ok this is an old document saved from before the time of the great purge j/k
anyways i promise ill update it one day
Eli
WWIV Networking Technical Documentation Version 2.0.34 3 October 1994 Wayne Heyward aka Midnight Tree Bandit (based on the original by Wayne Bell) Copyright 1994 by WH and WWIV Software Services WWIVnet Technical Documentation 2.0.34 (NET34) CONTENTS I. Introduction . . . . . . . . . . . . . . . . 1 A. History . . . . . . . . . . . . . . . . . 1 B. Purpose, Limitations, and other Info . . 1 C. Relevant Copyrights and Acknowledgements 2 II. General Overview of WWIV Networking . . . . . 4 III. Making Connections . . . . . . . . . . . . . 6 A. Establishing Contact . . . . . . . . . . 6 B. Data Transfer . . . . . . . . . . . . . . 7 C. Identification Block Examples . . . . . . 10 IV. Message Packets . . . . . . . . . . . . . . . 12 A. The Message Header . . . . . . . . . . . 12 B. Mail File Processing . . . . . . . . . . 14 C. Local Mail Processing . . . . . . . . . . 16 D. Main and Minor Message Types . . . . . . 18 V. BBSLIST/CONNECT Files and Message Routing . . 27 A. Old WWIVnet -- BBSLIST.NET & CONNECT.NET 27 B. New WWIVnet -- BBSLIST.x & CONNECT.x . . 30 C. Figuring the Routing . . . . . . . . . 31 VI. Tips for Writing WWIVnet Software . . . . . . 35 A. WWIVnet Interface Software . . . . . . . 35 B. WWIVnet Software Add-ons . . . . . . . . 37 Appendix A Mail Packet Compression . . . . . . . . . . . 38 Compression Source Code . . . . . . . . . . . 39 WWIVnet Technical Documentation 2.0.34 (NET34) I. INTRODUCTION A. History Back in 1989, Wayne Bell released the first technical documenta- tion covering the technical workings of the WWIV networking software. While much of the information in that document is still relevant now, much has changed since 1989. The Group structure has been added, support for more message types, and support for preprocessors to the packet tossers has been added. So in late 1992 or early 1993 Wayne asked for volunteers to rewrite the WWIVnet Technical documentation. No one spoke up. Then in March I started providing WWIV support on the GEnie information service, and some people started asking about getting technical information so they could get their non-WWIV boards to communicate with WWIV networks. Looking around, I found the original doc, and asked Wayne if anyone had answered his call. As it turned out, I became the volunteer. After much procrastination and "How's the doc coming?" from Wayne, here it is. B. Purpose, Limitations, and Other Info The purpose for this document is to explain the WWIVnet interface for those who wish to write software which communicates with WWIVnet systems, either independently or as an extra utility for the existing NETxx software. The documentation that you are reading now is more an expansion and clarification of the original docs than it is a total rewrite. It looks a little neater too, thanks to Word Perfect. Now that the bulk of the work is done, the plan is to update them with each release of NETxx to reflect new features. The information in this document is current with WWIVnet version 34 (NET34). First clarification: in the context of this document, the term "WWIVnet" refers to the software for interfacing WWIV-type networks and any network which uses that software. Though WWIVnet is also the name of the original and largest of the dozens of WWIV networks out there, the use of the term here is not meant to imply that this document is specific to that network. This documentation assumes that the reader at least: a) has a good working knowledge of C and the various C data types and data structures. b) has a general familiarity of how file transfer protocols work. 1 WWIVnet Technical Documentation 2.0.34 (NET34) Due to the proprietary nature of Wayne Bell's WWIVnet software, we will not cover the inner workings of the current networking programs distributed in NETxx.ZIP. We will only discuss the external requirements for any third party interfaces that may be written for connecting non-WWIV systems to WWIV networks. Likewise, we will not discuss the NETUP software, which generates and sends out the network node lists and connect lists. You'll just have to figure that out for yourself. This document is not a replacement for Filo's WWIVnet Software Documentation. This doc does not describe how to use the network software, only how it works. For instructions on using the NETxx software and familiarize yourself with how to use it, see Filo's documentation, which can be found in the current NETxx release. A note on the numbering for this document. This is version 2.0.34. The first number indicates that this is a major rewrite from the original by Wayne Bell. Unless a major overhaul is done, this is not likely to change. The 0 in the second part indicates that this is the first version of this document. If there are any major changes or additions made, this will be incremented. The 34 indicates that this information is current as of version 34 of the WWIVnet software (NET34). Minor changes reflecting small interface changes in the WWIVnet software will cause this number to be changed. This number will not always be the same as the latest version of the WWIVnet software; if there are no changes in the external interface, this document will not be updated. I welcome comments about this document -- suggestions for additional information to include, things that could be explained more fully, and so forth. I can be reached at the following addresses: WWIVnet: #2@8408 WWIVLink: #1@18411 IceNET: #1@8411 GEnie: TREE.BANDIT Internet: tree.bandit@genie.geis.com C. Relevant Copyrights and Acknowledgements This document is Copyright 1994 by Wayne Heyward (aka Midnight Tree Bandit) and WWIV Software Services (WSS). It may be freely distributed provided it is not altered in any way. This is copyrighted to prevent unauthorized (and possibly inaccurate) changes from being made to this document by anyone other than myself or any other appointed by WWIV Software Services (should I be unable to continue updating this document). 2 WWIVnet Technical Documentation 2.0.34 (NET34) WWIV BBS and the WWIVnet software (distributed as NETxx) are Copyright 1986-1994 by Wayne Bell and WSS. NETEDIT is Copyright 1994 by Black Dragon Enterprises. DSZ is Copyright 1994 by Omen Technology INC. HSLink is Copyright 1994 by Samuel H. Smith. The PKWare Compression Libraries are copyright 1993 by PKWARE, Inc. The WWIVnet interface information and code in this document is placed in the public domain, and may be freely used for the purpose of interfacing with WWIV networks and network software. I would like to thank Wayne Bell, not only for creating a top- notch BBS program that is both powerful and easy to use, but creating a networking scheme that is more painless to set up and operate than any other out there. He has said often that if he knew then what he does now, things would have been different. I cannot help thinking that the result would have been less elegant or easy to use. I would also like to thank Wayne for his patience over the last year and a half, waiting for me to get this document started. I've fired thousands of questions at him the last few weeks in an effort to make this documentation as complete as possible, and he answered every one. And finally thanks to Filo, who also provided vital information and advice without which this documentation would be incomplete. 3 WWIVnet Technical Documentation 2.0.34 (NET34) II. GENERAL OVERVIEW OF WWIV NETWORKING A WWIV network is basically a loose confederation of WWIV BBS systems that use the WWIVnet (or compatible) software. The software does not limit the connection structure, so the member sysops can connect to anyone they wish (subject to the rules of their network). For ease of administration, the network may be split up into Groups, each with their own coordinator. Node numbers are an unsigned short int, so that nodes may be assigned a value from 1 to 65535. The lists of nodes are distributed in two sets of files: BBSLIST.xxx and CONNECT.xxx. There are two different ways of handling these files. The old way has just one BBSLIST.NET and one CONNECT.NET file. The CONNECT.NET file assigns costs to each connection for each system. Some smaller networks still use this setup. The new way, implemented in 1990, uses several BBSLIST and CONNECT files with extensions indicating group number (e.g. Group 1's files would be BBSLIST.1 and CONNECT.1). BBSLIST.0 contains a list of Group numbers, and CONNECT.0 contains inter-Group connections. It is important that any non-WWIV systems be able to support both setups if they wish to connect to a WWIV network. Like all BBS networks, the primary purpose is to exchange private mail and public posts between BBSes. The passing of files in binary form, however, is not supported by the WWIVnet software, though there are some third party programs such as Tolkien's PACKSCAN which can handle files. All messages also have a maximum size limit of 32k. The basic WWIVnet software distributed in NETxx.ZIP by WSS consists of four programs: NETWORK.EXE, NETWORK1.EXE, NETWORK2.EXE and NETWORK3.EXE. Any alternative software for interfacing with WWIV should follow the same structure. NETWORK.EXE handles connections between systems. On the sending end of the connection, NETWORK.EXE calls out to another system, chosen from the CALLOUT.NET file on that system. The answering system activates NETWORK.EXE when it detects a network call. Once they're talking, they make any mail packet transfers needed. NETWORK1.EXE is the first of the two mail tossers. This one takes the incoming packet received by NETWORK.EXE and distributed the messages within to their rightful places. Local mail goes into LOCAL.NET, while mail passing through to other systems is tossed into packet files for the next hop. NETWORK2.EXE tosses the local messages in LOCAL.NET. Most are messages for email or local subboards, but there are also network updates, sub REQuests, software "pings," and other special purpose message types. It also has the ability to call on third-party preprocessors for special handling of certain types of messages. 4 WWIVnet Technical Documentation 2.0.34 (NET34) NETWORK3.EXE processes all the network updates that come in. This helps determine what routing off-system mail will take. Each WWIV network also has its own special encoding and decoding programs for handling of updates and network mail from the Network Coordinator and Group Coordinators. These are the DEmmm.EXE files (mmm corresponding to the message type). The DEmmm.EXE cannot be replaced, so any NETWORK2.EXE replacement must be able to recognize the need for calling the appropriate DEmmm.EXE, as described below. 5 WWIVnet Technical Documentation 2.0.34 (NET34) III. MAKING CONNECTIONS A. Establishing Contact Through some process, one system decides to call another. Various techniques can be used for deciding when and who to call; that should have no effect on the network. Any WWIVnet system should be able to receive a network connection at any time (i.e., there is no network mail hour). For an example of a method for limiting call out times, see the WWIVnet Software Docs. However the decision is made, a call is made to another WWIVnet system. If he connects, the connection protocol is then begun. After connection, the caller waits for the string "NN:". To get to this prompt, the caller sends the string "N " ('N', space), every half second. Every 7 seconds, the caller sends a carriage return (char 13 decimal). The reason for sending "N " is twofold: 1) the N is to answer any yes/no question that may occur on connection; and 2) the space is to abort any message printed out to callers, if the BBS allows it. After 16.5 seconds, the caller gives up and assumes he is at the NN: prompt. Since this sequence is designed specifically with WWIV systems in mind, any BBS or front end program receiving a call from a WWIVnet system must be at its login prompt, or have already started the network response program (such as NETWORK.EXE), by 16.5 seconds after the modem connection is estabilshed. Whether or not it can respond to the "N " sequence does not matter as long as it is prepared for the next step. Likewise, any network program calling a WWIVnet system must follow the above sequence to ensure a proper connection. After the NN: prompt is reached, the caller sends the string "\030!-@NETWORK@-!\r" (Ctrl-x, "!-@NETWORK@-!", return), to identify that this is the network calling. The caller then waits for the net identification string. The "!-@NETWORK@-!" string is sent every 6 seconds. After 20 seconds without receiving the network identification string, the caller gives up and hangs up. The network identification string is sent by the answering system after getting the "!-@NETWORK@-!" string. The network ident string is sent every 6 seconds, until the network response is received. The answering system gives up and hangs up after 20 seconds. The network ident string is: \x1b[8mxX33211\x0c31412718\x1b[8DNETWORK! (i.e., ESC "[8mxX33211" Ctrl-L "31412718" ESC "[8DNETWORK!") 6 WWIVnet Technical Documentation 2.0.34 (NET34) The network response string from the calling system is: \x1b[8mxyzzy$.@83\x0c## (i.e. ESC "[8mxyxxy$.@83" Ctrl-L "##") After getting the network identification string, the caller sends the network response string every 6 seconds. If, after 20 seconds, the answering system does not receive a Ctrl-B ('\002\'), the calling system gives up the attempt and hangs up. If the Ctrl-B is received, the caller considers the connection established. After getting the network response string, the answering system sends three Ctrl-B characters ("\002\002\002"), and considers the two systems connected. B. Data Exchange After the two systems are connected, the caller sends an identification block to the answering system. The block is 128 bytes long, and is sent in the same method as an xmodem block of data is sent, complete with CRC. The caller does not wait for a NAK before beginning transmission, but begins transmission of the block immediately after receiving one Ctrl-B. The block is sent as block #0, with CRC and 128 bytes of data. After receiving the block, the answering system sends the usual ACK/NAK, etc. If after 6 tries the block is not received correctly, both sides give up and disconnect. The block of data contains from seven to nine pieces of data, each separated by a space character (char 32 decimal). All bytes after the last piece of data have a value of zero. The pieces of data are: system number Net node number of the sender. sendback Whether the answering system may send a net file back to the sender ("0" for no, or "1" for yes). The caller will ignore this field when the answering system sends its ident block. In other words, the only system that determines whether sendback is allowed is the system making the call. cost The cost for the call, in cents per minute, as defined in CONNECT.NET under the old WWIVnet setup. If the network is using the Group setup, this value will be zero ("0"). features A long integer, sent as a literal, specifying the features supported by that system. Right now, five values are possible, affecting mainly the protocol used 7 WWIVnet Technical Documentation 2.0.34 (NET34) in transfer. It is read as a bitmap ('fea- tures&[value]'), with the bits having the following effects: 1 -- Zmodem available (DSZ or Visual Zmodem); 2 -- numk and netver found after password (see below); 4 -- HSLink (bidirectional protocol) available. Current versions of the WWIVnet software start with the 2 bit set, then sets the 1 and 4 bits as appropriate. If neither Zmodem nor HSLink are available, transfer defaults to internal Ymodem. tosendlen The number of bytes in the mail file that is to be transferred, sent as literal. password The password to be used between the two systems. If no password has been set yet, this is set to "NONE". Usual passwords are 15 characters long. numk Number of KB the sender is able to take, sent as a literal. This is calculated as free space on the data drive divided by three. This field will only be present if features&2 is set. net_ver Version of the network software, such as "34" for NET34. Third-party calling programs must send the version of WWIVnet software it is compatible with. This field will only be present if features&2 is set. net_name Name of the network the call is for. This is used by the receiver to determine which data directory the network files go into. This is not a required field, but to be safe it should always be included. One case in which it would be necessary is if a BBS is connect- ing two nodes with the same node number on different WWIV networks (i.e., one is @3050.IceNET and the other is @3050.WWIVnet). See below for examples of identification blocks sent between systems. To assure that the identification block is compatible with that generated by NETWORK.EXE in NET34, here is how it's generated and sent out by NETWORK.EXE: for (i=0; i<128; i++) b[i]=0; /* 'b' is the net ident string */ itoa(net_sysnum,b,10); /* net_sysnum = system's node number */ strcat(b," "); itoa(sendback,s,10); strcat(b,s); strcat(b," "); itoa((int) (cost*100.0),s,10); 8 WWIVnet Technical Documentation 2.0.34 (NET34) strcat(b,s); strcat(b," "); ltoa(features,s,10); strcat(b,s); strcat(b," "); ltoa(tosendlen,s,10); strcat(b,s); strcat(b," "); if (password[0]) strcat(b,password); else strcat(b,"NONE"); if (features & 2) { /* 'net_data' is network data dir, FREE_FACT = 3 */ ltoa((long) (freek1(net_data) / FREE_FACT), s, 10); strcat(b," "); strcat(b,s); strcat(b," "); itoa(NET_VER,s,10); strcat(b,s); } strcat(b," "); strcat(b,net_name); After the caller sends the block of data to the answering system, the answering system checks the password with the password expected from that system. If the password is wrong, or calls from that system are not allowed, the answering system discon- nects. Information on passwords and allowable systems should be in a separate data file, such as the CALLOUT.NET If the password is OK, the answering system then sends a similar block of data back to the caller, giving its system number, features, and bytes to send. Also, if no password had been set yet (the password received from the caller is "NONE"), then the answering system randomly picks a password and puts it in the password field. After both systems have sent and received the data blocks, transfers begin. If the caller has any data to send, it is sent first. If the answering has any data to send, it is sent second if the sendback flag is set on. It should be noted at this point that since Ymodem is the default protocol in the absence of Zmodem or HSLink, it must be supported internally in the WWIVnet calling program, or at least be able to run it externally. The Ymodem used by the WWIVnet software is not quite the true Ymodem defined by Forsberg. There is a block #0 which contains the filename, timestamp, and size (in bytes), followed by the 9 WWIVnet Technical Documentation 2.0.34 (NET34) file itself, ending with an EOT block. There is no "end of batch" block, however. If the caller has no data to send, the answering system immedi- ately begins sending data (again, if sendback is set on). If neither has any data to send, the transfer protocol is not started. Once a netmail file is completely sent, it is erased on the sending system. If the file is not completely sent (due to excessive errors or carrier loss), the file is not deleted, so that another attempt can be made on a later call. Of course, if HSLink is enabled (both ends can use it), both netmail files are sent at the same time, if there are two. If only one of the connected systems has a netmail file, HSLink is still used. After transfers (if any) are done, both systems wait 0.5-1.0 second, then hang up. The transfer of files is then done. C. Identification Block Examples 1. System 1 calls system 2 on WWIVnet. System 1 has 100KB to send to system 2, supports Zmodem and can accept 400KB. System 2 has 200KB to send to system 1, does not support Zmodem, and can accept 1200KB. The call costs $0.10/min (old CONNECT.NET being used). No password has been set yet on system 1, sendback is allowed, and NET34 is in use on both ends. System #1 sends: 1 1 10 3 102400 NONE 409600 34 WWIVnet System #2 sends: 2 1 10 2 204800 ARANDOMPASSWORD 1228800 34 WWIVnet Since Zmodem is not supported by both systems, Xmodem-1k is used to transfer the mail. 2. System 10 calls system 20 in IceNET. System 10 has 56KB to send, can accept 3485KB, and uses NET32. System 20 has 678KB to send, can accept 10MB, and is a PCBoard system using software compatible with NET34. Both support Zmodem and the selected password is "PASSWORDPASSWOR". Sendback is not enabled. System #10 sends: 10 0 0 3 57344 PASSWORDPASSWOR 3568640 32 IceNET System #20 sends: 20 0 0 3 0 PASSWORDPASSWOR 10240000 34 IceNET 10 WWIVnet Technical Documentation 2.0.34 (NET34) Since sendback is not allowed (the caller decides this), system 20 won't send any data to system 10, hence the number of bytes to send is zero. Zmodem will be used since both ends support it. 3. System 100 calls system 200 on MTBnet. System 10 has 125KB to send, and can accept 300KB. System 200 has 350KB to send and can accept 500KB. Both have HSLink available, use NET34, and use the password "OURPASSWORD1234". Sendback is enabled. System #100 sends: 100 1 0 6 128000 OURPASSWORD1234 307200 34 MTBnet System #200 sends: 200 1 0 6 358400 OURPASSWORD1234 512000 34 MTBnet Since system 100 cannot accept the 350KB system 200 has for it, only the 125KB from system 1 is sent. HSLink is used for the transfer since both systems support it, though only one system is sending a file. 11 WWIVnet Technical Documentation 2.0.34 (NET34) IV. MESSAGE PACKETS The most important component of any network is the mail file, which contains all the public posts, email, and network information which makes the BBS network what it is. WWIVnet mail files consist of a series of mail packets, each with its own header segment describing the type and size of the packet. There are two types of mail files in WWIVnet, each similar but processed differently. The netmail file is the file received from another system, and contains packets destined for that system as well as other systems in the network (if the BBS has more than one connect). Netmail files may be compressed, using the PKWare compres- sion libraries. The local mail file contains the packets from the netmail file which are destined for the BBS only. A. Message Header Each message sent through the network has a header. The header tells which user/system originated the message, where it is to be sent to, the type of message, and other information. The structure of the header is: typedef struct { unsigned short tosys, touser, fromsys, fromuser; unsigned short main_type, minor_type; unsigned short list_len; unsigned long daten; unsigned long length; unsigned short method; } net_header_rec; Each header is 24 bytes long. The fields, in detail, are: tosys, touser The destination of this message (system number and user number, if applicable). The touser field will be zero in all cases except for email (main_type==2) and SSMs (main_type==15). fromsys, fromuser The origin of the message (system number and user number). This contains the user number/system number combination of who actually wrote the message. If the message is "gated" (that is, a sub post from a system on a different network, 12 WWIVnet Technical Documentation 2.0.34 (NET34) or email from a user in another network), 'fromuser' will be zero. main_type, minor_type The type of message this is. The main type stores the actual type (email, post), and the minor_type is used to specify what sub-type it is. For example, the main_type for a post is 3. The minor_type is then used to specify what type of post it is, what subboard the post is to go on to. A list of main and minor types is found in section IV(D), below. daten The time the message was sent, stored in unix time, as the number of seconds since Jan 1, 1970. length The length of the message. This includes any information between the packet header and the message itself, such as the sender's name, message title, and so forth. Note that the length does not include the node list indicated by list_len. method If the file is encrypted, compressed, or source-verified, this describes the type of compression or encryption used. This will tell NETWORK2 (or other local mail tosser) which DEmmm.EXE to execute. DEmmm.EXE is explained in more detail in the next section, below. list_len Some messages need to go to more than one system. For example, networked posts may go to over 20 different systems. It makes no sense to have a separate copy of the message for each destination system, so the same copy of the header and message is used. (This is referred to as "stacking" the message). The list_len specifies the number of destination systems listed. If list_len is non-zero, then the touser and tosys fields are ignored. The list_len is not used for e-mail to a user (main_type is 2 or 7). When a message has only one destination system, the destina- tion system is stored in tosys, and list_len is zero. If there are two or more destinations, then tosys is 0, and list_len holds the number of destination systems. When list_len is non-zero, the list of destination systems is stored immediately after the header, but before the actual message itself. The length of the list is not included in the length field in the header; the length 13 WWIVnet Technical Documentation 2.0.34 (NET34) stored in the header is the length of the message only. Each entry in the destination system list is two bytes long, and is stored in the standard byte-reversed format of 80x86 chips. For example, if a post is destined to system 1, the tosys field will be 1, and list_len will be 0. If the post is destined to systems 1 and 2, tosys will be 0, list_len will be 2, and there will be 4 bytes between the header and message. The bytes will be: 01 00 02 00 (remember, byte-reversed format). The rest of the header will be the same for both messages. A packet thus consists of a net header, a destination list (if any), and the text of the message. The length of a full message packet is thus: 24 + 2*list_len + msg_length. The message text (the part following the header) for a post or email begins with information intended for the message header shown when the message is displayed. Each piece of information is followed by a carriage return and line feed (cr/lf) character to separate it from the next except for the message title, which is followed by a NUL character. For most posts and email, that information is: Message Title Whatever title the user gave to the post. Sender name usually the name and number of the user who wrote the message with the system number, in whatever format the sending BBS uses. Date string Formatted date the post was written, in whatever format the BBS uses. So the message header format for most posts and email would be TITLE<nul>SENDER_NAME<cr/lf>DATE_STRING<cr/lf>MESSAGE_TEXT. Some main_types have other information, as noted in the main_type descriptions in section IV(D). B. Mail File Processing A WWIVnet file is simply several packets appended into one file. Starting with NET25, the WWIVnet software supports compression of the netmail files to help save on connection time in long distance connections, using the PKWare Compression Libraries. These files have a slightly different format from uncompressed files, but the most important issue at this point is that the 14 WWIVnet Technical Documentation 2.0.34 (NET34) first long int of a compressed file has the value 0xFFFEFFFE. If you purchase the compression libraries from PKWare, details covering compressed packets are found in Appendix A. Otherwise, anyone using WWIVnet compatible software should be advised to make sure their connect only sends them uncompressed files, and the software should be able to detect and reject compressed packets before attempting to process them. Since there is nothing in the data exchange described above to warn that an incoming packet is compressed, there is no way to detect and prevent transfer of a compressed mail file. Once it has been received and (if necessary) uncompressed, the mail file should be processed following these steps: 1. Open the file, and set the current message pointer to the beginning of the file. 2. Read in the net header (24 bytes). 3. If list_len is non-zero, read in the list following the header (2 * list_len bytes). 4. Read in the message itself (length bytes). 5. Process the message. 6. If not the end of file, go to step 2. To ensure the integrity of the mail file, an initial pass over it should be done. This pass would step through each packet in the file, reading each header and making sure no packets are truncated. If the file ends in the middle of a packet, then it is obviously corrupted and cannot be processed properly. At this point, either throw away the whole file or remove the truncated packet and process the remaining packets. During the packet tossing, each packet needs to be marked as processed. Thus, if analysis is interrupted before completion, the packet analyzer can skip over those packets already processed when run again. To mark the packet as already processed (or deleted), set the main_type to 65535. Any packet with a main_type of 65535 should therefore not be processed. The analyzer should follow these steps when processing each packet: 1. If main_type is 65535 (deleted), skip the message. 2. If list_len is non-zero, do steps 3-6 for each entry in the list, substituting that entry for "tosys" 15 WWIVnet Technical Documentation 2.0.34 (NET34) 3. If tosys is this system, process the file locally (in the case of NETWORK1.EXE, the message is copied to LOCAL.NET for processing by the local packet processor). 4. If tosys is an unknown system or unreachable, put the packet in the dead mail file. 5. If the next system to forward the packet to ("next hop") is the system that the message was last received from, put the packet in the dead mail file. This prevents messages from looping 6. If the tosys is okay, put the packet into the file that is to be sent to the next hop. Of course, it is more complicated than that. If list_len is non-zero, all destination systems should be processed before the message is stored anywhere. This way, if the message has 10 destinations, each of which has the same next hop, only one copy of the message will be printed out, that packet with 10 systems in its destination list. Likewise, for a system with more than one connection, if a message has 4 destination systems going through one next hop and 3 going through another, one copy of the message will go into each hop's file -- one with four systems in the node list, the other with the remaining three. The dead mail file is reprocessed whenever a network update (new BBSlist or connection list) is received. C. Local Mail Processing and DEmmm.EXE Processing of local mail packets should be similar to processing of incoming netmail packets. The main difference between netmail tossing and local mail tossing is that the main and minor types are ignored during netmail processing, and the list_len and node list are ignored (since there won't be a list on local mail). 1. Open the file, and set the current message pointer to the beginning of the file. 2. Read in the net header (24 bytes). 3. Read in the message itself (length bytes). 4. Process the message. This is done according to the main_type and (if applicable) minor_type of the message. 5. If not the end of file, go to step 2. 16 WWIVnet Technical Documentation 2.0.34 (NET34) A few main_types (noted below) cause return messages to be generated to go back out to other systems. The local mail file analyzer should place these into an interim mail file that will be processed by the netmail file analyzer after local mail processing has been completed. The WWIVnet local mail analyzer (NETWORK2.EXE) puts these messages into P1.001 or P2.001. Then NETWORK1.EXE analyzes this file and places them into outgoing netmail files for the system's connections. Some types of messages that contain network related files such as updates to the nodelists and connect lists and email to all sysops from the NC or GC. For the sake of network security, these messages have a source-verification signature at the beginning (using, for example, RSA or a similar algorithm). There are several "methods" used to handle these messages, and each requires a decryption program, or DEmmm.EXE (where "mmm" is the encryption method, as listed in the 'method. field of the net header). These DEmmm.EXE files MUST be supplied by the NC or GC of each network, and each network's DEmmm.EXE are unique to that network. That is, WWIVnet's DE1.EXE will not handle method 1 messages from WWIVLink, nor vice versa. When a message is encountered with 'method!=0', the following steps are taken: 1. The local packet analyzer writes out the text of the message (no header or node list) to a temporary file (TEMPDE.XXX) in the data directory for the relevant network. 2. A command line for calling the appropriate DEmmm.EXE is created using the C command "sprintf(cmd, "de%u %s/tempde.xxx", nh.method, net_data);" ('nh' is a structure of type net_header_record, 'net_data' is the network data directory). The command is then executed. 3. The DEmmm.EXE program is then responsible for reading the TEMPDE.XXX in from disk, deleting it, then attempting to decode it. Two things can then happen: a. If the TEMPDE.XXX fails decoding (bad CRC), DEmmm.EXE just exits (returning to the local packet analyzer). If the analyzer finds the TEMPDE.XXX file does not exist, the message is deleted and the program goes to the next packet. b. If the CRC checks out in the DEmmm.EXE program, it writes out the decoded text into a new TEMPDE.XXX file and exits. The local packet analyzer reads in the data from that file and replaces the text of the message with that, then goes ahead and processes the packet as determined by main_type. 17 WWIVnet Technical Documentation 2.0.34 (NET34) Network operators who wish to write EN/DE programs for their own netwide messages may wish to consider using the RSAREF library to develop their own source-verification scheme. D. Main and Minor Message Types The main and minor type of each message determines how it is processed (where it goes, whether it's a sub post, email, or network info, etc.). The analyzer reads the message header in first to get the main and minor types, then performs the operation indicated by those fields. Here is a list of the main_ and minor_types, along with the WWIV BBS #define name and descriptions of the processing required. Encoding method is assumed to be zero unless otherwise noted. Note that while these descriptions concern analyzing local mail packets, they also apply to how to create outgoing netmail packets. It should also be noted that some of the "UNUSED" message types could be used by some third party software, but they are not an official part of the WWIVnet software, so no mention is made of them. main_type 1 (0x0001) -- main_type_net_info These messages contain various network information files, encoded with method 1 (requiring DE1.EXE). Once DE1.EXE has verified the source and returned to the analyzer, the file is created in the network's DATA directory with the filename determined by the minor_type (except minor_type 1). 0 -- Feedback to sysop from the NC. This is sent to the #1 account as source-verified email. 1 -- BBSLIST.NET -- Old-style node list (non-Group setup). 2 -- CONNECT.NET -- Old-style connections list (non-Group). 3 -- SUBS.LST -- List of subboards ("subs") available through the network. This has been replaced by main_type 9. 4 -- WWIVNEWS.NET -- An electronic magazine of sorts distributed within some networks, usually monthly. 5 -- FBACKHDR.NET -- a header file added to network update reports for the network. 6 -- Additional WWIVNEWS.NET text -- appended to the existing WWIVNEWS.NET file. 7 -- CATEG.NET -- List of sub categories. WWIV's sub setup facility uses this list so the sysop can specify what category a netted sub falls into. The network's SUBS.LST compiler uses this information for compiling the subs lists sent out as main_type 9. 8 -- NETWORKS.LST -- A list of all current WWIVnet type networks. 18 WWIVnet Technical Documentation 2.0.34 (NET34) This message type is source-verified. That is, there is a digital signature at the beginning of the message text which is decoded by the DE1.EXE to verify that it has come from a "legal" source. This helps make sure that the network info will only come from the Network Coordinator. If the source- verification fails, the packet is discarded. main_type 2 (0x0002) -- main_type_email This is regular email sent to a user number at this system (see tosys and touser, above). Note that this type of mail should only be received by systems that assign numbers to users (WWIV, VBBS, etc.). BBSes in a WWIV network that only identify users by name (PCBoard, RBBS, etc.) can only receive email-by-name (see main_type 7, below). Email has no minor type, so minor_type will always be zero. Processing of the email is straightforward. The analyzer looks for the user number indicated by the touser field. If the number exists and the user has not been deleted from the BBS, the message is written into the email file, addressed to the user indicated. If the number does not exist or the user at that number has been deleted, the packet is deleted without processing. Alternatively, the analyzer may generate a return message (as email) to the sender telling him that the mail was not delivered and quoting the message back to him. main_type 3 (0x0003) -- main_type_post This is a post sent from the sub host's system to the subscriber systems, for subs that have a numeric sub-type (subs of alphanumeric subtypes are main_type 26, described below). The minor_type will be the numeric subtype the post will go to. When this type is encountered, the network analyzer should search the BBS data files for the sub type given. When the sub is found, the message is written into the indicated message file in whatever format the BBS software uses. If the sub type is not found, the message packet is simply deleted. (There are some local mail preprocessors which will scan the packet for messages on subs that the system does not carry, and return the message to the host system. An alternate mail analyzer could have such a capability built in.) main_type 4 (0x0004) -- UNUSED main_type 5 (0x0005) -- main_type_pre_post These messages are similar to main_type_3, except they are posts en route from the subscribers to the host of a sub. 19 WWIVnet Technical Documentation 2.0.34 (NET34) Like main_type 3, the minor_type is the numeric subtype of the sub. Since this is from subscriber to host, list_len will be zero. When this type of packet is received, the local mail tosser should look for the appropriate file which will contain the list of subscribers to the sub (WWIV and NETxx use N[subtype].NET) If the file is found, a main_type 3 copy of the post is generated in an outgoing netmail file, with the node list read from the subscriber file inserted before the message text (and the list_len field modified reflecting the addition of the node list). If the file cannot be found, the analyzer assumes the BBS does not host the sub and deletes the packet. Many WWIV sysops use a feature of the software known as network validation ("netval"). When a sub is set for netval (this is found in the SUBS.DAT record for the sub), the analyzer does not send the post out to the network. The sysop must validate the post on the BBS, at which point it is sent out by the BBS. This also applies to pre-posts for main_type 26 (main_type_new_post). main_type 6 (0x0006) -- main_type_external This type has largely been replaced with main_type 27 (main_type_new_external), but essentially works the same way. This will create messages that are read and processed by an external processor. The minor_type is determined by the program expected to work with it. When the processor encounters this type of message, it searches for a file that contains the names of external programs, and the minor_types they accept, used by the BBS (EXT_LIST.NET for the WWIVnet software). If found, the message is written or appended to EXTERNAL.NET in the network's data directory. The external program, when run, should be able to find the file and process it, then delete the file (or the portion that it uses). Note that when there is more than one main_type 6 message in a mail file, the EXTERNAL.NET will contain all messages of that type, so the external message processor needs to be able to find the relevant text within the file. It is encouraged that programs that use external messages use main_type 27 (main_type_new_external), which has more robust features. Among other things, that type will create a separate temporary file for each main_type 27 message found, making processing of external messages simpler. main_type 7 (0x0007) -- main_type_email_name 20 WWIVnet Technical Documentation 2.0.34 (NET34) The other email type. The touser field is zero, and the name is found at the beginning of the message text, followed by a NUL character. Minor_type will always be zero. When this type of packet is encountered, the analyzer gets the name from the beginning of the message text and searches through the BBS's user list to find the specified name. If it is found, the message is written into the email file for the BBS. If it is not, the message will be deleted or a return email may be sent back to the sender, explaining that the message was not delivered and quoting the email back. The destination user's name is prepended to the beginning of the message text, followed by a NUL, then the rest of the usual message header info and the message text. The message header info at the beginning of email-by-name messages is thus DEST_USER_NAME<nul>TITLE<nul>SENDER_NAME<cr/lf> DATE_STRING<cr/lf>MESSAGE_TEXT. main_type 8 (0x0008) -- main_type_net_edit This type is used by Black Dragon in conjunction with his program NETEDIT, a utility for managing the network files on a WWIV BBS. Minor_types are as follows: 0 -- A partial update to the BBSLIST information. 1 -- A request for BBSLIST information to be changed. 2 -- A partial update to the connection information. 3 -- A request for connection information to change. 4 -- An update to NETEDIT's registration record. 5 -- A transmittal of the installation message. 6 -- A request for to transmit a registration record. 7 -- A response to request for a registration record. 8 -- A remote request for a net analysis ("/A"). 9 -- An ASCII text response to a remote analysis. 10 - Network Editor E-mail and/or automatic feedback. 11 - A message reporting an error condition. 12 - A request for installation and ver information. 13 - A request for a remote node's ALIASES.NET file. 14 - A request for a node's aliases. 15 - A response to the alias request. For more information on the use of these types, see the NETEDIT documentation, or email Black Dragon at @1180 on WWIVnet or @13080 on WWIVLink. main_type 9 (0x0009) -- main_type_sub_lst Networks with large subs lists (over 32k) break them up into parts and send the set out under this main type rather than the subs.lst type under main_type 1. The minor_type indicates the part of the subs list. 21 WWIVnet Technical Documentation 2.0.34 (NET34) When the analyzer processes this type, it creates a file in the appropriate network directory and copies the message text into it. Minor_type zero creates the file SUBS.LST, and all other minor_types create a SUBS.x file where 'x' is the minor_type. main_type 10 (0x000a) -- UNUSED main_type 11 (0x000b) -- main_type_bbslist This type is for the new-style BBSLIST files used in networks that use the Group setup. It covers full and partial updates sent from the Network Coordinator (NC) to the entire network as well as update requests sent from the Group Coordinators (GCs) to the NC. The encoding method is either 1 (when coming from the NC) or calculated as ((minor_type % 256)+256) (when coming from the GC). Messages of this type are source verified by DE<method>.EXE, handled the same as main_type 1 packets are. Minor types are as follows: 0..255 Full bbslist update sent from NC to the network. Minor type is the Group number. Creates BBSLIST.<minor_type> in the network data direc- tory. 257..511 Full bbslist update sent from the GC to the NC. Minor_type is the Group number plus 256. Creates BBSLIST.A<minor-less-256-in-hex> in the NC's network data directory. 513..767 Partial bbslist update sent from the NC to the network. Minor type is the Group number plus 512. Creates the file BBSLIST.<minor-type> in the network data directory. This file will be merged with the appropriate full BBSLIST file during network analysis (described below). In some networks, the Group updates are sent out to the network by the GCs rather than the NC. main_type 12 (0x000c) -- main_type_connect This is the same as main_type 11, except it is for CONNECT files. It also does not include partial updates, as there are none for CONNECT files. The encoding method is also either 1 (from NC) or ((minor_type % 256)+256) (from NC) for this type. These packets are also source-verified, checked by DE<method>.EXE. Minor types: 0..255 Full CONNECT update sent from NC to the network. Minor type is the Group number. Creates CONNECT.<minor-type> in the network data directory (after source-verification). 257..511 Full bbslist update sent from the GC to the NC. Minor_type is the Group number plus 256. Creates CONNECT.A<minor-less-256-in-hex> in the NC's 22 WWIVnet Technical Documentation 2.0.34 (NET34) network data directory (after source verifica- tion). In some networks, the Group updates are sent out to the network by the GCs rather than the NC. main_type 13 (0x000d) -- UNUSED main_type 14 (0x000e) -- main_type_group_info For now, this type only covers email to the members of a particular Group by the GC, so minor type will always be zero. Encoding method is the Group number plus 256. Processing for this is the same as for type 1/0 messages. They are source-verified by DE<method>.EXE. main_type 15 (0x000f) -- main_type_ssm WWIV BBSes also send out small messages, known as "SSMs", across the network. These are little one-line messages generally telling users when their mail has been read and so forth. Some BBSes have been modified to send other types of messages. At any rate, main_type handles these small messages. Minor_type is always zero. Like email, the analyzer searches for the user number in the BBS's user list. If found, the message is written into the SSM file for the BBS. Since this is a feature most non-WWIV systems do not support, they can be ignored. One feature of WWIV networking is the ability for network sysops to send "REQs" to the hosts of subs, enabling them to automati- cally subscribe to and drop subs they belong to. Main_types 16 through 19 handle REQs and their responses. main_type 16 (0x0010) -- main_type_sub_add_req This is for requests to add the sending system to a sub's subscriber list. Minor_type will be the numeric sub type, or zero for alphanumeric sub types. For minor_type==0, the sub type (followed by NUL) will be the message text. Otherwise, there should be no message text (if there is, ignore it). When this message type is received, the analyzer should search for the subtype's subscriber file (N[subtype].NET for WWIV systems). If the file is found, the system number of the new subscriber is added, if it is not in there already. If the add is successful, it will then look for a text file in the data directory (SA[subtype].NET for the WWIVnet software) that contains information the sysop wants to send back to the subscriber. A type 18 message is sent to the subscriber indicating status of the add request (see below) and including the text in the SA[subtype].NET file, if one 23 WWIVnet Technical Documentation 2.0.34 (NET34) is found. If the add is not allowed, the analyzer looks for SR[subtype].NET and sends that text back to the requester. If the add is otherwise unsuccessful, the type 18 message will include the status and a short explanation of why the add was not succcessful. main_type 17 (0x0011) -- main_type_sub_drop_req This is the same as a main_type 16 message, except that it is sent by a subscriber wishing to drop a sub. The minor_type is determined the same way as main_type 16. There should be no message text, but if there is any, it is ignored. Processing is similar to a type 16 message. The analyzer searches for the subtype's subscriber file, and upon finding it removes the subscriber's system number from it, if it is there. Status of the drop request is returned to the sender in a main_type 19 message, with a short message appended that explains the status. main_type 18 (0x0012) -- main_type_sub_add_resp This carries the status response to a main_type 16 (sub add request). The minor_type is determined the same way as type 16 message. The first byte of message text (after the subtype, if minor_type==0) is the status of the add request. Possible status byte values are: 0 -- Subscriber added successfully. 1 -- This system is not the host (N[subtype].NET not found). 3 -- Not allowed to add subscribers automatically. 4 -- System number already there (can't add it again). Since these messages also may contain a message to the requesting sysop, the message header info at the beginning of the message text appears as SUBTYPE<nul>STATUS_BYTE TITLE<nul>SENDER_NAME<cr/lf>DATE_STRING<cr/lf>MESSAGE_TEXT. In this case, SENDER_NAME will be the name of the sysop of the system hosting the sub. 'SUBTYPE<nul>' will only be included if the sub is an alpha subtype. And finally, note that there is not <cr/lf> or <nul> after the status byte. When received, the processor will send the message text mentioned in the main_type 16 description (minus the status byte) to the sysop as email, if the status is 0 or 3. main_type 19 (0x0013)- main_type_sub_drop_resp Similar to main_type 18, this carries the response to a sub drop request, with the minor_type following the same conventions as above. This also carries a status byte as the message text: 0 -- Sub dropped successfully. 1 -- This system is not the host. 24 WWIVnet Technical Documentation 2.0.34 (NET34) 2 -- System number is not there (can't drop it). 3 -- not allowed to drop subscribers automatically. The message header info in the message text is the same format as for main_type 18. When received, the processor will send the message text mentioned in ther main_type 17 description (minus the status byte) to the sysop as email, is the status is 0 or 3. main_type 20 (0x0014) -- main_type_sub_list_info In many WWIV networks, the subs list coordinator (SLC) occasionally sends out "pings" to all network members. When this message type is received from the SLC (minor_type 0), the analyzer checks the BBS's sub data file. If there are any subs hosted by the receiving system which are flagged for inclusion in the distributed SUBS.LST, a list of them is returned to the SLC via another main_type 20 message with minor_type==1). When the SLC recieves the reply, it is written into SUBS.INF in the network's data directory (appended if the file exists). main_types 21 (0x0015) through 25 (0x0019) -- UNUSED These were formerly reserved for the WWIVLink network for their own updates, before they purchased NETUP (WSS's network update software). It is not longer used by that network. main_type 26 (0x001a) -- main_type_new_post Because of the growing number of networked subs on WWIVnet, the number of available subtypes was getting scarce. Starting with WWIV version 4.22 and NET32, alphanumeric subtype support was added, greatly expanding the possible subtypes. Alpha subtypes are seven characters -- the first must be a letter, but the rest can be any character allowed in a DOS filename. This main_type covers both subscriber- to-host and host-to-subscriber messages. Minor type is always zero (since it's ignored), and the subtype appears as the first part of the message text, followed by a NUL. Thus, the message header info at the beginning of the message text is in the format SUBTYPE<nul>TITLE<nul> SENDER_NAME<cr/lf>DATE_STRING<cr/lf>MESSAGE_TEXT. It is assumed that a message coming into a host is a prepost, and it is processed similarly to main_type 5. Likewise, it is assumed that messages coming into a sub- scriber system are net posts, and they are processed similarly to main_type 3. main_type 27 (0x001b) -- main_type_new_external 25 WWIVnet Technical Documentation 2.0.34 (NET34) This is the new type of external message, implemented with NET33. Like main_type 6, it creates an external file with the message text for an external program to process. Again, the minor_type is determined by the external program. There is a full explanation of how these messages are processed in Filo's WWIVnet Software Docs. In short, similar to main_type 6, the local mail processor searches for the minor_type in a data file (EPROGS.NET for NETxx), and creates an external file if it is found. When the local mail processor is finished with the local mail file, the program associated with that minor_type will execute, with the associated filename (with path) as a parameter. 26 WWIVnet Technical Documentation 2.0.34 (NET34) V. BBSLIST/CONNECT FILES AND MESSAGE ROUTING So how does the network software know where to send an off-system message, especially if the BBS has more than one connect? FidoNet has its nodelists, and so does WWIVnet. WWIVnet actually has two different types of node lists, as mentioned elsewhere. We'll take these separately, then discuss figuring out the routing. A. Old WWIVnet -- BBSLIST.NET & CONNECT.NET In the beginning of WWIVnet, there were only two files needed to keep up with the systems in the network -- BBSLIST.NET and CONNECT.NET. Though this is rarely used now, there are still some smaller networks which use these files, so they should be discussed. BBSLIST.NET holds a listing of what systems are in the network. Each system has an entry, with the systems usually grouped by area code. The format for each system's line: system number (preceded by @), system phone number (preceded by *), max bps rate of the system (preceded by #), system flags if any, WWIV registration number or date of entry (enclosed in brackets), and system name (enclosed in ""). For example, the BBSLIST line for Amber in WWIVnet could be: @1 *310-798-9993 #14400 < !$ [1] "Amber" Most of the system flags after the modem speed indicate the kind of high-speed modem being used by the system. Currently, these flags are: | -- Telebit-compatible (PEP) modem. < -- USR HST 9600+bps modem. > -- Hayes V-Series compatible 9600+bps modem. Z -- Zoom V.32terbo (19.2kpbs) modem. / -- CompuCom 9600+bps modem. ! -- CCITT V.32 (9600bps) modem. $ -- CCITT V.32bis (14.4kbps) modem. ~ -- V.FAST (28.8kbps) modem. ? -- Fax-capable modem (not currently used) Other system flags used which are not modem designators: + -- The system is a dedicated mail server. That is, it is not a true BBS, only handles the transfer of network mail for an area or region. \ -- Fidonet system. Some systems in the network have "gateways" into Fidonet (or Fidonet compatible, such as GlobalNet). = -- PCPursuitable system. This is actually not useful since PCPursuit has gone out of business (though there are other similar networks still operating). _ -- End node. That is, a system with only one connection. 27 WWIVnet Technical Documentation 2.0.34 (NET34) There can also be one of three flags appearing before the phone number: ^ -- Area Code coordinator (AC). & -- Network Coordinator (NC). % -- Group Coordinator (GC) Note that since there can only be one Network Coordinator, the "&" should only appear once in the BBSLIST.NET file. Also, the "%" is not likely to be seen except in the Group setup described below, since this setup has no Groups. The first line of the BBSLIST.NET must be a tilde (~) followed by the Unix timestamp (seconds since midnight, Jan 1, 1970) indicating the date and time the file was sent out by the NC or GC. CONNECT.NET lists the connection costs between systems. The cost listed should be the cost per minute, though for most networks using this system, the rule of thumb is 0.00 for local connects, 0.01 for long distance connects, and more for long distance connects that one wants to route less mail through. Each entry in the CONNECT.NET file specifies a one-way connection between two systems. The entries in the CONNECT.NET file do NOT need to be in any specific order. The format for system's connection entry is: the system number (preceded by "@"), first connection and cost (separated by "="), second connection and cost, and so forth. Like BBSLIST.NET, the first line is a tilde (~) followed by the UNIX timestamp. Examples: 1. If there are two systems, numbered 1 and 2, and each can call each other for free, the CONNECT.NET file would look like: @1 2=0.00 @2 1=0.00 Note that the routing analysis software should make sure both ends of the connection have entries referring to each other. 2. If there are three systems, each can call the others for free, the CONNECT.NET file would look like: @1 2=0.00 3=0.00 @2 1=0.00 3=0.00 @3 1=0.00 2=0.00 3. If system 3 called the other two for $0.10, the CONNECT.NET file would look like: @1 2=0.00 3=0.10 @2 1=0.00 3=0.10 28 WWIVnet Technical Documentation 2.0.34 (NET34) @3 1=0.10 2=0.10 In both BBSLIST.NET and CONNECT.NET file, each entry begins with identifying the system number (preceded with @), allowing system entries to take up more than one line -- in larger networks a CONNECT.NET entry can fill more than one line. Everything after the system number identifier up to the next "@", corresponds to that system. Thus, the CONNECT.NET files above could also be listed as: @1 2=0.00 3=0.10 @2 1=0.00 3=0.10 @3 1=0.10 2=0.10 or @1 2=0.00 3=0.10 @2 1=0.00 2=0.10 @3 1=0.10 2=0.10 Thus, the end-of-line indicator (EOL) should be IGNORED. Neither the BBSLIST.NET nor CONNECT.NET file need to be in any specific order. There cannot, however, be multiple entries per system in either BBSLIST.NET or CONNECT.NET. It is possible for a system to have references in one or both of the .NET files, but not be reachable from any other system. For example, two systems may be listed in BBSLIST.NET, and listed in CONNECT.NET, but each can only call the other. No other system in the network can connect with them, so they don't exist, essentially. Also, a system can be listed in BBSLIST.NET, but not have any entries in CONNECT.NET. This usually happens for systems just joining the network, and those systems essentially don't exist either. It is also possible for one system to call another, but the second system can't call back the first. This is unusual, but valid. Also, the cost of a connection can be different in one direction than it is in the other. This is also valid. BBSLIST.NET is received across the network as main_type 1, minor_type 1 (1/1). CONNECT.NET is received as main_type 1, minor_type 2 (1/2). 29 WWIVnet Technical Documentation 2.0.34 (NET34) B. New WWIVnet -- BBSLIST.x and CONNECT.x As mentioned previously, things changed in 1990. The original WWIVnet network had grown so large that it was necessary to break the BBSLIST and CONNECT files into smaller segments, known as Groups. How the Groups are determined is up to the Network Coordinator. WWIVnet's Groups were formed based on the connec- tion topology at the time of the conversion to the Group system. Many other networks use the International Time Zones to divide the groups. The Groups are numbered, with the potential for up to 255 Groups in a network. The BBSLIST and CONNECT files have the Group number ("x") as the extension. The BBSLIST.x file is formatted the same way as the BBSLIST.NET under the old WWIVnet system. Only BBSes with the Group are in each Group's files. There is an additional file, BBSLIST.0, which contains information for the routing analyzer. The first line has the UNIX timestamp, as usual. The second describes which CONNECT.x file to use. If it is ":" alone, then CONNECT.0 contains all the connection information for the network, so that is all that will be used. If the second line is ":A", then CONNECT.0 and the CONNECT.x files for all Groups are used. There can also be partial BBSLIST updates sent out, indicating systems to be added, changed or removed. The extension on these messages is generally Group number plus 512 (e.g., a group 1 partial update would be BBSLIST.513). For added or changed systems, the system is listed as it would appear in the BBSLIST.x it belongs to. A deleted system is listed as just the system number with a period (.), as in "@1234 .". These partial updates are incorporated into the full BBSLIST files during the routing analysis (see below). The BBSLIST.x files use the same indicators as the BBSLIST.NET file, with one addition: This should only appear once in each BBSLIST.x file, since each Group may only have one GC. CONNECT.x is not like the old CONNECT.NET. The main difference is that there are no costs in the connections, only the node numbers each system is connected to. So in the second example in the previous section, the CONNECT.x for systems 1, 2 and 3 would look like this: @1 2 3 @2 1 3 @3 1 2 As noted above, the CONNECT.x files will be used as specified by the second line in BBSLIST.0. When that line is ":", CONNECT.0 will contain all the network's connections. When it is ":A", the 30 WWIVnet Technical Documentation 2.0.34 (NET34) CONNECT.x files contain all the connections within each Group. All connections between systems in different groups are listed in CONNECT.0. For example, say we have a network with five systems, numbered 1, 2, 3, 4, and 5. Systems 1 and 2 are in Group 1, and systems 3, 4, and 5 are in Group 2. 1 and 2 connect to each other, and 2 connects to 4. 3 and 4 connect to each other, and 5 connects to 1. CONNECT.1 will contain: @1 2 @2 1 CONNECT.2 will contain: @3 4 @4 3 CONNECT.0 will contain: @1 5 @2 4 @4 2 @5 1 Like the old WWIVnet files, the ordering of the systems in these files does not matter, however a node number may appear only once in all of the BBSLIST.x files combined. The BBSLIST.x files are received across the networks as main_type 11, with the minor_type being determined by the Group they are for. CONNECT.x files are received as main_type 12, with the minor_type determined by the Group number. C. Figuring the Routing There are three ways message routing could be determined: 1. Each time you need to route a message, find the least cost or shortest path (depending on whether new or old update files are being used); 2. Each time one of the network programs that has to route messages is run, the least-cost or shortest route to each system is decided; or 3. Each time an update to the .NET files is received, the least cost route is decided to each system. Options 1 and 2 are simply not practical. Depending on network size and system speed, it can take a minute or more to analyze the network data files and determine the optimal route. Finding the best route to a specific system requires the same operation as finding the best route to all systems, so option #1 is a waste 31 WWIVnet Technical Documentation 2.0.34 (NET34) of time (besides possibly requiring the BBS to have the path- finding code in it). Option #2 holds no advantages over option #3 because it will tie up the BBS unnecessarily. Therefore, the optimal routes to all the systems in the network should be analyzed only when a network update is received. This routing analysis can be done any way, as long as it determines the best route. The best way, however, could follow these steps: 1. System records are read into an array from BBSLIST.NET (for the old WWIVnet setup) or the BBSLIST.x files (for the Group setup). The array is of struct net_system_list_rec (see below). All fields are filled from the BBSLIST.x except numhops and forsys, which are set to 65535 and 0, respec- tively. For the Group setup, the BBSLIST.xxx partial updates (.513-.768) are read in next, and the indicated changes (existing systems replaced, new systems added, systems indicated with "." deleted) are made in the array and in the BBSLIST files themselves. After processing, the partial updates are deleted. 2. Next, the CONNECT files are read into another array. Since system records may be repeated in the CONNECT files, make sure, when each system record is read in, a check is made in the array to see if there is already an entry for it. If there is, add the connections in the new record to the existing record. 3. Then, the analysis starts. The analyzer uses the system's callout list (CALLOUT.NET for NETxx) as a base, starting with the first entry and checking each of its connnects, spreading out from there to THEIR connects. This is done for each system in the callout list. For each destination system checked, the number of hops found is compared to that entered in the network data array (numhops) and changed if it is less. The forsys is also changed, if that is different. This is for the Group setup. If the network is using the old WWIVnet setup, cost, rather than number of hops, is considered. In this case, when figuring cost, the speed of a connection (highest speed two connecting systems will support) needs to be considered. For instance, two systems connecting at 14400bps at a cost of 0.10 would take precedence over two systems connectiung at 2400bps at a cost of 0.10 (assuming that they are on the path to the same destination system, and all other scosts are equal). 32 WWIVnet Technical Documentation 2.0.34 (NET34) 4. When all systems in the callout list are processed, analysis is complete and the network data array is written to disk. If specified, a piece of mail is then sent to the sysop giving the results of the analysis (for instance, how many valid systems are in the network, how many systems route through each of this system's connections, who the NC and GC and AC are, and so forth). The data structure NETxx's NETWORK3.EXE uses for the network data file is: typedef struct { unsigned short sysnum; /* system number */ char phone[13], /* phone number of system */ name[40]; /* name of system */ unsigned char group; /* group system is in */ unsigned short speed, /* max bps rate of system */ other, /* other info (bit mapped) */ forsys; /* next hop from here */ short numhops; /* how far to get there */ union { unsigned short rout_fact; /* routing factor */ float cost; /* cost factor */ long temp; /* temporary variable */ } xx; } net_system_list_rec; It is encouraged that this structure be used by any WWIVnet compatible analyzer. Not only is this used by the WWIV BBS software, but some WWIVnet add-ons also use this file, so supporting this structure will enhance compatibility with WWIVnet. The fields: sysnum, phone, name, group, and speed should be self-explanatory. other -- This is bitmapped, and contains the modem and other information shown in BBSLIST. The bitmap values are (with corresponding BBSLIST flag): \ other_fido 0x0001 | other_Telebit_19200 0x0002 < other_USR_9600 0x0004 > other_Hayes_9600 0x0008 ^ other_coordinator 0x0010 (area coordinator) ! other_V32 0x0020 $ other_V32bis 0x0040 = other_PCP 0x0080 % other_group_coord 0x0100 & other_net_coord 0x0200 / other_compucom 0x0400 33 WWIVnet Technical Documentation 2.0.34 (NET34) + other_net_server 0x0800 ? other_FAX 0x1000 _ other_end_system 0x2000 ~ other_VFAST 0x4000 forsys -- Where to forward messages destined for this system, also known as "next hop". For example, if a message going from system 1 to system 5 passes through systems 2 and 4, then forsys==2. When it is determined that the system is unreachable (listed in BBSLIST but no connections listed), forsys==65535. rout_fact -- This is the routing factor, but is currently not used by the NETxx software. cost -- When using an old-style WWIV network setup, this holds the cost of the call, calculated as the sum of costs for each hop to the destination. When all systems have been processed, you should have a database containing all systems in the network and how they may be reached. Whenever a packet that is not destined for the local system is processed, the data file is searched to find the system entry for the destination system. If it is not found, then the system is unknown. If the system is identified as unreachable (forsys==65535), the system is also considered unknown. 34 WWIVnet Technical Documentation 2.0.34 (NET34) VI. TIPS FOR WRITING WWIVNET SOFTWARE That about covers all the technical details for designing software compatible with WWIV networks. Now for some things to consider for those wishing to design a WWIVnet interface for a non-WWIV BBS, or add-ons to existing WWIVnet software. A. WWIVnet Interface Software The information provided in this document is enough for anyone wishing to write WWIVnet interface software from scratch. Unless you are writing for a BBS on a non-PC platform (such as Hermes for Macintosh), there is no need to rewrite all of the software to interface a PC-based BBS to a WWIV network. Since the local mail processor (NETWORK2.EXE) is the only program that writes to BBS message bases, that is really the only one needing replace- ment. If any of the NETxx programs are used, it is essential that all of the supporting data files used by that software be present. For details on those files, see the WWIVnet software documentation. Some additional programming may be necessary, though. For one, a shell would be useful for executing the various network programs, unless the BBS can be modified to make the calls itself. A batch file could do it, but a program such as Jim Wire's CLOUT makes it much easier. Any shell or BBS modification should follow these steps (filenames in parentheses are programs from NET34 or files created/used by them): 1. Choose a system to call (or have one specified), then execute the network callout program (NETWORK.EXE). If successful, proceed to step 2. If not, either try again or end processing. 2. Check for the incoming netmail file (P*.NET). If there isn't one, end processing. If there is one, run the netmail packet analyzer (NETWORK1.EXE). 3. Check for the local mail file packet (LOCAL.NET). If there is none, end processing. If there is one, run the local mail packet analyzer (NETWORK2.EXE). 4. Check again for a netmail packet (outgoing messages result- ing from local mail processing). If there is one run the netmail analyzer, otherwise proceed to the next step. 5. Check for a BBSLIST or CONNECT update. The most reliable way to do this is to compare the filedates of the CONNECT and BBSLIST files against the filedate of the database file created last time the routing analyzer ran. If one or more of the files is new (or there is a partial BBSLIST update), run the routing analyzer (NETWORK3.EXE). If the software cannot be modified to handle these steps, it is probably best to use a front-end such as Front Door or 35 WWIVnet Technical Documentation 2.0.34 (NET34) Binkleyterm, then set up events that would run the shell for making the network calls and processing. The trickiest part is exporting messages from the BBS to a WWIV network file. Possibly the easiest way to pack new messages is to have the BBS write them out to Fido packets (if the BBS is Fido-compatible), then when control returns to the front end, run an event that converts the Fido packet to a WWIV mail file. When doing this, keep in mind that WWIV networks do not have all of the fields a WWIV packet does, most notably the "To:" field. Another method could be a program that, after the BBS returns control to the front end, scans the BBS's message bases for new messages on the WWIVnet subboards. This would work best for BBS programs that cannot export Fido messages. In either case, it is important that the netmail file processor analyze the outgoing message file (P*.NET) for tossing into the various connection files (S*.NET and Z*.NET). Of course, the optimal solution, if possible, would be to modify the BBS software to export the messages directly into a WWIVnet compatible mail file, and run the other network programs as needed without the shell. This is probably be a good time to discuss the naming of the incoming and pending netmail files, mentioned in step 2 above. The actual name of the P*.NET can vary, depending on NETxx version and what program generates it. NETWORK.EXE in older NETxx versions (NET33 and below) receive the netmail file as P1.NET, while the one in NET34 receives the file as P1-0-1.NET. The "-0" in the middle indicates that NETWORK.EXE created the file (think of it as NETWORK0). When other NET34 programs generate pending netmail files, the middle number indicates which program created it (NETWORK2.EXE, the local mail processor, would create a pending netmail file named P1-2-1.NET). The main reason for this new naming system is so that we can tell the source of a P*.NET file being processed by the netmail analyzer. The WWIV BBS just creates P0.NET (network email, generally) and P1.NET (outggoing sub posts, generally). WWIV 4.23 also creates a PGATE.NET file, which contains posts for "gated" subs (that is, subs which are carried on more than one network). WWIV 4.24 does not use PGATE.NET for gated messages. Multi-instance WWIV 4.23 and above setups create P*.nnn (where 'nnn' is the instance number, such as P*.001 for instance 1) while a user is online, but they are renamed to P*.NET after the user logs off. The NETWORK1.EXE processes all of the P*.NET files, until none are left, before converting any indicated S<sysnum>.NET files into compressed Z<sysnuum>.NET files (see Appendix A). It is 36 WWIVnet Technical Documentation 2.0.34 (NET34) important that an alternate netmail file analyzer be able to recognize and handle any P*.NET file, not just Pn.NET. B. WWIVnet Software Add-ons There are two possible types of add-ons supported by the WWIVnet software, both working with the local mail processor. The external message processors (or "post-processors") are described above in the main_type descriptions. As noted above, it is recommended that any post-processor be written to be compatible with main_type 27, because it provides an easier interface for external messages. Again, a full description of how to use the external message feature is provided in the WWIVnet Software Documentation written by Filo. A common use for external messages is what is known as a "ping," used by the authors of some WWIV network utilities who wish to gain some information about the use of their software. The author sends out a main_type 27 message with the minor_type they are using. If a receiving system is using the software and it is installed properly, it will execute after local mail processing, and process the request in the external message. The local mail processor also supports use of "pre-processors," generally used to scan the local mail file for certain types of messages before the local mail processor gets to it. One example is JAFO's AUTOSEND, which looks for sub requests and sends out messages from the system's subs to new subscribers. These, also, are described in the WWIVnet Software Documentation. Naturally, any external message processor or preprocessor that generates new outgoing network messages must put them into a P*.NET file so that NETWORK1.EXE can find it and process it. 37 WWIVnet Technical Documentation 2.0.34 (NET34) APPENDIX A MAIL PACKET COMPRESSION In order to write WWIVnet software that can deal with compressed mail packets, you must have the PKWare Compression Libraries, available from PKWare, Inc. for $300.00. This Appendix covers the necessary details for handling compressed mail packets. To make the explanation easier, how NETWORK1 from NET34 handles compressed files will be explained. When NETWORK1 analyzes the file of messages to go out on the network (P*.NET), they are placed in Sxxxx.NET files (where xxxx corresponds to the numbers of systems in the CALLOUT.NET). After processing of all P*.NET files, NETWORK1 checks to see which connections accept compressed files. For each that does, its Sxxxx.NET is compressed with the implode() function from the PKWare libraries. The compressed data is appended to the corresponding Zxxxx.NET file (which is created if it does not exist). The size of the compressed segment in Zxxxx.NET is then checked against the size of the Sxxxx file. If the compressed segment is smaller than the original file, the file header and segment header (see below) are updated and Zxxxx.NET is closed. If the compressed file is the same size or larger than the uncompressed file, the uncompressed version is appended to the Zxxxx.NET (overwrit- ing the compressed version), then the headers are updated and the file closed. Whether the original Sxxxx.NET was compressed or not, it is deleted after it is transferred to the Zxxxx.NET. Thus, while an uncompressed netmail file is simply a collection of message packets with their headers, the compressed netmail file is a collection of segments which contain one or more messages, either compressed or not. The file has a ten byte header, and each segment within the file has a five byte header. The netmail file header has three elements: compression identifier -- long int (4 bytes) Always set to 0xfffefffe. extra bytes -- unsigned short int (2 bytes) Number of additional bytes in the header record, being the sum of the bytes in all fields following . This is to allow for future expansion of the header while maintaining compatibility with older versions of the NETxx software. Currently, this should have the value of 4. uncompressed bytes -- long int (4 bytes) Length of the file when it is uncompressed. This gets updated each time a new segment is added to the compressed file. The header on each segment of the compressed file has two elements: compression flag -- char (1 byte) Set to 0 if segment is NOT compressed, 1 if it is. 38 WWIVnet Technical Documentation 2.0.34 (NET34) segment length -- long int (4 bytes) Set to the actual length of the segment, in bytes. When a netmail file is received, NETWORK1 reads the first four bytes. If they are 0xfffefffe, it knows the file is compressed, so it decompresses it before processing the messages. The first ten bytes are read in order to get the uncompressed length of the file. Then for each segment, these steps are followed: 1. The segment header is read in, to see if the segment is com- pressed and how long the segment is. 2. If the segment is compressed, it is decompressed into a temporary netmail file (which is created for the first segment, and appended for each additional segment) using PKWare's 'explode()' function. If it is NOT compressed, it is written directly to the temporary netmail file. Once all segments have been decompressed or written to the temporary netmail file, the original netmail file is deleted and the temporary netmail file is renamed to the original's name. NETWORK1 then processes message packets the new uncompressed netmail file. COMPRESSION SOURCE CODE The following code is provided to help simplify the process of writing code for complete compatibility with the WWIVnet software. It is the same as what is used by NETWORK1.EXE in NET34. It covers both the compression and decompression of netmail packets. Comments have been added by WH in order to clarify what's happening. Some lines are split due to space. /* Description of global variables used here: * (long) nbw -- number of bytes written * (long) nbr -- number of bytes read * (long) nbl -- number of bytes left (to read/write) * (int) fi -- input file handle (set to "S[sysnum].NET") * (int) fo -- output file handle (set to "Z[sysnum].NET" for compression, "TEMP.NET" for decompression) * (char) net_data -- path to system's network data directory * The rest should be obvious from their use. */ unsigned far pascal net_read(char far *buff, unsigned short int far *size) /* used { unsigned br=0,sz; unsigned pct,i; sz=*size; 39 WWIVnet Technical Documentation 2.0.34 (NET34) if ((long)sz>nbl) sz=(unsigned)nbl; br=read(fi,buff,sz); if (br<0) br=0; nbr += br; nbl -= br; nc_sf += br; return(br); } void far pascal net_write(char far *buff, unsigned short int far *size) { write(fo,buff,*size); nbw += *size; } void net_compress(unsigned int sn) { char s[81], s1[81], fl; long l,l1; char *buf; unsigned short int type, dsize, xx; /* set up the input (Sxxxx.NET) and output (Zxxxx.NET) filenames */ sprintf(s,"%sS%u.net",net_data, sn); sprintf(s1,"%sZ%u.net",net_data, sn); /* open the input file, if possible */ fi=open(s,O_RDWR | O_BINARY); if (fi<0) { return; } buf=malloc(35256); if (!buf) { printf("\r Not enough mem to compress \r"); return; } /* open the output file, if there is one */ fo=open(s1,O_RDWR | O_BINARY | O_CREAT, S_IREAD | S_IWRITE); if (fo<0) { 40 WWIVnet Technical Documentation 2.0.34 (NET34) close(fi); free(buf); return; } /* write file header if file is new */ if (filelength(fo)==0) { /* compression identifier */ l=0xfffefffe; write(fo,&l,4); /* extra bytes in header */ xx=4; write(fo,&xx,2); /* uncompressed bytes (initalized to 0) */ l=0L; write(fo,&l,4); } /* prepare for new segment */ nbw=nbr=0; l=filelength(fo); lseek(fo,l,SEEK_SET); l1=filelength(fi); nbl=l1; fl=1; /* compresssion flag (compressed) */ /* write compression flag and segment length to segment header */ write(fo,&fl,1); write(fo,&nbw,4); type=CMP_ASCII; if (l1<1024) dsize=1024; else if (l1<2048) dsize=2048; else dsize=4096; /* compress the file */ implode(net_read, net_write, buf, &type, &dsize); if (nbw>=nbr) { /* if it didn't compress */ lseek(fo,l,SEEK_SET); lseek(fi,0L,SEEK_SET); fl=0; /* change segment header (flag off, seg length is input length */ write(fo,&fl,1); write(fo,&nbr,4); /* then write input file to output file (overwrite compressed) */ xx=read(fi,buf,32768); while (xx>0) { write(fo,buf,xx); 41 WWIVnet Technical Documentation 2.0.34 (NET34) xx=read(fi,buf,32768); } chsize(fo,l+5+nbr); } else { /* if compressed, write compressed seg length to segment header */ lseek(fo,l+1,SEEK_SET); write(fo,&nbw,4); } /* update output file header (change uncompresssed bytes) */ lseek(fo,6,SEEK_SET); read(fo,&l,4); l += nbr; lseek(fo,6,SEEK_SET); write(fo,&l,4); bytes_comp=filelength(fo); bytes_uncomp=l; /* compute percentage of compression */ if (bytes_comp<bytes_uncomp) xx=(unsigned) ((bytes_uncomp-bytes_comp)*100/bytes_uncomp); else xx=0; /* clean up */ close(fi); close(fo); unlink(s); free(buf); } void net_uncompress(char *fn) /* 'fn' is the name (with path) of the P*.NET file being processed */ { char s[81],fl; long l,l1; unsigned xx; char *buf; /* set up output filename (temporary netmail file) */ sprintf(s,"%sTEMP.NET",net_data); buf=malloc(16384); if (!buf) { printf("\r Not enough mem to uncompress \r"); return; } /* Zxxxx.NET, if possible */ 42 WWIVnet Technical Documentation 2.0.34 (NET34) fi=open(fn,O_RDWR | O_BINARY); if (fi<0) { free(buf); return; } /* open output file */ fo=open(s,O_RDWR | O_BINARY | O_CREAT | O_TRUNC, S_IREAD | S_IWRITE); if (fo<0) { close(fi); free(buf); return; } /* get file header */ lseek(fi,4,SEEK_SET); /* compression identifier */ read(fi,&xx,2); /* extra bytes */ read(fi,&bytes_uncomp,4); /* uncompressed bytes */ bytes_comp=filelength(fi); lseek(fi,6+xx,SEEK_SET); l=bytes_comp-(6+xx); /* compute compressed bytes */ /* decompression pass */ while (l>0) { /* get segment header */ read(fi,&fl,1); /* compression flag */ read(fi,&l1,4); /* segment length (in bytes) */ nbr=nbw=0; nbl=l1; if (fl==0) { /* if segment not compressed, write directly to temporary * netmail file */ if (nbl>16384) xx=read(fi,buf,16384); else xx=read(fi,buf,(unsigned)nbl); while (nbl>0) { write(fo,buf,xx); nbl -= (long)xx; if (nbl>16384) xx=read(fi,buf,16384); else xx=read(fi,buf,(unsigned)nbl); } } else { /* if segment compressed, decompress to temp netmail file */ explode(net_read, net_write, buf); } l -= (l1+5); 43 WWIVnet Technical Documentation 2.0.34 (NET34) } /* clean up */ close(fi); close(fo); unlink(fn); rename(s,fn); /* rename temp filename to P*.NET */ free(buf); } 44