137 lines
6.5 KiB
Plaintext
137 lines
6.5 KiB
Plaintext
This file is part of the OpenSSH software.
|
|
|
|
The licences which components of this software fall under are as
|
|
follows. First, we will summarize and say that all components
|
|
are under a BSD licence, or a licence more free than that.
|
|
|
|
OpenSSH contains no GPL code.
|
|
|
|
1)
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
|
|
[Tatu continues]
|
|
* However, I am not implying to give any licenses to any patents or
|
|
* copyrights held by third parties, and the software includes parts that
|
|
* are not under my direct control. As far as I know, all included
|
|
* source code is used in accordance with the relevant license agreements
|
|
* and can be used freely for any purpose (the GNU license being the most
|
|
* restrictive); see below for details.
|
|
|
|
[However, none of that term is relevant at this point in time. All of
|
|
these restrictively licenced software components which he talks about
|
|
have been removed from OpenSSH, ie.
|
|
|
|
- RSA is no longer included, found in the OpenSSL library
|
|
- IDEA is no longer included, its use is deprecated
|
|
- DES is now external, in the OpenSSL library
|
|
- GMP is no longer used, and instead we call BN code from OpenSSL
|
|
- Zlib is now external, in a library
|
|
- The make-ssh-known-hosts script is no longer included
|
|
- TSS has been removed
|
|
- MD5 is now external, in the OpenSSL library
|
|
- RC4 support has been replaced with ARC4 support from OpenSSL
|
|
- Blowfish is now external, in the OpenSSL library
|
|
|
|
[The licence continues]
|
|
|
|
Note that any information and cryptographic algorithms used in this
|
|
software are publicly available on the Internet and at any major
|
|
bookstore, scientific library, and patent office worldwide. More
|
|
information can be found e.g. at "http://www.cs.hut.fi/crypto".
|
|
|
|
The legal status of this program is some combination of all these
|
|
permissions and restrictions. Use only at your own responsibility.
|
|
You will be responsible for any legal consequences yourself; I am not
|
|
making any claims whether possessing or using this is legal or not in
|
|
your country, and I am not taking any responsibility on your behalf.
|
|
|
|
|
|
NO WARRANTY
|
|
|
|
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
|
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
|
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
|
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
|
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
|
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
|
REPAIR OR CORRECTION.
|
|
|
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
|
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
|
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
|
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
|
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
|
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
|
POSSIBILITY OF SUCH DAMAGES.
|
|
|
|
2)
|
|
The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
|
|
Comments in the file indicate it may be used for any purpose without
|
|
restrictions:
|
|
|
|
* COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
|
|
* code or tables extracted from it, as desired without restriction.
|
|
|
|
3)
|
|
The 32-bit CRC compensation attack detector in deattack.c was
|
|
contributed by CORE SDI S.A. under a BSD-style license. See
|
|
http://www.core-sdi.com/english/ssh/ for details.
|
|
|
|
* Cryptographic attack detector for ssh - source code
|
|
*
|
|
* Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
|
|
*
|
|
* All rights reserved. Redistribution and use in source and binary
|
|
* forms, with or without modification, are permitted provided that
|
|
* this copyright notice is retained.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
* WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
|
|
* CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
|
|
* SOFTWARE.
|
|
*
|
|
* Ariel Futoransky <futo@core-sdi.com>
|
|
* <http://www.core-sdi.com>
|
|
|
|
4)
|
|
Remaining components of the software are provided under a standard
|
|
2-term BSD licence with the following names as copyright holders:
|
|
|
|
Markus Friedl
|
|
Theo de Raadt
|
|
Niels Provos
|
|
Dug Song
|
|
Aaron Campbell
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|