First draft of Site Admin's Document
bajan@mocha.cc.mcgill.ca Mon, 10 February 1992 05:49 UTC
Received: from nri.reston.va.us by NRI.NRI.Reston.VA.US id aa21133; 10 Feb 92 0:49 EST
Received: from kona.CC.McGill.CA by NRI.NRI.Reston.VA.US id aa21122; 10 Feb 92 0:48 EST
Received: from mocha.CC.McGill.CA by kona.cc.mcgill.ca with SMTP (5.65a/IDA-1.4.2b/CC-Guru-2b) id AA05981 (mail destined for IETF-Manager@nri.reston.va.us) on Mon, 10 Feb 92 00:06:01 -0500
Received: by mocha.cc.mcgill.ca (4.1/SMI-4.1) id AA03208; Mon, 10 Feb 92 00:06:00 EST
Message-Id: <9202100506.AA03208@mocha.cc.mcgill.ca>
From: bajan@mocha.cc.mcgill.ca
Date: Mon, 10 Feb 1992 00:06:00 -0500
X-Mailer: Mail User's Shell (7.2.2 4/12/91)
To: iafa@cc.mcgill.ca
Subject: First draft of Site Admin's Document
Hi All, Well, it's about time that IAFA got some work done :-) As promised here is the first draft of the Site Administrators document that Peter and myself have put together. It is quite rough in many places (the first two parts especially), but I wanted to get something out to the list ASAP in order to start the discussion. Don't worry too much about spelling and order (we didn't :-). This is just the foundation for the discussion phase. We would like to have the first "official" draft by mid-March in time for IETF San Diego. The first couple of sections deal with standard anonmous FTP archive (AFA) stuff: setting one up and general pointers to its maintenance. The "main" part of the document is the additional information that we would like to see AFA's publish. As mentioned in the document, we realize that this is a far from ideal solution to the problem, however it looks as if it is the only thing we'll have to work with for the next couple of years until some form of standard is put into place and deployed. We think it is a workable solution until such time. The document is currently 14 pages so I've formatted it for printing for those who want to. Cut at the dotted line and ship it off. Here we go....enjoy -Alan ----8<--------8<--------8<--------8<--------8<--------8<--------8<--------8< Feb 9 23:53 1992 draft.1 Page 1 DRAFT IAFA-WG Guide to FTP Site Administration Introduction As the growth of the Internet continues it is now fair to speak of an "Internet infostructure". Companion to the extensive physical infrastructure that is itself responsible for the specific routing and delivery of messages, the Internet infostructure is comprised of that growing body of information and the structure that holds it now available to users of the net. Much of this infostructure is available equally to all users. Other portions are available to anyone participating in specific network-based workgroups. The Internet acts as an enabling technology that makes available this wealth of information to those who know how to access it. In this document we concentrate on the remote file transfer model for sharing information in an Internet environment. On the Internet, this model is primarily implemented using the File Transfer Protocol (FTP) [1]. Available at most sites, an FTP service provides users with a secure and reliable mechanism to copy specific files from one host to another across the network. In particular, we aim to provide information to anyone contemplating setting up or maintaining an Internet information archive using the facilities of FTP. A companion document will cover the use and operation of FTP archives from the user's perspective. Users of FTP normally must go through a login sequence when connecting to a foreign host. They are then allowed to copy those files to which they have been granted access permission. The login sequence provides basic authentication and security in an open systems environment with hundreds of thousands of interconnected hosts and millions of users. The underlying FTP protocol provides needed error checking and thus ensures reliability. What is Anonymous FTP? The basic FTP-based file sharing model has been extended throught the creation of a network of universally accessible FTP archives sites. Information at such sites is available to all users of the Internet, without the usual authentication step using the convention of "anonymous FTP". Under this mechanism, site administrators make available a collection of files to the Internet community by creating a special "anonymous" user account. Normal authentication mechanisms are disabled (hence the use of the term "anonymous") thus allowing anyone who connects to such a site to copy information back to their own host. The use of anonymous FTP began as a convention among relatively few sites on the Internet. Details on establishing and operating such an archive and even the names of sites supporting this mechanism was shared among users of the net through ad hoc methods. With the continued growth of the Internet [2] such ad hoc methods Feb 9 23:53 1992 draft.1 Page 2 are now seen to be inadequate. Anonymous FTP indexing tools It is expected that as the amount of information on the network grows, such resource discovery tools will become increasingly more important. The Internet Anonymous FTP Archive Working Group (IAFA-WG) has been formed under the auspices of the Internet Engineering Task Force to foster better utilization of the anonymous FTP archive mechanism for sharing information on the Internet. This guide is intended for current and potential archive administrators and includes procedures for setting up a site and guidelines for its operation. In addition, we include proposals for using anonymous archives as the first step to "publishing" information in the Internet enviroment are included. Despite their success, anonymous FTP archives are not the ideal manner for publishing information. They do however, have the advantage of being relatively cheap and easy to establish and provide near universal access to their contents. With proper attention by archive site administrators, they provide a relatively simple way to distribute information. Organization of this document This document is divided into four sections. Part I discusses the reasons why an organisation might wish to establish an anonymous FTP archive site. Specific issues, both technical and non-technical are addressed to herp the site administrator determine if establishing such an archive is appropriate for his or her site. Part II describes the steps needed to set up and maintain an anonymous FTP archive site. Specific examples for the most common operating system environments are included. Part III offers a set recommended information that a site may wish to compile and make available to archive users. It is expected that archive indexing tools would automatically gather and make available this information to a wide audience. Although not required, it is expected that providing such information would make your archive a more useful resource. At the heart of this section are specific recommendations that are intended to provide a standardized means for sharing information about the contents of a specific archive site. These recommendations include information concerning services provided by the institution, document abstracts, and information such as administrative contacts, local Timezone and other site-specific details. Part IV contains a set of recommended encoding procedures for the information outlined in Part III. These procedures allow the Feb 9 23:53 1992 draft.1 Page 3 adminstrator to take into account site-specific issues, such as whether a particular operating system offers the capability of creating and using subdirectories, any limitations on filename length or the inability to use specific characters in filenames. Using these recommendations, it is assumed that automated tools will be developed that can incorporate information about that site into larger infostructures which enable the general public to locate and access the information at the site in a timely and efficient way. Part I: What is an anonymous FTP archive and why set one up ? Internet archives are repositories of information of common interest to a group. For example, researchers sharing a common set of data will often put the information in a central location so that it can be accessed by all those in the group. How this access is performed can vary, but on the Internet the FTP service and the associated remote file sharing paradigm are often used. The FTP service has been around since the early days of the Internet. It has been a successful service, with over 40% of current network traffic being used for this purpose [* ref *]. The basic FTP system is designed around a client/server model. Users invoke the client to connect to the server process running on the remote host. The server is responsible for verifying the authenticity of the user and performing the operations requested by the user through the client, enforcing the security and integrity of the host system. In ordinary FTP sessions one would log into an account on the remote host from where one either wanted to retrieve the file or to which the file (or files) were to be placed. Basic commands allow the user to navigate through the remote file system and copy or delete files. This form of access requires one to have the name and password of the account on the remote system. Why set up an anonymous FTP archive ? Site administrators set up anonymous ftp archives for any of several reasons: a) Sharing of useful information. Many sites contain data which their owners would like to make publicly available. Research papers, locally produced software and datasets are some of the most common offerings. An anonymous ftp archive allows you to make this information available to a large audience that would not otherwise be able to easily access it. b) Caching and redundancy. Sites at the end of slow network links often set up an AFA site to redistribute information obtained from other sites so that the operation need not be repeated multiple times for the same piece of information. Large software offerings such as X11 or TeX which can total several hundred Megabytes are often prime candidates for caching at the closer end of a slow network link. Feb 9 23:53 1992 draft.1 Page 4 c) To raise a site's profile by providing a valuable network resource. A useful large and well maintained archive site is a valuable resource to the general Internet community. This can give the group providing the archive higher visibility which in turn can call attention to other work by that site. Initially, most ftp archives resided on centrally controlled mainframe or minicomputers. The huge growth in the number of workstations and PCs on the Internet has led to the growth of a number of smaller, more site-specific archives. The current population of archives now offer everything from small collections of specialized data to collections consisting of hundreds or even thousands of Megabytes of information, much of it shadowed or copied from other sites on the Internet. Part II: Setting up and maintaining an anonymous ftp archive site. Once it has been decided that an anonymous ftp account is to be created it is up to the system administrator to configure the FTP server to allow such access. How this is done exactly is operating system dependent and may be as simple as creating a password entry with the appropriate information for an FTP pseudo-user. In most modern systems, support for the anonymous account is built into the FTP server program primarily to enforce security. It is important to bear in mind that once the account is enabled, by its very definition, _anyone_ on the network can access the account. Examples for some common operating systems are given below: UNIX In most implementations of UNIX, the ftp server (ftpd) is launched from inetd running as the super user (root). The anonymous facility is enabled by adding an account for the user "ftp" to the password file. A typical /etc/passwd enty would look like: ftp::67:20:Anonymous FTP account:/home/ftp:/bin/true Note that a) there is no entry in the second (password) field and b) that the shell is listed as /bin/true so as to prevent access to the account by telnet(1) or rlogin(1). The line /bin/true may have to be added to the file /etc/shells to allow /bin/true to be used as a "shell". Most UNIX systems will have the ftp server perform a chroot(2) call in order to enforce the confinement of the process to the specified anonymous ftp home directory (in this case /home/ftp). Subdirectories of the ftp home directory called "bin" and "etc" should be created. root should own the home directory. a) ~ftp/bin should have a copy of the ls(1) program with execute only permissions to all and the directory should be not by writable by anyony. Both should be owned by root. Feb 9 23:53 1992 draft.1 Page 5 b) ~ftp/etc should be created with owner root and readonly permissions. It can optionally contain a file called passwd with one entry of the form ftp:*:67:20:Anonymous FTP account:/:/bin/true Note in this case that the passwd field is "*" and the home directory is listed as "/". A file called "group" can also be placed in this directory with an entry for the ftp group conforming to the group(5) manual entry. In systems with dynamic libraries (eg. SunOS 4.X), a copy of these libraries and certain devices may need also to be created. Consult your documentation. [VMS] [other OS?] There are a few areas of potential problems from both the security and administrative sides of running an anonymous ftp archive site which will be mentioned here. If you are not sure of the capabilities of your server it is a good idea to consult your system documentation or your software vendor. Some of these problems can be solved by using one of the freely distributable ftp servers now available. Technical a) The view of the filesystem that the ftp client has access to should be restricted with only those files specifically intended to being distributed actually visible. In the best case, this restriction should be enforced at the lowest possible level, preferably by the operating system itself. Application-level enforcement should be avoided. For example, some ftp servers try to restrict the movement of the clients by filtering pathname requests. This is a weaker enforcement of access policies than those supplied by the operating system and alternate servers which utilize OS support should be used in preference. b) Many sites maintain "incoming" directories which allow the uploading of information into the archive by the general public. These can be very useful for the easy distribution of data. However, they can also be used as a transfer point for files that should not be on your system. Most operating systems allow having a directory be world writable but not world readable. If you really want to have one of these directories, it is a good idea to configure them in this way to allow the site adminstrator to examine and vet the data before it is made generally available. c) Check the permissions and ownerships of the files in your archive. Many administrators have adopted the practice of transferring ownership of archive files to the ftp pseudo-user. The file permissions should then be scrutinzed to make sure that individual files cannot now be modified by that user (unless of course, that is specifically the intention). The "ftp user" is anyone using the anonymous account. The replacement of files with corrupted versions (viruses, trojan horses etc) has been known to occur. d) The anonymous ftp subtree of the file system is usually self Feb 9 23:53 1992 draft.1 Page 6 contained. This means that references (UNIX symbolic links for example) outside of this subtree will not be resolved and are thus inaccessible to users of the system. e) Care should be taking when naming or renaming files in archives. The truism that names should be meaningful takes on a greater significance in this environment since this is all that the remote user has to work with when trying to discover the contents of the file without actually retrieving it. If one is caching a file from another ftp site, renaming is usually not recommended since the ability to determine if the two files contain identical information can be lost. Additionally whitespace an non printable characters (on operating systems which allow this) is frowned apon since this can make the file inaccessible to the remote user. Additionaly, characters such as '@', '!', '|', or "_" may not be available or have special significance on remote systems and should be used with caution. f) Very large files should be split into smaller pieces when placed in ftp archives. The retrieval of large files can be difficult on unreliable or congested links since if a failure during transfer occurs, it is usually not possible to restart from the point of failure and continue. The entire transfer has to be restarted. This can be time consuming and costly in terms of network bandwith. Currently, files of 500 - 600 K are usually considered as the maximum desirable size. Files larger than this should be split. Non technical a) Check the contents of the archive to make sure that the files stored there can legally (and ethically) be obtained by the general public. Information (progams, documents, datasets) which is freely distributable or in the public domain should be the only information placed in an anonymous ftp archive site. That information of unknown legal status should not be made generally available until the question is resolved: do not assume that because the information might have been retrieved from another archive that it is supposed to be generally available. There have been many instances in the past of proprietary information being unwitting distributed by uninformed archive administrators. This could prove to be an expensive mistake. Know what is in your archive. b) It is wise to only obtain files for caching on your system from "reputable" sites around the net. These are well known and are run in a highly professional manner. c) Many ftp servers allow the logging of operations requested by their users. This logged information usually contains the names or IP addresses of the hosts from which the client is logged on. In the past when there were may users on a system, this information didn't say much about who was doing what. However, in today's network environment where individual computers have in fact become _personal_ computers, this information can easily identify the actual user to a high degree of probability. It is considered unethical behavior to release this logged information to individuals or groups not directly associated with the maintenance of the archive. Privacy rights have in many respects not been legally defined for computer environments and as such it is up to each site Feb 9 23:53 1992 draft.1 Page 7 administrator to see that priviledged information is not conciously or inadvertently distributed. d) Anonymous ftp site administrators should be aware that the storage of pornographic material in their archives may cause problems of a legal or (more likely) political nature. This is also true of other potentially offensive material such as that related to weaponry or terrorism. There are a number of cases where the network provider for sites carrying such material has threatened termination of network access until the offending files have been removed. Part III: Useful Configuration and Contents Information In this section we define a minimum recommeded set collection of information that you could offer as the administrator of an archive site. In doing so, you would extend the functionality of your archive, as well as the functionality of indexing and resource discovery tools that choose to pick up and redistribute this information. It is expected that this information will itself be made available through the anonymous ftp archive mechanism. The specific encoding method used will be site-specific and encoding methods for some of the most popular computing environments are presented in Part IV. Note that these recommendations do not mandate or require that any particular piece of information be offered. Rather, they are suggestions for a minimal subset of information that we believe will make your archive a more useful resource to the Internet. Site-Specific Configuration Information: Your site could include a variety of description and configuration information that would be of use to potential users of that archive. These might include: Description Information: Site Overview: - A brief abstract listing the overall goals and aims of the archive site administration. If your site is intended to specialize in a particular type of information (Examples might include software for a specific machine type, on-line copies of a particular type of literature or research papers and information in a particular branch of science or engineering) you could indicate this. Configuration Information: Site configuration information could be included to help users better understand your wishes on how and when to access your site. This could include such information as: Feb 9 23:53 1992 draft.1 Page 8 Access Information: - Text describing the access policies of this site. This could include such information as preferred times of usage, conventions or restrictions for uploading files to this site etc. Contact Information: - You might also wish to include the name of the organisation or group administering the site. - The postal address of the site - The telphone number of the site [* Suggestions welcome for additions to this list *] Site-Specific Content Information: The preceeding selection all pertain to access and utilization policies for a site. You could also wish to make available a selection of information about the actual contents of your archive or even the services available from your organization or institution. Thus, you could make available information on: Services: - The archive should offer an overall directory of each the various Internet services offered by the associated organization's systems, along with corresponding contact information. This directory could indicate whether the the parent organization offers such services as: - an on-line library catalogue, - interactive network tools or any other services you currently offer. The existance of an entry in such a directory could also be used as an indication that associated archive configuration entries existed for such areas as abstracts of on-line documents, descriptions of available software, or a list of publicly available electronic mailing lists maintained at this site. In such cases you might wish to include specific information on: Abstracts: - The system could also include an outline of each textual document contained in the archive. This might correspond to the actual abstract for each technical report or other paper served from this archive site but any textual document offered could have a corresponding abstract made available for it. Packages: Feb 9 23:53 1992 draft.1 Page 9 - The system could also include an appropriate outline for each of the program packages offered at this site. This owuld correspond to the README file included with many freely distributable software, but should definitely include such information as: - what the program claims to do, - the orginal author, - current site where the package is being maintained, - current package maintainer, - and any special considerations or restrictions on the package's use (GNU copyleft, hardware restrictions, etc). Mailing Lists: - The archive administrator might also wish to indicate which publicly available mailing lists are maintained by this organization or institution, along with subscription information. Complete File listing: Each archive might wish to include a recursive listing of all archive entries at this archive in format appropriate for that environment. Such listings, if properly maintained, reduce network traffic while simplifying the task of archive indexing services. Part IV: Information Encoding for Specific Environments In this section we offer recommended encoding methods for the standard items of information listed in Part III. In many cases these recommendations should be applicable to all environments. Where this is not true standardized encodings are offered for specific environments. We offer such a standardized format so that If such information _is_ to be offered, it is formatted in such a way that it can be utilized by automated indexing and retrieval tools. The encoding methods proposed were developed to be extensible, so that additional information can be offered in a similar format, if the site administrator so wishes. Developing such recommendations offered several challenges. It is hoped that the encoding conventions should be applicable to as wide a variety of operating systems, file structures and encoding schemes as possible. In addition, the globalization of the Internet requires attention to constraints such as language in use at an archive site. In addition, the encoding methods proposed must be easy to implement and, for the moment, use existing methods of access and retrieval. We currently assume that the site language is English. Additional formats for other languages may be proposed at a later date. Feb 9 23:53 1992 draft.1 Page 10 An Encoding for UNIX Sytems: All information encoded using this scheme should reside in a standard configuration and content directory located at the root of the anonymous ftp file tree. Specific items of information are to reside in specific named files an directories. Files should be made world readable and that size and last modification dates [* times? *] can be obtained through the existing FTP mechanism. The specified encodings take one of three types. These are: - Free form text - semi-structure (in which specific fields are detailed but their contents are free form) - structured The encoding form for each entry is included in its description. The advantages to this system are that this information need only be constructed once with infrequent periodic updates as changes ocurr. Many of these files may never change during the lifetime of the host as an anonymous ftp site. They require no special programs or protocols to construct: a text editor is all that is needed. This document will propose a basic set of categories which will be modified in the future as need dictates. Configuration directory [* It seems to make sense to call the configuration directory CONFIG and that it be placed in the file structure directly under ("the child of") the directory in which the FTP client is located on login to the anonymous ftp host The following categories/filenames are in English Categories marked with a '?' have questionably utility but are included for consideration *] Categories 1) Free format. The information in these files will be handled as one large text string. No attempt will be made by automatic tools to extract individual pieces of information from them. (Information about the host itself) POST: The postal address of the site PHONE: The telphone number of the site (in international format) ACCESS: Text describing the access policies of this site. Information such as preferred times of usage, Feb 9 23:53 1992 draft.1 Page 11 conventions or restrictions for uploading files to this site etc. would be placed here. DESCRIPT: Contains text and keywords describing any field or area of specalization that the site subscribes to. For example, if the site was concerned with molecular biology a paragraph or two with that keyword and some further description would be in order. ORG: Contains the name of the organisation or group administering the site. Example: School of Computer Science or McGill University 1) Semi-structured. These categories should have the specified fields, but no formal syntax will be specified. The assumption shouldn't be made that the information contained in these categories applies to the anonymous ftp host itself. Rather, the group or organization may publish general information: the specific information will be contained inside the file describing the category. All files will be retrieved from each subdirectory. Attempts may be made to parse the information within each file. MAILLIST (subdirectory) ------------------------ A file for each mailing list maintained by that site, group or organisation. The file should be the name of the list if possible. It contains the following fields: NAME ADDRESS ADMIN DESCRIPTION KEYWORDS Each field name is followed by the appropriate information, each field starting on a new line. NAME The name of the list. ADDRESS The address (in RFC 822 format) that mail intended for this list should be sent to. ADMIN The address (in RFC 822 format) of the administrative contact for the list. It is to this address that additions and deletions to the list should be directed. DESCRIPTION A description of the purpose of the list. Any special conditions for the list should be included. KEYWORDS Keywords useful for anyone looking for the list Feb 9 23:53 1992 draft.1 Page 12 PACKAGES (subdirectory) [* Two proposals *] [Package to be taken to mean program (suite), dataset, document etc] a) A file for each package on the anonymous archive that that archive is responsible for (either by authorship or maintenance). There is a concept that many packages have a "home" base from which the latest copy can be obtained: in some sense the site is "authoritative" for that package. b) A file for each package on the anonymous archive. [* Of course some sites won't do it for _every_ package, but some may want to choose some packages that they would particularly like to "advertise" *]. [* In both cases the following fields apply *] NAME The name of the program AUTHOR The name of the individual or group which wrote/compiled ("put together") the package. Email address should be included. DESCRIPTION The description of the package. KEYWORDS Keywords useful for anyone looking for the package [* For proposal (b): STATUS One of either "original" or "copy" to determine if the anonymous site is "authoritative" for that package. [* Or perhaps "MAINTAINED@" or "MAINTAINEDBY" *] ABSTRACTS A list of the abstracts of paper's available on the AFA Fields are: NAME The name of the paper AUTHOR The name of the individual or group which wrote paper. Email address should be included. DESCRIPTION The description of the paper. KEYWORDS Keywords useful for anyone looking for the package SERVICES A list of any special services the host provides. Examples include systems like WAIS, Prospero, Gopher, the Geographic database, weather servers etc. Fields are: NAME The name of the service ACCESS Procedure to be followed in order to access the service (eg. telnet to a specific port number, special account etc) DESCRIPTION A description of the service. KEYWORDS Keywords for anyone looking for the service 3) Structured Feb 9 23:53 1992 draft.1 Page 13 (Information about the Host) TIMEZONE (signed numeric) The signed numeric differenc of the site from UTC with "-" signifying zones west and "+" meaning times east. Daylight savings conventions are ignored since they can be resolved externally. Thus North American Eastern Standard Time (EST) would be -5, France would be +1 etc. EMAIL (alphanumeric string) Contains the email address at which the site administrator can be reached in RFC 822 standard. For example, a file containing bajan@cc.mcgill.ca would be valid. Alternately, "Alan Emtage" <bajan@cc.mcgill.ca> could be used. LOCALE? (alpha string) Contains the comma separated list of city, state (province etc), country in which the site is located. Example: Montreal,Quebec,Canada COORDS (string) Contains the whitespace or comma separated latitude and longitude in degrees, minutes (specified as degrees.minutes) of the host. The number can be signed with "+" for points East and North, "-" for points West and South. Alternately, the letters E or W after the latitude will signify East or West; N or S signifying North or South on the longitude. Example: -23.45,+33.15 Would specify latitude 23 degrees, 45 minutes West, Logitude 33 degrees, 15 minutes North. This could also be specified as 23.45E,33.15N [* This isn't as strange as may first appear. The ability to display the hosts location (on a map for example), may be of considerable use *] (Information for the "infostructure") CNAME (string) The preferred name of the AFA. This must be a valid name resolvable under the standard DNS protocol. Thus if the site administrators would prefer you to use the name "ftp.foobar.net" instead of the primary name "free.foobar.net", this information would be placed in this file. UPFREQ (numeric) Feb 9 23:53 1992 draft.1 Page 14 The frequency in days for which this site would like to be updated in the infostructure. Sites that changed their information often would have a shorter update time than those who didn't. Of course it would be more desirable if the infostructure was current all the time. However at this point, this just not a feasible proposal. Thus we can benefit from a clue given by the site administrator, the person who has the greatest knowledge in this area. An empty file could signify "no preference". UPTIMES (alphanumeric) The preferred times between which the site would like the infostructure update to be performed. The assumption of nightime (local) updates may be incorrect for sites that run heavy nightime loads. The file consists of the starting and ending times as two 4 digit numbers separated by commas or whitespace. An optional "L" could follow the second number separated by commas or whitespace. UTC would be the default. Thus a file containing 0000 0500 L would mean that the site would prefer to be updated between 0000 and 0500 local time. An empty file would signify "no preference". The use of "L" would require that the TIMEZONE file be present to calculate the UTC times. (Contents of the host) LISTING A recursive file listing (ls -lR) of the anonymous ftp home directory. [compressed using the UNIX compress(1) facility or equivalent is desirable for reducing network load]. [* Other categories *] [* Other Operating Systems *] Bibliography [1] RFC 959 Postel, J.B.; Reynolds, J.K. File Transfer Protocol. 1985 October [2] RFC1296 Lottor, M. Internet Growth (1981-1991). 1992 January;
- First draft of Site Admin's Document bajan
- Re: First draft of Site Admin's Document Mark D. Baushke
- Re: First draft of Site Admin's Document bajan
- Re: First draft of Site Admin's Document Edward Vielmetti