aboutsummaryrefslogblamecommitdiff
path: root/share/FAQ/UUCP_Internals.FAQ
blob: b927122caa5a8e5ed247e865df995b864675a4cf (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603


































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































                                                                                   
Path: bloom-beacon.mit.edu!cambridge-news.cygnus.com!comton.airs.com!ian
From: ian@airs.com (Ian Lance Taylor)
Newsgroups: comp.mail.uucp,comp.answers,news.answers
Subject: UUCP Internals Frequently Asked Questions
Keywords: UUCP, protocol, FAQ
Message-ID: <uucp-internals_787915801@airs.com>
Date: 20 Dec 94 09:30:02 GMT
Expires: 31 Jan 95 09:30:01 GMT
Reply-To: ian@airs.com (Ian Lance Taylor)
Followup-To: comp.mail.uucp
Organization: Infinity Development, Waltham, MA
Lines: 1587
Approved: news-answers-request@MIT.Edu
Supersedes: <uucp-internals_785496601@airs.com>
Xref: bloom-beacon.mit.edu comp.mail.uucp:5270 comp.answers:9043 news.answers:31575

Archive-name: uucp-internals
Version: $Revision: 1.26 $
Last-modified: $Date: 1994/10/26 02:39:07 $

 This article was written by Ian Lance Taylor <ian@airs.com> and I may
 even update it periodically.  Please send me mail about suggestions
 or inaccuracies.

 This article describes how the various UUCP protocols work, and
 discusses some other internal UUCP issues.  It does not describe how
 to configure UUCP, nor how to solve UUCP connection problems, nor how
 to deal with UUCP mail.  I do not know of any FAQ postings on these
 topics.  There are some documents on the net describing UUCP
 configuration, but I can not keep an up to date list here; try using
 archie.

 If you haven't read the news.announce.newusers articles, read them.

 This article is in digest format.  Some newsreaders will be able to
 break it apart into separate articles.  Please don't ask me how to do
 this, though.

 This article answers the following questions.  If one of these
 questions is posted to comp.mail.uucp, please send mail to the poster
 referring her or him to this FAQ.  There is no reason to post a
 followup, as most of us know the answer already.

Sources
What does "alarm" mean in debugging output?
What are UUCP grades?
What is the format of a UUCP lock file?
What is the format of a UUCP X.* file?
What is the UUCP protocol?
What is the 'g' protocol?
What is the 'f' protocol?
What is the 't' protocol?
What is the 'e' protocol?
What is the 'G' protocol?
What is the 'i' protocol?
What is the 'j' protocol?
What is the 'x' protocol?
What is the 'y' protocol?
What is the 'd' protocol?
What is the 'h' protocol?
What is the 'v' protocol?
Thanks

----------------------------------------------------------------------

From: Sources
Subject: Sources

"Unix-to-Unix Copy Program," said PDP-1.  "You will never find a more
wretched hive of bugs and flamers.  We must be cautious."
                                                --DECWars

I took a lot of the information from Jamie E. Hanrahan's paper in the
Fall 1990 DECUS Symposium, and from Managing UUCP and Usenet by Tim
O'Reilly and Grace Todino (with contributions by several other
people).  The latter includes most of the former, and is published by
        O'Reilly & Associates, Inc.
        103 Morris Street, Suite A
        Sebastopol, CA 95472
It is currently in its tenth edition.  The ISBN number is
0-937175-93-5.

Some information is originally due to a Usenet article by Chuck
Wegrzyn.  The information on execution files comes partially from
Peter Honeyman.  The information on the 'g' protocol comes partially
from a paper by G.L. Chesson of Bell Laboratories, partially from
Jamie E. Hanrahan's paper, and partially from source code by John
Gilmore.  The information on the 'f' protocol comes from the source
code by Piet Berteema.  The information on the 't' protocol comes from
the source code by Rick Adams.  The information on the 'e' protocol
comes from a Usenet article by Matthias Urlichs.  The information on
the 'd' protocol comes from Jonathan Clark, who also supplied
information about QFT.  The FSUUCP information comes straight from
Christopher J. Ambler; it applies to version 1.4 and up.

Although there are few books about UUCP, there are many about networks
and protocols in general.  I recommend two non-technical books which
describe the sorts of things that are available on the network: ``The
Whole Internet,'' by Ed Krol, and ``Zen and the Art of the Internet,''
by Brendan P. Kehoe.  Good technical discussions of networking issues
can be found in ``Internetworking with TCP/IP,'' by Douglas E. Comer
and David L. Stevens and in ``Design and Validation of Computer
Protocols'' by Gerard J. Holzmann.

------------------------------

From: alarm
Subject: What does "alarm" mean in debugging output?

The debugging output of many versions of UUCP (but not Taylor UUCP)
will include messages like
    alarm 1
or
    pkcget: alarm 1

This message means that the UUCP package has timed out while waiting
for some sort of response from the remote system.  This normally
indicates some sort of connection problem.  For example, the modems
might have lost their connection, or perhaps one of the modems will
not transmit the XON and XOFF characters, or perhaps one side or the
other is dropping characters.  It can also mean that the packages
disagree about some aspect of the UUCP protocol, although this is less
common.

Using the information in the rest of this posting, you should be able
to figure out what type of data your UUCP was expecting to receive.
This may give some indication as to exactly what the problem is.  It
is difficult to be more specific, since there are many possiblities.

------------------------------

From: UUCP-grades
Subject: What are UUCP grades?

Modern UUCP packages support grades for each command.  The grades
generally range from 'A' (the highest) to 'Z' followed by 'a' to 'z'.
Some UUCP packages also support '0' to '9' before 'A'.  Some UUCP
packages may permit any ASCII character as a grade.

On Unix, these grades are encoded in the name of the command file.  A
command file name generally has the form
    C.nnnngssss
where nnnn is the remote system name for which the command is queued,
g is a single character grade, and ssss is a four character sequence
number.  For example, a command file created for the system ``airs''
at grade 'Z' might be named
    C.airsZ2551

The remote system name will be truncated to seven characters, to
ensure that the command file name will fit in the 14 character file
name limit of the traditional Unix file system.  UUCP packages which
have no other means of distinguishing which command files are intended
for which systems thus require all systems they connect to to have
names that are unique in the first seven characters.  Some UUCP
packages use a variant of this format which truncates the system name
to six characters.  HDB and Taylor UUCP use a different spool
directory format, which allows up to fourteen characters to be used
for each system name.

The sequence number in the command file name may be a decimal integer,
or it may be a hexadecimal integer, or it may contain any alphanumeric
character.  Different UUCP packages are different.

FSUUCP (a DOS based UUCP and news package) uses up to 8 characters for
file names in the spool (this is a DOS file name limitation; actually,
with the extension, 11 characters are available, but FSUUCP reserves
that for future use).  FSUUCP defaults mail to grade D, and news to
grade N, except that when the grade of incoming mail can be
determined, that grade is preserved if the mail is forwarded to
another system.  Mail and news are currently the only 2 types of
transfers supported.  The default grades may be changed by editing
the MAIL.RC file for mail, or the FSUUCP.CFG file for news.

UUPC/extended for DOS, OS/2 and Windows NT handles mail at grade 'C',
news at grade 'd', and file transfers at grade 'n'.  The UUPC/extended
UUCP and RMAIL commands accept grades to override the default, the
others do not.

I do not know how command grades are handled in other non-Unix UUCP
packages.

Modern UUCP packages allow you to restrict file transfer by grade
depending on the time of day.  Typically this is done with a line in
the Systems (or L.sys) file like this:
    airs Any/Z,Any2305-0855 ...
This allows grades 'Z' and above to be transferred at any time.  Lower
grades may only be transferred at night.  I believe that this grade
restriction applies to local commands as well as to remote commands,
but I am not sure.  It may only apply if the UUCP package places the
call, not if it is called by the remote system.

Taylor UUCP can use the ``timegrade'' and ``call-timegrade'' commands
to achieve the same effect (and supports the above format when reading
Systems or L.sys).

UUPC/extended provides the symmetricgrades option to announce the
current grade in effect when calling the remote system.

This sort of grade restriction is most useful if you know what grades
are being used at the remote site.  The default grades used depend on
the UUCP package.  Generally uucp and uux have different defaults.  A
particular grade can be specified with the -g option to uucp or uux.
For example, to request execution of rnews on airs with grade 'd', you
might use something like
    uux -gd - airs!rnews <article

Uunet queues up mail at grade 'C', but increases the grade based on
the size.  News is queued at grade 'd', and file transfers at grade
'n'.  The example above would allow mail (below some large size) to be
received at any time, but would only permit news to be transferred at
night.

------------------------------

From: UUCP-lock-file
Subject: What is the format of a UUCP lock file?

This discussion applies only to Unix.  I have no idea how UUCP locks
ports on other systems.

UUCP creates files to lock serial ports and systems.  On most if not
all systems these same lock files are also used by cu to coordinate
access to serial ports.  On some systems getty also uses these lock
files, often under the name uugetty.

The lock file normally contains the process ID of the locking process.
This makes it easy to determine whether a lock is still valid.  The
algorithm is to create a temporary file and then link it to the name
that must be locked.  If the link fails because a file with that name
already exists, the existing file is read to get the process ID.  If
the process still exists, the lock attempt fails.  Otherwise the lock
file is deleted and the locking algorithm is retried.

Older UUCP packages put the lock files in the main UUCP spool
directory, /usr/spool/uucp.  HDB UUCP generally puts the lock files in
a directory of their own, usually /usr/spool/locks or /etc/locks.

The original UUCP lock file format encodes the process ID as a four
byte binary number.  The order of the bytes is host-dependent.  HDB
UUCP stores the process ID as a ten byte ASCII decimal number, with a
trailing newline.  For example, if process 1570 holds a lock file, it
would contain the eleven characters space, space, space, space, space,
space, one, five, seven, zero, newline.  Some versions of UUCP add a
second line indicating which program created the lock (uucp, cu, or
getty/uugetty).  I have also seen a third type of UUCP lock file which
does not contain the process ID at all.

The name of the lock file is traditionally "LCK.." followed by the
base name of the device.  For example, to lock /dev/ttyd0 the file
LCK..ttyd0 would be created.  On SCO Unix, the lock file name is
always forced to lower case even if the device name has upper case
letters.

System V Release 4 UUCP names the lock file using the major and minor
device numbers rather than the device name.  The file is named
LK.XXX.YYY.ZZZ, where XXX, YYY and ZZZ are all three digit decimal
numbers.  XXX is the major device number of the device holding the
directory holding the device file (e.g., /dev).  YYY is the major
device number of the device file itself.  ZZZ is the minor device
number of the device file itself.  If s holds the result of passing
the device to the stat system call (e.g., stat ("/dev/ttyd0", &s)),
the following line of C code will print out the corresponding lock
file name:
    printf ("LK.%03d.%03d.%03d", major (s.st_dev),
            major (s.st_rdev), minor (s.st_rdev));
The advantage of this system is that even if there are several links
to the same device, they will all use the same lock file name.

------------------------------

From: X-file
Subject: What is the format of a UUCP X.* file?

UUCP X.* files control program execution.  They are created by uux.
They are transferred between computers just like any other file.  The
uuxqt daemon reads them to figure out how to execute the job requested
by uux.

An X.* file is simply a text file.  The first character of each line
is a command, and the remainder of the line supplies arguments.  The
following commands are defined:
    C command
        This gives the command to execute, including the program and
        all arguments.  For example,
            C rmail ian@airs.com
    U user system
        This names the user who requested the command, and the system
        from which the request came.
    I standard-input
        This names the file from which standard input is taken.  If no
        standard input file is given, the standard input will probably
        be attached to /dev/null.  If the standard input file is not
        from the system on which the execution is to occur, it will
        also appear in an F command.
    O standard-output [ system ]
        This names the standard output file.  The optional second
        argument names the system to which the file should be sent.
        If there is no second argument, the file should be created on
        the executing system.
    F required-file [ filename-to-use ]
        The F command can appear multiple times.  Each F command names
        a file which must exist before the execution can proceed.
        This will usually be a file which is transferred from the
        system on which uux was executed, but it can also be a file
        from the local system or some other system.  If the file is
        not from the local system, then the command will usually name
        a file in the spool directory.  If the optional second
        argument appears, then the file should be copied to the
        execution directory under that name.  This is necessary for
        any file other than the standard input file.  If the standard
        input file is not from the local system, it will appear in
        both an F command and an I command.
    R requestor-address
        This is the address to which mail about the job should be
        sent.  It is relative to the system named in the U command.
        If the R command does not appear, then mail is sent to the
        user named in the U command.
    Z
        This command takes no arguments.  It means that a mail message
        should be sent if the command failed.  This is the default
        behaviour for most modern UUCP packages, and for them the Z
        command does not actually do anything.
    N
        This command takes no arguments.  It means that no mail
        message should be sent, even if the command failed.
    n
        This command takes no arguments.  It means that a mail message
        should be sent if the command succeeded.  Normally a message
        is sent only if the command failed.
    B
        This command takes no arguments.  It means that the standard
        input should be returned with any error message.  This can be
        useful in cases where the input would otherwise be lost.
    e
        This command takes no arguments.  It means that the command
        should be processed with /bin/sh.  For some packages this is
        the default anyhow.  Most packages will refuse to execute
        complex commands or commands containing wildcards, because of
        the security holes this opens.
    E
        This command takes no arguments.  It means that the command
        should be processed with the execve system call.  For some
        packages this is the default anyhow.
    M status-file
        This command means that instead of mailing a message, the
        message should be copied to the named file on the system named
        by the U command.
    # comment
        This command is ignored, as is any other unrecognized command.  

Here is an example.  Given the following command executed on system
test1
    uux - test2!cat - test2!~ian/bar !qux '>~/gorp'
(this is only an example, as most UUCP systems will not permit the cat
command to be executed) Taylor UUCP will produce the following X.
file:
    U ian test1
    F D.test1N003r qux
    O /usr/spool/uucppublic test1
    F D.test1N003s
    I D.test1N003s
    C cat - ~ian/bar qux
The standard input will be read into a file and then transferred to
the file D.test1N003s on system test2, and the file qux will be
transferred to D.test1N003r on system test2.  When the command is
executed, the latter file will be copied to the execution directory
under the name qux.  Note that since the file ~ian/bar is already on
the execution system, no action need be taken for it.  The standard
output will be collected in a file, then copied to the directory
/usr/spool/uucppublic on the system test1.

------------------------------

From: UUCP-protocol
Subject: What is the UUCP protocol?

The UUCP protocol is a conversation between two UUCP packages.  A UUCP
conversation consists of three parts: an initial handshake, a series
of file transfer requests, and a final handshake.

Before the initial handshake, the caller will usually have logged in
the called machine and somehow started the UUCP package there.  On
Unix this is normally done by setting the shell of the login name used
to /usr/lib/uucp/uucico.

All messages in the initial handshake begin with a ^P (a byte with the
octal value \020) and end with a null byte (\000).  A few systems end
these messages with a line feed character (\012) instead of a null
byte; the examples below assume a null byte is being used.

Some options below are supported by QFT, which stands for Queued File
Transfer, and is (or was) an internal Bell Labs version of UUCP.  

Taylor UUCP size negotiation was introduced by Taylor UUCP, and is
also supported by DOS based FSUUCP and Amiga based wUUCP and
UUCP-1.17.

The initial handshake goes as follows.  It is begun by the called
machine.

called: \020Shere=hostname\000
    The hostname is the UUCP name of the called machine.  Older UUCP
    packages do not output it, and simply send \020Shere\000.

caller: \020Shostname options\000
    The hostname is the UUCP name of the calling machine.  The
    following options may appear (or there may be none):
        -QSEQ
            Report sequence number for this conversation.  The
            sequence number is stored at both sites, and incremented
            after each call.  If there is a sequence number mismatch,
            something has gone wrong (somebody may have broken
            security by pretending to be one of the machines) and the
            call is denied.  If the sequence number changes on one of
            the machines, perhaps because of an attempted breakin or
            because a disk backup was restored, the sequence numbers
            on the two machines must be reconciled manually.  This is
            not supported by FSUUCP.
        -xLEVEL
            Requests the called system to set its debugging level to
            the specified value.  This is not supported by all
            systems.
        -pGRADE
        -vgrade=GRADE
            Requests the called system to only transfer files of the
            specified grade or higher.  This is not supported by all
            systems.  Some systems support -p, some support -vgrade=.
        -R
            Indicates that the calling UUCP understands how to restart
            failed file transmissions.  Supported only by System V
            Release 4 UUCP and QFT.
        -ULIMIT
            Reports the ulimit value of the calling UUCP.  The limit
            is specified as a base 16 number in C notation (e.g.,
            -U0x1000000).  This number is the number of 512 byte
            blocks in the largest file which the calling UUCP can
            create.  The called UUCP may not transfer a file larger
            than this.  Supported only by System V Release 4 UUCP, QFT
            and FSUUCP.  FSUUCP reports the lesser of the
            available disk space on the spool directory drive and the
            ulimit variable in FSUUCP.CFG.
        -N
            Indicates that the calling UUCP understands the Taylor
            UUCP size negotiation extension.  Not supported by
	    traditional UUCP packages.

called: \020ROK\000
    There are actually several possible responses.
        ROK
            The calling UUCP is acceptable, and the handshake proceeds
            to the protocol negotiation.  Some options may also
            appear; see below.
        ROKN
            The calling UUCP is acceptable, it specified -N, and the
            called UUCP also understands the Taylor UUCP size limiting
            extensions.
        RLCK
            The called UUCP already has a lock for the calling UUCP,
            which normally indicates the two machines are already
            communicating.
        RCB
            The called UUCP will call back.  This may be used to avoid
            impostors (but only one machine out of each pair should
            call back, or no conversation will ever begin).
        RBADSEQ
            The call sequence number is wrong (see the -Q discussion
            above). 
        RLOGIN
            The calling UUCP is using the wrong login name.
        RYou are unknown to me
            The calling UUCP is not known to the called UUCP, and the
            called UUCP does not permit connections from unknown
            systems.  Some versions of UUCP just drop the line rather
            than sending this message.

    If the response is ROK, the following options are supported by
    System V Release 4 UUCP and QFT.
        -R
            The called UUCP knows how to restart failed file
            transmissions.
        -ULIMIT
            Reports the ulimit value of the called UUCP.  The limit is
            specified as a base 16 number in C notation.  This number
            is the number of 512 byte blocks in the largest file which
            the called UUCP can create.  The calling UUCP may not send
            a file larger than this.  Also supported by FSUUCP.
        -xLEVEL
            I'm not sure just what this means.  It may request the
            calling UUCP to set its debugging level to the specified
            value.
    If the response is not ROK (or ROKN) both sides hang up the phone,
    abandoning the call.

called: \020Pprotocols\000
    Note that the called UUCP outputs two strings in a row.  The
    protocols string is a list of UUCP protocols supported by the
    caller.  Each UUCP protocol has a single character name.  These
    protocols are discussed in more detail later in this document.
    For example, the called UUCP might send \020Pgf\000.

caller: \020Uprotocol\000
    The calling UUCP selects which protocol to use out of the
    protocols offered by the called UUCP.  If there are no mutually
    supported protocols, the calling UUCP sends \020UN\000 and both
    sides hang up the phone.  Otherwise the calling UUCP sends
    something like \020Ug\000.

Most UUCP packages will consider each locally supported protocol in
turn and select the first one supported by the called UUCP.  With some
versions of HDB UUCP, this can be modified by giving a list of
protocols after the device name in the Devices file or the Systems
file.  For example, to select the 'e' protocol in Systems,
    airs Any ACU,e ...
or in Devices,
    ACU,e ttyXX ...
Taylor UUCP provides the ``protocol'' command which may be used either
for a system or a port.

After the protocol has been selected and the initial handshake has been
completed, both sides turn on the selected protocol.  For some
protocols (notably 'g') a further handshake is done at this point.

Each protocol supports a method for sending a command to the remote
system.  This method is used to transmit a series of commands between
the two UUCP packages.  At all times, one package is the master and
the other is the slave.  Initially, the calling UUCP is the master.

If a protocol error occurs during the exchange of commands, both sides
move immediately to the final handshake.

The master will send one of four commands: S, R, X or H.

Any file name referred to below is either an absolute pathname
beginning with "/", a public directory pathname beginning with "~/", a
pathname relative to a user's home directory beginning with "~USER/",
or a spool directory file name.  File names in the spool directory are
not pathnames, but instead are converted to pathnames within the spool
directory by UUCP.  They always begin with "C." (for a command file
created by uucp or uux), "D." (for a data file created by uucp, uux or
by an execution, or received from another system for an execution), or
"X." (for an execution file created by uux or received from another
system).

master: S FROM TO USER -OPTIONS TEMP MODE NOTIFY SIZE
    The S and the - are literal characters.  This is a request by the
    master to send a file to the slave.
        FROM
            The name of the file to send.  If the C option does not
            appear in OPTIONS, the master will actually open and send
            this file.  Otherwise the file has been copied to the
            spool directory, where it is named TEMP.  The slave
            ignores this field unless TO is a directory, in which case
            the basename of FROM will be used as the file name.  If
            FROM is a spool directory filename, it must be a data file
            created for or by an execution, and must begin with "D.".
        TO
            The name to give the file on the slave.  If this field
            names a directory the file is placed within that directory
            with the basename of FROM.  A name ending in `/' is taken
            to be a directory even if one does not already exist with
            that name.  If TO begins with `X.', an execution file will
            be created on the slave.  Otherwise, if TO begins with
            `D.' it names a data file to be used by some execution
            file.  Otherwise, TO should not be in the spool directory.
        USER
            The name of the user who requested the transfer.
        OPTIONS
            A list of options to control the transfer.  The following
            options are defined (all options are single characters):
                C
                    The file has been copied to the spool directory
                    (the master should use TEMP rather than FROM).
                c
                    The file has not been copied to the spool
                    directory (this is the default).
                d
                    The slave should create directories as necessary
                    (this is the default).
                f
                    The slave should not create directories if
                    necessary, but should fail the transfer instead.
                m
                    The master should send mail to USER when the
                    transfer is complete (not supported by FSUUCP).
                n
                    The slave should send mail to NOTIFY when the
                    transfer is complete (not supported by FSUUCP).
        TEMP
            If the C option appears in OPTIONS, this names the file to
            be sent.  Otherwise if FROM is in the spool directory,
            TEMP is the same as FROM.  Otherwise TEMP may be a dummy
            string, such as "D.0".  After the transfer has been
            succesfully completed, the master will delete the file
            TEMP.
        MODE
            This is an octal number giving the mode of the file on
            MASTER.  If the file is not in the spool directory, the
            slave will always create it with mode 0666, except that if
            (MODE & 0111) is not zero (the file is executable), the
            slave will create the file with mode 0777.  If the file is
            in the spool directory, some UUCP packages will use the
            algorithm above and some will always create the file with
            mode 0600.  This field is not used by FSUUCP, since it is
            meaningless on DOS.
        NOTIFY
            This field may not be present, and in any case is only
            meaningful if the n option appears in OPTIONS.  If the n
            option appears, then when the transfer is successfully
            completed, the slave will send mail to NOTIFY, which must
            be a legal mailing address on the slave.  If a SIZE field
            will appear but the n option does not appear, NOTIFY will
            always be present, typically as the string "dummy" or
            simply a pair of double quotes.
        SIZE
            This field is only present when doing Taylor UUCP or SVR4
            UUCP size negotiation, It is the size of the file in
            bytes.  Taylor UUCP version 1.03 sends the size as a
            decimal integer, while versions 1.04 and up, and all other
            UUCP packages that support size negotiation, send the size
            in base 16 with a leading 0x.

    The slave then responds with an S command response.
        SY START
            The slave is willing to accept the file, and file transfer
            begins.  The START field will only be present when using
            file restart.  It specifies the byte offset into the file
            at which to start sending.  If this is a new file, START
            will be 0x0.
        SN2
            The slave denies permission to transfer the file.  This
            can mean that the destination directory may not be
            accessed, or that no requests are permitted.  It implies
            that the file transfer will never succeed.
        SN4
            The slave is unable to create the necessary temporary
            file.  This implies that the file transfer might succeed
            later.
        SN6
            This is only used by Taylor UUCP size negotiation.  It
            means that the slave considers the file too large to
            transfer at the moment, but it may be possible to transfer
            it at some other time.
        SN7
            This is only used by Taylor UUCP size negotiation.  It
            means that the slave considers the file too large to ever
            transfer.
        SN8
            This is only used by Taylor UUCP.  It means that the file
            was already received in a previous conversation.  This can
            happen if the receive acknowledgement was lost after it
            was sent by the receiver but before it was received by the
            sender.
	SN9
	    This is only used by Taylor UUCP (versions 1.05 and up)
	    and FSUUCP (versions 1.5 and up).  It means that the
	    remote system was unable to open another channel (see the
	    discussion of the 'i' protocol for more information about
	    channels).  This implies that the file transfer might
	    succeed later.
        SN10
            This is reportedly used by SVR4 UUCP to mean that the file
            size is too large.

    If the slave responds with SY, a file transfer begins.  When the
    file transfer is complete, the slave sends a C command response.
        CY
            The file transfer was successful.
        CYM
            The file transfer was successful, and the slave wishes to
            become the master; the master should send an H command,
            described below.
        CN5
            The temporary file could not be moved into the final
            location.  This implies that the file transfer will never
            succeed.

    After the C command response has been received (in the SY case) or
    immediately (in an SN case) the master will send another command.

master: R FROM TO USER -OPTIONS SIZE
    The R and the - are literal characters.  This is a request by the
    master to receive a file from the slave.  I do not know how SVR4
    UUCP or QFT implement file transfer restart in this case.
        FROM
            This is the name of the file on the slave which the master
            wishes to receive.  It must not be in the spool directory,
            and it may not contain any wildcards.
        TO
            This is the name of the file to create on the master.  I
            do not believe that it can be a directory.  It may only be
            in the spool directory if this file is being requested to
            support an execution either on the master or on some
            system other than the slave.
        USER
            The name of the user who requested the transfer.
        OPTIONS
            A list of options to control the transfer.  The following
            options are defined (all options are single characters):
                d
                    The master should create directories as necessary
                    (this is the default).
                f
                    The master should not create directories if
                    necessary, but should fail the transfer instead.
                m
                    The master should send mail to USER when the
                    transfer is complete.
        SIZE
            This only appears if Taylor UUCP size negotiation is being
            used.  It specifies the largest file which the master is
            prepared to accept (when using SVR4 UUCP or QFT, this was
            specified in the -U option during the initial handshake).

    The slave then responds with an R command response.  FSUUCP does
    not support R requests, and always responds with RN2.
        RY MODE [ SIZE ]
            The slave is willing to send the file, and file transfer
            begins.  MODE is the octal mode of the file on the slave.
            The master treats this just as the slave does the MODE
            argument in the send command, q.v.  I am told that SVR4
            UUCP sends a trailing SIZE argument.  For some versions of
            BSD UUCP, the MODE argument may have a trailing M
            character (e.g., RY 0666M).  This means that the slave
            wishes to become the master.
        RN2
            The slave is not willing to send the file, either because
            it is not permitted or because the file does not exist.
            This implies that the file request will never succeed.
        RN6
            This is only used by Taylor UUCP size negotiation.  It
            means that the file is too large to send, either because
            of the size limit specifies by the master or because the
            slave considers it too large.  The file transfer might
            succeed later, or it might not (this will be cleared up in
            a later release of Taylor UUCP).
	RN9
	    This is only used by Taylor UUCP (versions 1.05 and up)
	    and FSUUCP (versions 1.5 and up).  It means that the
	    remote system was unable to open another channel (see the
	    discussion of the 'i' protocol for more information about
	    channels).  This implies that the file transfer might
	    succeed later.

    If the slave responds with RY, a file transfer begins.  When the
    file transfer is complete, the master sends a C command.  The
    slave pretty much ignores this, although it may log it.
        CY
            The file transfer was successful.
        CN5
            The temporary file could not be moved into the final
            location.

    After the C command response has been sent (in the RY case) or
    immediately (in an RN case) the master will send another command.

master: X FROM TO USER -OPTIONS
    The X and the - are literal characters.  This is a request by the
    master to, in essence, execute uucp on the slave.  The slave
    should execute "uucp FROM TO".
        FROM
            This is the name of the file or files on the slave which
            the master wishes to transfer.  Any wildcards are expanded
            on the slave.  If the master is requesting that the files
            be transferred to itself, the request would normally
            contain wildcard characters, since otherwise an `R'
            command would suffice.  The master can also use this
            command to request that the slave transfer files to a
            third system.
        TO
            This is the name of the file or directory to which the
            files should be transferred.  This will normally use a
            UUCP name.  For example, if the master wishes to receive
            the files itself, it would use "master!path".
        USER
            The name of the user who requested the transfer.
        OPTIONS
            A list of options to control the transfer.  It is not
            clear which, if any, options are supported by most UUCP
            packages.

    The slave then responds with an X command response.  FSUUCP does
    not support X requests, and always responds with XN.
        XY
            The request was accepted, and the appropriate file
            transfer commands have been queued up for later
            processing.
        XN
            The request was denied.  No particular reason is given.

    In either case, the master will then send another command.

master: H
    This is used by the master to hang up the connection.  The slave
    will respond with an H command response.
        HY
            The slave agrees to hang up the connection.  In this case
            the master sends another HY command.  In some UUCP
            packages the slave will then send a third HY command.  At
            this point the protocol is shut down, and the final
            handshake is begun.
        HN
            The slave does not agree to hang up.  In this case the
            master and the slave exchange roles.  The next command
            will be sent by the former slave, which is the new master.
            The roles may be reversed several times during a single
            connection.

After the protocol has been shut down, the final handshake is
performed.  This handshake has no real purpose, and some UUCP packages
simply drop the connection rather than do it (in fact, some will drop
the connection immediately after both sides agree to hangup, without
even closing down the protocol).

caller: \020OOOOOO\000
called: \020OOOOOOO\000

That is, the calling UUCP sends six O's and the called UUCP replies
with seven O's.  Some UUCP packages always send six O's.

------------------------------

From: UUCP-g
Subject: What is the 'g' protocol?

The 'g' protocol is a packet based flow controlled error correcting
protocol that requires an eight bit clear connection.  It is the
original UUCP protocol, and is supported by all UUCP implementations.
Many implementations of it are only able to support small window and
packet sizes, specifically a window size of 3 and a packet size of 64
bytes, but the protocol itself can support up to a window size of 7
and a packet size of 4096 bytes.  Complaints about the inefficiency of
the 'g' protocol generally refer to specific implementations, rather
than to the correctly implemented protocol.

The 'g' protocol was originally designed for general packet drivers,
and thus contains some features that are not used by UUCP, including
an alternate data channel and the ability to renegotiate packet and
window sizes during the communication session.

The 'g' protocol is spoofed by many Telebit modems.  When spoofing is
in effect, each Telebit modem uses the 'g' protocol to communicate
with the attached computer, but the data between the modems is sent
using a Telebit proprietary error correcting protocol.  This allows
for very high throughput over the Telebit connection, which, because
it is half-duplex, would not normally be able to handle the 'g'
protocol very well at all.  When a Telebit is spoofing the 'g'
protocol, it forces the packet size to be 64 bytes and the window size
to be 3.

This discussion of the 'g' protocol explains how it works, but does
not discuss useful error handling techniques.  Some discussion of this
can be found in Jamie E. Hanrahan's paper, cited above.

All 'g' protocol communication is done with packets.  Each packet
begins with a six byte header.  Control packets consist only of the
header.  Data packets contain additional data.

The header is as follows:

    \020
        Every packet begins with a ^P.
    k (1 <= k <= 9)
        The k value is always 9 for a control packet.  For a data
        packet, the k value indicates how much data follows the six
        byte header.  The amount of data is 2 ** (k + 4), where **
        indicates exponentiation.  Thus a k value of 1 means 32 data
        bytes and a k value of 8 means 4096 data bytes.  The k value
        for a data packet must be between 1 and 8 inclusive.
    checksum low byte
    checksum high byte
        The checksum value is described below.
    control byte
        The control byte indicates the type of packet, and is
        described below.
    xor byte
        This byte is the xor of k, the checksum low byte, the checksum
        high byte and the control byte (i.e., the second, third,
        fourth and fifth header bytes).  It is used to ensure that the
        header data is valid.

The control byte in the header is composed of three bit fields,
referred to here as TT (two bits), XXX (three bits) and YYY (three
bits).  The control is TTXXXYYY, or (TT << 6) + (XXX << 3) + YYY.

The TT field takes on the following values:
    0
        This is a control packet.  In this case the k byte in the
        header must be 9.  The XXX field indicates the type of control
        packet; these types are described below.
    1
        This is an alternate data channel packet.  This is not used by
        UUCP.
    2
        This is a data packet, and the entire contents of the attached
        data field (whose length is given by the k byte in the header)
        are valid.  The XXX and YYY fields are described below.
    3
        This is a short data packet.  Let the length of the data field
        (as given by the k byte in the header) be L.  Let the first
        byte in the data field be B1.  If B1 is less than 128 (if the
        most significant bit of B1 is 0), then there are L - B1 valid
        bytes of data in the data field, beginning with the second
        byte.  If B1 >= 128, let B2 be the second byte in the data
        field.  Then there are L - ((B1 & 0x7f) + (B2 << 7)) valid
        bytes of data in the data field, beginning with the third
        byte.  In all cases L bytes of data are sent (and all data
        bytes participate in the checksum calculation) but some of the
        trailing bytes may be dropped by the receiver.   The XXX and
        YYY fields are described below.

In a data packet (short or not) the XXX field gives the sequence
number of the packet.  Thus sequence numbers can range from 0 to 7,
inclusive.  The YYY field gives the sequence number of the last
correctly received packet.

Each communication direction uses a window which indicates how many
unacknowledged packets may be transmitted before waiting for an
acknowledgement.  The window may range from 1 to 7, and may be
different in each direction. For example, if the window is 3 and the
last packet acknowledged was packet number 6, packet numbers 7, 0 and
1 may be sent but the sender must wait for an acknowledgement before
sending packet number 2.  This acknowledgement could come as the YYY
field of a data packet or as the YYY field of a RJ or RR control
packet (described below).

Each packet must be transmitted in order (the sender may not skip
sequence numbers).  Each packet must be acknowledged, and each packet
must be acknowledged in order.

In a control packet, the XXX field takes on the following values:
    1 CLOSE
        The connection should be closed immediately.  This is
        typically sent when one side has seen too many errors and
        wants to give up.  It is also sent when shutting down the
        protocol.  If an unexpected CLOSE packet is received, a CLOSE
        packet should be sent in reply and the 'g' protocol should
        halt, causing UUCP to enter the final handshake.
    2 RJ or NAK
        The last packet was not received correctly.  The YYY field
        contains the sequence number of the last correctly received
        packet.
    3 SRJ
        Selective reject.  The YYY field contains the sequence number
        of a packet that was not received correctly, and should be
        retransmitted.  This is not used by UUCP, and most
        implementations will not recognize it.
    4 RR or ACK
        Packet acknowledgement.  The YYY field contains the sequence
        number of the last correctly received packet.
    5 INITC
        Third initialization packet.  The YYY field contains the
        maximum window size to use.
    6 INITB
        Second initialization packet.  The YYY field contains the
        packet size to use.  It requests a size of 2 ** (YYY + 5).
        Note that this is not the same coding used for the k byte in
        the packet header (it is 1 less).  Most UUCP implementations
        that request a packet size larger than 64 bytes can handle any
        packet size up to that specified.
    7 INITA
        First initialization packet.  The YYY field contains the
        maximum window size to use.

The checksum of a control packet is simply 0xaaaa - the control byte.

The checksum of a data packet is 0xaaaa - (CHECK ^ the control byte),
where ^ denotes exclusive or, and CHECK is the result of the following
routine as run on the contents of the data field (every byte in the
data field participates in the checksum, even for a short data
packet).  Below is the routine used by Taylor UUCP; it is a slightly
modified version of a routine which John Gilmore patched from G.L.
Chesson's original paper.  The z argument points to the data and the c
argument indicates how much data there is.

int
igchecksum (z, c)
     register const char *z;
     register int c;
{
  register unsigned int ichk1, ichk2;

  ichk1 = 0xffff;
  ichk2 = 0;

  do
    {
      register unsigned int b;

      /* Rotate ichk1 left.  */
      if ((ichk1 & 0x8000) == 0)
        ichk1 <<= 1;
      else
        {
          ichk1 <<= 1;
          ++ichk1;
        }

      /* Add the next character to ichk1.  */
      b = *z++ & 0xff;
      ichk1 += b;

      /* Add ichk1 xor the character position in the buffer counting from
         the back to ichk2.  */
      ichk2 += ichk1 ^ c;

      /* If the character was zero, or adding it to ichk1 caused an
         overflow, xor ichk2 to ichk1.  */
      if (b == 0 || (ichk1 & 0xffff) < b)
        ichk1 ^= ichk2;
    }
  while (--c > 0);

  return ichk1 & 0xffff;
}

When the 'g' protocol is started, the calling UUCP sends an INITA
control packet with the window size it wishes the called UUCP to use.
The called UUCP responds with an INITA packet with the window size it
wishes the calling UUCP to use.  Pairs of INITB and INITC packets are
then similarly exchanged.  When these exchanges are completed, the
protocol is considered to have been started.

Note that the window and packet sizes are not a negotiation.  Each
system announces the window and packet size which the other system
should use.  It is possible that different window and packet sizes
will be used in each direction.  The protocol works this way on the
theory that each system knows how much data it can accept without
getting overrun.  Therefore, each system tells the other how much data
to send before waiting for an acknowledgement.

When a UUCP package transmits a command, it sends one or more data
packets.  All the data packets will normally be complete, although
some UUCP packages may send the last one as a short packet.  The
command string is sent with a trailing null byte, to let the receiving
package know when the command is finished.  Some UUCP packages require
the last byte of the last packet sent to be null, even if the command
ends earlier in the packet.  Some packages may require all the
trailing bytes in the last packet to be null, but I have not confirmed
this.

When a UUCP package sends a file, it will send a sequence of data
packets.  The end of the file is signalled by a short data packet
containing zero valid bytes (it will normally be preceeded by a short
data packet containing the last few bytes in the file).

Note that the sequence numbers cover the entire communication session,
including both command and file data.

When the protocol is shut down, each UUCP package sends a CLOSE
control packet.

------------------------------

From: UUCP-f
Subject: What is the 'f' protocol?

The 'f' protocol is a seven bit protocol which checksums an entire
file at a time.  It only uses the characters between \040 and \176
(ASCII space and ~) inclusive as well as the carriage return
character.  It can be very efficient for transferring text only data,
but it is very inefficient at transferring eight bit data (such as
compressed news).  It is not flow controlled, and the checksum is
fairly insecure over large files, so using it over a serial connection
requires handshaking (XON/XOFF can be used) and error correcting
modems.  Some people think it should not be used even under those
circumstances.

I believe the 'f' protocol originated in BSD versions of UUCP.  It was
originally intended for transmission over X.25 PAD links.

The 'f' protocol has no startup or finish protocol.  However, both
sides typically sleep for a couple of seconds before starting up,
because they switch the terminal into XON/XOFF mode and want to allow
the changes to settle before beginning transmission.

When a UUCP package transmits a command, it simply sends a string
terminated by a carriage return.

When a UUCP package transmits a file, each byte b of the file is
translated according to the following table:

       0 <= b <=  037: 0172, b + 0100 (0100 to 0137)
     040 <= b <= 0171:       b        ( 040 to 0171)
    0172 <= b <= 0177: 0173, b - 0100 ( 072 to  077)
    0200 <= b <= 0237: 0174, b - 0100 (0100 to 0137)
    0240 <= b <= 0371: 0175, b - 0200 ( 040 to 0171)
    0372 <= b <= 0377: 0176, b - 0300 ( 072 to  077)

That is, a byte between \040 and \171 inclusive is transmitted as is,
and all other bytes are prefixed and modified as shown.

When all the file data is sent, a seven byte sequence is sent: two
bytes of \176 followed by four ASCII bytes of the checksum as printed
in base 16 followed by a carriage return.  For example, if the
checksum was 0x1234, this would be sent: "\176\1761234\r".

The checksum is initialized to 0xffff.  For each byte that is sent it
is modified as follows (where b is the byte before it has been
transformed as described above):

      /* Rotate the checksum left.  */
      if ((ichk & 0x8000) == 0)
        ichk <<= 1;
      else
        {
          ichk <<= 1;
          ++ichk;
        }

      /* Add the next byte into the checksum.  */
      ichk += b;

When the receiving UUCP sees the checksum, it compares it against its
own calculated checksum and replies with a single character followed
by a carriage return.
    G
        The file was received correctly.
    R
        The checksum did not match, and the file should be resent from
        the beginning.
    Q
        The checksum did not match, but too many retries have occurred
        and the communication session should be abandoned.

The sending UUCP checks the returned character and acts accordingly.

------------------------------

From: UUCP-t
Subject: What is the 't' protocol?

The 't' protocol is intended for use on links which provide reliable
end-to-end connections, such as TCP.  It does no error checking or
flow control, and requires an eight bit clear channel.

I believe the 't' protocol originated in BSD versions of UUCP.

When a UUCP package transmits a command, it first gets the length of
the command string, C.  It then sends ((C / 512) + 1) * 512 bytes (the
smallest multiple of 512 which can hold C bytes plus a null byte)
consisting of the command string itself followed by trailing null
bytes.

When a UUCP package sends a file, it sends it in blocks.  Each block
contains at most 1024 bytes of data.  Each block consists of four
bytes containing the amount of data in binary (most significant byte
first, the same format as used by the Unix function htonl) followed by
that amount of data.  The end of the file is signalled by a block
containing zero bytes of data.

------------------------------

From: UUCP-e
Subject: What is the 'e' protocol?

The 'e' protocol is similar to the 't' protocol.  It does no flow
control or error checking and is intended for use over networks
providing reliable end-to-end connections, such as TCP.

The 'e' protocol originated in versions of HDB UUCP.

When a UUCP package transmits a command, it simply sends the command
as an ASCII string terminated by a null byte.

When a UUCP package transmits a file, it sends the complete size of
the file as an ASCII decimal number.  The ASCII string is padded out
to 20 bytes with null bytes (i.e. if the file is 1000 bytes long, it
sends "1000\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0").  It then sends the
entire file.

------------------------------

From: UUCP-G
Subject: What is the 'G' protocol?

The 'G' protocol is used by SVR4 UUCP.  It is identical to the 'g'
protocol, except that it is possible to modify the window and packet
sizes.  The SVR4 implementation of the 'g' protocol reportedly is
fixed at a packet size of 64 and a window size of 7.  Supposedly SVR4
chose to implement a new protocol using a new letter to avoid any
potential incompatibilities when using different packet or window
sizes.

Most implementations of the 'g' protocol that accept packets larger
than 64 bytes will also accept packets smaller than whatever they
requested in the INITB packet.  The SVR4 'G' implementation is an
exception; it will only accept packets of precisely the size it
requests in the INITB packet.

------------------------------

From: UUCP-i
Subject: What is the 'i' protocol?

The 'i' protocol was written by Ian Lance Taylor (who also wrote this
FAQ).  It is used by Taylor UUCP version 1.04.

It is a sliding window packet protocol, like the 'g' protocol, but it
supports bidirectional transfers (i.e., file transfers in both
directions simultaneously).  It requires an eight bit clear
connection.  Several ideas for the protocol were taken from the paper
``A High-Throughput Message Transport System'' by P. Lauder.  I don't
know where the paper was published, but the author's e-mail address is
piers@cs.su.oz.au.  The 'i' protocol does not adopt his main idea,
which is to dispense with windows entirely.  This is because some
links still do require flow control and, more importantly, because
using windows sets a limit to the amount of data which the protocol
must be able to resend upon request.  To reduce the costs of window
acknowledgements, the protocol uses a large window and only requires
an ack at the halfway point.

Each packet starts with a six byte header, optionally followed by data
bytes with a four byte checksum.  There are currently five defined
packet types (DATA, SYNC, ACK, NAK, SPOS, CLOSE) which are described
below.  Although any packet type may include data, any data provided
with an ACK, NAK or CLOSE packet is ignored.

Every DATA, SPOS and CLOSE packet has a sequence number.  The sequence
numbers are independent for each side.  The first packet sent by each
side is always number 1.  Each packet is numbered one greater than the
previous packet, modulo 32.

Every packet has a local channel number and a remote channel number.
For all packets at least one channel number is zero.  When a UUCP
command is sent to the remote system, it is assigned a non-zero local
channel number.  All packets associated with that UUCP command sent by
the local system are given the selected local channel number.  All
associated packets sent by the remote system are given the selected
number as the remote channel number.  This permits each UUCP command
to be uniquely identified by the channel number on the originating
system, and therefore each UUCP package can associate all file data
and UUCP command responses with the appropriate command.  This is a
requirement for bidirectional UUCP transfers.

The protocol maintains a single global file position, which starts at
0.  For each incoming packet, any associated data is considered to
occur at the current file position, and the file position is
incremented by the amount of data contained.  The exception is a
packet of type SPOS, which is used to change the file position.
The reason for keeping track of the file position is described below.

The header is as follows:

    \007
	Every packet begins with ^G.
    (PACKET << 3) + LOCCHAN
	The five bit packet number combined with the three bit local
	channel number.  DATA, SPOS and CLOSE packets use the packet
	sequence number for the PACKET field.  NAK packet types use
	the PACKET field for the sequence number to be resent.  ACK
	and SYNC do not use the PACKET field, and generally leave it
	set to 0.  Packets which are not associated with a UUCP
	command from the local system use a local channel number of 0.
    (ACK << 3) + REMCHAN
	The five bit packet acknowledgement combined with the three
	bit remote channel number.  The packet acknowledgement is the
	number of the last packet successfully received; it is used by
	all packet types.  Packets which are not sent in response to a
	UUCP command from the remote system use a remote channel
	number of 0.
    (TYPE << 5) + (CALLER << 4) + LEN1
	The three bit packet type combined with the one bit packet
	direction combined with the upper four bits of the data
	length.  The packet direction bit is always 1 for packets sent
	by the calling UUCP, and 0 for packets sent by the called
	UUCP.  This prevents confusion caused by echoed packets.
    LEN2
	The lower eight bits of the data length.  The twelve bits of
	data length permit packets ranging in size from 0 to 4095
	bytes.
    CHECK
	The exclusive or of the second through fifth bytes of the
	header.  This provides an additional check that the header is
	valid.

If the data length is non-zero, the packet is immediately followed by
the specified number of data bytes.  The data bytes are followed by a
four byte CRC 32 checksum, with the most significant byte first.  The
CRC is calculated over the contents of the data field.

The defined packet types are as follows:

    0 (DATA)
	This is a plain data packet.
    1 (SYNC)
	SYNC packets are exchanged when the protocol is initialized,
	and are described further below.  SYNC packets do not carry
	sequence numbers (that is, the PACKET field is ignored).
    2 (ACK)
	This is an acknowledgement packet.  Since DATA packets also
	carry packet acknowledgements, ACK packets are only used when
	one side has no data to send.  ACK packets do not carry
	sequence numbers.
    3 (NAK)
	This is a negative acknowledgement.  This is sent when a
	packet is received incorrectly, and means that the packet
	number appearing in the PACKET field must be resent.  NAK
	packets do not carry sequence numbers (the PACKET field is
	already used).
    4 (SPOS)
	This packet changes the file position.  The packet contains
	four bytes of data holding the file position, most significant
	byte first.  The next packet received will be considered to be
	at the named file position.
    5 (CLOSE)
	When the protocol is shut down, each side sends a CLOSE
	packet.	 This packet does have a sequence number, which could
	be used to ensure that all packets were correctly received
	(this is not needed by UUCP, however, which uses the higher
	level H command with an HY response).

When the protocol starts up, both systems send a SYNC packet.  The
SYNC packet includes at least three bytes of data.  The first two
bytes are the maximum packet size the remote system should send, most
significant byte first.  The third byte is the window size the remote
system should use.  The remote system may send packets of any size up
to the maximum.  If there is a fourth byte, it is the number of
channels the remote system may use (this must be between 1 and 7,
inclusive).  Additional data bytes may be defined in the future.

The window size is the number of packets that may be sent before a
packet is acknowledged.  There is no requirement that every packet be
acknowledged; any acknowledgement is considered to acknowledge all
packets through the number given.  In the current implementation, if
one side has no data to send, it sends an ACK when half the window is
received.

Note that the NAK packet corresponds to the unused 'g' protocol SRJ
packet type, rather than to the RJ packet type.  When a NAK is
received, only the named packet should be resent, not any subsequent
packets.

Note that if both sides have data to send, but a packet is lost, it is
perfectly reasonable for one side to continue sending packets, all of
which will acknowledge the last packet correctly received, while the
system whose packet was lost will be unable to send a new packet
because the send window will be full.  In this circumstance, neither
side will time out and one side of the communication will be
effectively shut down for a while.  Therefore, any system with
outstanding unacknowledged packets should arrange to time out and
resend a packet even if data is being received.

Commands are sent as a sequence of data packets with a non-zero local
channel number.  The last data packet for a command includes a
trailing null byte (normally a command will fit in a single data
packet).  Files are sent as a sequence of data packets ending with one
of length zero.

The channel numbers permit a more efficient implementation of the UUCP
file send command.  Rather than send the command and then wait for the
SY response before sending the file, the file data is sent beginning
immediately after the S command is sent.  If an SN response is
received, the file send is aborted, and a final data packet of length
zero is sent to indicate that the channel number may be reused.  If an
SY reponse with a file position indicator is received, the file send
adjusts to the file position; this is why the protocol maintains a
global file position.

Note that the use of channel numbers means that each UUCP system may
send commands and file data simultaneously.  Moreover, each UUCP
system may send multiple files at the same time, using the channel
number to disambiguate the data.  Sending a file before receiving an
acknowledgement for the previous file helps to eliminate the round
trip delays inherent in other UUCP protocols.

------------------------------

From: UUCP-j
Subject: What is the 'j' protocol?

The 'j' protocol is a variant of the 'i' protocol.  It was also
written by Ian Lance Taylor, and first appeared in Taylor UUCP version
1.04.

The 'j' protocol is a version of the 'i' protocol designed for
communication links which intercept a few characters, such as XON or
XOFF.  It is not efficient to use it on a link which intercepts many
characters, such as a seven bit link.  The 'j' protocol performs no
error correction or detection; that is presumed to be the
responsibility of the 'i' protocol.

When the 'j' protocol starts up, each system sends a printable ASCII
string indicating which characters it wants to avoid using.  The
string begins with the ASCII character '^' (octal 136) and ends with
the ASCII character '~' (octal 176).  After sending this string, each
system looks for the corresponding string from the remote system.  The
strings are composed of escape sequences: \ooo, where o is an octal
digit.  For example, sending the string ^\021\023~ means that the
ASCII XON and XOFF characters should be avoided.  The union of the
characters described in both strings (the string which is sent and the
string which is received) is the set of characters which must be
avoided in this conversation.  Avoiding a printable ASCII character
(octal 040 to octal 176, inclusive) is not permitted.

After the exchange of characters to avoid, the normal 'i' protocol
start up is done, and the rest of the conversation uses the normal 'i'
protocol.  However, each 'i' protocol packet is wrapped to become a
'j' protocol packet.

Each 'j' protocol packet consists of a seven byte header, followed by
data bytes, followed by index bytes, followed by a one byte trailer.
The packet header looks like this:

    ^
        Every packet begins with the ASCII character '^', octal 136.
    HIGH
    LOW
        These two characters give the total number of bytes in the
        packet.  Both HIGH and LOW are printable ASCII characters.
        The length of the packet is (HIGH - 040) * 0100 + (LOW - 040),
        where 040 <= HIGH < 0177 and 040 <= LOW < 0140.  This permits
        a length of 6079 bytes, but there is a further restriction on
        packet size described below.
    =
        The ASCII character '=', octal 075.
    DATA-HIGH
    DATA-LOW
	These two characters give the total number of data bytes in
        the packet.  The encoding is as described for HIGH and LOW.
        The number of data bytes is the size of the 'i' protocol
        packet wrapped inside this 'j' protocol packet.
    @
	The ASCII character '@', octal 100.

The header is followed by the number of data bytes given in DATA-HIGH
and DATA-LOW.  These data bytes are the 'i' protocol packet which is
being wrapped in the 'j' protocol packet.  However, each character in
the 'i' protocol packet which the 'j' protocol must avoid is
transformed into a printable ASCII character (recall that avoiding a
printable ASCII character is not permitted).  Two index bytes are used
for each character which must be transformed.

The index bytes immediately follow the data bytes.  The index bytes
are created in pairs.  Each pair of index bytes encodes the location
of a character in the 'i' protocol packet which was transformed to
become a printable ASCII character.  Each pair of index bytes also
encodes the precise transformation which was performed.

When the sender finds a character which must be avoided, it will
transform it using one or two operations.  If the character is 0200 or
greater, it will subtract 0200.  If the resulting character is less
than 020, or is equal to 0177, it will xor by 020.  The result is
a printable ASCII character.

The zero based byte index of the character within the 'i' protocol
packet is determined.  This index is turned into a two byte printable
ASCII index, INDEX-HIGH and INDEX-LOW, such that the index is
(INDEX-HIGH - 040) * 040 + (INDEX-LOW - 040).  INDEX-LOW is restricted
such that 040 <= INDEX-LOW < 0100.  INDEX-HIGH is not permitted to be
0176, so 040 <= INDEX-HIGH < 0176.  INDEX-LOW is then modified to
encode the transformation:

    If the character transformation only had to subtract 0200, then
    INDEX-LOW is used as is.

    If the character transformation only had to xor by 020, then 040
    is added to INDEX-LOW.

    If both operations had to be performed, then 0100 is added to
    INDEX-LOW.  However, if the value of INDEX-LOW were initially 077,
    then adding 0100 would result in 0177, which is not a printable
    ASCII character.  For that special case, INDEX-HIGH is set to
    0176, and INDEX-LOW is set to the original value of INDEX-HIGH.

The receiver decodes the index bytes as follows (this is the reverse
of the operations performed by the sender, presented here for
additional clarity):

    The first byte in the index is INDEX-HIGH, and the second is
    INDEX-LOW.

    If 040 <= INDEX-HIGH < 0176, the index refers to the data byte at
    position (INDEX-HIGH - 040) * 040 + INDEX-LOW % 040.

        If 040 <= INDEX-LOW < 0100, then 0200 must be added to indexed
        byte.

        If 0100 <= INDEX-LOW < 0140, then 020 must be xor'ed to the
        indexed byte.

        If 0140 <= INDEX-LOW < 0177, then 0200 must be added to the
        indexed byte, and 020 must be xor'ed to the indexed byte.

    If INDEX-HIGH == 0176, the index refers to the data byte at
    position (INDEX-LOW - 040) * 040 + 037.  0200 must be added to the
    indexed byte, and 020 must be xor'ed to the indexed byte.

This means the largest 'i' protocol packet which may be wrapped inside
a 'j' protocol packet is (0175 - 040) * 040 + (077 - 040) == 3007
bytes.

The final character in a 'j' protocol packet, following the index
bytes, is the ASCII character '~' (octal 176).

The motivation behind using an indexing scheme, rather than escape
characters, is to avoid data movement.  The sender may simply add a
header and a trailer to the 'i' protocol packet.  Once the receiver
has loaded the 'j' protocol packet, it may scan the index bytes,
transforming the data bytes, and then pass the data bytes directly on
to the 'i' protocol routine.

------------------------------

From: UUCP-x
Subject: What is the 'x' protocol?

The 'x' protocol is used in Europe (and probably elsewhere) with
machines that contain an builtin X.25 card and can send eight bit data
transparently across X.25 circuits, without interference from the X.28
or X.29 layers.  The protocol sends packets of 512 bytes, and relies
on a write of zero bytes being read as zero bytes without stopping
communication.  It first appeared in the original System V UUCP
implementation.

------------------------------

From: UUCP-y
Subject: What is the 'y' protocol?

The 'y' protocol was developed by Jorge Cwik for use in FX UUCICO, a
PC uucico program.  It is designed for communication lines which
handle error correction and flow control.  It is a streaming protocol,
like the 'f' protocol.  It requires an eight bit clean connection.  It
performs error detection, but not error correction; when an error is
detected, the line is dropped.  I do not know the implementation
details.

------------------------------

From: UUCP-d
Subject: What is the 'd' protocol?

This is apparently used for DataKit muxhost (not RS-232) connections.
No file size is sent.  When a file has been completely transferred, a
write of zero bytes is done; this must be read as zero bytes on the
other end.

------------------------------

From: UUCP-h
Subject: What is the 'h' protocol?

This is apparently used in some places with HST modems.  It does no
error checking, and is not that different from the 't' protocol.  I
don't know the details.

------------------------------

From: UUCP-v
Subject: What is the 'v' protocol?

The 'v' protocol is used by UUPC/extended, a PC UUCP program.  It is
simply a version of the 'g' protocol which supports packets of any
size, and also supports sending packets of different sizes during the
same conversation.  There are many 'g' protocol implementations which
support both, but there are also many which do not.  Using 'v' ensures
that everything is supported.

------------------------------

From: Thanks
Subject: Thanks

Besides the papers and information acknowledged at the top of this
article, the following people have contributed help, advice,
suggestions and information:
    Earle Ake 513-429-6500 <ake@Dayton.SAIC.COM>
    cambler@nike.calpoly.edu (Christopher J. Ambler)
    jhc@iscp.bellcore.com (Jonathan Clark)
    jorge@laser.satlink.net (Jorge Cwik)
    celit!billd@UCSD.EDU (Bill Davidson)
    "Drew Derbyshire" <ahd@kew.com>
    erik@pdnfido.fidonet.org
    Matthew Farwell <dylan@ibmpcug.co.uk>
    dgilbert@gamiga.guelphnet.dweomer.org (David Gilbert)
    kherron@ms.uky.edu (Kenneth Herron)
    Mike Ipatow <mip@fido.itc.e-burg.su>
    Romain Kang <romain@pyramid.com>
    "Jonathan I. Kamens" <jik@GZA.COM>
    "David J. MacKenzie" <djm@eng.umd.edu>
    jum@helios.de (Jens-Uwe Mager)
    peter@xpoint.ruessel.sub.org (Peter Mandrella)
    david nugent <david@csource.oz.au>
    Stephen.Page@prg.oxford.ac.uk
    joey@tessi.UUCP (Joey Pruett)
    James Revell <revell@uunet.uu.net>
    Larry Rosenman <ler@lerami.lerctr.org>
    Rich Salz <rsalz@bbn.com>
    evesg@etlrips.etl.go.jp (Gjoen Stein)
    kls@ditka.Chicago.COM (Karl Swartz)
    Dima Volodin <dvv@hq.demos.su>
    jon@console.ais.org (Jon Zeeff)
    Eric Ziegast <ziegast@uunet.uu.net>

------------------------------

End of UUCP Internals Frequently Asked Questions
******************************
-- 
Ian Taylor | ian@airs.com | First to identify quote wins free e-mail message:
``You don't have to sleep.  That's just something *they* tell you to keep
  *control* over you.  Nobody has to sleep; you're *taught* to sleep when
  you're a kid.  If you're really determined, you can get over it.''