Node Manager.
- Msg Base and Path
This feature allows you to control the areatype a new area
gets: Passthrough, QuickBBS, Squish and *.MSG.
If you select QuickBBS IMAIL tries to find a free board in
IMAIL.AR and assignes this to the new area (be careful that
all areas used are defined in IMAIL.AR).
If you select Squish or *.MSG, IMAIL calculates a CRC-32
from the areatag and creates either a new squish area in
the directory specified in Path or a new directory under
the directory specified in Path using this CRC for the
filename/directory to prevent collisions with already
existing areas.
- Other switches
The following switches only control the default settings of
a new entry created by IMAIL. They are described in the
Area Manager section:
Secure, # Days, # Msgs, Hide, Auto Maint, Mandatory,
Read Only, Tiny-Seens, Zone-Gate, Keep-Seens,
b. Compression Programs
In this section, you may specify the programs, along with their
parameters, to use in the creation of outbound compressed mail.
Also a short name for each program is asked which is used by
IMALNK (remote change of compression).
When you run IMSETUP for the first time, it will show defaults
for the following programs:
ARC, Arj, LHarc, PKARC/PKPAK, PAK, PKZip, SQZ, ZOO.
The default parameters are listed in Chapter 13. section b.
If you wish, you may add other programs of your own choice, but
do not leave any entries empty. Instead, if you do not intend to
use one (or more) of the predefined programs, replace it with
one that you do use.
Of course, all of the programs you intend to use must be present
somewhere in the DOS path.
You will then select which of these programs to use for mail
compression on a per-system basis, in the Node Export Manager
(see Section e.). If IMAIL needs to compress mail for a system
not listed, it will use the first of those given in this menu.
c. Decompression Programs
IMAIL automatically recognizes compressed files produced by the
following programs:
ARC, Arj, LHarc, PKARC/PKPAK, PAK, PKZip, SQZ, ZOO.
In this menu, you may change the name and parameters which will
be executed when compressed mail files are identified. The
default parameters "preinstalled" in IMSETUP are listed in
Chapter 13. section b.
It is also possible to define a program which should be invoked
if IMAIL is not able to determine the type of compression used
to create an ARCmail file. If this entry is not defined, IMAIL
will simply ignore the file.
Be VERY careful when changing these items, for a mistake might
produce very unexpected (and often unwanted) results. And
certainly do NOT try to use one program instead of another. A
compressed file identified as having been created by LHarc, for
example, cannot be decompressed by ARC!
If possible, have all of the decompression programs somewhere in
the DOS path, unless you are absolutely certain that you will
not be getting mail compressed by one or more of them.
d. Area Manager
The Area Manager is one of the most important parts of the
program, and also controls most of what IMAIL does.
When you first run IMSETUP, no message areas are defined. You
will see a screen with many different fields, all empty or set
to certain default values. These fields will be explained in a
moment, but first the editing keys.
1) Editing Keys
The following keys will allow you to edit, add, delete or
find area records. They are:
- F1: Edit
The F1 key allows you to edit the current message area
record (ie. the one currently being displayed). For the
meaning of each of the fields, see below.
If at any time during editing you wish to abort, simply
press ESC, and nothing will be saved. The same is true if
you were adding an area: it will be "forgotten".
- F2: Find
Pressing F2 brings up a window in which you may specify an
area name. If the area is found, it will be displayed. Wild
cards may be used: * expands to 0 or more characters, while
? will match any single character. The record may then be
edited with F1. Note that a wild card search is slower than
one in which the full area name is specified.
- F3: Global
If you need to make global changes to the area information,
pressing F3 will bring up the Global Edit menu. From this,
it is possible to edit the origin lines, origin addresses,
or to add, delete or replace systems in the export list.
In each case, the changes will be made on a per-group
basis. One or more groups may be specified, and the
modifications will be made for all echo areas which belong
to the selected groups.
To close the Global Edit menu, press ESC; you will be
returned to the main Area Manager screen.
- F4: Browse
The browse function will allow you to examine a list of all
the currently defined areas, and to move to a specific
record. The window shows some information about each area.
For example, an entry might read:
TEST_ECHO T:S G:X
The first field is the name of the area. This is followed
by the type of the area (Q for Hudson, M for *.MSG or S for
Squish), and by the group to which it belongs.
Autoadded areas area indicated with an [A], unlinked areas
with an [U].
- F5: Copy Area
The F5 key allows you to create a new echo but in opposite
to Ins it takes over some data from the current record
(like group, flag settings, downlinks).
- F6: Echo flow statistics
Pressing F6 pops up a small window which allows you to
check the current echomail flow information for the current
area.
- ESC/F10: Exit
ESC and F10 is used to exit the Area Manager.
- Ins: Add
Adds a new message area, and takes you into editing mode.
Added records are automatically inserted into the list so
that it is maintained in alphabetical order.
- Del: Delete
Deletes the current message area. You will be asked for
confirmation.
- Home: First
Takes you to the first message area (they are sorted in
ascending alphabetical order).
- End: Last
Takes you to the last message area.
- PgUp/PgDn: Previous/Next
The PgUp and PgDn keys move between the area records. Once
you have found the one you are looking for, you may edit it
with F1. (Note that the arrow keys have the same effect as
PgUp and PgDn.)
2) The Message Area Record
What follows is a description of the individual fields of the
message area record, and how they are used and changed.
All fields are required unless stated otherwise.
- Area Name
This is the name of the message area, sometimes called
"Area Tag". The name may be up to 50 characters long; it
will be forced into upper case. Special characters such as
'-', '_' and '.' may be used, but no spaces may appear.
Please be sure of the spelling of the name, since it is
used to identify into which area (board or path) an
incoming message should be tossed.
It is not possible to define two areas with the same area
name. IMSETUP will show a warning message, and you will be
prompted to correct the name. This is to prevent
cross-linked areas.
- Comment
Here you may enter a brief description of the area. This
description is used by AreaLink and IMTHINGS NOTIFY when
generating lists of the areas you have available, and may
also help remind you of the topic or purpose of the message
area.
Note that if the area was auto-added by TOSS or by
AreaLink, the comment will be set to something like
"Area autoadded by <node> on <date>"
IMAIL tries also to determine the description from the
forward link request file (if defined).
This field is optional.
- Origin Line
Here you may specify up to 63 characters which will be used
as the origin line for the area if it is an echo area (see
Chapter 10. for more information on Origin lines).
To this will be prefixed the string
* Origin:
and your origin address (see below) will be appended. The
total length must not exceed 79 characters.
If you forget to define this field, the default origin line
will be used. Note that if the BBS or editor program used
to write an echo message already adds an origin line, the
one defined here will not be used.
- Active
This by default is set to 'Y', which means that the area is
active. If set to 'N', IMAIL will behave as if the area had
not been defined.
This will allow you to disable an echo area for any reason
you may wish, without having to actually delete it, and
later re-enter it.
In opposite to unlinked areas, inactive areas are ignored
by AreaLink and cannot accessed by any downlink.
- Group
A letter between A and Z which identifies the group to
which this message area belongs.
Groups are used primarily by the AreaLink function to
indicate which nodes may request links to which echo areas.
For more information on this, see Section e., and Chapter
8.
If the area was auto-added by TOSS or AreaLink, this field
will be set to the group specified in the Node Manager's
New Area Group field (for the node which created the echo),
or to that specified in the Other Parameters menu, or to
'?' if neither of these are defined. In the last case, it
should be edited to the correct value.
You can access the Group Manager via F6 which allows you to
select one of the predefined groups.
- Secure
If enabled, IMAIL will check the address of the system
which sent the message in this area. If it is among the
export nodes listed in the Export List (see below), it will
be imported and processed; otherwise, it will be tossed
into your Bad Message Board.
If this switch is set to N, IMAIL will also ignore the
export only flag in the list of linked systems.
- Msg Base Type
Here you indicate the message base (format). Possible
choices are 'Q' for Hudson (QBBS or RemoteAccess), 'M' for
*.MSG, 'S' for Squish or 'P' for Passthrough.
- Type
In this field, you will indicate the type of message area.
You may specify that an area is Echo (E), Local (L), Net
Mail (N). In this way, you may include ALL of your message
areas in IMSETUP. For the purpose of handling echo mail,
only those areas which are of type Echo will be considered.
Local areas will be ignored by all IMAIL functions (but not
by IMTHINGS), but will ensure that you do not use a board
number twice. The special board BADMAIL, DUPES and PERSMAIL
are an exception to this rule, they are forced to Local by
IMSETUP.
Net mail areas are used by the IMPORT function of IMTHINGS.
- Board
If the area is of type Hudson, then in this field you
should specify the board number corresponding to the
message area.
The board number may be between 1 and 200 inclusive (the
upper limit is imposed by QuickBBS/RA).
IMSETUP will not let you use the same board number twice,
because you would be cross-linking echo areas. If you press
F4, a list of all unused board numbers will be shown, and
you may select one from it by pressing ENTER. If you are
changing the board number, the highlight bar will be placed
on the currently defined board number; ESC will allow you
to retain the current definition.
TOSS uses this number when importing echo messages, since
the QuickBBS/RemoteAccess message bases contain no
indication of the area name. Similarly, SCAN uses this to
derive the name of an echo area when exporting mail.
- Path
If the message area is of type *.MSG or Squish, then in
this field you should specify the directory or path name of
the message base.
If the area is of type *.MSG, the directory in which the
the messages will be placed should be specified. For
Squish-type areas, specify the directory and the base file
name of the area (ie. directory plus file name without
extension).
- # Days
This item is used by IMTHINGS KILL /U (see Chapter 9.
Section c.) to determine which messages to kill: it will
mark as deleted any messages older than the number of days
specified here. If this field is left at zero, no messages
will be killed, unless the "# Msgs" field below is
specified.
The maximum value which can be entered in this field is
255.
If the area is marked as Passthrough, this field has no
meaning.
- # Msgs
This is used by IMTHINGS KILL /U (see Chapter 9. Section
c.) to determine how many messages to leave in this board.
If this field is left at zero, it will be ignored, and no
messages will be killed, unless the "# Days" field (see
above) is specified.
Naturally, if the area is Passthrough, this field has no
meaning.
- Hide
Enable this option if this area should not be displayed in
any AreaLink report of available areas. Moreover it cannot
be linked with a wildcard request.
- Unlinked
Together with Auto Maint, this field controls the unlink
status for the current area. If this field is set to yes,
IMAIL has unlinked this area after the last downlink has
unlinked it from your system and the remaining system was
listed as uplink in the Forward Link Request Manager.
The echo will still appear in your list of available areas
and if a system requests this area, IMALNK automatically
requests this area from your uplink again.
- Auto Maint
If this option is set to N the unlink check and the dead
echo check are disabled for this area, so it will remain
linked to your system.
- Mandatory
If you set this field to yes, no downlink can unlink from
this echo using the AreaLink functions. This can only be
done manually.
- Read only
If this option is enabled, every system linking this area
gets an export only flag (which can be removed manually by
the sysop). This flag prevents unauthorized downlinks from
posting messages in restricted (read only) areas.
- Tiny-Seens
Enable this option if you want to strip all the SEEN-BY
information from an incoming echo message before it is
re-exported.
In this case, the outgoing message will contain only the
SEEN-BYs of your downlinks. Note, however, that if the area
is not marked as passthrough, and if the Keep-Seens option
(below) is active, the message will be imported with the
original SEEN-BY information.
- Zone Gate
This field is similar to the Tiny-Seens field (above). It
indicates that IMAIL should strip all information from the
SEEN-BY line when exporting to a system which is in a
different zone, except for your address and that of the
downlink.
Note that when the message is imported in your message base
(if the area is not passthrough) the original SEEN-BY lines
will be preserved.
- Keep-Seens
Enable this option if you want to import the SEEN-BY
information into your message base. If disabled, the
SEEN-BY lines will be stripped from the message.
- Origin Address
Pressing F1 while editing an area will allow you to choose
the address to use in the Origin line of the message.
You will be presented with a window containing a list of
all the addresses defined in the "System Addresses" menu;
select one of these.
This address will also be used in the PATH line of the echo
message, as well as in the list of SEEN-BYs.
Note that only the net and node numbers will be placed in
the SEEN-BYs and PATH lines; the use of zone and point
numbers is not accepted. However, IMAIL is able to parse
zone and point information from these lines, if found.
- Seen-Bys
Pressing F2 while editing an area will allow you to choose
one or more addresses to add to the SEEN-BY line for that
area.
If you do not select any addresses, then the one specified
as "Origin Address" will be used.
Note, as above, that zone and point numbers will not be
placed in the SEEN-BY lines generated by IMAIL.
- Linked systems
Pressing F3 will bring up the Export List Manager. Here,
you may specify up to 60 systems to which this echo will be
exported. At least one node must be defined to TOSS or SCAN
to/from the area.
In this menu, you may also indicate that a system is
"Export-only" or "Import-only". "Export-only" means that
IMAIL will export mail to this system, but will not accept
incoming mail, in this area from this system. This is only
valid for "secured" areas. "Import-Only" indicates that
IMAIL will accept incoming mail from the system, but will
never export to it.
It is also possible to see whether a node has been marked
as "Paused", and to toggle this flag (see Chapter 8.
section b.).
3) Special boards
IMAIL uses three special areas for some internal purposes. At
least the bad message area has to be defined. The dupes area
and the personal message area may be set to passthrough.
- Bad Messages
Messages flagged as "bad" will be tossed into this message
area. These include echo mail messages arriving from
unlisted systems when "Secure" mode is active for that
area, as well as echo mail in unrecognized areas.
You should first choose if you want the area to be of type
Hudson (Q), *.MSG (M) or Squish (S). If you select Hudson,
then you must supply a valid board number; otherwise, you
should specify a path name.
This record is required, they hardcoded areatag is
BADMAIL
Note: this area should NOT be used for anything except
"bad" mail! If you post messages into this board, there is
a distinct possibility that the messages will be sent to
other systems should any areas be automatically added.
- Dupe Messages
This message area is the one into which all messages
flagged as duplicates will be tossed. If not defined, dupes
will simply be killed (deleted).
As with the Bad Message Area, first select the type of the
message area (Hudson, *.MSG or Squish), and then the board
or path.
The hardcoded areatag for this record is
DUPES
Note: This board should not be used for anything except
duplicate messages.
- Personal Message Board
IMAIL can check the echo mail while tossing for new mail
for the person defined as sysop in IMSETUP. If you enable
this feature you can select that these mails are copied
into a special board, the Personal Message Board. This area
The hardcoded areatag for this record is
PERSMAIL
Note: This board should not be used for anything except
personal messages.
e. Node Manager
The Node Manager is used to specify information regarding the
systems to which you export mail, including which program will
be used to compress outbound mail for the system, as well as
what type of file attach to generate.
1) Editing Keys
The following keys will allow you to edit, add, delete or
find node records. They are:
- F1: Edit
The F1 key allows you to edit the current node record (ie
the one currently being displayed). For the meaning of each
of the fields, see below.
If at any time during editing you wish to abort, simply
press ESC, and nothing will be saved. The same is true if
you were adding an entry: it will be "forgotten".
- F2: Find
Pressing F2 brings up a window in which you may specify a
node number. If the address is found, it will be displayed.
It may then be edited with F1.
- F4: Browse
The browse function will allow you to examine a list of all
the currently defined nodes, and to move quickly to a
specific record. The window shows some information about
system. For example, an entry might read:
27:1331/1 C ANP
The letter following the node address indicates the status:
H means Hold, C is Crash, while N is normal. The letters
following are the groups to which that system has access.
- F5: Copy Record
The F5 key allows you to create a new entry but in opposite
to Ins it takes over some data from the current record
(like groups or flag settings).
- F10: Save
The F10 key is used to exit the Node Manager, saving any
changes made. Note that if IMSETUP detects the presence of
the IMAIL semaphore it will wait until the semaphore is
removed before saving.
- Ins: Add
Adds a new entry, and takes you into editing mode. Added
records are automatically inserted into the list so that is
it maintained in order.
Note that if IMAIL detects the existence of the IMAIL
semaphore it will not allow this function to be used until
the semaphore has been removed.
- Del: Delete
Deletes the current record. You will be asked for
confirmation.
- Home: First
Takes you to the first record (they are sorted in ascending
alphabetical order).
- End: Last
Takes you to the last node in the list.
- ESC: Exit
ESC is used to exit the Node Manager, abandoning any
changes made. You will be asked if you are sure that you
want to abandon the changes; if you reply 'N', you will be
returned to the Manager.
- PgUp/PgDn: Previous/Next
The PgUp and PgDn keys move between the records. Once you
have found the one you are looking for, you may edit it
with F1. (Note that the arrow keys have the same effect as
PgUp and PgDn.)
2) Address
Here you specify the address of the system. The Zone, Net and
node are required. If no point is specified, it will default
to 0.
3) Sysop
This field allows you to specify the name of the sysop of the
system. It is used for purely cosmetic purposes, by AreaLink
and IMTHINGS NOTIFY, when generating net mail messages, and
so is not required.
4) Domain
If you press F1 while editing, it will allow you to specify
the domain to which the system belongs. This is very
important in multi-domain environments, and when you have
different outbound directories for each domain (see Chapter
5., Section a., para 2) for more on this).
Select the domain from the list presented. If the system
belongs to a domain which is not listed, you should define it
in the Domains menu.
5) AreaLink Password
If specified, this will be the password that the system will
use when requesting areas or information from Area Link. If
no password is specified, the system may not request any
areas, even if one or more groups have been enabled.
For more information on Area Link, see Chapter 8.
6) Packet Password
For added security, you may specify that packets to and from
this node contain a password. The password may not be longer
than 8 characters. This password will ensure that mail from
that system cannot be sent by someone else under false
pretences.
7) Groups
List the Groups to which the system may have access. Up to 26
may be specified.
A system must have a Group enabled in order to be able to
request a link to any echo area which is part of that Group.
Using F6 you can access the Group Manager. It shows you the
groups currently assigned to that system and allows you to
add or remove certain groups very easy.
8) Notify
This flag indicates whether or not the specified node should
receive NOTIFY messages. By default, this is set to Yes,
indicating that the system will receive a notification
message from IMTHINGS NOTIFY.
9) Remote Maint
IMAIL may allow systems to carry out changes in the links for
other systems. These changes may be made via AreaLink, using
the %FROM meta-command (see Chapter 8. section b.).
In order to enable a node to make these changes for other
systems, this field must be set to 'Y'; the default is 'N'.
Remote Maint also allows the system to delete an echo area
from your list, or to change the name of an area. It thus
allows a lot of control over your system.
10) Rescan OK
This flag indicated whether the system is allowed to rescan
echo mail from your system, with an AreaLink request. Of
course, only those echo to which this node has access will be
rescanned.
11) Add to New
If you wish this system to be added to all new areas, then
set this field to Yes. Note that the node will only be
auto-added if it is in the same domain as the system which
"created" the new area.
12) Forward Requests
This flag selects whether this system is allowed to cause
Forward Link Requests, so you can prevent downlinks from
requesting areas from your uplink.
13) Create New Areas
If you wish to allow the system to create new echo mail areas
on your system, then set this flag to 'Y'. Otherwise, mail in
unknown echo areas, originating from this system, will be
tossed into the bad message area.
14) New Areas Group
If you have enabled the Create New option (above), this field
will specify the group to be used for echo areas created by
the node. If it is left empty, group will default to that
specified in the Other Parameters menu (see Chapter 5.
section a. para 7)).
15) Uplink
Together with "Program Name" and "FSC-0057 compatible" these
fields are used by the remote functions of AreaLink. If an
area is remote created, renamed or deleted, IMAIL informs
your links about this.
This field selects whether this system is one of your
uplinks (see below).
16) Program Name
This is the name of the AreaLink used by this system. It is
used by Arealink when forwarding delete, create or change
requests to the systems linked to a certain echo. See next
section ( 17) FSC-0057 compatible) for details.
17) FSC-0057 compatible
This flag specifies whether this system is FSC-0057 compa-
tible (which is only required concerning the remote delete,
rename and create request).
If such a function is executed on your system, all affected
downlinks are notified. If they are also FSC-0057 compatible
and are not an uplink, their AreaLink is also notified with
a message. The table below shows how AreaLink works in this
cases:
Remote request FSC-0057 not FSC-0057
delete delete request unlink request
create create request link request
rename rename request -------------
18) Message Status
Pressing F2 while editing a node's information will allow you
to change the message status for messages created by IMAIL
(like AreaLink replies). By default, this is "Normal", but
you may select one of:
Normal No status
Hold Hold message for pick up
Crash Send message Crash
Immediate Set Immediate flag
This status can be combined with a direct status, so messages
created by IMAIL can be prevented from being routed via other
systems. The destination system must either pickup them at
your system or you will have to send these messages directly
to their destination.
Note that any systems not defined in the Node Manager will
not have their messages marked DIRECT.
19) Attach Status
The F3-key allows you to change the file attach status. By
default, this is also "Normal", but you may select one of:
Normal No status
Hold Hold attach for pick up
Crash Send attach Crash
Immediate Send attach Immediately
This can be combined with a direct status, so file attaches
will never be routed via other systems. This is not available
in a Binkley environment because FLO-files are by default
direct
It is STRONGLY recommended that echo mail NOT be routed, so
if the node is your echo mail feed, it is best to mark it as
Direct.
Note that any systems not defined in the Node Manager will
have their mail put on HOLD for pickup.
20) Packer
If you press F4 while editing a node's information, you will
be able to select the program to use for mail compression. A
list will appear, containing the programs you defined in the
"Compression Programs" menu.
If you make no selection, by default the first program in the
list will be used.
Note that is is possible to specify that no compression
program be used (the last entry in the list). In this case,
PKT files addressed to the node being edited will not be
compressed, and will simply be file attached to the system.
This allows simple mail processors to receive mail from IMAIL
systems without needing to have one or more decompression
programs available.
21) Capability
The Capability describes the other system's mail processor.
Currently, two types are defined:
Stone Age
Type 2+
Using F7, you can set this field according to the capability
of the remote system's mail processor, if known. If you are
unsure, leave the field set to "Stone Age".
Note, that it is possible to define as Type 2+ mail
processors which are not normally detected as such but which
have the zone and point information. This is done in the
Product Code menu (see above).
For more information on the capability word, refer to the
FTSC documents FSC-0039 and FSC-0048. See also FTS-0001.
These documents may be available near you; otherwise you
should be able to file request them from 1:1/20. Refer also
to Chapter 13. Section a.
Note that IMAIL will always generate "Type 2+" information in
the packet header, and identify itself as a Type 2+ mail
processor, regardless of the setting of this field.
22) Cap Handling
This field allows you (using F8) to define how IMAIL will use
the setting defined in the Capability field when handling
inbound mail. If it is set to "Force", IMAIL will always use
the setting defined in the Capability field, regardless of
what the actual format of the inbound packet(s) might be.
Instead, if set to "Auto", IMAIL will try to determine the
type of packet by examining the Capability Word and its
validation copy and/or the product code, and process the file
accordingly.
Please note that IMAIL cannot correctly handle points which
use "Stone Age" mail processors, unless they are using
fakenet addresses.
f. Pack Routing
In this menu you may specify default routing for IMPACK (see
Chapter 6. Section 7.); in other words, you may specify that net
mail for one or more systems be compressed in a packet addressed
to another system, from which (presumably) the mail will be
forwarded on.
The menu is composed of two "Route Via" columns, which indicate
the nodes via which net mail will be routed. For reasons of
space, the routed and excepted nodes are not shown unless the
appropriate function key is pressed.
If no systems are listed as "Routed Systems", IMPACK will simply
look for and compress mail for the "Route Via" address.
To edit these entries, position the cursor on the desired row
and press ENTER. You will then be able to edit the "Route Via"
address. Once finished, you may edit the list of "Routed System"
by pressing F1. It is also possible to specify one or more
"excepted systems" by pressing F2.
It is possible to insert new entries between existing ones by
pressing INS, and to delete entries (permanently!) by pressing
DEL.
IMSETUP supports the use of the "*" macro when specifying the
"Routed Systems". This macro may be used in place of the net,
node or point fields (the zone should always be given). For
example:
2:* All net mail messages addressed to
systems in Zone 2
2:246/* All net mail messages addressed to the
nodes in Zone 2, Net 246
2:246/100.* All net mail messages addressed to the
points of node 2:246/100. This is
equivalent to:
57:4980/100 This is treated as if you had written
57:4980/100.*; in other words, it will
act on all messages to the "boss" node
and his points.
If you wish to indicate only certain
points (or the node itself as .0), you
will have to specify them explicitly:
2:246/100.1 This will pack messages for point 1 of
the system 2:246/100 via the node
specified in the "Route Via" column.
If you do not specify the Zone, IMSETUP will use the Zone as
defined in your primary address.
Routing via itself:
If you use the ALL macro '*' as Via System, IMPACK will pack all
messages matching this entry via the node itself, for example
Route Via: *
Routed Systems: 2:246/55
Routed Systems: 2:246/48
Routed Systems: 2:246/37
tells IMPACK to packs the netmail for 2:246/55 via 2:246/55,
2:246/48 via 2:246/48 and 2:246/37 via 2:246/37. Using this
feature you can collect several entries to one.
An example might serve to illustrate how this all works. If you
have two entries such as the following:
Route Via: 2:246/55
Routed Systems: 2:*
Excepted Systems: 2:245/* 2:242/*
Route Via: 2:242/53
Routed Systems: 2:*
Excepted Systems: (none)
Thus all mail addressed to systems in Zone 2 would be routed via
2:246/55, EXCEPT for mail addressed to systems in net 242 and
245. Since the list is processed top-down, mail for systems in
nets 242 and 245 will be pack-routed via 2:242/53.
g. Import/Export Functions
1) Export Areas.Bbs
Here you can create a standard Areas.Bbs file, IMSETUP will
ask you for the name of the file.
2) Export GoldED Areafile
This function creates an include file for GoldED and uses
already the enhanced format (up from GoldED 2.41).
6. IMAIL COMMAND LINE OPTIONS
Once you have configured the program via IMSETUP, you are ready to
use IMAIL. There are three separate commands or functions
"contained" in IMAIL, and they are invoked via the command line.
The syntax used to invoke IMAIL is:
IMAIL TOSS | SCAN | /?
The switch ? may be prefixed with a dash (-) or a slash (/); IMAIL
will recognize both. If no command is given, IMAIL will display a
help screen, and return to the DOS prompt.
Here is a description of the commands.
a. /? - Help
This will cause IMAIL to display a brief summary of its command
line options on the screen. Any other commands will be ignored.
b. TOSS - Toss Incoming Mail
This enables IMAIL's TOSS function. This will search your
inbound files directory for mail, either compressed or in PKT
form, and toss it into your message base; net mail messages will
end up in the net mail subdirectory, while echo mail will be put
into the correct message area.
The TOSS function will automatically forward any echo mail to
other links, as well as net mail messages. Outgoing mail is
automatically compressed, and a file attach message generated
(unless the /X option is used).
The following is important when working in a multitasking/net-
work environment.
When compressing outgoing mail, IMAIL fully supports the Front-
Door 2.10 CRC-semaphores and the Binkley BUSY-flags. So IMAIL
can work while your mailer is still online. Without this support
(like under FrontDoor 2.02) you should not leave your mailer
online while IMAIL is compressing because it may cause file
access problems and loss of mail. This does not affect TOSS.
If TOSS finds that there is insufficient free space on the
working drive while processing, it will automatically compress
all outgoing mail before going on. This should help prevent disk
full errors.
Should TOSS encounter an ARCmail file from which it cannot
extract the mail packets successfully, it will rename the file
to have an extension of .BA? so that you can look at it, and so
the file will not be processed again.
For information on how TOSS handles the Capability Word, refer
to Chapter 5. Section e.
Note that IMAIL TOSS will return an ERRORLEVEL of 1 if it has
processed net mail messages. This fact can be used to
selectively call IMAIL ALNK only if net mail messages have been
received. For the full list of ERRORLEVELs returned, see Chapter
13. section d.
1) /B - Check Bad Message Board
Use this switch is you wish to force IMAIL to check messages
in the Bad Message Area. This will override the configuration
setting (see Chapter 5. section a.).
What will happen is this: if an echo message is found, IMAIL
will search to see if it belongs to an area defined in your
Areas file (IMAIL.AR); if the correct are is found, the
message will be moved to the correct area. However, if the
area is marked as Passthrough, the message will be deleted.
Please note that if you are tossing dupes into the Bad
Message Board (rather than having a separate board for them),
then any dupes found may also be moved. This option is useful
in those cases in which your echo feed has "turned on" an
area which has not yet been defined in your areas file.
2) /X - No Compression
The /X switch will force TOSS to not compress any outgoing
packets which it has generated. This is useful only in
multi-tasking environments.
The reason for this is that there can be problems if IMAIL is
running and the mailer tries to transfer the ARCmail file. In
some cases it could happen that the mailer truncates a file
while IMAIL is trying to access it; IMAIL hangs with a
sharing violation:
IMAIL checks the file, it is unaccessed; the mailer accesses
the file and transfers it; IMAIL tries to access the file and
gets a sharing violation; the mailer truncates the file, but
IMAIL still tries to access the file and gets an invalid
archive.
Use this switch with caution! If you are not running in a
multi-tasking environment, it should not be used, since it
will leave packets that have not been compressed, and with no
corresponding file attach message.
Naturally, a later run of IMAIL TOSS (or SCAN) will find the
unprocessed packets and process them into ARCmail.
c. SCAN - Scan for Outgoing Mail
This evokes the echo/net mail SCAN function. The message base(s)
will be searched for outgoing net and echo mail, exporting it to
packets.
If the messages are echo mail, a packet will be generated for
each of the downlinks listed for the area; a net mail message,
on the other hand, will be exported to a MSG-style file, and
placed in your net mail directory, where it can be pack routed
and compressed with IMPACK - IMAIL will not compress it.
For echo mail, if the destination system is listed in the Node
Manager, the appropriate compression program will be called to
compress the packet; otherwise, the first program listed will be
used (by default, ARC).
Regarding echo mail, SCAN will use the origin address as
specified in the IMSETUP Area Manager, rather than trying to
extract this information from the message header.
1) /D - Disable Dupe Checking
Normally, SCAN will check that a message about to be exported
in not a dupe, by checking the dupe database (IMAIL.DP). If
you are sure that you will never export duplicate messages,
you can speed up SCAN by disabling this check; however, this
is not advisable.
2) /F - Force Complete SCAN
If for any reason you suspect that IMAIL has not scanned out
all the the mail which should be exported, run it with the /F
switch. This will bypass the use of the ECHOMAIL.BBS,
NETMAIL.BBS and/or ECHOSCAN.LOG files generated by the BBS
and/or message editor, as well as the internal counter IMAIL
uses to keep track of which message it last scanned.
3) /Q - Only Hudson
If you wish to have IMAIL process only the Hudson message
base (QuickBBS or RemoteAccess), then you may run SCAN with
the /Q switch.
4) /S - Only MSG/Squish
This switch has the opposite effect of /Q: it will cause SCAN
to process only *.MSG and Squish message areas, ignoring the
Hudson message base (if present).
5) /X - No Compression
The /X switch will force SCAN to not compress any outgoing
packets it has created.
For a detailed explanation of this, see the /X switch as used
in TOSS (Section b. above).
7. IMPACK - Pack Net Mail Messages
This is IMAIL's net packer. The IMAIL Net Mail Message Directory
will be searched for outgoing net mail messages, which will be
compressed into ARCmail compressed files according to the
information given on the command line, and specified in IMSETUP
(see Chapter 5. Section f.).
Note that this command operates only on MSG style messages. Net
mail messages in the Hudson/Squish/*.MSG message areas will be
exported by the SCAN command and thereafter treated as normal net
mail.
The syntax of IMPACK is:
IMPACK [/N] [/C] [/D] [/H] [/R] [/X]
[z:n/nd[.p] [[...] VIA z:n/nd[.p]]]
(The square brackets enclose optional elements.) 'z:n/nd.p'
represents a network address in the usual form:
zone:net/node.point
where the point field is optional. If not specified, messages
addressed to point of the given system will be packed along with
the mail for that system. If you are a "boss" node, net mail for
your points will never be pack routed via another node, unless
explicitly forced with the ".*" macro (see below).
As with IMSETUP, the net, node and point fields may be replaced
with the '*' macro. If you omit the zone field, the zone defined
for your primary network address will be used by default.
If more than one system is given on the command line, then there
MUST be a 'via' node; that is, a system for which all the mail for
the preceding systems will be packed. Therefore, a command such as:
IMPACK 2:* 5:* 2:2/1
is not valid, and IMAIL will complain. Similarly, remember that if
you write
IMPACK *
you are specifying more than one system, in which case, there must
be a 'via' node.
When run, IMPACK will scan the command line for routing commands
and act on them, after which it will process the default routing
commands given in IMSETUP, which means that you may override the
defaults. If no parameters are given on the command line, IMPACK
will simply act on the defaults.
For example, the command:
IMPACK 2:* 5:* VIA 2:2/1
will collect any outgoing messages for all systems in zones 2 and
5, as well as messages for 2:2/1, and compress them into a file
attach for 2:2/1.
Please note that by default mail for points will always be routed
via the boss system. Therefore the commands
IMPACK 2:246/55.*
and
IMPACK 2:246/55
are equivalent. In both cases all mail for the system 2:246/55 and
any of its points will be compressed into the same file.
As another example, you may specify:
IMPACK * VIA 2:2/1
If your primary zone is 2, this will pack all outgoing mail for
systems in zone 2 via the system 2:2/1.
If you are a "boss" node (that is, you have points), net mail for
points can only be pack routed explicitly. For example:
IMPACK 2:246/100.* VIA 2:246/100.1
This applies also to default pack routing. Also note that it
applies only to 4D addressing (addresses which use the point
number); fake net addresses will not be checked, so care should be
taken that net mail destined to a fakenet address is never pack
routed out of your point net.
Messages marked as Crash or Hold will only be processed and packed
if the /C and/or /H switches (described below) are specified.
Messages which are file attaches, file requests, update requests,
or which have the IMMediate, DIRect or LOCKed status will NEVER be
packed.
a. /N - No Default Pack Routing
If for any reason you wish IMPACK to ignore the defaults given
in IMSETUP, suffix the switch /N to the command line. In this
case, IMPACK will simply process the command line.
Note that the command
IMPACK /N
effectively tells IMPACK to do nothing, since no route commands
are given in the command line, and the /N switch tells IMPACK to
ignore the defaults.
But if PKTs are pending in the temporary outbound pkt directory,
IMPACK will compress these PKTs into arcmail bundles.
b. /C - Pack Crash Messages
If you want IMPACK to pack messages marked with Crash status,
specify the /C switch on the command line.
Otherwise, IMPACK will by default NOT pack Crash messages.
c. /D - Pack Direct Messages
If you specify this switch, IMPACK will pack messages which are
marked as Direct. By default, such messages are not packed.
NOTE: messages marked as direct will not be routed, unless the
/R switch is also specified (see below). So for example, if you
have a message addressed to 2:310/11, and it is marked direct,
you cannot pack route it with the command
IMPACK 2:all via 2:310/0
Without the /R switch, direct messages will only be packed if
"routed" to their destination. For example:
IMPACK 2:310/11
d. /H - Pack Hold Messages
If you want to pack messages marked as Hold along with "normal"
messages, specify the /H switch on the command line.
Normally, IMPACK will not pack messages with the Hold bit set.
e. /R - Pack Route Direct
If you specify the /D switch (see above), net mail messages will
not be pack routed unless they are being packed to their
destination. This behaviour can be overridden with the /R
switch. In this case, IMPACK will pack route net mail marked as
Direct as though this flag had not been specified.
Use this switch with care, since the Direct flag is =not=
stripped from the net mail message, and might cause your uplink
considerable grief! Please check with your uplink before using
it!
Note that if the /D switch is =not= specified, this switch will
have no effect.
f. /X - No Compression
This switch has the same effect as the /X switch in IMAIL SCAN
or TOSS. For more information, see Chapter 6. section b.
g. /? - Help
If you do not give IMPACK any parameters, or if you specify the
/? switch, it will display a brief summary of its options.
8. IMALNK
AreaLink is a function which allows other systems to request echos
from your system without the need for you to manually insert them
in the areas' export list. It is similar in function to AreaMgr
(which is part of TosScan), or to AreaFix. AreaLink is not fully
compliant with FSC-0057 (rev 3), but will implement full compliance
with one of the next releases.
What happens is this: a system sends a message addressed to IMAIL
on your system. Instead of the subject, he places a password. In
the body of the message will go the list of areas to which the
other system wishes to be linked, or areas which he no longer
wishes to receive. The system may also request information from
IMAIL by including one or more of the supported meta-commands.
In order to be able to use AreaLink, a system must be defined in
your Node Manager (See section e. of Chapter 5.). When the request
is processed by AreaLink, it will check that the password given on
the subject line of the message matches the one defined in the node
manager.
Also, AreaLink will only allow a system to request areas belonging
to one of the groups to which he has access.
When allowing rescan requests you should consider that IMALNK only
creates the PKTs for the downlink but does not compress them into
the arcmail bundles. You have to call IMAIL or IMPACK for that
purpose!
a. Format of the Request
As outlined above, a request to AreaLink takes a specific
format. Here is an example:
From: John Doe on 2:246/55
To: IMAIL on 2:246/47
Subject: password
-------------------------------------------------------------
+SYSOP <= Request to add area
+SYSOP,R <= Request to add area with rescan
+SYSOP,R=10 <= Request to add area with rescan
of the last 10 messages
=NEWS,R <= Request to update area with rescan
=NEWS,R=20 <= Request to update area with rescan
of the last 20 messages.
-PENPAL <= Request to remove area
~FRIENDS <= Request for remote deletion
%DROP FRIENDS <= Request for remote deletion
&TEST <= Request for remote creation
%ADD TEST <= Request for remote creation
#OLD.ECH NEW.ECH <= Request for name change
%CHANGE OLD.ECH NEW.ECH <= Request for name change
%QUERY <= Request for active area list
%LIST <= Request for available area list
%UNLINKED <= Request for unlinked but available
areas
%INFO <= Request for general information
%RESCAN <= Request to rescan new and updated
areas
%PWD xxxx <= Request for password change
%COMPRESS xxx <= Request to change compression
program
%HELP <= Request for help on AreaLink use
All names, the password, area names and meta-commands may be
given in any combination of upper and lower case.
As can be seen, in order to request that an area be added, the
name of the area may be prefixed with a plus ('+') sign, whereas
to have a area removed, it =must= be prefixed with a minus ('-')
sign. The plus sign is optional.
Wildcards may be specified within area names. AreaLink
recognizes and handles the following:
* Matches 0 or more characters. For
example, IM*L will match IMAIL.
? Matches a single character. So ?MAIL
will match IMAIL and FMAIL.
[a-d] Matches any character in the range 'a'
to 'd'
Thus to request that all areas available to you be linked, you
could specify
+*
The '~' character indicates a remote deletion request; for more
information, see Section e. below. The '#' character indicates a
request to change the name of an echo area; this is described in
Section f. The '%', on the other hand, is used to prefix the
meta-commands recognized by AreaLink; these are described in
Section b.
Note that requests may be addressed to any one of:
IMAIL
AREALINK
AREAFIX
AREAMGR
AreaLink will recognize any of the above "names".
Optionally, the message may end in a tear line ('---'), followed
by any text (usually a message to the sysop). In this case, the
request will not be deleted. If the message contains no tear
line, it will be removed once processed.
b. Meta-Commands
IMAIL supports several meta-commands in AreaLink requests. These
are:
1) %COMPRESS
This allows a sysop to request that your system use a
different compression program be used to create ARCmail files
bound for his system. If no valid compression program is
given, AreaLink will respond with a list of the available
programs.
The format of the command is:
%COMPRESS <program>
where <program> should be the root name of a valid
compression program (eg. PKZIP, ARC, or whatever).
2) %FROM
The %FROM meta-command will allow another system to make
requests "on behalf" of a different system.
This is particularly useful for remote maintenance of someone
else's system. In order to do this, the system must have
Remote Maint enabled in IMSETUP (see Chapter 5. section e.).
The format of the meta-command is
%FROM <full node number>
where the address must include the zone and point fields of
the system which will be linked (or unlinked).
Note that the password (subject) of the message must be
correct for the system SENDING the message, not for the
system for which the changes will be made. The generated
reply will be send, again, to the system which sent the
request, not to the one for which the changes were made.
3) %HELP
This meta-command will make AreaLink send a help text to the
sysop. The help text to be sent may be defined in IMSETUP; if
none is defined, a standard text will be sent, explaining the
principle features of AreaLink.
4) %LIST
The %LIST meta-command will have AreaLink reply with a list
of all the areas available to the requesting system. In other
words, those which are marked as Active, and which belong to
a group listed as available for that system.
5) %NOTE
This meta-command is used to introduce a comment to the
sysop. It is equivalent to adding a tear-line in the message
body, but the use of %NOTE is preferred.
AreaLink requests containing a tear-line or a %NOTE will not
be deleted once processed.
6) %PAUSE
If a sysop wishes to temporarily unlink from ALL echos, then
he may send a message to AreaLink with the %PAUSE command.
This will cause the receiving system to stop exporting echo
mail without deleting the node from the export list for the
echo areas to which he is linked.
This command is revered with a %RESUME (see below).
7) %PWD
With this meta-command, a sysop can change the password he
uses to make AreaLink requests to your system. Note that if
no new password is specified, AreaLink will NOT respond with
the current password, for reasons of security.
8) %QUERY
If the message contains this meta-command, AreaLink will
reply with a list of currently active echos for the
requesting system
9) %RESCAN
This meta-command will allow a node to request that IMAIL
send all old mail in the areas requested. For example, if a
system requests to be linked to the SYSOP echo, and places a
%RESCAN meta-command in the message text, IMAIL will link the
system, and then scan your message base for any messages in
this area, and send them to the requesting system.
All the exported messages will have the same SEEN-BY lines as
they normally would, thus (hopefully) preventing duplicates.
However, the messages will be exported only to the system
requesting the rescan, not to all linked nodes.
In order to prevent the system which requested the rescan
from sending the messages out to other systems, AreaLink will
insert a special kludge into the message: ^ARESCANNED <addr>
where <addr> is the address of the system which requested the
rescan.
Note that if you have set the Allow Rescan option in IMSETUP
to "no" (see Chapter 5. Section 4)), then the rescan request
will be ignored.
10) %RESUME
%RESUME will reverse the effect of a %PAUSE command (see
above). It will reactivate the suspended link.
11) %UNLINKED
This meta-command is, in a sense, the complement of %QUERY
and %LIST. In other words, it will send a list of all
available echos which are NOT currently linked to the
requesting system.
12) %INFO
%INFO sends some general information (packer used, AreaLink
password, ...) to this system.
c. AreaLink Replies
When it has processed a request, AreaLink will generate a reply
message to the system who sent the request. This message will
contain the list of echo areas added and/or removed for that
system, as well as query and list information, if requested.
The message will be marked as Kill/Sent (ie it will be deleted
once sent) unless you have configured IMAIL to keep them (see
Chapter 5. Section 4)).
d. Forward Link Requests
Here you may define one or more systems as uplinks, specifying
the name of a file containing a list of echo areas available
on those systems.
If a system requests an echo area not currently available on
your system, AreaLink will search the files specified for the
required echo. If it is found, it will generate a request to the
given uplink. In this case, it will also automatically add the
area to your database, defining the area name, and marking it as
passthrough (as opposed to areas automatically added by TOSS);
the group will be undefined. The uplink and downlink systems
will be defined in the export list. Such areas will be marked as
"Auto-Added" in the IMSETUP Area Manager until they are edited.
e. Remote Delete Request
AreaLink will allow you to give partial control of your areas
configuration to another system: any system which has Remote
Maint (see Chapter 5. Section e.) enabled in the Node Manager
will be able to delete one or more echo areas from your system.
This feature is useful if, for example, you wish to allow your
boss or host system to automatically delete an area when it has
been discontinued.
In order for a system to delete an area from your list, it will
send a normal AreaLink request to your system, prefixing the
names of the areas to be deleted with a '~' character or with
a %DROP command. For example:
From: John Doe on 2:246/55
To: IMAIL on 2:246/47
Subject: password
---------------------------------------------------
~PENPAL <= Request to delete area or
%DROP PENPAL
In the above example, the system is requesting that an area be
linked to it, and at the same time, that the area PENPAL be
deleted from your configuration.
When AreaLink processes such a request, it will first send a net
mail message to any other systems which are linked to that area,
warning them that it has been deleted. It will then flag the
area as deleted and inactive, so that any requests to link to it
will be ignored. The next time IMSETUP is run, and the Area
Manager entered, the area will be removed completely from the
list.
f. Remote Create Request
This command allows to create an area remotely (similiar as if
the area is sent by a system which is allowed to create areas).
As for all remote commands, the system requesting to create an
area needs Remote Maint privileges.
The format of a Remote Create request is as follows:
From: John Doe on 2:246/55
To: IMAIL on 2:246/47
Subject: password
---------------------------------------------------
&PENPAL <= Request to create area
%ADD PENPAL
g. Remote Change Request
As with Remote Deletion requests (see above), a system which has
Remote Maint privileges on your system may request a change of
area name. What this will do is simply to change the name of the
area; no other variations will take place.
The format of a Remote Change request is as follows:
From: John Doe on 2:246/55
To: IMAIL on 2:246/47
Subject: password
---------------------------------------------------
#OLD.ECH NEW.CH <= Request to change name
%CHANGE OLD.ECH NEW.CH
The '#' character indicates a Change request. Following should
be the old area name; then, after one or more spaces should come
the new area name.
If AreaLink finds the old area name, and the node requesting the
change is active for that group, AreaLink will make the
requested change, advising all other downlinks of the variation
by sending them a net mail message.
h. Local Maintenance
IMAIL also allows the sysop to use AreaLink as if another sysop
had sent a request. This can be done by using one or more of the
command line switches described below.
When run from the command line, AreaLink is designed to mimic
its behaviour when it is parsing a request from another system.
(For more information on the single meta-commands, see Section
b. above.) The advantage of using AreaLink to make changes
instead of doing it from IMSETUP is that a net mail message will
be generated automatically, informing the system of the changes
made.
Note that each switch may appear only ONCE on the command line.
However, the /+ and /- switches may make use of the '*' wild
card. For multiple changes, it will be necessary to run AreaLink
several times.
The complete syntax accepted by AreaLink is:
IMALNK /N<addr>
/+<area>
/-<area>
/=<area>
/I
/L
/Q
/U
/R
/H
/P
/S
/D<area>
/C<area:area>
1) /N<address> - Node to Make Changes For
This switch indicates the node number for which you wish the
changes to be made. It will make AreaLink behave as it it had
received a request from that system, sending it a net mail
messages listing the actions taken.
If this parameter is omitted, AreaLink will act on behalf of
YOUR system. Thus most of the other switches are meaningless.
In particular, /I, /L, /Q, /H, /U, /R, /P, /S, /+, /- and /=
will be ignored.
If the /N switch is used, a net mail message will be
generated for that system, specifying the changes made. If
this switch is NOT used, a net mail message will be generated
to you.
2) /+<area> - Link Node to Area
Links the system specified by /N to the echo area. If /N is
not specified, this switch will be ignored. Wild cards may be
used, as illustrated in this chapter, section a.
3) /-<area> - Unlink Node from Area
Unlinks the system specified by /N from the given echo area.
If /N is not specified, this switch will have no effect.
Wildcards may be used, as explained in this chapter, section
a.
4) /=<area> - Update Node in Area
Updates the area for this node and has the same effect as an
unlink request followed by a link request. It is mainly used
when an already linked echos should be rescanned.
5) /I - General Information
This sends some general information (packer used, AreaLink
password, ...) to the system.
6) /L - List Available Areas
Sends the system a list of available echos, marking those
which are already linked. This switch is ignored if /N is not
given. (Corresponds to the %LIST meta-command.)
7) /Q - Query - List Linked Echos
Sends the system a list of currently linked echos. The switch
is ignored if no system is specified with the /N switch.
(Corresponds to the %QUERY meta-command.)
8) /U - List Available but Unlinked Echos
Sends a list of echo areas which are available but not
currently linked to the system. The switch will be ignored if
no system is specified with /N. (Corresponds to the %UNLINKED
meta-command.)
9) /R - Rescan
Perform a rescan of echos linked with /+. This switch has no
meaning if /+ and /N are both not specified. (Corresponds to
the %RESCAN meta-command.)
10) /H - Send Help
Sends the system the defined help text. This switch has no
meaning if no system is specified with the /N switch.
(Corresponds to the %HELP meta-command.)
11) /P - Pause
This will cause the receiving system to stop exporting echo
mail without deleting the node from the export list for the
echo areas to which he is linked.
This command is revered with /S (see below).
12) /S - Resume Sending
/S will reverse the effect of a /P command (see above). It
will reactivate the suspended link.
13) /D<area> - Delete Echo Area
Deletes the specified echo area. All links will be notified
of the deletion (Switch may be substituted with /~<area>).
14) /C<area:area> - Change Echo Name
Changes the name of an echo. The first echo tag is changed to
the second. (Switch may be substituted with /#<area:area>)
9. IMTHINGS
IMTHINGS is a program containing additional utilities for use with
IMAIL. It is used giving it a command and additional parameters,
which vary according to the command given.
All of the commands give a brief on-line help if followed by the /?
switch. For example, to get help on the SEND command:
IMTHINGS SEND /?
In most cases, the commands may be abbreviated to one or two
letters; for example IMTHINGS KILL may be given as IMTHINGS K.
However, IMTHINGS SORT must be abbreviated to IMTHINGS SO since the
SEND command also begin with the letter 'S'.
Supported message bases are indicated by a letter, as follows:
M = *.MSG
Q = Hudson (QuickBBS or RemoteAccess)
S = Squish
PLEASE NOTE: The Squish MSGAPI which is used in IMAIL and IMTHINGS
has a built-in limit regarding the number of messages it can handle
during certain operations. This limit is just over 5300 messages.
So it is suggested that you keep each Squish message area under
this limit.
a. IMPORT - Import Net Mail Messages [MQS]
The IMPORT function allows you to import net mail messages from
the net mail directory into the net mail area of the message
base. This is necessary is you wish to allow the users of your
BBS to read net mail addressed to them.
It will scan the net mail directory for net mail messages
addressed to one of your AKAs, and if found, import them into
the net mail area which corresponds to that AKA. Once imported,
the MSG file will be deleted. Note that net mail addressed to
any of the names specified in the IMSETUP No Import menu will
not be imported (see Chapter 5. Section a.).
The syntax of this command is:
IMTHINGS IMPORT /S
1) /S - Strip crash bit from imported messages
This parameter tells IMPORTS to strip a possibly present
crash flag from the message before it is imported.
NOTE: Net mail messages which are also File Requests or Update
Requests will not be imported. However, File Attach messages
will. So to avoid problems, it is best to run IMAIL TOSS before
IMTHINGS IMPORT.
b. INDEX - Rebuild index files [-Q-]
The INDEX command will rebuild the message base index files
(MSGIDX.BBS, MSGTOIDX.BBS and MSGINFO.BBS) from the MSGHDR.BBS
file. Use this if for any reason you suspect that one or more of
these files have somehow become damaged.
Note that INDEX is run automatically after the following
functions:
MOVE
SORT
The INDEX function has no command line parameters.
c. KILL - Delete messages from an area [MQS]
The KILL command allows you to mark as deleted some or all
messages in a specified message area. Note that KILL does NOT
pack the message base. Use IMTHINGS PACK for this.
With a Hudson message base, normally KILL will create a
temporary file to which it will write the new MSGHDR.BBS.
However, if it detects that there is not enough disk space, it
will overwrite the original file directly; this method is MUCH
slower.
Note that it is advisable to run IMAIL SCAN /F before running
this command; this will ensure that all outgoing echo mail
messages have been exported.
The syntax of the command is:
IMTHINGS KILL /A<areaname>
/B<board>
/D<days>
/K<days>
/N<number>
/Q
/S
/U
/O
/!
1) /A<areaname>
If specified, the /A switch should be followed by the name of
one of the echo areas, as given in the Area Manager. If this
switch is used, then the /B switch should NOT be given.
NOTE: If you specify the /U switch, this switch will be
ignored.
2) /B<board>
If specified, the /B switch should be followed by a message
board number. In this way, it is possible to "act" on message
board not defined in the IMSETUP Area Manager (for example,
local message areas). If the /B switch is used, then the /A
switch should NOT be given.
If you do not specify one of /A or /B, then KILL will act on
ALL message boards, unless the /U switch is given (see
below).
3) /D<days>
This allows you to specify that KILL should keep messages
younger than the given number of days. If the switch is not
used, then IMTHINGS will not check the date of the message.
Note that if the /U switch is given, the /D switch will be
ignored.
4) /K<days>
This switch allows you to have KILL delete old ARCmail files
and their respective file attaches. The <days> parameter
indicates the age of the message; in other words, ARCmail
files which are older than the given number of days will be
deleted.
If you choose to use this switch, it is recommended that you
advise your downlinks, so that they know that should pick up
their mail before it is deleted.
This feature works only in the FrontDoor environment because
it uses the file attach netmails to get the necessary infor-
mation.
5) /N<number>
If this switch is used, KILL will leave the specified number
of messages in the base, marking the rest as deleted.
Note that if neither /N nor /D are specified, then KILL will
mark ALL messages in the designated board as deleted, unless
the /U switch is given (see below). If both are given, the
KILL will ensure that both criteria are met, in which case it
may leave less than <number> messages in the area if it finds
"old" messages.
6) /Q - Hudson Only
This switch instructs KILL to only process the Hudson message
base (if defined). Squish or MSG message bases will be
ignored.
7) /S - MSG/Squish Only
This switch instructs KILL to process only *.MSG or Squish
message bases. If you have also defined a Hudson message
base, it will be ignored.
8) /U - Use Default Information
This parameter tells IMTHINGS KILL to use the information
given in IMSETUP to determine how many messages to kill. It
will operate on all boards defined in the Areas Manager,
leaving the given numbers of messages in the board, or
deleting all messages older than the given number of days.
PLEASE NOTE: if you use the /U switch, the /A, /B, /D and /N
switches will be ignored if also specified.
9) /O - Delete messages in undefined boards
In conjunction with /U this parameters tells KILL to kill all
messages which are in hudson boards not defined in the IMAIL
Area Manager.
10) /! - Allow All Messages to be Killed
This switch will allow all messages in a given area, or all
messages in a given message base, to be deleted.
d. LINK - Link Messages in Message Base [MQS]
In order to update the links between the messages and their
replies, run IMTHINGS LINK after each arrival of echo mail, or
at least once a night.
LINK scans the message base, looks for messages with similar
subject lines, and from them, creates links for each message,
which point to the previous message in the chain, and the next
message.
Note that the case of the subject line is not significant; thus
"Echo mail" and "Echo Mail" will match when creating links. Note
however that the search is performed ignoring any leading "RE:"
in the subject line.
IMAIL marks Squish/*.MSG areas when tossing new mails into them
which is used by LINK to skip areas without new messages. This
can be overwritten by using the /F commandline switch.
The syntax of this command is:
IMTHINGS LINK /C /Q /S /F
1) /C - Clean
If this switch is specified, LINK will remove all occurrences
of "RE:" (in upper and/or lower case) from the message
subject lines. Otherwise, the "RE:" strings will be left in
place, but still ignored when the link search is being done.
2) /Q - Hudson only
With this switch, LINK will be forced to process only the
Hudson message base.
3) /S - MSG/Squish only
This is the opposite of /Q: it will force LINK to process
only Squish and MSG type areas.
4) /F - Forced Link
By default LINK only links Squish/*.MSG areas which have been
marked by TOSS when new mail has been tossed into these areas.
This can be overridden using /F.
e. MOVE - Move Message Area [MQS]
The MOVE command allows you to move all the messages from one
board or area to another. The syntax of the command allows you
to specify the source and destination areas either by board
number or by area name.
IMTHINGS MOVE /R<src area> | /S<src board> | /F<src path>
/T<dst area> | /D<dst board> | /P<dst path>
Please note that all messages moved will have the Outgoing Echo,
Outgoing Net and Net mail bits cleared, so that they will not be
SCANned out again by mistake, thus creating confusion in the
network.
1) /R<src area>
If you know the area name as specified in IMSETUP's Area
Manager, you may use this switch. If you use this switch,
then do NOT use the /S switch.
For example:
IMTHINGS MOVE /RSYSOP /D12
will move all messages from the SYSOP area to board 12 (which
might be a local board).
2) /S<src board>
If the source board in not defined in the Area Manager, it
will have no area name; so specify the board number using the
/S switch. If you use /S, then do NOT use /R.
3) /F<src path>
Here you specify the source Squish/*.MSG path. SEND tests
whether this area is a *.MSG area (in this case you specify
the directory) or a Squish area (in this case you specify the
filename of the area without extension). If you use /F, then
do NOT use /R or /S.
4) /T<dst area>
You may specify the destination area name with this switch.
It is used in the same way as /R. If you use the /T switch,
then do NOT use /D.
5) /D<dst board>
If the destination board is not defined in IMSETUP's Area
Manager, you may specify the board number. See above for an
example of its use. If you use this switch, then do NOT use
/T.
6) /P<dst path>
Here you specify the destination Squish/*.MSG path. SEND
tests whether this area is a *.MSG area (in this case you
specify the directory) or a Squish area (in this case you
specify the filename of the area without extension). If you
use /F, then do NOT use /D or /T.
f. NOTIFY - Send list of linked echos [---]
The NOTIFY function will send a message to the systems which are
linked to you for at least one echo area, listing the echos to
which they are linked, as well as systems listed in the Node
Manager. Note that systems listed in the Node Manager which have
the Notify flag set off will not be notified unless explicitly
specified on the command line (see Chapter 5. section e.).
The syntax of the command is:
IMTHINGS NOTIFY [z:n/nd.p]
[....]
/N
/P
/W
where "z:n/nd.p" is a standard network address. The "*" macro
may be used, as with IMPACK (except, of course, that in this
case there are no "VIA" nodes). Note that
IMTHINGS NOTIFY *
notifies all systems in your primary zone only. If you have AKAs
in different zones or feed echo mail to systems in more than one
zone, and wish to notify ALL of your downlinks, simply give the
command
IMTHINGS NOTIFY
1) /N - No node manager
If you specify this switch, NOTIFY will not generate a
message to systems which are listed only in the node manager,
but are not listed in any of the echo areas' export lists.
2) /P - Notify AreaLink Password
If you wish to remind your downlinks of their AreaLink
password, specify the /P switch. The password will then be
included in the net mail message which is generated.
3) /W - Only Warn of Password Expiration
The /W switch will cause NOTIFY to only generate a message
warning about an expired AreaLink password, should this be
the case.
g. PACK - Compress message base [MQS]
In Hudson and Squish message bases, when you delete a message,
it is not actually removed from the base, but rather is just
marked in a special way. PACK will allow you to remove from the
message base those messages marked as deleted, thus recovering
unused disk space.
In *.MSG message areas, this concept does not exist, since
messages are physically deleted; so PACK will simply renumber
the message area.
For Hudson areas, PACK will normally create temporary files to
which it will write the new MSGHDR.BBS and MSGTXT.BBS files.
However, if it detects that there is not enough free disk space
to do this, it will overwrite the original files; this method is
considerably slower.
Optionally, it is also possible to have PACK renumber all net
mail messages.
In order to make PACK faster on Hudson areas, it does not try to
update the 3 index files; instead of this, it will call IMTHINGS
INDEX after having completed.
Note that it is advisable to run IMAIL SCAN /F before packing
the message base. This will ensure that all outgoing echo mail
messages have been exported.
The syntax of the command is:
IMTHINGS PACK /B
/P
/Q
/R
/S
/U
PACK is not able to keep track of the message links, so it may
be desirable to run LINK after PACK.
PACK will update the USERS.BBS file (if it is found) as well as
LASTREAD.BBS (this file keeps track of the last messages read in
each message area).
1) /B - Keep backup
If you specify this switch, PACK will not delete the backups
it made of the five files which comprise the message base.
2) /P - Pack IMAIL.AR
When deleting areas in IMAIL.AR, these records are only
marked as deleted but remain in the database. If you want to
remove them finally or rebuild the index files (IMAIL.?R) for
any reason, run IMTHINGS PACK /P. This will reconstruct the
areas files and removes deleted and duplicate entries.
If /P is given on the command line, all other switches will
be ignored by IMTHINGS PACK.
3) /Q - Hudson Only
If you wish to process only the Hudson message base, then
specify the /Q switch. *.MSG and Squish areas will be
ignored.
4) /R - Renumber
Giving the /R switch will have PACK renumber all net mail
messages.
5) /S - *.MSG/Squish Only
If you wish to process only *.MSG and Squish areas, then use
the /S switch on the command line. Any areas in a Hudson
message base will be ignored.
6) /U - do not change USERS.BBS
This commandline switch allows you to disable the update of
the user-base (USERS.BBS). It was added to prevent problems
caused when updating the USERS.BBS of RemoteAccess 2.0Gamma
which has different structures.
h. POST - Post message in echo area [MQS]
The POST function will allow you to post a message in an echo
area. It is particularly useful for posting echo message
statistics, for example.
The syntax of the command is:
IMTHINGS POST /F<filename>
/A<areaname>
/B<board>
/W<to_who>
/R<from_who>
/S<subject>
1) /F<filename>
The /F switch is used to specify the name of the text file to
post as the message. This file should be a simple ASCII file,
containing no special control characters. This parameter is
required.
2) /A<areaname>
To specify the name of the echo area in which to post the
message, use the /A switch. The name of the area may be given
in upper or lower case, or any combination of the two. If you
use this switch, do NOT use the /B switch.
3) /B<board>
Use the /B switch to give the number of the message board in
which to post the message, if the area is not defined in
IMSETUP's Area Manager. If you use this switch, then do NOT
use the /A switch.
4) /W<to_who>
You may optionally specify the name of the person to whom the
message is addressed. If this parameter is omitted, the
message will be addressed to 'All'.
If the /W parameter is used, the name should contain no
spaces; replace the spaces with underscores: /WTest_User
5) /R<from_who>
By default, POST will use the name defined in the Sysop field
in IMSETUP to indicate the name of the sender of the message.
If you want to use another name, specify it after the /R
switch. The name should contain no spaces; replace any spaces
with an underscore.
6) /S<subject>
You may also specify the subject of the message with the /S
switch. If this parameter is omitted, the message subject
will be 'News'.
If you do use this parameter, the text following the switch
should contain no spaces; replace them with underscores. For
example: /STest_message_#1
i. RECOVER - Unerase messages [-Q-]
The RECOVER command will allow you to "undelete" messages in
your Hudson message base. Naturally, it will only work if you
have not PACKed the base.
By default, RECOVER will "undelete" messages found in any
message area, prompting you at each message. However, you may
specify that it look for messages in a specific area, and that
it automatically recover all deleted messages it finds.
The syntax of the command is:
IMTHINGS RECOVER /A<areaname>
/B<board>
/U
1) /A<areaname>
If specified, the /A switch indicates the name of the echo
area to search for deleted messages. If given, then the /B
switch (see below) should NOT be given.
2) /B<board>
If specified, this switch indicates the board to search for
deleted messages. Giving the board number allows you more
flexibility, since local message areas might not be defined
in the Area Manager, and therefore would have no name - the
/A switch cannot be used. If you use this switch, the /A
switch (see above) should NOT be given.
3) /U - Automatic Mode
Automatic mode. If this switch is given, RECOVER will not
prompt you at each message. Instead, it will "undelete" all
messages it finds (if /A or /B are specified, only messages
in the specified message area will be recovered).
j. SEND - Send a file [---]
The SEND command invokes the IMAIL Robot. This will allow you to
send a file and/or message to another system, much like any
other Robot program.
The syntax of the SEND command is:
IMTHINGS SEND /F<filename>
/A<address>
/W<to_who>
/T<text>
/C | /H
/D
/K
/E
/Y<days>
/N<1-16>
/!
If a file name is given with /F, and the required file is found,
a file attach message will be generated in your Net Mail
directory. However, it is also possible omit the file name, and
simply specify a text file (with /T). In this case, a net mail
message will be generated, with no attached file. Note that
either a file or a message text (or both) must be specified; if
both are omitted, SEND will exit with an error.
1) /F<filename>
Indicates the full pathname of the file to be sent. This
parameter is not required if you simply wish to send a net
mail message.
If the filename contains wildcards, only the first matching
file will be sent. If the full path is not supplied, IMTHINGS
will use the current drive and path when generating the file
attach message. Note that if the file has zero length, it
will NOT be sent.
2) /A<address>
Specifies the destination address of the file. This parameter
is required.
The address should contain the zone, otherwise the zone of
your primary address will be used by default.
3) /W<to_who>
You may optionally specify the name of the person to whom the
file is being sent. If this parameter is omitted, the message
will be addressed to 'Sysop'.
If the /W parameter is used, the name should contain no
spaces; replace the spaces with underscores: /WTest_User
4) /T<text>
This switch allows you to specify the name of a text file to
be used as the "body" of the file attach message. If omitted,
the message will have no text. It may also be used to
generate a normal net mail message if the /F parameter is not
given.
5) /C - Crash
Mark message with Crash status.
This option is mutually exclusive with the Hold option below.
6) /H - Hold
Mark message with Hold status.
This option is mutually exclusive with the Crash option
above.
7) /D - Direct
Send message Direct. This means that in no case will the
message be routed via another system. It may be used together
with the /C or the /H option.
Use this flag only if your mailer supports the FLAGS DIR
kludge.
8) /K - Kill/Sent
Marks the message as Kill/Sent. In other words, once sent,
the message will be automatically deleted from your Net Mail
directory. Otherwise, it will remain, but be marked as Sent.
9) /E - Delete/Sent
Marks the message as Delete/Sent. This will cause the mailer
to delete the file once it has been sent.
Use this flag only if your mailer supports the FLAGS KFS
kludge.
10) /Y<days> - Newer than
Indicates that the file must be newer than <days> for it to
be sent.
This is useful for sending nodelist files, as you can then
specify a wildcard in the filename, and indicate that the
file be sent only if it is newer than, say, 6 days.
11) /N<0-15> - Alternate Address or AKA
With this switch, you may specify which of your addresses
should be used when sending the file. If /N is not specified,
SEND will attempt to find an address which best matches that
of the destination system.
If /N is specified, it may take one of several forms:
/N or /N0 - your primary address
/Nx - AKA 'x', where x may be between 1 and 15
/N<addr> - where addr is a full network address.
12) /! - send message without attach
This switch allows to create messages without fileattach and
realizes a POST function for the netmail.
k. SORT - Sort the Message Base [-Q-]
The SORT function will sort the Hudson message base by message
date. What it does is to read in the MSGHDR.BBS file, saving the
message number and time stamp. The list thus created is sorted,
and then the MSGHDR.BBS file is rewritten, following the order
of the new message numbers.
Note that the SORT command destroys the message index files, so
it automatically called INDEX once finished.
SORT also updates USERS.BBS (if found) and LASTREAD.BBS; this
may account for the last message number read being suddenly
moved; previously "older" messages have a newer date and/or
time.
The syntax of the SORT function is:
IMTHINGS SORT /L
/Q
/U
1) /L - Link Messages after Sort
Since SORT destroys the message links, you may wish to have
it call LINK after processing has completed. This can be done
by specifying /L on the command line.
2) /Q - "Quick" Sort
The /Q switch forces a "quick" sort. In other words, only
those messages numbered higher than the highest lastread
pointer will be sorted. The advantage of this is that your
users will not have to read old messages again. The
disadvantage is that, due to the way certain message editors
assign new message numbers, it is possible that a small
number of "old" messages will be overwritten. Thus it might
be advisable to run IMTHINGS PACK prior to calling SORT with
this switch.
3) /U - do not change USERS.BBS
This commandline switch allows you to disable the update of
the user-base (USERS.BBS). It was added to prevent problems
caused when updating the USERS.BBS of RemoteAccess 2.0Gamma
which has different structures.
10. AN OVERVIEW OF ECHOMAIL
Information derived from FTS-0004.
a. What is Echo Mail?
Echo Mail is a technique which permits several nodes in a
network to share messages. All systems sharing a given echo see
any messages entered into the echo by any of the participating
systems. This can be implemented in such a way as to be totally
transparent to the users of a particular system. In fact, they
may not even be aware of the network being used to move their
messages about from node to node! This has its disadvantages
also - most users who are not educated about Echo Mail do not
realize the messages transmitted cost MANY sysops money, not
just the local sysop. This is an important consideration in Echo
Mail and should not be taken lightly. In an echo with 100
systems as participants the cost per message can get quite high.
b. How it Works
In general, the process is:
1. A message is entered into a designated area on a FidoNet
or compatible system.
2. This message is "exported" along with some control
information to each system "linked" to the echo through the
originating system.
3. Each of the receiving systems "import" the message into
the proper Echo Mail area.
4. The receiving systems then "export" these messages, along
with additional control information, to each of their links.
5. Return to step 3.
The method is quite simple - in general. Of course, following
the steps literally would mean messages would never stop being
exported and transmitted to other systems. This obviously is not
desired as the network would quickly become overburdened. The
information contained in the 'control information' section is
used to prevent transmitting the same message more than once to
a single system.
c. Echo Mail Message Control Information
There are five pieces of control information associated with an
Echo Mail message. Some are optional, some are not. Normally
this information is never entered by the person creating the
message, but rather is added by the program which is responsible
for the exporting of the original message. The following control
fields determine how Echo Mail is handled:
1) Area Line
This is the first line of an echo mail message. Its actual
appearance is:
AREA:CONFERENCE
where CONFERENCE is the name of the echo. This line is added
when a conference is being "exported" to another system. It
is based upon information found in the configuration file for
the designated message area (in the case of IMAIL, this file
is IMAIL.AR). This field is REQUIRED by the receiving system
to "import" a message into the correct Echo Mail area.
Note that IMAIL will not handle echo mail messages which
"kludge" this field by putting a ^A character in front of it;
these messages will be tossed into your net mail directory.
Note also that you may not have two areas defined with the
same area name; this would create cross-linked messages,
which are a potential source of duplicates.
2) Tear Line
This line is near the end of a message and consists of three
dashes (---) followed by an optional program specifier. This
is used to show the first program used to add Echo Mail
compatible control information to the message. The tear line
generated by IMAIL looks like:
--- <a small product-specific banner>
This field is optional for most Echo Mail compatible
processors. Some systems will place this line in the message
when it is first created, but it is normally added when the
message is first "exported."
3) Origin Line
This line appears near the bottom of a message and gives a
small amount of information about the system where it
originated. It looks like:
* Origin: IMAIL Development (2:246/47)
The " * Origin: " part of the line is a constant field. This
is followed by a banner which should in some way identify the
system which originated the message. The complete network
address (2:246/47 in this case) is added by the program
inserting the line. This field is generated at the same time
as the tear line, and therefore may either be generated at
the time of creation or during the first "export" processing.
4) SEEN-BY Lines
There can be many SEEN-BY lines at the end of Echo Mail
messages, and they are the real "meat" of the control
information. They are used to determine the systems to
receive the exported messages. The format of the line is:
SEEN-BY: 132/101 113 136/601 1014/1
The net/node numbers correspond to the net/node numbers of
the systems having already received (or "seen") the message.
In this way a message is never sent to a system twice. In an
Echo with many participants the number of SEEN-BY lines can
be very large. This line is added if it is not already a part
of the message, or added to if it already exists, each time a
message is exported to other systems. This is a REQUIRED
field, and IMAIL might not function correctly if this field
is not put in place by other Echo Mail compatible programs.
IMAIL uses this field to check whether one of your downlinks
has already seen this message (which normally only occurs due
to errors in the distribution topology). Depending on the
configuration, IMAIL notifies you and/or does not export this
message to this system.
5) PATH Lines
These are the last lines in an Echo Mail message. They appear
as follows:
^APATH: 132/101 1014/1
where the ^A stands for Control-A (ASCII character 1) and the
net/nodes listed correspond to those systems having processed
the message before it reached the current system. This is not
the same as the SEEN-BY lines, because those lines list all
systems the message has been sent to, while the path line
contains all systems having actually processed the message.
d. Methods of Sending Echo Mail
To this point the issue of how Echo Mail is actually sent has
been glossed over entirely. The phrase has been, "the message is
exported to another system." What exactly does this mean?
Thom Henderson (from System Enhancement Associates) came up with
the original ARCmail program. Having previously written the ARC
file archiving and compression program, he knew the savings
achievable by having all of the Net Mail messages placed in .ARC
format for transmission. As a by-product, the messages no longer
appeared in the net mail area, but were included in a file
attached to a message. In this way the tremendous number of
messages generated, and the phone bill problems were both
solved.
IMAIL builds the ARCmail files during export, and unpacks them
during import. This way messages are exported directly to
ARCmail style file attaches, and imported directly from ARCmail
style file attaches.
e. Topology
The way in which systems link together for a particular Echo is
called the "echo topology." It is important to know this
structure for two reasons:
1) it is important to have a topology which is efficient in the
transfer of the Echo Mail messages;
2) it is important to have a topology which will not cause
systems to see the same messages more than once.
Efficiency can be measured in a number of ways; least time
involved for all systems to receive a message, least cost for
all systems to receive a message, and least phone calls required
for all systems to receive a message are all valid indicators of
efficiency. Users of Echo Mail compatible systems have
determined (through trial and error) the best measure of
efficiency is a combination of all three of the measurements
given above. Balancing the equation is not trivial, but some
guidelines can be given:
1. Never have two systems attempting to send Echo Mail to
each other at the same time. This results in "collisions"
that will cause both systems to fail. To avoid this, one
system should be responsible for polling while the other
system is holding mail. This arrangement can alternate based
upon various criteria, but both systems should never be
attempting to call each other at the same time.
2. Have nodes form "stars" for distribution of Echo Mail.
This arrangement has several nodes all receiving their Echo
Mail from the same system. In general the systems on the
"outside" of the star poll the system on the "inside". The
system on the "inside" in turn polls other systems to receive
the Echo Mail that is being passed on to the "outside"
systems.
3. Utilize fully connected polygons with a few vertices.
Nodes can be connected in a triangle (A sends to B and C, B
sends to A and C, C sends to A and B) or a fully connected
square (all corners of the square send to all of the other
corners). This method is useful for getting Echo Mail
messages to each node as quickly as possible.
All of these efficiency guidelines have to be tempered with the
guidelines dealing with keeping duplicate messages from being
exported. Duplicates will occur in any topology that forms a
closed polygon that is not fully connected. Take for example the
following configuration:
A ----- B
| |
| |
C ----- D
This square is a closed polygon that is not fully connected. It
is capable of generating duplicates as follows:
1. A message is entered on node A.
2. Node A exports the message to node B and node C placing
the SEEN-BY for A, B, and C in the message as it does so.
3. Node B sees that node D is not listed in the SEEN-BY and
exports the message to node D.
4. Node C sees that node D is not listed in the SEEN-BY and
exports the message to node D.
At this point node D has received the same message twice - a
duplicate was generated. Normally a "dupe-ring" will not be as
simple as a square. Generally it will be caused by a system on
one end of a long chain accidentally connecting to a system on
the other end of the chain. This causes the two ends of the
chain to become connected, forming a polygon.
f. Why a PATH line?
The PATH line stores the net/node numbers of each system having
actually processed a message. This information is useful in
correcting the biggest problem encountered by nodes running an
Echo Mail compatible system - the problem of finding the cause
of duplicate messages. How does the PATH line help solve this
problem? Take the following path line as an example:
^aPATH: 107/6 107/312 107/528 107/312 132/101
This shows the message having been processed by node 107/312 on
more than one occasion. Based upon the earlier description of
the 'information control' fields in Echo Mail messages, this
clearly is an error in processing (see Section b. entitled "How
it Works"). This further shows node 107/528 as the node which
apparently processed the message incorrectly. In this case the
path line can be used to quickly locate the source of duplicate
messages.
The circular path detection of IMAIL recognizes such errors and
allows you to stop such duplicate mails. IMAIL checks whether
your system is already in the path line. But as the path does
not contain zone information (and net/node combinations might be
the same in different zones, IMAIL also checks whether the
systems before and after your nodenumber are in the list of
linked systems of this echo. If this is also true, a circular
path has been detected.
In an Echo with many participants it becomes almost impossible
to determine the exact topology used. In these cases the use of
the path line can help a coordinator of the Echo track any
possible breakdowns in the overall topology, while not
substantially increasing the amount of information transmitted.
Having this small amount of information added to the end of each
message pays for itself very quickly when it can be used to help
detect a topology problem causing duplicate messages to be
transmitted to each system.
g. Gating of Echo Mail
Until recently, the only network which made use of the methods
described above was FidoNet. However, new networks have
appeared, and the problem of sharing Echo Mail between these
networks arose. (To avoid ambiguity, the term "domain" was
introduced to distinguish between networks such as FidoNet and
SIGnet.)
Sharing (or gating) of Echo Mail presents technical problems.
Put simply, the network addresses which are valid in one domain
may not appear in the messages of another domain.
The reason for this is that, if we consider only the net and
node fields of a network address (many mail processors are not
able to handle the zone and point fields), there is a high
possibility that a given address exists in another domain.
With net mail, this problem may be solved by enforcing the
requirement that inter-domain mail be sent directly to its
destination, or at least, to a gateway system.
With Echo Mail, the problem is more complex, due to the
information contained in the SEEN-BY and PATH lines (as
described above). These lines contain network addresses, and are
needed to prevent duplicate rings.
However, a strategy has evolved which will allow Echo Mail to be
gated.
Above all, only ONE system should be allowed to gate Echo Mail
between domains. This may be done on a world-wide or Zone-wide
basis. This system will be responsible for receiving the mail
from one domain, and feeding it into the other.
This is not enough. Due to the possibility of duplicate network
addresses, all SEEN-BYs and PATH lines should be removed during
the gating process. This explains why only one system should be
allowed to gate Echo Mail.
11. KLUDGE LINES
For the more technically minded, there follows an explanation of
the various kludge lines that IMAIL may place in messages.
A kludge line is generally defined as any line preceded by a ^A
(Control-A) character, and may be found either before the message
text itself, or after it.
a. EID
The EID is used only in Echo Mail messages. IMAIL does NOT add
this kludge to echo messages. It was 'invented' mostly for
reasons of dupe checking, but IMAIL will use other methods for
this purpose.
The format of the kludge varies; according to the specification
proposed by Jim Nutt, it may be:
^AEID zddd nnnccccc
where z is the zone modulo 16, ddd is the net modulo 4096, nnn
is the net modulo 4096, and ccccc is a message serial number.
The serial number is generated using the low order word of the
Unix time stamp shifted left 4 bits, with a nybble counter
appended.
b. FLAGS
This kludge is present in net mail messages only, and is used by
many mailers to give more information on how the message should
be treated. It is followed by one of more modifiers; some of the
more common ones are listed below.
1) DIR
Indicates that the net mail message should be sent direct to
its destination; it will NEVER be routed.
IMAIL allows you to specify whether mail should be marked
DIRECT or not. See the description of the Node Manager
(Chapter 5. Section e.)
2) IMM
Indicates that a message should be sent immediately. IMAIL
will never use this, and will always ignore it.
3) TFS
Truncate File when Sent. This is found only in file attach
messages, and indicates that the file should be truncated
when sent. ARCmail file attached generates by IMAIL will have
this flag set.
4) KFS
Kill File when Sent. This is found only in file attach
messages, and means that the mailer will delete the file once
sent.
5) CFM
Confirmation Receipt Request. This flag is set if the sending
system wishes to have an acknowledgement that the message was
read. As such, IMAIL does not intercept this flag; it is up
to the message editor to handle it.
6) RRQ
Return Receipt Request. This flag is set if the sending
system wishes to have an acknowledgement that the message was
received by your system.
Currently, IMAIL does not recognize this flag, since the
message header itself defines a similar bit. If the bit is
set, IMAIL will automatically generate a reply to the sending
system.
c. FMPT
The FMPT kludge is used in net mail messages only. It is similar
to the TOPT kludge, except that it is used to indicate that the
message originate from a point system.
The format of this kludge is:
^AFMPT <orig point>
where <orig point> is the point component of the address of the
system originating the message.
d. INTL
The INTL kludge is used in net mail messages only. It indicates
that the message is destined to a zone which is different from
the one in which it originated.
The format of the INTL kludge is:
^AINTL <dest zone:net/node> <orig zone:net/node>
IMAIL will use this kludge to try to determine zone addresses,
as well as adding it to net mail messages it generates. Note
that in multi-domain environments (ie, systems which belong to
more than one domain, and thus more than one zone), IMAIL will
put an INTL kludge in ALL net mail messages it generates, even
if the destination and origin zones are the same.
e. MSGID
A MSGID kludge is used in all messages, be they net mail of echo
mail messages. They are automatically added by IMAIL when it
generates messages (Automatic Reply, AreaLink's messages, etc),
and used in duplicate checking.
The format of the MSGID follows the specification proposed by
Jim Nutt, which is:
^AMSGID: zone:net/node[.point]@domain xxxxxxxx
where zone, net, node and point are the address of the
origination system, and domain is the domain of the originating
system (eg. FidoNet, SIGnet, etc). xxxxxxxx is a serial number
which is derived from the originating system's address, a Unix
time stamp, and an internal counter.
IMAIL will automatically supply the domain by attempting to
derive it from the list of domains specified in IMSETUP (see
Chapter 5. section a. para 2)). If the zone number is not
recognized, no domain field will be added.
f. PID
The PID (Product ID) is appended by IMAIL to all messages it
generates. Following the specifications given by Joaquim
Homrighausen, the format of the kludge is:
^APID: <product> <version> [<serial number>]
For example, IMAIL 1.40 would generate the kludge as follows:
^APID: IMAIL 1.40
g. REPLY
The REPLY kludge is simply a copy of the MSGID of the message to
which you are replying. IMAIL currently does not generate this
kludge.
The format is as for MSGIDs:
^AREPLY: zone:net/node[.point]@domain xxxxxxxx
h. RESCANNED
IMAIL inserts this kludge in messages which have been exported
in response to a %RESCAN request. This way, when they are
processed by TOSS, they will not be exported to other system,
thus potentially creating dupe rings.
There are currently only few mailprocessers which support this
kludge, so it is by no means a fail-safe method of preventing
dupes. Rescanning echo mail is ALWAYS dangerous, and until some
robust and standard method is adopted, it is best to avoid
rescanning altogether.
The format of this kludge (according to FSC-0057) is:
^ARESCANNED <addr>
where addr is the address of the system which requested the
rescan.
i. TID
The PID (Tosser ID) is appended by IMAIL to all messages when
exporting them from the message base. The format of the klugde
is:
^ATID: <product> <version> [<serial number>]
For example, IMAIL 1.40 would generate the kludge as follows:
^ATID: IMAIL 1.40
j. TOPT
The TOPT kludge is used in net mail messages only. It is used to
indicate that the message is directed to a point system, rather
than a "normal" node.
The format of this kludge is:
^ATOPT <dest point>
where <dest point> is the point component of the address. For
example, a message addressed to 2:310/11.22 will have:
^ATOPT 22
while the message header will contain the address 310/11.
12. BATCH FILE EXAMPLE
The example given below is designed for systems running SuperBBS,
with FrontDoor as a mailer. It should be easy to modify for other
setups, but we can only write from our own experience.
ECHO Off
:START
C:
CD \FD
FD
IF ERRORLEVEL 99 GOTO CLEAN
IF ERRORLEVEL 60 GOTO SCAN
IF ERRORLEVEL 50 GOTO UNPACKMAIL
IF ERRORLEVEL 40 GOTO LOCAL
IF ERRORLEVEL 30 GOTO LOAD_BBS
IF ERRORLEVEL 10 GOTO OUT
IF ERRORLEVEL 1 GOTO ERROR
GOTO START
:LOAD_BBS
CALL DOBBS.BAT
GOTO START
:LOCAL
BBS -L -E0
GOTO START
:CLEAN
REM Message Areas Maintenance
IMTHINGS KILL /U
IMTHINGS PACK
GOTO START
:SCAN
IMAIL SCAN
GOTO START
:UNPACKMAIL
IMAIL TOSS
IMALNK
IMPACK
GOTO START
:ERROR
CLS
ECHO *** Internal Error *** Programming Error
GOTO OUT
:OUT
ECHO System .... Down!
13. MISCELLANEOUS INFORMATION
a. A Note about Capability
The term Capability, when referred to a mail processor,
indicates that program's ability to generate zone and point
information in outgoing mail, as well as the ability to
recognize and use such information in inbound mail
Currently, IMAIL distinguishes between two forms of capability:
"Stone Age" and "Type 2+". "Stone Age" means that the packet
contains no zone and/or point information, and thus IMAIL is
forced to guess at their value; "Type 2+" indicates that the
packet contains zone and point information, and IMAIL knows
where to look for them.
"Type 2+" mail packets are distinguished from the others by
means of a Capability Word and a Capability Word Validation Copy
(as outlined in the document FSC-0039). However, there are
several mail processors which produce valid zone and point
information, but do not mark the packets as "Type 2+". In order
for IMAIL to correctly extract the zone and point fields from
these packets, they must be marked as
Capability: Type 2+
Cap Handling: Forced
in the Node Manager (see Chapter 5. Section e.). In other words,
you should enquire as to which mail processor echo node is
using, and set these two fields accordingly.
Examples of mail processors which produce Type 2+ information
are:
Product Product Code
--------------- ------------
BBCscan CE
D'Bridge 1A
Fmail 81
FrontDoor 0C
GEcho 61
IMAIL 4B
MailLink 9D
Qmail 29
RA-Echo 8C
ScanToss 82
TosScan 3F
ZmailQ 35
Some of these do not (yet) make use of the Capability Word, but
it is possible to "tell" IMAIL that a mail processor has Type 2+
Capability by indicating its product code in IMSETUP (see
Chapter 5. section a.).
For other mail processors, unless you are certain of the
contrary, the best is to set the two capability fields to "Stone
Age"/Auto.
b. Defaults for Compression/Decompression
For reference, below are listed the default parameters for the
compression and decompression programs as you would see them
when installing IMAIL for the first time.
1) Compression
Arc.Exe mw
Arj.Exe m -c -e+ -y -i
Lha.Exe m /m2n1t1
Pak.Exe m /WN /ST. /P
PkArc.Exe -ot m"
PkZip.Exe -m -ex -o (PkZip Version 1.10)
PkZip.Exe -m- -~ -ex -o (PkZip Version 2.04, default)
Sqz.Exe aM /p3
Zoo.Exe aMPh:
2) Decompression
Arc.Exe xw
Arj.Exe e -c -i -y
Lha.Exe e /c1m2n1
Pak.Exe e /WA
PKUnZip.Exe -ed -o
PkXArc.Exe -r
SQZ e /o1
Zoo.Exe eO
c. Files Maintained by IMAIL
IMAIL and IMSETUP create and maintain several external data
files. Generally it is NOT a good idea to delete these unless
you wish to rebuild your configuration from the beginning.
Of these files, all those containing IMAIL's configuration
information (ie, all those whose name begins with IMAIL) should
reside in the directory from which IMAIL is run, or, if you have
set the IMAIL environment variable, in the directory it points
to.
IMAIL.CF Basic IMAIL configuration information,
including network addresses, Pack Routing and
so on.
IMAIL.AR Contains the definitions of the echo areas. If
this file is deleted, ALL echo area
information will be lost. This file is updated
by AreaLink, if necessary, and is usually
maintained via IMSETUP.
IMAIL.AX Index file of echo area information, according
to area name. This file is maintained and
updated both by IMSETUP and IMAIL. It may be
deleted (in which case you will need to run
IMSETUP to recreate it).
IMAIL.BX Index file of echo area information, according
to Hudson board number. This file is
maintained and updated both by IMSETUP and
IMAIL. It may be deleted (in which case you
will need to run IMSETUP to recreate it).
IMAIL.ND This file contains the information defined in
the Node Manager.
IMAIL.DP Data base of information used to catch
IMAIL.DP1 duplicate messages. This file may be deleted,
IMAIL.DP2 but then you risk missing incoming dupes.
IMAIL.PR This is a compiled version of the FTSC product
code list (which is usually distributed as
FTSCPROD.xxx, where xxx is a decimal number).
IMAIL.GR The Group Database with the names and the de-
fault settings for the groups.
IMAIL.CFM Text file used when IMAIL generates a confirm-
ation receipt request.
????????.$I$ A packet file (????????.PKT) that was being
processed by TOSS. You should only find these
files if there was a system crash during a
TOSS. In order to process it, simply rename it
to ????????.PKT and run IMAIL TOSS again. If
IMAIL finds such files it renames them to
????????.P$$ renamed (????????.$i$) file (see above).
????????.P$T A packet file (????????.PKT) where IMAIL TOSS
found errors while processing this packet.
????????.IMA These files are created while IMAIL/IMPACK are
compressing packets into the arcmail bundles.
They are simply renamed PKTs. If you find IMAs
in your temp pkt outbound, check your settings
and your log file. They only remain if IMAIL
was unable to compress them for any reason.
d. Exit Codes
Should an error occur while IMAIL, IMALNK, IMPACK or IMTHINGS
are running, all programs will exit with an error, and set the
MS-DOS ERRORLEVEL environment variable. This may be tested in a
batch file, and acted upon. Listed below are the ERRORLEVELs:
ERRORLEVEL Meaning
0 No error
1 TOSS/SCAN process net mail
2 TOSS/SCAN processed echo mail
4 TOSS/SCAN processed bad mail
8 TOSS/SCAN processed Hudson mail
16 TOSS/SCAN processed *.MSG mail
32 TOSS/SCAN processed Squish mail
64 TOSS found mail to the sysop
238 Cannot create directory
239 File locking error
240 Error opening IMAIL.AX
241 Error opening IMAIL.BX
242 Index file missing or corrupt
243 IMAIL.CF not found
244 IMAIL.AR not found
245 IMAIL.ND not found
246 Error in IMAIL.CF
247 Bad version of IMAIL.CF
248 Error opening file
249 Error reading file
250 Error writing file
251 Command line parameter error
252 File not found
253 Memory allocation error
254 Disk full
255 Unknown (generic) error
The errorlevels 1-64 are also indicated by a set of semaphore
files which area created in the semaphore directory when IMAIL
exits. This makes the evaluation of the errorlevels much easier:
IMAIL.NET TOSS/SCAN processed net mail
IMAIL.ECO TOSS/SCAN processed echo mail
IMAIL.BAD TOSS/SCAN processed bad mail
IMAIL.QBS TOSS/SCAN processed QuickBBS Areas
IMAIL.MSG TOSS/SCAN processed Msg Areas
IMAIL.SQU TOSS/SCAN processed Squish Areas
IMAIL.PER TOSS found mail to the sysop
14. IMAIL REGISTRATION SITES
a. Headquarters
IMAIL INC.
System: FidoNet 2:246/47
IntlNet 57:49/0
Snail Mail: Andreas Klein
Werner-Heisenberg-Weg 106
W-8014 Neubiberg
Germany
b. Australia
IMAIL Support & Distribution Australia
System: FidoNet 3:632/350
IntlNet 58:4100/31
Snail Mail: Bob Snowdon
17 Witham Drive
Coldstream, Victoria
Australia 3770
c. C.I.S. (ex-USSR)
IMAIL Support & Distribution C.I.S.
System: FidoNet 2:495/21
Snail Mail: Egons Bush
20 Virzas str.
District Bauska
Iecava, Latvia
LV3913
d. Europe
IMAIL Support & Distribution Europe
System: FidoNet 2:285/304
IntlNet 57:3101/100
Snail Mail: Henk Heidema
Vinkplein 64
3334 VH Zwijndrecht
Holland
e. North America
IMAIL Support & Distribution North America (North)
System: FidoNet 1:153/923
IntlNet 56:200/1
SIGnet 25:4604/198
Snail Mail: Hardy Rosenke
P.O. Box 1240
Tsawwassen, BC
Canada V4M 3T3
IMAIL Support & Distribution North America (South)
System: FidoNet 1:10/100
IntlNet 57:49/22
Snail Mail: Pablo Kleinman
1353 N. Martel Ave, Suite 320
Hollywood, CA 90046
U.S.A.
f. Italy
IMAIL Support & Distribution Turkey
System: IntlNet 57:3902/103
Snail Mail: Fortunato Lodari
C.so Garibaldi 88/a
84081 Baronissi (Sa)
Italia.
g. Sweden
IMAIL Support & Distribution Sweden
System: FidoNet 2:204/503
IntlNet 57:46/101
Snail Mail: Jonny Bergdahl
Lillgatan 34B
S554 51 Jonkoping
Sweden
h. Turkey
IMAIL Support & Distribution Turkey
System: FidoNet: 2:430/1
Snail Mail: Tolga Yurderi, Biltur
Yogurtcuzulfu Sok. 15/2
PK.20 Bebek, Istanbul
Turkiye, Avrupa.