Forums / In game politics / Zetamania wars ( Era 35 )

Zetamania wars ( Era 35 )
05:51:41 Sep 16th 08 - Mr. Darque Shade:

Ok lets grow up.  We are all being stupid now even myself.  Lets just play the damn era :-)


05:52:21 Sep 16th 08 - Duke Spud:

HAHA! It not bragging that I defeated your army. It's proving that your all talk and no action. And when you do show some sort of action, it's useless...

So stop acting big and shut the hell up.

I agree, your being stupid...


05:53:17 Sep 16th 08 - Mr. Darque Shade:

**beep*y smirk*

Come on Spud.....I agreed to stop acting stupid.  You gotta do it too.


05:53:59 Sep 16th 08 - Lord Charley Deallus:

Kiss and make up >_>


05:54:24 Sep 16th 08 - Mr. Darque Shade:

lol :-)

Get those dagger eyes away from me Charley!


05:55:03 Sep 16th 08 - Lord Charley Deallus:

I have been reading this argument for days...I think the dagger eyes are essential :p


05:56:12 Sep 16th 08 - Mr. Darque Shade:

I know I know I am sorry.  I gotta stay away from the o' whiskey bottle!


06:00:08 Sep 16th 08 - Commander Baldwin:

Oh. Did something happen here? You need filter eyes instead of daggers.


06:00:54 Sep 16th 08 - Duke Spud:

Darque Shade, you just want these arguments to stop because now you know im not afraid to post those messages. But anyways, As long as nobody whines about anything about "Preds NAPing the strongest KD" or "Your power/members are twice ours" or "Preds this" "Preds that". Then yes, I will shut up.

Otherwise, post something that I or the rest of the Preds can prove wrong, forget my silence..


06:05:50 Sep 16th 08 - Lord Charley Deallus:

Once again....ODC does not cease to amaze me...I am talking to Mr. Miller about life and the weather when this twat starts blabbering

[23:58] Mr. Commandment: lor deallus who never sleeps along his bed buddy demonic cute call signs
[23:58] * Mr. Rumpnissen The Evighetsmaskin has left Lobby
[23:58] * Mr. Stray has joined Lobby
[23:58] Lord Charley Deallus: ...oh hey racist child
[23:58] Mr. Commandment: english boy
[23:58] Lord Charley Deallus: Hey Miller...Mr. Commandment here thinks racism is cool
[23:59] Mr. Commandment: top of the morn to you
[23:59] * Mr. Bump has joined Lobby
[23:59] Lord Charley Deallus: he honestly thinks he is cool
[23:59] Mr. Commandment: too bad im english... you are fool in a boot of a car
[23:59] Lord Charley Deallus: and especially since I made him look like a complete *beep*
[23:59] Lord Charley Deallus: you aren't english
[23:59] Lord Charley Deallus: you went and started spraying crap about how the english are *beep*
[23:59] Sir Miller: racism is horrible
[23:59] Mr. Commandment: oh you took one city of mine and your mult account i may add...
[00:00] Lord Charley Deallus: ...keep calling me a multi...I can still call you a nub
[00:00] Mr. Commandment: took 3 days you are swine
[00:00] Lord Charley Deallus: it doesn't take a multi to make nubs cry
[00:00] Sir Miller: quit argueing
[00:00] Lord Charley Deallus: Oh, just so you know, Demonic Shezmu isn't English...he is Dutch
[00:00] Sir Miller: the both of you
[00:00] Mr. Commandment: lol you take it the way you please me lad... until you show me anything you are trash talkin TURD of a boy
[00:01] Mr. Vapor: lol
[00:01] Lord Charley Deallus: ...trash talking? I simply backed up my words
[00:01] Lord Charley Deallus: You have yet to do anything
[00:01] Lord Charley Deallus: except catch my scout army
[00:01] Lord Charley Deallus: You have lost city after city and army after army to Shezmu
[00:01] Sir Miller: stop!
[00:01] Lord Charley Deallus: While I ran circles around you
[00:01] Sir Miller: take it private
[00:01] Sir Miller: seriously
[00:01] Mr. Commandment: you make the english *beep* you should go to america and fit right in... kids there a dying genration
[00:01] Lord Charley Deallus: Alright alright...I will simply stop to prove I am a bigger man
[00:02] Lord Charley Deallus: Americans like you shame your country
[00:02] Lord Charley Deallus: I am done...
[00:02] Mr. Commandment: one city the other was a gimme
[00:02] Lord Charley Deallus: phhht
[00:02] Mr. Commandment: talk to my *beep*
[00:03] Mr. Commandment: you admit multi then cause you did nothing demonic did everything...anytime you come around you die
[00:04] Mr. Commandment: its sad games rule your life... and post this in the forum you loser you look like a redneck fag who has nothin better to do then complain about his feeling being hurt... later loser!
[00:04] Lord Charley Deallus: hang on...making a quick post
[00:04] Sir Miller: what are you 8?
[00:04] Sir Miller: shut the *beep* up
[00:04] Mr. Commandment: lol losers prevail
[00:05] Sir Miller: you want to talk *beep*?


06:08:53 Sep 16th 08 - Mr. Darque Shade:

omg Charley!  You just wanted Spud and I to shut up so YOU could flame!!!!

I feel used....

*sniff*


06:09:44 Sep 16th 08 - Duke Spud:

HAHA!

Still not better than the current argument...

Er...past argument now I guess...


06:11:56 Sep 16th 08 - Lord Charley Deallus:

lol racism and he talks big for being in his first era...he thinks me and Shezmu are multis...this has been going on for days and no one seems to care that ODC is dropping the ball in respect...


06:16:12 Sep 16th 08 - Duke Spud:

It's his first era... maybe (by reading this thread) me mistakenly took VU as a pure trashtalking game...


06:25:00 Sep 16th 08 - Lord Charley Deallus:

Sir Miller "talked" some sense into him.....
+10 Respect Points to Sir Miller ☺


06:33:50 Sep 16th 08 - Duke Spud:

...Yay!


06:35:41 Sep 16th 08 - Lord Charley Deallus:

Then Commandment said some naughty things to Miller.....I am sensing a ban :-) Lady Jasmina doesn't have to do anything after all......kind of sad how this kept going...


08:09:06 Sep 16th 08 - Demonic Shezmu:

and again the nublar with a big mouth lost a city and another one of his "mighty" armies has died along with it...15k troops...down the drain...he's not even worth to be called a JOKE lmfao :P

by god...is this the standards ODC choses it's members by nowadays?! if they're smart, they drop him from the kingdom before he tarnishes what little respect I have left for them...


13:08:22 Sep 16th 08 - Lady Jasmina:

And he gave me his word that he will stop talking to you.
I just dont understand some people...

Anyways Lord Charley Deallus why dont you be the grown up in that argument, and just dont talk to him? Why do you continue to argue with him?

Well I am sure I will be clearing up the KD soon...
Respect and Team Work are the things that Odyssey stands for.
And insults and attacking NAPed KD that some did, we will have to deal with that soon.

I am sorry once again for this Lord Charley Deallus, I will deal with this soon.


16:01:47 Sep 16th 08 - Lord Charley Deallus:

[00:01] Lord Charley Deallus: Alright alright...I will simply stop to prove I am a bigger man

Lady Jasmina....I never started the argument with him...he talked to me first when I was talking to Miller...if you don't believe me...then don't...I went in there to actually find Septim to see if he was online for once in the last few days, but he wasn't so instead I talked to Miller


16:55:59 Sep 16th 08 - Sir Gallyon:

Shezmu Shezmu Shezmu!!! Goooo Shezmuu!! :) Kill 'em all :D


20:35:00 Sep 16th 08 - Lord Charley Deallus:

Oh...and sorry but I read your question wrong...I argued back because I will NOT be talked down to by some piece of crap player who can do nothing but spew the vilest insults at me.  When that fails, he goes to racism and calling me a multi.  I will not be slandered and just sit there and let him think he is better than me.  He may be older, but his maturity rivals that of kids in late grade school or high school.  I have my honor to defend here and when he starts sladering the English, I am not going to stand by and let him do that.  I am one of those few people who believe in honor and integrity for his family, being of some nobility.  This may be a game, but when you start arguments like that for no reason, you deserve to get punched in RL.
~Lord Charley Deallus


23:22:14 Sep 16th 08 - Mr. Pimp:

Pimp kills Commandment....and starts belting out "God Save the Queen" by the Sex Pistols


23:23:10 Sep 16th 08 - Mr. Pimp:

then realises most are too young to know who they are, let alone join in an angry chorus :(


23:44:55 Sep 16th 08 - Lord Incognito:

I know them, not well enough to remember the chorus though :p


03:14:27 Sep 17th 08 - Mr. Pimp:

Its a shame when a KD needs to create Multi's like Gaul have to try win. No fear Gaul (*beep*ing french *beep*s)...you need 100 multi's to beat me *beep*heads


03:14:57 Sep 17th 08 - Mr. Darque Shade:

What the HELL are you talking about?


03:16:19 Sep 17th 08 - Mr. Darque Shade:

And I am not French lol!


Don't make me do another RP story about you.


03:18:11 Sep 17th 08 - Duke Gilthanas:

Just ignore him Shade, he's not entierly sure what he's talking about. Just let him troll right along and we can all go back to enjoying our evenings.


03:20:28 Sep 17th 08 - Mr. Darque Shade:

Yeah, I need to get a nice glass of whiskey.  (Too much heart burn though.)


03:22:03 Sep 17th 08 - Mr. Darque Shade:

Oh I get what the French thing was.  Gauls were a barbarian tribe that inhabited most of what is now France.


03:23:09 Sep 17th 08 - Duke Gilthanas:

Actually Pimp, it refers to most of Western Europe, and in no way smelly.

Mhm, real mature...


03:23:25 Sep 17th 08 - Mr. Pimp:

slow as usual


03:24:57 Sep 17th 08 - Mr. Darque Shade:

*sniff*


03:38:34 Sep 17th 08 - Duke Spud:

*Sigh*

I have so much to say, yet I promised not to say it, besides, Im a bit lazy right now. Dont be suprized if you visit this thread and see an uber long post by me.... It just might happen...


03:41:39 Sep 17th 08 - Mr. Pimp:

I hearby declare a total war for 100 era's between Predators and any Gaul member. For any new KD who joins this battle, you will be given the full protection of Predators. Gaul have, over the many era's been a KD of cowards...unable to fight their own battles. What happened to Military was not uncommon. I have seen the same thing happen over the era's. Gaul will NAP you then hide behind you as your KD bears the full brunt of the onslaught. Music, Holy and many others are testament to the Gaulish ways.

I promise to make Gaul the worst experience in a VU players time. Join them and you will be hunted. Protect them and you will be annihalated. 4 KD's have joined this pact already and many more will follow...out of pure distate for all of the Gaul KD...another Sparta wannabee


03:44:27 Sep 17th 08 - Duke Spud:

Since I wish to not give my 2 cents.....yet. I'll just root.

GO PIMP!!!!


03:48:12 Sep 17th 08 - Mr. Pimp:

*beep* this...only one KD i dispissed like this and that was Sparta...I annihalated them and will *beep* this bunch up too


04:26:01 Sep 17th 08 - Mr. Heiro:


In this issue…
In “Midnight and the Fleeing Phoenix” by Shawn Hutchens, Armondo Diego, after serving some years in a Tennessee penitentiary for a manslaughter he did not commit, in 1974 is handed over to Bobby Lee, a mountain of a man who uses work-release prisoners to work his various agricultural businesses. Lee runs his businesses like a medieval fiefdom. Despite his good-ol’ boy persona, he is a menacing and dangerous man, as Armondo learns when he begins to contemplate his escape. Peter Chilson’s story “Toumani Ogun” is about John Heller, a man scarred by his years of doing relief work in Africa and who becomes obsessed with revenge when one day near his home in the U.S. he encounters Toumani Ogun, a former African soldier whose men killed Heller’s African driver 20 years before. In Paris Smith’s   “Down Macon Way” Norm, a white man, is married to Phyllis, a black woman. They both hail from near Macon, Georgia, but when Norm goes to his dying grandfather’s home, Phyllis, whose own grandfather was killed by racists, refuses to go with him. While he is there he learns a terrible secret about the death. “Living on Paper, Dying on Trust” by Jack Vian is the gritty story of Kody, a parolee who picks up Brad the day he is released from prison. Kody lives with a girlfriend, but Brad wants to renew their jailhouse relationship. Leandro is a black man in 1930’s Louisiana unjustly accused of murder in Norton R. Girault’s “Leandro.” In jail he is poorly treated, but then a white man steps forward to defend him, and the whole problem is resolved in a surprising way. “The Summer She Was Seven” by Paul Johnson tells the story of a little boy in the 1940’s whose cousin Elsie, a precocious seven-year-old girl, comes to visit. When they are put to bed in the same room for the night she—remarkably—teaches him the art of loving a woman. Estrellita, a Chilean Indian girl whose gray eyes betray some European heritage in Roberta Kalechofsky’s “The Enigmatic Power of the Letter ‘J’,” is abducted by some whites and branded on the forehead with the letter “J.” Tribal superstition prevents its medical removal, but when she goes to Santiago and falls into the dark side, the strange letter has a powerful effect on the men who become her clients. In “You Only Live Once” by Bruce Douglas Reeves, Joe is trying to make it on the cold streets of depression-era L.A. He left home, hoping for something better than the measly ditch-digging job his brother has; he’s even tried boxing despite his small size; but the only way he sees to make it big is to get in with Trummy McGhee’s bootlegging operation. Poems and short pieces by Laurel Speer and Sonja Skarstedt and an editorial PRELUDE that discusses language and transcendence round out the issue.


04:26:29 Sep 17th 08 - Mr. Heiro:

Virtually every day we all see in the media or meet in personal life certain types of people: the capitalist who specializes in swallowing up companies and in the name of efficiency firing half the workers, attempting to get rid of any unions and rolling back benefit packages of the remaining workers, all the while threatening them with the specter of foreign workers who toil for a dollar a day; the spurned lover who stalks and murders his former lover because if she cannot belong to him she cannot belong to another; the blustering right-winger who tells a panhandler to get a job and who blames the people in the ghetto for their poverty; the person at work who substitutes power manipulation for relationship, who backstabs and hides his or her self-regard under the guise of duty or the importance of the organization, telling a worker that she cannot attend to her dying mother or sick child until she gets her work done; the athlete who crashes into the sidelines, knocking over spectators and photographers but not bothering to apologize or check to see if anyone is hurt; the pundit on television who blandly discusses the U.S. economic embargo of Iraq in terms of power politics without mentioning that the embargo kills tens of thousands of Iraqi children, old and sick people every year.
    
What do all these people have in common? They all lack imagination. Being egocentric, solipsistic, self-involved, or whatever term one cares to use, they never think of other people, for other people with their individual needs and desires are not important, not real to them—hence the violation of Kantian ethics (the practical imperative, never to treat another human being as a means to an end but always as a end in him- or herself). They are evil too, for what is evil but this very violation of Kantian ethics? And yet since at its mo*beep*ndamental level imagination is seeing what isn’t there, they are not totally unimaginative; it is only that they have a warped and perverted imagination that only serves their selfishness and greed. In a brilliant passage in Essay on the Principles of Human Action, the English Romantic writer William Hazlitt makes the connection between self-centeredness and the possibility of wider human sympathy and solidarity when he states that the only way to know the future is by a projection of the imagination. The same mental power, that is to say, that a greedy, selfish man uses to dream up his schemes for getting rich and gaining power is the same faculty of imagination that makes him capable of sympathetic identification with others. I could not love myself, Hazlitt concludes, if I were not capable of loving others.
    
We do not often see such thinking in modern-day America; instead we see glorified the capitalist who swallows up companies and the athlete who scores the touchdown at any price. The self-involved, unimaginative man, however, is like a black hole. His soul has shriveled into a tiny dense point that gives off no light and which distorts everyone who comes into contact with him. He is not to whom Hamlet was referring when he exclaimed, “What a piece of work is a man!” Capitalistic societies, as always innately hostile to any visions of oneness and solidarity, stimulate the imagination that everyone possesses in selfish ways, trying to make people not see the unity and oneness of humanity by deflecting this most human attribute into dreams of getting rich, having money and power, big cars and stuff, always stuff. It feeds not the spiritual hunger for peace and unity but the selfish, materialistic, grasping desire to have things so that (the ads make us hope) we will be loved and admired. As a result it produces in abundance dreadful, miserable excuses for human beings.
    
The polar opposite of the human being as black hole is the person with empathic imagination. He or she can see all people on their own terms, as beings imbued with personalities, histories, wants and desires, fears and phobias. Such imagination allows us to participate more fully in humanity, to experience life at a wider and deeper level. Imagination is also the most human attribute we have. Every other human characteristic is shared in some degree with our fellow mammals and other creatures, but the ability to imagine worlds that don’t exist in reality or to see life from another’s eyes is uniquely human. The fullest realization of our human nature, then, is found in those with the most imagination. Exercising it is liberating; it widens one’s view of the world so that one sees unity and similarity instead of atomistic individuals and hierarchies.
    
The fact that all human beings have imagination and are at least potentially capable of entering into the life of another person is what makes literature innately moral and ethical. One antidote to the sickeningly self-regarding culture that inundates us, then, is literature, or it should be. Literature opens minds, stimulates the empathic/sympathetic imagination by allowing readers to see the world through other eyes than their own. Just as a workout in a gym strengthens muscles, a workout with a poem or story strengthens the imagination. But the dominant literary movements of our day, modernism and postmodernism, perversely parallel capitalistic values in their ethos. Modernism has so distorted the cultural heritage of the west that it has made artistic duty nothing more than to exalt the self, and it does this at the expense of imagination, the one thing that all human beings have (and writers should have in abundance) that leads to human solidarity. The characteristic emphasis of modernism is to see the writer as special, as a being above the ordinary human realm. Even in works where this attitude is not explicit, the reader can still sense the repellent sense of superiority. The writer is regarded as one who is not subject to the same human duties and limitations as mere citizens, and disdain for bourgeois values widens into contempt for working people. Such writers, in short, ally themselves with capitalistic values and carefully observe hierarchies of worth. The only use for a poor bedraggled beggar is that he might make an aesthetically pleasing subject for a painting, but his presence in a poem by Pound or Eliot or in a Bloomsbury novel is only an occasion for superiority and contempt. With its emphasis on form and experimentation, its inspiration not from life but from other literary works, the spirit of modernism is essentially critical, not creative, not imaginative. There are of course exceptions where life wins out over theory (Joyce’s Ulyssesbeing the best example, but even some of the passages in The Waste Land), but essentially modernism smells of the lamp. Instead of being an imaginative and creative response to life, its practitioners show in their works (Pound’s poetry, for example) that they are more interested in playing the role of a writer or a poet than in being a human being responding to the multitudinous wonder of the world and being a writer. Coming up with a new form is never imaginative unless the new form is the only way to express a new way of seeing the world such as Walt Whitman did in Leaves of Grass, but what insight does the long rant of the Cantos offer?


04:27:14 Sep 17th 08 - Mr. Darque Shade:

lmao WTF!?  I don't know if I dare to read that.


04:28:08 Sep 17th 08 - Mr. Heiro:

wow my first and second and last forum posts  lol  figured i would waste some time in between ticks


04:32:02 Sep 17th 08 - Mr. Heiro:
Network Working Group                                          J. Postel
Request for Comments: 854 J. Reynolds
ISI
Obsoletes: NIC 18639 May 1983

TELNET PROTOCOL SPECIFICATION


This RFC specifies a standard for the ARPA Internet community. Hosts on
the ARPA Internet are expected to adopt and implement this standard.

INTRODUCTION

The purpose of the TELNET Protocol is to provide a fairly general,
bi-directional, eight-bit byte oriented communications facility. Its
primary goal is to allow a standard method of interfacing terminal
devices and terminal-oriented processes to each other. It is
envisioned that the protocol may also be used for terminal-terminal
communication ("linking") and process-process communication
(distributed computation).

GENERAL CONSIDERATIONS

A TELNET connection is a Transmission Control Protocol (TCP)
connection used to transmit data with interspersed TELNET control
information.

The TELNET Protocol is built upon three main ideas: first, the
concept of a "Network Virtual Terminal"; second, the principle of
negotiated options; and third, a symmetric view of terminals and
processes.

1. When a TELNET connection is first established, each end is
assumed to originate and terminate at a "Network Virtual Terminal",
or NVT. An NVT is an imaginary device which provides a standard,
network-wide, intermediate representation of a canonical terminal.
This eliminates the need for "server" and "user" hosts to keep
information about the characteristics of each other's terminals and
terminal handling conventions. All hosts, both user and server, map
their local device characteristics and conventions so as to appear to
be dealing with an NVT over the network, and each can assume a
similar mapping by the other party. The NVT is intended to strike a
balance between being overly restricted (not providing hosts a rich
enough vocabulary for mapping into their local character sets), and
being overly inclusive (penalizing users with modest terminals).

NOTE: The "user" host is the host to which the physical terminal
is normally attached, and the "server" host is the host which is
normally providing some service. As an alternate point of view,




Postel & Reynolds [Page 1]



RFC 854 May 1983


applicable even in terminal-to-terminal or process-to-process
communications, the "user" host is the host which initiated the
communication.

2. The principle of negotiated options takes cognizance of the fact
that many hosts will wish to provide additional services over and
above those available within an NVT, and many users will have
sophisticated terminals and would like to have elegant, rather than
minimal, services. Independent of, but structured within the TELNET
Protocol are various "options" that will be sanctioned and may be
used with the "DO, DON'T, WILL, WON'T" structure (discussed below) to
allow a user and server to agree to use a more elaborate (or perhaps
just different) set of conventions for their TELNET connection. Such
options could include changing the character set, the echo mode, etc.

The basic strategy for setting up the use of options is to have
either party (or both) initiate a request that some option take
effect. The other party may then either accept or reject the
request. If the request is accepted the option immediately takes
effect; if it is rejected the associated aspect of the connection
remains as specified for an NVT. Clearly, a party may always refuse
a request to enable, and must never refuse a request to disable some
option since all parties must be prepared to support the NVT.

The syntax of option negotiation has been set up so that if both
parties request an option simultaneously, each will see the other's
request as the positive acknowledgment of its own.

3. The symmetry of the negotiation syntax can potentially lead to
nonterminating acknowledgment loops -- each party seeing the incoming
commands not as acknowledgments but as new requests which must be
acknowledged. To prevent such loops, the following rules prevail:

a. Parties may only request a change in option status; i.e., a
party may not send out a "request" merely to announce what mode it
is in.

b. If a party receives what appears to be a request to enter some
mode it is already in, the request should not be acknowledged.
This non-response is essential to prevent endless loops in the
negotiation. It is required that a response be sent to requests
for a change of mode -- even if the mode is not changed.

c. Whenever one party sends an option command to a second party,
whether as a request or an acknowledgment, and use of the option
will have any effect on the processing of the data being sent from
the first party to the second, then the command must be inserted
in the data stream at the point where it is desired that it take


Postel & Reynolds [Page 2]



RFC 854 May 1983


effect. (It should be noted that some time will elapse between
the transmission of a request and the receipt of an
acknowledgment, which may be negative. Thus, a host may wish to
buffer data, after requesting an option, until it learns whether
the request is accepted or rejected, in order to hide the
"uncertainty period" from the user.)

Option requests are likely to flurry back and forth when a TELNET
connection is first established, as each party attempts to get the
best possible service from the other party. Beyond that, however,
options can be used to dynamically modify the characteristics of the
connection to suit changing local conditions. For example, the NVT,
as will be explained later, uses a transmission discipline well
suited to the many "line at a time" applications such as BASIC, but
poorly suited to the many "character at a time" applications such as
NLS. A server might elect to devote the extra processor overhead
required for a "character at a time" discipline when it was suitable
for the local process and would negotiate an appropriate option.
However, rather than then being permanently burdened with the extra
processing overhead, it could switch (i.e., negotiate) back to NVT
when the detailed control was no longer necessary.

It is possible for requests initiated by processes to stimulate a
nonterminating request loop if the process responds to a rejection by
merely re-requesting the option. To prevent such loops from
occurring, rejected requests should not be repeated until something
improvements. Operationally, this can mean the process is running a
different program, or the user has given another command, or whatever
makes sense in the context of the given process and the given option.
A good rule of thumb is that a re-request should only occur as a
result of subsequent information from the other end of the connection
or when demanded by local human intervention.

Option designers should not feel constrained by the somewhat limited
syntax available for option negotiation. The intent of the simple
syntax is to make it easy to have options -- since it is
correspondingly easy to profess ignorance about them. If some
particular option requires a richer negotiation structure than
possible within "DO, DON'T, WILL, WON'T", the proper tack is to use
"DO, DON'T, WILL, WON'T" to establish that both parties understand
the option, and once this is accomplished a more exotic syntax can be
used freely. For example, a party might send a request to alter
(establish) line length. If it is accepted, then a different syntax
can be used for actually negotiating the line length -- such a
"sub-negotiation" might include fields for minimum allowable, maximum
allowable and desired line lengths. The important concept is that




Postel & Reynolds [Page 3]



RFC 854 May 1983


such expanded negotiations should never begin until some prior
(standard) negotiation has established that both parties are capable
of parsing the expanded syntax.

In summary, WILL XXX is sent, by either party, to indicate that
party's desire (offer) to begin performing option XXX, DO XXX and
DON'T XXX being its positive and negative acknowledgments; similarly,
DO XXX is sent to indicate a desire (request) that the other party
(i.e., the recipient of the DO) begin performing option XXX, WILL XXX
and WON'T XXX being the positive and negative acknowledgments. Since
the NVT is what is left when no options are enabled, the DON'T and
WON'T responses are guaranteed to leave the connection in a state
which both ends can handle. Thus, all hosts may implement their
TELNET processes to be totally unaware of options that are not
supported, simply returning a rejection to (i.e., refusing) any
option request that cannot be understood.

As much as possible, the TELNET protocol has been made server-user
symmetrical so that it easily and naturally covers the user-user
(linking) and server-server (cooperating processes) cases. It is
hoped, but not absolutely required, that options will further this
intent. In any case, it is explicitly acknowledged that symmetry is
an operating principle rather than an ironclad rule.

A companion document, "TELNET Option Specifications," should be
consulted for information about the procedure for establishing new
options.

THE NETWORK VIRTUAL TERMINAL

The Network Virtual Terminal (NVT) is a bi-directional character
device. The NVT has a printer and a keyboard. The printer responds
to incoming data and the keyboard produces outgoing data which is
sent over the TELNET connection and, if "echoes" are desired, to the
NVT's printer as well. "Echoes" will not be expected to traverse the
network (although options exist to enable a "remote" echoing mode of
operation, no host is required to implement this option). The code
set is seven-bit USASCII in an eight-bit field, except as modified
herein. Any code conversion and timing considerations are local
problems and do not affect the NVT.

TRANSMISSION OF DATA

Although a TELNET connection through the network is intrinsically
full duplex, the NVT is to be viewed as a half-duplex device
operating in a line-buffered mode. That is, unless and until




Postel & Reynolds [Page 4]



RFC 854 May 1983


options are negotiated to the contrary, the following default
conditions pertain to the transmission of data over the TELNET
connection:

1) Insofar as the availability of local buffer space permits,
data should be accumulated in the host where it is generated
until a complete line of data is ready for transmission, or
until some locally-defined explicit signal to transmit occurs.
This signal could be generated either by a process or by a
human user.

The motivation for this rule is the high cost, to some hosts,
of processing network input interrupts, coupled with the
default NVT specification that "echoes" do not traverse the
network. Thus, it is reasonable to buffer some amount of data
at its source. Many systems take some processing action at the
end of each input line (even line printers or card punches
frequently tend to work this way), so the transmission should
be triggered at the end of a line. On the other hand, a user
or process may sometimes find it necessary or desirable to
provide data which does not terminate at the end of a line;
therefore implementers are cautioned to provide methods of
locally signaling that all buffered data should be transmitted
immediately.

2) When a process has completed sending data to an NVT printer
and has no queued input from the NVT keyboard for further
processing (i.e., when a process at one end of a TELNET
connection cannot proceed without input from the other end),
the process must transmit the TELNET Go Ahead (GA) command.

This rule is not intended to require that the TELNET GA command
be sent from a terminal at the end of each line, since server
hosts do not normally require a special signal (in addition to
end-of-line or other locally-defined characters) in order to
commence processing. Rather, the TELNET GA is designed to help
a user's local host operate a physically half duplex terminal
which has a "lockable" keyboard such as the IBM 2741. A
description of this type of terminal may help to explain the
proper use of the GA command.

The terminal-computer connection is always under control of
either the user or the computer. Neither can unilaterally
seize control from the other; rather the controlling end must
relingui*beep*s control explicitly. At the terminal end, the
hardware is constructed so as to relinquish control each time
that a "line" is terminated (i.e., when the "New Line" key is
typed by the user). When this occurs, the attached (local)


Postel & Reynolds [Page 5]



RFC 854 May 1983


computer processes the input data, decides if output should be
generated, and if not returns control to the terminal. If
output should be generated, control is retained by the computer
until all output has been transmitted.

The difficulties of using this type of terminal through the
network should be obvious. The "local" computer is no longer
able to decide whether to retain control after seeing an
end-of-line signal or not; this decision can only be made by
the "remote" computer which is processing the data. Therefore,
the TELNET GA command provides a mechanism whereby the "remote"
(server) computer can signal the "local" (user) computer that
it is time to pass control to the user of the terminal. It
should be transmitted at those times, and only at those times,
when the user should be given control of the terminal. Note
that premature transmission of the GA command may result in the
blocking of output, since the user is likely to assume that the
transmitting system has paused, and therefore he will fail to
turn the line around manually.

The foregoing, of course, does not apply to the user-to-server
direction of communication. In this direction, GAs may be sent at
any time, but need not ever be sent. Also, if the TELNET
connection is being used for process-to-process communication, GAs
need not be sent in either direction. Finally, for
terminal-to-terminal communication, GAs may be required in
neither, one, or both directions. If a host plans to support
terminal-to-terminal communication it is suggested that the host
provide the user with a means of manually signaling that it is
time for a GA to be sent over the TELNET connection; this,
however, is not a requirement on the implementer of a TELNET
process.

Note that the symmetry of the TELNET model requires that there is
an NVT at each end of the TELNET connection, at least
conceptually.

STANDARD REPRESENTATION OF CONTROL FUNCTIONS

As stated in the Introduction to this document, the primary goal
of the TELNET protocol is the provision of a standard interfacing
of terminal devices and terminal-oriented processes through the
network. Early experiences with this type of interconnection have
shown that certain functions are implemented by most servers, but
that the methods of invoking these functions differ widely. For a
human user who interacts with several server systems, these
differences are highly frustrating. TELNET, therefore, defines a
standard representation for five of these functions, as described


Postel & Reynolds [Page 6]



RFC 854 May 1983


below. These standard representations have standard, but not
required, meanings (with the exception that the Interrupt Process
(IP) function may be required by other protocols which use
TELNET); that is, a system which does not provide the function to
local users need not provide it to network users and may treat the
standard representation for the function as a No-operation. On
the other hand, a system which does provide the function to a
local user is obliged to provide the same function to a network
user who transmits the standard representation for the function.

Interrupt Process (IP)

Many systems provide a function which suspends, interrupts,
aborts, or terminates the operation of a user process. This
function is frequently used when a user believes his process is
in an unending loop, or when an unwanted process has been
inadvertently activated. IP is the standard representation for
invoking this function. It should be noted by implementers
that IP may be required by other protocols which use TELNET,
and therefore should be implemented if these other protocols
are to be supported.

Abort Output (AO)

Many systems provide a function which allows a process, which
is generating output, to run to completion (or to reach the
same stopping point it would reach if running to completion)
but without sending the output to the user's terminal.
Further, this function typically clears any output already
produced but not yet actually printed (or displayed) on the
user's terminal. AO is the standard representation for
invoking this function. For example, some subsystem might
normally accept a user's command, send a long text string to
the user's terminal in response, and finally signal readiness
to accept the next command by sending a "prompt" character
(preceded by <CR><LF>) to the user's terminal. If the AO were
received during the transmission of the text string, a
reasonable implementation would be to suppress the remainder of
the text string, but transmit the prompt character and the
preceding <CR><LF>. (This is possibly in distinction to the
action which might be taken if an IP were received; the IP
might cause suppression of the text string and an exit from the
subsystem.)

It should be noted, by server systems which provide this
function, that there may be buffers external to the system (in




Postel & Reynolds [Page 7]



RFC 854 May 1983


the network and the user's local host) which should be cleared;
the appropriate way to do this is to transmit the "Synch"
signal (described below) to the user system.

Are You There (AYT)

Many systems provide a function which provides the user with
some visible (e.g., printable) evidence that the system is
still up and running. This function may be invoked by the user
when the system is unexpectedly "silent" for a long time,
because of the unanticipated (by the user) length of a
computation, an unusually heavy system load, etc. AYT is the
standard representation for invoking this function.

Erase Character (EC)

Many systems provide a function which deletes the last
preceding undeleted character or "print position"* from the
stream of data being supplied by the user. This function is
typically used to edit keyboard input when typing mistakes are
made. EC is the standard representation for invoking this
function.

*NOTE: A "print position" may contain several characters
which are the result of overstrikes, or of sequences such as
<char1> BS <char2>...

Erase Line (EL)

Many systems provide a function which deletes all the data in
the current "line" of input. This function is typically used
to edit keyboard input. EL is the standard representation for
invoking this function.

THE TELNET "SYNCH" SIGNAL

Most time-sharing systems provide mechanisms which allow a
terminal user to regain control of a "runaway" process; the IP and
AO functions described above are examples of these mechanisms.
Such systems, when used locally, have access to all of the signals
supplied by the user, whether these are normal characters or
special "out of band" signals such as those supplied by the
teletype "BREAK" key or the IBM 2741 "ATTN" key. This is not
necessarily true when terminals are connected to the system
through the network; the network's flow control mechanisms may
cause such a signal to be buffered elsewhere, for example in the
user's host.



Postel & Reynolds [Page 8]



RFC 854 May 1983


To counter this problem, the TELNET "Synch" mechanism is
introduced. A Synch signal consists of a TCP Urgent notification,
coupled with the TELNET command DATA MARK. The Urgent
notification, which is not subject to the flow control pertaining
to the TELNET connection, is used to invoke special handling of
the data stream by the process which receives it. In this mode,
the data stream is immediately scanned for "interesting" signals
as defined below, discarding intervening data. The TELNET command
DATA MARK (DM) is the synchronizing mark in the data stream which
indicates that any special signal has already occurred and the
recipient can return to normal processing of the data stream.

The Synch is sent via the TCP send operation with the Urgent
flag set and the DM as the last (or only) data octet.

When several Synchs are sent in rapid succession, the Urgent
notifications may be merged. It is not possible to count Urgents
since the number received will be less than or equal the number
sent. When in normal mode, a DM is a no operation; when in urgent
mode, it signals the end of the urgent processing.

If TCP indicates the end of Urgent data before the DM is found,
TELNET should continue the special handling of the data stream
until the DM is found.

If TCP indicates more Urgent data after the DM is found, it can
only be because of a subsequent Synch. TELNET should continue
the special handling of the data stream until another DM is
found.

"Interesting" signals are defined to be: the TELNET standard
representations of IP, AO, and AYT (but not EC or EL); the local
analogs of these standard representations (if any); all other
TELNET commands; other site-defined signals which can be acted on
without delaying the scan of the data stream.

Since one effect of the SYNCH mechanism is the discarding of
essentially all characters (except TELNET commands) between the
sender of the Synch and its recipient, this mechanism is specified
as the standard way to clear the data path when that is desired.
For example, if a user at a terminal causes an AO to be
transmitted, the server which receives the AO (if it provides that
function at all) should return a Synch to the user.

Finally, just as the TCP Urgent notification is needed at the
TELNET level as an out-of-band signal, so other protocols which
make use of TELNET may require a TELNET command which can be
viewed as an out-of-band signal at a different level.


Postel & Reynolds [Page 9]



RFC 854 May 1983


By convention the sequence [IP, Synch] is to be used as such a
signal. For example, suppose that some other protocol, which uses
TELNET, defines the character string STOP analogously to the
TELNET command AO. Imagine that a user of this protocol wishes a
server to process the STOP string, but the connection is blocked
because the server is processing other commands. The user should
instruct his system to:

1. Send the TELNET IP character;

2. Send the TELNET SYNC sequence, that is:

Send the Data Mark (DM) as the only character
in a TCP urgent mode send operation.

3. Send the character string STOP; and

4. Send the other protocol's analog of the TELNET DM, if any.

The user (or process acting on his behalf) must transmit the
TELNET SYNCH sequence of step 2 above to ensure that the TELNET IP
gets through to the server's TELNET interpreter.

The Urgent should wake up the TELNET process; the IP should
wake up the next higher level process.

THE NVT PRINTER AND KEYBOARD

The NVT printer has an unspecified carriage width and page length
and can produce representations of all 95 USASCII graphics (codes
32 through 126). Of the 33 USASCII control codes (0 through 31
and 127), and the 128 uncovered codes (128 through 255), the
following have specified meaning to the NVT printer:

NAME CODE MEANING

NULL (NUL) 0 No Operation
Line Feed (LF) 10 Moves the printer to the
next print line, keeping the
same horizontal position.
Carriage Return (CR) 13 Moves the printer to the left
margin of the current line.








Postel & Reynolds [Page 10]



RFC 854 May 1983


In addition, the following codes shall have defined, but not
required, effects on the NVT printer. Neither end of a TELNET
connection may assume that the other party will take, or will
have taken, any particular action upon receipt or transmission
of these:

BELL (BEL) 7 Produces an audible or
visible signal (which does
NOT move the print head).
Back Space (BS) 8 Moves the print head one
character position towards
the left margin.
Horizontal Tab (HT) 9 Moves the printer to the
next horizontal tab stop.
It remains unspecified how
either party determines or
establishes where such tab
stops are located.
Vertical Tab (VT) 11 Moves the printer to the
next vertical tab stop. It
remains unspecified how
either party determines or
establishes where such tab
stops are located.
Form Feed (FF) 12 Moves the printer to the top
of the next page, keeping
the same horizontal position.

All remaining codes do not cause the NVT printer to take any
action.

The sequence "CR LF", as defined, will cause the NVT to be
positioned at the left margin of the next print line (as would,
for example, the sequence "LF CR"). However, many systems and
terminals do not treat CR and LF independently, and will have to
go to some effort to simulate their effect. (For example, some
terminals do not have a CR independent of the LF, but on such
terminals it may be possible to simulate a CR by backspacing.)
Therefore, the sequence "CR LF" must be treated as a single "new
line" character and used whenever their combined action is
intended; the sequence "CR NUL" must be used where a carriage
return alone is actually desired; and the CR character must be
avoided in other contexts. This rule gives assurance to systems
which must decide whether to perform a "new line" function or a
multiple-backspace that the TELNET stream contains a character
following a CR that will allow a rational decision.

Note that "CR LF" or "CR NUL" is required in both directions


Postel & Reynolds [Page 11]



RFC 854 May 1983


(in the default ASCII mode), to preserve the symmetry of the
NVT model. Even though it may be known in some situations
(e.g., with remote echo and suppress go ahead options in
effect) that characters are not being sent to an actual
printer, nonetheless, for the sake of consistency, the protocol
requires that a NUL be inserted following a CR not followed by
a LF in the data stream. The converse of this is that a NUL
received in the data stream after a CR (in the absence of
options negotiations which explicitly specify otherwise) should
be stripped out prior to applying the NVT to local character
set mapping.

The NVT keyboard has keys, or key combinations, or key sequences,
for generating all 128 USASCII codes. Note that although many
have no effect on the NVT printer, the NVT keyboard is capable of
generating them.

In addition to these codes, the NVT keyboard shall be capable of
generating the following additional codes which, except as noted,
have defined, but not reguired, meanings. The actual code
assignments for these "characters" are in the TELNET Command
section, because they are viewed as being, in some sense, generic
and should be available even when the data stream is interpreted
as being some other character set.

Synch

This key allows the user to clear his data path to the other
party. The activation of this key causes a DM (see command
section) to be sent in the data stream and a TCP Urgent
notification is associated with it. The pair DM-Urgent is to
have required meaning as defined previously.

Break (BRK)

This code is provided because it is a signal outside the
USASCII set which is currently given local meaning within many
systems. It is intended to indicate that the Break Key or the
Attention Key wa*beep*. Note, however, that this is intended to
provide a 129th code for systems which require it, not as a
synonym for the IP standard representation.

Interrupt Process (IP)

Suspend, interrupt, abort or terminate the process to which the
NVT is connected. Also, part of the out-of-band signal for
other protocols which use TELNET.



Postel & Reynolds [Page 12]



RFC 854 May 1983


Abort Output (AO)

Allow the current process to (appear to) run to completion, but
do not send its output to the user. Also, send a Synch to the
user.

Are You There (AYT)

Send back to the NVT some visible (i.e., printable) evidence
that the AYT was received.

Erase Character (EC)

The recipient should delete the last preceding undeleted
character or "print position" from the data stream.

Erase Line (EL)

The recipient should delete characters from the data stream
back to, but not including, the last "CR LF" sequence sent over
the TELNET connection.

The spirit of these "extra" keys, and also the printer format
effectors, is that they should represent a natural extension of
the mapping that already must be done from "NVT" into "local".
Just as the NVT data byte 68 (104 octal) should be mapped into
whatever the local code for "uppercase D" is, so the EC character
should be mapped into whatever the local "Erase Character"
function is. Further, just as the mapping for 124 (174 octal) is
somewhat arbitrary in an environment that has no "vertical bar"
character, the EL character may have a somewhat arbitrary mapping
(or none at all) if there is no local "Erase Line" facility.
Similarly for format effectors: if the terminal actually does
have a "Vertical Tab", then the mapping for VT is obvious, and
only when the terminal does not have a vertical tab should the
effect of VT be unpredictable.

TELNET COMMAND STRUCTURE

All TELNET commands consist of at least a two byte sequence: the
"Interpret as Command" (IAC) escape character followed by the code
for the command. The commands dealing with option negotiation are
three byte sequences, the third byte being the code for the option
referenced. This format was chosen so that as more comprehensive use
of the "data space" is made -- by negotiations from the basic NVT, of
course -- collisions of data bytes with reserved command values will
be minimized, all such collisions requiring the inconvenience, and



Postel & Reynolds [Page 13]



RFC 854 May 1983


inefficiency, of "escaping" the data bytes into the stream. With the
current set-up, only the IAC need be doubled to be sent as data, and
the other 255 codes may be passed transparently.

The following are the defined TELNET commands. Note that these codes
and code sequences have the indicated meaning only when immediately
preceded by an IAC.

NAME CODE MEANING

SE 240 End of subnegotiation parameters.
NOP 241 No operation.
Data Mark 242 The data stream portion of a Synch.
This should always be accompanied
by a TCP Urgent notification.
Break 243 NVT character BRK.
Interrupt Process 244 The function IP.
Abort output 245 The function AO.
Are You There 246 The function AYT.
Erase character 247 The function EC.
Erase Line 248 The function EL.
Go ahead 249 The GA signal.
SB 250 Indicates that what follows is
subnegotiation of the indicated
option.
WILL (option code) 251 Indicates the desire to begin
performing, or confirmation that
you are now performing, the
indicated option.
WON'T (option code) 252 Indicates the refusal to perform,
or continue performing, the
indicated option.
DO (option code) 253 Indicates the request that the
other party perform, or
confirmation that you are expecting
the other party to perform, the
indicated option.
DON'T (option code) 254 Indicates the demand that the
other party stop performing,
or confirmation that you are no
longer expecting the other party
to perform, the indicated option.
IAC 255 Data Byte 255.







Postel & Reynolds [Page 14]



RFC 854 May 1983


CONNECTION ESTABLISHMENT

The TELNET TCP connection is established between the user's port U
and the server's port L. The server listens on its well known port L
for such connections. Since a TCP connection is full duplex and
identified by the pair of ports, the server can engage in many
simultaneous connections involving its port L and different user
ports U.

Port Assignment

When used for remote user access to service hosts (i.e., remote
terminal access) this protocol is assigned server port 23
(27 octal). That is L=23.




































Postel & Reynolds [Page 15]


04:33:12 Sep 17th 08 - Mr. Heiro:

and thats that, so will all of you grow up and stop bickering, cause what i just posted is as relevant to this game as your conversations....


04:39:25 Sep 17th 08 - Duke Spud:

Reported...


04:41:11 Sep 17th 08 - Lord Charley Deallus:

Wha??? Dang now it takes me more effort to scroll down...this angers me! Flame!


04:43:45 Sep 17th 08 - Mr. Heiro:

so have all the racial and anti-homosexual slurs your kingdoms mates have been posting  im the leader of a human rights group and have no interest in hearing such things  you guys should be ashamed of yourselfs  grow up


04:44:16 Sep 17th 08 - Duke Spud:

Mr. Heiro

Report


9/17/2008 11:33:12 AM
and thats that, so will all of you grow up and stop bickering, cause what i just posted is as relevant to this game as your conversations....

 

Your completely wrong. This thread is called Zetamania wars... wars on Zetamania (Physical AND VERBAL).

Please, do youself a favor and never do that again....


04:47:01 Sep 17th 08 - Mr. Heiro:

so have all the racial and anti-homosexual slurs your kingdoms mates
have been posting  im the leader of a human rights group and have no
interest in hearing such things  you guys should be ashamed of
yourselfs  grow up


04:48:33 Sep 17th 08 - Lord Charley Deallus:

Mr. Heiro

Report


9/16/2008 11:47:01 PM
so have all the racial and anti-homosexual slurs your kingdoms mates
have been posting  im the leader of a human rights group and have no
interest in hearing such things  you guys should be ashamed of
yourselfs  grow up
I am guessing I am not part of the "growing up" part since I was discriminated against -_-


[Top]  Pages:  (back) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 (next) 30

Login
Username: Don't have an account - Sign up!
Password: Forgot your password - Retrive it!

My bookmarksOld forum design


- close -
  Copyright © 1999-2024 Visual Utopia. All rights reserved. Page loaded in 0.06 seconds. Server time: 12:28:54 PM