Date: Tue, 15 Jun 93 04:30:09 PDT
From: Advanced Amateur Radio Networking Group <tcp-group@ucsd.edu>
Errors-To: TCP-Group-Errors@UCSD.Edu
Reply-To: TCP-Group@UCSD.Edu
Precedence: Bulk
Subject: TCP-Group Digest V93 #154
To: tcp-group-digest


TCP-Group Digest            Tue, 15 Jun 93       Volume 93 : Issue  154

Today's Topics:
         (oops!) JNOS 1.09 for Linux re-uploaded to ucsd.edu
                       ampr hosts file (4 msgs)
                       ampr hosts file UCSD.EDU
         Digital audio:  CVSD or CELP.  Chipset suggestions?
                  NOS POP3 and POP2 servers (2 msgs)
              password in IP timestamp option ? (2 msgs)
                      Password security (3 msgs)
                     Re: ampr hosts file UCSD.EDU
                           UK Co-ordinators
                           WAMPES bug fixed
                    xms.asm compile error (2 msgs)

Send Replies or notes for publication to: <TCP-Group@UCSD.Edu>.
Subscription requests to <TCP-Group-REQUEST@UCSD.Edu>.
Problems you can't solve otherwise to brian@ucsd.edu.

Archives of past issues of the TCP-Group Digest are available
(by FTP only) from UCSD.Edu in directory "mailarchives".

We trust that readers are intelligent enough to realize that all text
herein consists of personal comments and does not represent the official
policies or positions of any party.  Your mileage may vary.  So there.
----------------------------------------------------------------------

Date: Mon, 14 Jun 1993 09:59:16 -0400
From: "Brandon S. Allbery" <bsa@kf8nh.wariat.org>
Subject: (oops!) JNOS 1.09 for Linux re-uploaded to ucsd.edu
To: ka9q-unix@knuth.mtsu.edu, nos-bbs@hydra.carleton.ca, tcp-group@ucsd.edu,

Well, I made several mistakes in uploading this yesterday, including but not
limited to putting it in the wrong incoming directory and omitting the
instructions for "attach asy" under Linux/Unix.  It's not in tcpip/incoming
with a proper README in the archive.  I also found and fixed a smallish
problem myself... I hadn't noticed that 1.09's dochat() expects nonnull
arguments, so TTYCALL broke.

++Brandon
--
Brandon S. Allbery    kf8nh@kf8nh.ampr.org   bsa@kf8nh.wariat.org

It's not too late to turn back from the "Gates" of Hell...
Linux: the free 32-bit operating system, available NOW. Why waaaaaait for NT?

------------------------------

Date: Mon, 14 Jun 93 13:22:31 BST
From: A.D.S.Benham@bnr.co.uk
Subject: ampr hosts file
To: TCP-Group@UCSD.Edu

>Date: Fri, 11 Jun 93 23:43:09 CET
>From: BARRY TITMARSH <BTITMARS%ESOC.BITNET@vm.gmd.de>
>Subject: ampr hosts file UCSD.EDU
>To: TCP-GROUP <TCP-GROUP@ucsd.edu>,

>Hi just looked again at the amprhosts file on ucsd.edu, last look 6 months ago,
>seems that its vastly out of date.. since im interested in Uk and German
>IP's, I have a vested interest, When and how often do the IP coordinators
>mail copies of the IP hosts of their domain to the World domain list
>namely UCSD.EDU, I think Brian at that address ?
>The German IP hosts is about 6 months out of date.. the UK IP hosts is
>Years behind !! My own IP is not even in the list and i have had this ip
>number for 2.5 years now.
>Come On Lads!! can we keep the amprhosts up to date with WW coord!
>Can one trust it?? If your on a Internet worm hole and DNS dont have the Info
>Then WHAT,? hmmmm
>Thanks. Barry.

On a related subject....

In Southern England we're running a hub experiment, and we realised that trying
to keep =everyone's= host file up-to-date wasn't going to work.
So most of the hubs now run DNS, so their users don't need a hosts file at all.

The problem we've run into is that because the "ampr.org" domain is flat, there's
no way that we can set up a DNS with authority for the range of addresses that it
issues.
For example, my local hub issues addresses in the range 44.131.19.192 - 44.131.19.223
and therefore his DNS should have authority for hostnames mapping to addresses in that
range.
But with a flat domain, there's no practical way to distinguish between "g8fsl.ampr.org"
and "zl9zzz.ampr.org" - only one of which my local hub has authority for. So we're
stuck with every hub trying to keep an up-to-date hosts file.. and hopefully not
getting it from ucsd.edu...

Is there a reason why "ampr.org" is a flat domain? Would it be generally helpful to
sub-divide it into continents/countries/regions? (For example, the Internet apparently
routes all net-44 traffic to the USofA. So if I send Internet mail to "g8fsl.ampr.org"
it will go 3000 miles (+) in the wrong direction first, and then probably get stuck).

What I'm thinking of is something along the lines of changing from "g8fsl.ampr.org" to
"g8fsl.ldn.uk.ampr.org" to indicate I'm in the London sub-domain of the United Kingdom
sub-domain of "ampr.org". Then we can set up a DNS with authority for "*.ldn.uk.ampr.org".

I'm told it can't be done. I'm told "ampr.org" is flat. But I'm not told why. 
All I'm trying to do is to improve the situation, so that we don't need every ampr.org
host to have a host file that contains every other host that connectivity exists for
(which would be one big file, covering East, South-East and Southern England, and however
much of the USA that can be reached through the London <> New York link).


Andrew Benham
--------------------------------------------------------------------
adsb@bnr.co.uk   BNR Europe Ltd, London Road, Harlow, Essex CM17 9NA
adsb@bnr.ca      +44 279 402372    Fax: +44 279 402029
Home:            g8fsl@g8fsl.ampr.org [44.131.19.195]    G8FSL@GB3XP
--------------------------------------------------------------------

------------------------------

Date: Mon, 14 Jun 93 11:34:36 CDT
From: andyw@aspen.cray.com (Andy Warner)
Subject: ampr hosts file
To: tcp-group@ucsd.edu (TCP Group)

>  [...]
> I'm told it can't be done. I'm told "ampr.org" is flat. But I'm not told why. 
> All I'm trying to do is to improve the situation, so that we don't need every ampr.org
> host to have a host file that contains every other host that connectivity exists for
> (which would be one big file, covering East, South-East and Southern England, and however
> much of the USA that can be reached through the London <> New York link).

As long as we don't forget that names are not routes, why can't we do
whatever makes the most sense ? I don't see why we need to get hooked
up on dogma. Locally we have <callsign>.tcman.ampr.org, and we run
2 or 3 nameservers for that suffix, if our internet link was working
we wouldn't need to do this, but it's not..

So far we've used this "administrative domain" for a specific
geographic area, but we're currently thinking about what to do
when we go state-wide (mn.usa.ampr.org ? - hmmm, that doesn't
sound right, does it ?) Large corporate internets tend to be
split this way, at least internally, don't they ?

-- 
andyw. (N0REN/G1XRL)

andyw@aspen.cray.com Andy Warner, Cray Research, Inc. (612) 683-5835

------------------------------

Date: Mon, 14 Jun 93 22:23:03 EDT
From: "Ross Patterson" <n4yyh@wa2hee.ampr.org>
Subject: ampr hosts file
To: A.D.S.Benham@bnr.co.uk

On Mon, 14 Jun 93 13:22:31 BST, <A.D.S.Benham@bnr.co.uk> wrote:

>Is there a reason why "ampr.org" is a flat domain? Would it be generally helpful to
>sub-divide it into continents/countries/regions? (For example, the Internet apparently
>routes all net-44 traffic to the USofA. So if I send Internet mail to "g8fsl.ampr.org"
>it will go 3000 miles (+) in the wrong direction first, and then probably get stuck).

Changing the names won't fix this, you need to change to a network number 
that doesn't advertise its primary connection via the USA.  There's no law
that says you have to be part of net 44, although it is next to impossible
to get a Class A (i.e. X.*.*.*) or Class B (X.Y.*.*) network address these
days.  There's no reason why the UK couldn't have a Class C (X.Y.Z.*) 
address of its own, and still have hostnames in the AMPR.ORG domain.

The difference between network numbers and domain names is subtle, and
confuses many supposed experts.  From the very beginning, the idea has been
that domain names implement some "natural" grouping of hosts, such as all
the Amateur Radio stations, while network numbers implement the routing of
packets (datagrams to IPers) between hosts.  Just because two hosts share
a common network number doesn't mean they are at all related.  And just
because two hosts share a common domain name doesn't mean they are
located anywhere nearby each other.  My favorite example is that of
Stanford.Rutgers.Edu, located in Palo Alto California, and
Rutgers.Stanford.Edu, located in New Brunswick New Jersey.  Each was located
3000 miles from its "home" domain, and had a network address on its
"guest"network.

>What I'm thinking of is something along the lines of changing from "g8fsl.ampr.org" to
>"g8fsl.ldn.uk.ampr.org" to indicate I'm in the London sub-domain of the United Kingdom
>sub-domain of "ampr.org". Then we can set up a DNS with authority for "*.ldn.uk.ampr.org".

This works, but only sort-of. When you move to the Outer Hebrides, you don't
want your hostname to change to g8fsl.solitary-rocks.uk.ampr.org.  But if 
you can get IP connectivity between DNS servers, you can have as many 
authoritative servers for a domain as you want, reducing the need for
geographic locators in names.  Depending on software capabilities, you may
need to FTP the DOMAIN.TXT file around, or it may happen automagically via
the "zone transfer" facility.

>I'm told it can't be done. I'm told "ampr.org" is flat. But I'm not told why.

Gee, that's the easiest question you've asked so far.  Brian Kantor, the
registered "owner" of AMPR.ORG, wants it that way.  Several folks have
offered to set up authoritative servers for sub-domains, and each has been
rebuffed.  From what I hear, Brian feels responsible for the domain, and 
wants to keep it under his control so he can fix it if it gets broken.  And
as far as the Network Information Center (NIC) is concerned, he IS 
responsible, so I guess that makes it his decision.

73,

Ross  N4YYH

------------------------------

Date: Tue, 15 Jun 93 13:54:36 +1000
From: wkt@csadfa.cs.adfa.oz.au (Warren Toomey)
Subject: ampr hosts file
To: andyw@aspen.cray.com (Andy Warner), tcp-group@ucsd.edu (TCP Group)

>> I'm told it can't be done. I'm told "ampr.org" is flat. But I'm not told why. 

Domains work by having one server have a portion of the whole database.
For example, ucsd.edu holds the database for the portion

 XXXX.ampr.org

This is `flat' because the whole of the ampr.org domain is kept by ucsd.edu.
If, instead it was broken into geographic sub-domains, we could have it
spread over many places, e.g

 minnie.vk1xwt.act.au.ampr.org

would be served by a DNS looking after XXXX.vk1xwt.act.au.ampr.org. We would
need other servers to look after

 XXXX.act.au.ampr.org
 XXXX.au.ampr.org, and
 XXXX.ampr.org

The advantages of this approach is that the databases are maintained locally,
and theoretically they are up to date. Also, a breakdown at one DNS does
not stop DNS information from other portions.

The disadvantages is that without 24/day solid DNS servers for each domain
interconnected by reliable links, you would never be able to reliably resolve
domain names. Also, we would need to convert the current database of
callsign.ampr.org names to the new system.

I would suggest that we don't have the capability of fully sub-domaining
the entire .ampr.org domain yet, because of unreliable DNS/links.
However, areas with reliable DNS/links have the capability of partitioning
off their domain space from ucsd.edu if they wish to. Brian Kantor would
have to agree to this, he would need to get ucsd.edu to `know' about
the partitioning.

 Warren vk1xwt

------------------------------

Date: Mon, 14 Jun 93 13:15:27 BST
From: john <John.Heaton@nessie.mcc.ac.uk>
Subject: ampr hosts file UCSD.EDU
To: markw@icsbelf.co.uk (Mark Willis)

> The previous UK coordinator, g6phf, did not have internet access.
                               ^^^^^
              it was           g6pwy

> There is a new coordinator as of a few months ago, g1plt. I am not sure
> wether he is able to update the database.

Yep!, he does have access.

John
-- 
                 John Heaton   -   NRS Central Administrator
      MCC Network Unit, The University, Oxford Road, Manchester,  M13-9PL
            Phone: (+44) 61 275 6011   -   FAX: (+44) 61 275 6040
                   Packet: G1YYH @ G1YYH.GB7PWY.#16.GBR.EU

------------------------------

Date: Mon, 14 Jun 93 08:51:56 mdt
From: ka7oei@uugate.wa7slg.ampr.org
Subject: Digital audio:  CVSD or CELP.  Chipset suggestions?
To: tcp-group@ucsd.edu

One of the uses for our developing high-speed packet network in Utah will
be digital voice/repeater linking.  To that end we are looking for
some CODEC chips to handle voice compression.

They MUST be able to pass DTMF and CTCSS tones with audio for the old-
fashioned controllers that might be at the far ends.

Does anyone have comments on the CVSD codecs around?  Their data rates
are a bit higher than we would like, but perfectly useable.  We are
especially interested in the CELP stuff (The 8kbps audio channel) stuff
but have no insight on the what chipsets would be both affordable and/or
worth pursuing...

I'd love comments on this...

<Clint>

ka7oei@uugate.wa7slg.ampr.org
clint@uugate.aim.utah.edu
ka7oei@wb7ulh (ax.25 stuff...)

------------------------------

Date: Mon, 14 Jun 1993 09:45:24 -0600 (CST)
From: "Erik Olson" <erik@marge.phys.washington.edu>
Subject: NOS POP3 and POP2 servers
To: TCP-Group@UCSD.Edu, ashok@biochemistry.BIOC.CWRU.Edu

[Ashok writes]
>I have recently (today) come across a couple POP3 clients that seem to use
>lower case commands (eg. "user" instead of "USER" etc.), and therefore not
>work with the Erik Olson's POP3 server for NOS.

You should write to the author of those POP3 clients and tell them to get
their act together; The RFC (1081 & the other one) specifically says
commands are to be sent in UPPER CASE!  Completely counter to RFC822 (SMTP)
which explicitly says to accept either.

However,  the bugfix follows Phil Karn's advice, "Accept liberally, send
conservatively".

   - Erik
---
Erik Olson (in lab)                      erik@marge.phys.washington.edu
University of Washington                      olson@phys.washington.edu
Cosmic Ray Lab, Phys. 405

------------------------------

Date: Mon, 14 Jun 93 12:48:35 CST
From: "Ashok Aiyar" <ashok@biochemistry.BIOC.CWRU.Edu>
Subject: NOS POP3 and POP2 servers
To: erik@marge.phys.washington.edu

On Mon, 14 Jun 1993 09:45:24 -0600 (CS, Erik Olson wrote:

>[Ashok writes]
>>I have recently (today) come across a couple POP3 clients that seem to use
>>lower case commands (eg. "user" instead of "USER" etc.), and therefore not
>>work with the Erik Olson's POP3 server for NOS.
>
>You should write to the author of those POP3 clients and tell them to get
>their act together; The RFC (1081 & the other one) specifically says
>commands are to be sent in UPPER CASE!  Completely counter to RFC822 (SMTP)
>which explicitly says to accept either.

I agree fully.  I also checked RFC 1081, and RFC 1225.  Both these clients 
are "beta-test" Winsock clients ....

>However,  the bugfix follows Phil Karn's advice, "Accept liberally, send
>conservatively".

I don't call it a bug-fix, since the bug isn't in your POP3 server, but 
rather in the client's implementation of POP3.  Nonetheless, I noticed that 
Berkeley popper seems to accept upper, lower and mixed-case commands, and 
also University of Minnesota pop2d.c (pop2 daemon) does the same.

Sorry, I didn't mean to offend you.  I have actually written to the author 
of one client, but mail to the other one seems to bounce.

Best wishes,
Ashok

----------------------------------------------------------------------
                             Ashok A. Aiyar
                       Department of Biochemistry
                         CWRU School of Medicine
----------------------------------------------------------------------

------------------------------

Date: 14 Jun 93 17:02:07 GMT
From: Jon Jagger <J.R.Jagger@sheffield-hallam.ac.uk>
Subject: password in IP timestamp option ?
To: tcp-group@ucsd.edu

Hi,
I've been reading RFCs in my search to find a way to insert
a password into an IP packet header. I think I may have found a way.
Firstly I note that no NOS code I have yet looked at implements
the timestamp ip header option, but all honour the ip.optlen
setting.

The timestamp usage is as follows

0            8        16       24    28      <-  start-bit
option_code  length   pointer  oflow+flag
32 bit timestamp
32 bit timestamp
....

where option_code = 68 indicates a timestamp.
length = number of octets in option starting at option_code (so min
value = 4). pointer = next free octet (min val = 5).
oflow = number of gateways that could not add a timestamp 'cos
pointer > length when they got the packet. flag indicates
whether the gateway adds time_stamp of IPaddress+timestamp.
The timestamp is normally some standard setting but can be a
local time setting if this standard value is not available as
long as the high order bit of the timestamp is set.

Anyway what I'm thinking of putting onto the non gateway NOS code
is this

if (ismyaddress(ip.source))
    {
    int32 p1,p2 ;
    uchar oflow = 0 ;
    ip.options[0] = 68 ;  /* timestamp */
    ip.options[1] = 12 ;  /* giving me 64 bits */
    ip.options[2] = 13 ;  /* which I am going to use up */
    getpassword(&p1, &p2) ;  /* ps,p2 are DES encryptions */
    if (!(p1 & 0x80000000L))
        {
        p1 |= 0x80000000L ;  /* ensure high bit set */
        oflow |= 1 ;         /* mark so gateway can undo */
        }
    if (!(p2 & 0x80000000L))
        {
        p2 |= 0x80000000L ;
        oflow |= 2 ;
        }
    put32(ip.options+4, p1) ;  /* fill 32 bits assigned by length */
    put32(ip.options+8, p2) ;  /* fill remaining 32 bits */
    ip.options[3] = (oflow << 4) | 0 ;  /* flag = 0 */
    }


This way I am not encrypting any data, all the values are
possible, all digipeating nodes will pass on the packet
unaffected till it reaches the net-44 gateway.
The gateway can then verify the ip.source sender is a permitted user
of the gateway. I think this will work as long as none of the
digipeating nodes alter oflow. Even if they did I could still get
the gateway to decrypt all four versions of the password (with or
without the high bit set to find the correct one).

Can anyone see any major flaws in this reasoning ?
In particular using this method means that you could not use
any of the ip options such as record route, or strict source
routing,....  Are these options used at all for anything in IP
or by other higher level protocols in NOS. I feared that ping might
use them but have been told that that uses ICMP packets.

Thanks
JJ
:: Jon Jagger , Sheffield Hallam University, S1 1WB, UK
:: Work J.R.Jagger@shu.ac.uk   Home 2E1BSD (44.131.2.111)
:: Tel 0742 533802/432889 (work/home) Fax 0743 533840
:: Newspaper ad: Men wanted for expanding contracting company!

------------------------------

Date: 14 Jun 93 17:02:07 GMT
From: Jon Jagger <J.R.Jagger@sheffield-hallam.ac.uk>
Subject: password in IP timestamp option ?
To: tcp-group@ucsd.edu

Hi,
I've been reading RFCs in my search to find a way to insert
a password into an IP packet header. I think I may have found a way.
Firstly I note that no NOS code I have yet looked at implements
the timestamp ip header option, but all honour the ip.optlen
setting.

The timestamp usage is as follows

0            8        16       24    28      <-  start-bit
option_code  length   pointer  oflow+flag
32 bit timestamp
32 bit timestamp
....

where option_code = 68 indicates a timestamp.
length = number of octets in option starting at option_code (so min
value = 4). pointer = next free octet (min val = 5).
oflow = number of gateways that could not add a timestamp 'cos
pointer > length when they got the packet. flag indicates
whether the gateway adds time_stamp of IPaddress+timestamp.
The timestamp is normally some standard setting but can be a
local time setting if this standard value is not available as
long as the high order bit of the timestamp is set.

Anyway what I'm thinking of putting onto the non gateway NOS code
is this

if (ismyaddress(ip.source))
    {
    int32 p1,p2 ;
    uchar oflow = 0 ;
    ip.options[0] = 68 ;  /* timestamp */
    ip.options[1] = 12 ;  /* giving me 64 bits */
    ip.options[2] = 13 ;  /* which I am going to use up */
    getpassword(&p1, &p2) ;  /* ps,p2 are DES encryptions */
    if (!(p1 & 0x80000000L))
        {
        p1 |= 0x80000000L ;  /* ensure high bit set */
        oflow |= 1 ;         /* mark so gateway can undo */
        }
    if (!(p2 & 0x80000000L))
        {
        p2 |= 0x80000000L ;
        oflow |= 2 ;
        }
    put32(ip.options+4, p1) ;  /* fill 32 bits assigned by length */
    put32(ip.options+8, p2) ;  /* fill remaining 32 bits */
    ip.options[3] = (oflow << 4) | 0 ;  /* flag = 0 */
    }


This way I am not encrypting any data, all the values are
possible, all digipeating nodes will pass on the packet
unaffected till it reaches the net-44 gateway.
The gateway can then verify the ip.source sender is a permitted user
of the gateway. I think this will work as long as none of the
digipeating nodes alter oflow. Even if they did I could still get
the gateway to decrypt all four versions of the password (with or
without the high bit set to find the correct one).

Can anyone see any major flaws in this reasoning ?
In particular using this method means that you could not use
any of the ip options such as record route, or strict source
routing,....  Are these options used at all for anything in IP
or by other higher level protocols in NOS. I feared that ping might
use them but have been told that that uses ICMP packets.

Thanks
JJ
:: Jon Jagger , Sheffield Hallam University, S1 1WB, UK
:: Work J.R.Jagger@shu.ac.uk   Home 2E1BSD (44.131.2.111)
:: Tel 0742 533802/432889 (work/home) Fax 0743 533840
:: Newspaper ad: Men wanted for expanding contracting company!

------------------------------

Date: Mon, 14 Jun 93 17:32:06 +0200
From: jt@fuw.edu.pl
Subject: Password security
To: samisen!djc@sol.UVic.CA, tcp-group@ucsd.edu

I have rewritten some of MD5 code (MD5Transform function) in assembly
- speed increased over 3 times on every machine, now MD5Transform times
are: < 8 ms on slow 4.77MHz XT, < 1 ms on 12MHz AT, < 700 us on 16MHz
386, < 170 us on 16MHz 386 with use of 32-bit registers.
(I will make the assembly code available when I finish it).

On Intel CPU-s initializing 16 bytes + one MD5Transform + moving result
(16 bytes) constitute full MD5 for fixed-length data up to 55 bytes
(if more data is to be processed the MD5Transform must be invoked once
for every 64-byte block). The multiple MD5 hashing of password can be
done in the following way: put password (up to 55 bytes) in buffer,
append padding and length to it, init the 16 bytes, MD5Transform(),
put padding and new length in buffer starting from offset 16, and now
for every hash must move 16 bytes, init 16 bytes, MD5Transform().

Since can use quite large hash counts (even thousands on 386).

To Mike Bilow: don't afraid someone will unhash MD5 digest, even when
its input length is known, seems MD5 really well mixes bits...  73's

------------------------------

Date: Mon, 14 Jun 93 10:01:20 PDT
From: djc@samisen.UVic.CA
Subject: Password security
To: tcp-group@ucsd.edu

> From: MIKEBW@ids.net (Mike Bilow, <sol.UVic.CA!ids.net!MIKEBW>)
> 
> Your recursive password scheme is very interesting, but I think it has
> a potential vulnerability.  All passwords S(i) where i > 0 are known to
> ...

This criticism is quite valid.  What it all boils down to is that
MD5 is not designed for this application.  I am not a crytographer so
I chose MD5 because it was convenient, free, and fast.  There are other
one-way hash algorithms (Snefru?) - maybe someone out there can suggest
a more suitable replacement.

Mind you, there aren't any cryptographers trying to crack passwords
on my network and this method, even as it is, is far, far better than
all the other schemes I have actually seen in use.

-- 
/\/\/\/\/\/
Doug Collinge, try: sol.uvic.ca!samisen!djc
  or:  samisen!djc@sol.uvic.ca
  or:  dcolling@ve7frg.ampr.org
VE7GNU  PBBS: VE7GNU@VE7VBB.#ISLAND.BC.CAN.NOAM

------------------------------

Date: Mon, 14 Jun 93 13:21:05 EDT
From: "William Allen Simpson" <bill.simpson@um.cc.umich.edu>
Subject: Password security
To: tcp-group@ucsd.edu

The method of sending a Challenge value, and returning a MD5 hash
response based on a the challenge, a message number, and a
secret/password, is well documented in RFC-1334, PPP Authentication
Protocols.

No passwords are sent over the link.  It's easy to use and maintain as
long as there are a small number of users.

I am working on extending this to Kerberos and PEM certificates, for
sites with tens of thousands of users.

Bill.Simpson@um.cc.umich.edu

------------------------------

Date: Mon, 14 Jun 93 18:27:17 MST
From: w6swe@w6swe.tapr.org (Bob Nielsen)
Subject: Re: ampr hosts file UCSD.EDU
To: tcp-group@ucsd.edu

Which file is this, anyway?  The only list I could find a few months ago had
only addresses which seemed to be reachable through gateways (or at least I
assumed that was what it was---I've had an address for about 3 years and 
wasn't listed).


------------------
Bob Nielsen, W6SWE  Internet: w6swe@tapr.org
Tucson, AZ   Amateur IP: 44.124.12.16
    AX.25: w6swe@wb7tls.az.usa.na

------------------------------

Date: Mon Jun 14 17:47:42 1993
From: iiitac@pyr.swan.ac.uk
Subject: UK Co-ordinators
To: tcp-group@ucsd.edu

Well if the UK co-ordinator isn't on the internet surely 

a) He can send updates to Brian via packet
b) He could send them to someone in the UK to forward onto the internet.
That's not a major chore surely - I'll even volunteer if none of the 
actual co-ordinators want to do it.

Alan

------------------------------

Date: Mon, 14 Jun 93 14:27:10 MDT
From: Dieter Deyke <deyke@mdddhd.fc.hp.com>
Subject: WAMPES bug fixed
To: tcp-group@ucsd.edu

I have  uploaded a new version of WAMPES  (wampes-930614)  to  UCSD.EDU.
This version fixes a severe stack overflow problem in the 930610 version
of   WAMPES.   You   may   either    pull   the   new    archive    from
ucsd.edu:.../incoming, or apply the following patch manually.

In the file src/login.c, change the line

char bitmap[MAXUID+1];

to be

static char bitmap[MAXUID+1];         /* Keep off the stack */

Sorry for the inconvenience,

Dieter

------------------------------

Date: Mon, 14 Jun 93 08:21 EDT
From: "James C Mankin (814)-863-4348" <N5X@PSUVM.PSU.EDU>
Subject: xms.asm compile error
To: nx2b%nx2b.ampr.org@UCSD.EDU

>When compiling jnos 1.10x1 with the 386 option, XMS.ASM displays
>the error "Operand types do not match".

>.Does anyone have a fix for this?

>Thanks,
>Steve Dorfman NX2B

Since XMS isnt supposed to work anyway, I got rid of that error by
replacing XMS.ASM with a file containing only one line of
END
Seemed to work OK.      73's Jim kb3kj

------------------------------

Date: Mon, 14 Jun 93 16:50:42 +0200
From: jt@fuw.edu.pl
Subject: xms.asm compile error
To: nx2b@nx2b.ampr.org, tcp-group@ucsd.edu

> Date: Mon, 14 Jun 93 00:29:31 GMT  Message-Id: <2769@nx2b.ampr.org>
> 
> When compiling jnos 1.10x1 with the 386 option, XMS.ASM displays
> the error "Operand types do not match".
> The line with the error reads -
> lds si, buf

I suppose the buf is arg to procedure and its definition has different
meaning for 32-bit CPU - look for "proc" followed by "arg ...,buf:<type>,..."
Either the type must be changed (if it doesn't match definition in caller's
code) or "LDS ESI,buf" must be used for 32-bit CPU (if you use large memory
model with 32-bit addressing because have >4 Gigabytes RAM). 73's, JT

------------------------------

End of TCP-Group Digest V93 #154
******************************
******************************