]>
Commit | Line | Data |
---|---|---|
3c0ef626 | 1 | This file is part of the OpenSSH software. |
2 | ||
3 | The licences which components of this software fall under are as | |
4 | follows. First, we will summarize and say that all components | |
5 | are under a BSD licence, or a licence more free than that. | |
6 | ||
7 | OpenSSH contains no GPL code. | |
8 | ||
9 | 1) | |
10 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | |
11 | * All rights reserved | |
12 | * | |
13 | * As far as I am concerned, the code I have written for this software | |
14 | * can be used freely for any purpose. Any derived versions of this | |
15 | * software must be clearly marked as such, and if the derived work is | |
16 | * incompatible with the protocol description in the RFC file, it must be | |
17 | * called by a name other than "ssh" or "Secure Shell". | |
18 | ||
19 | [Tatu continues] | |
20 | * However, I am not implying to give any licenses to any patents or | |
21 | * copyrights held by third parties, and the software includes parts that | |
22 | * are not under my direct control. As far as I know, all included | |
23 | * source code is used in accordance with the relevant license agreements | |
24 | * and can be used freely for any purpose (the GNU license being the most | |
25 | * restrictive); see below for details. | |
26 | ||
27 | [However, none of that term is relevant at this point in time. All of | |
28 | these restrictively licenced software components which he talks about | |
29 | have been removed from OpenSSH, i.e., | |
30 | ||
31 | - RSA is no longer included, found in the OpenSSL library | |
32 | - IDEA is no longer included, its use is deprecated | |
33 | - DES is now external, in the OpenSSL library | |
34 | - GMP is no longer used, and instead we call BN code from OpenSSL | |
35 | - Zlib is now external, in a library | |
36 | - The make-ssh-known-hosts script is no longer included | |
37 | - TSS has been removed | |
38 | - MD5 is now external, in the OpenSSL library | |
39 | - RC4 support has been replaced with ARC4 support from OpenSSL | |
40 | - Blowfish is now external, in the OpenSSL library | |
41 | ||
42 | [The licence continues] | |
43 | ||
44 | Note that any information and cryptographic algorithms used in this | |
45 | software are publicly available on the Internet and at any major | |
46 | bookstore, scientific library, and patent office worldwide. More | |
47 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | |
48 | ||
49 | The legal status of this program is some combination of all these | |
50 | permissions and restrictions. Use only at your own responsibility. | |
51 | You will be responsible for any legal consequences yourself; I am not | |
52 | making any claims whether possessing or using this is legal or not in | |
53 | your country, and I am not taking any responsibility on your behalf. | |
54 | ||
55 | ||
56 | NO WARRANTY | |
57 | ||
58 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | |
59 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | |
60 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | |
61 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | |
62 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |
63 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | |
64 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | |
65 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | |
66 | REPAIR OR CORRECTION. | |
67 | ||
68 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | |
69 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | |
70 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | |
71 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | |
72 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | |
73 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | |
74 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | |
75 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | |
76 | POSSIBILITY OF SUCH DAMAGES. | |
77 | ||
78 | 2) | |
79 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | |
80 | Comments in the file indicate it may be used for any purpose without | |
81 | restrictions: | |
82 | ||
83 | * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or | |
84 | * code or tables extracted from it, as desired without restriction. | |
85 | ||
86 | 3) | |
87 | The 32-bit CRC compensation attack detector in deattack.c was | |
88 | contributed by CORE SDI S.A. under a BSD-style license. | |
89 | ||
90 | * Cryptographic attack detector for ssh - source code | |
91 | * | |
92 | * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. | |
93 | * | |
94 | * All rights reserved. Redistribution and use in source and binary | |
95 | * forms, with or without modification, are permitted provided that | |
96 | * this copyright notice is retained. | |
97 | * | |
98 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED | |
99 | * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE | |
100 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR | |
101 | * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS | |
102 | * SOFTWARE. | |
103 | * | |
104 | * Ariel Futoransky <futo@core-sdi.com> | |
105 | * <http://www.core-sdi.com> | |
106 | ||
107 | 4) | |
108 | ssh-keygen was contributed by David Mazieres under a BSD-style | |
109 | license. | |
110 | ||
111 | * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. | |
112 | * | |
113 | * Modification and redistribution in source and binary forms is | |
114 | * permitted provided that due credit is given to the author and the | |
115 | * OpenBSD project by leaving this copyright notice intact. | |
116 | ||
117 | 5) | |
118 | The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers | |
119 | and Paulo Barreto is in the public domain and distributed | |
120 | with the following license: | |
121 | ||
122 | * @version 3.0 (December 2000) | |
123 | * | |
124 | * Optimised ANSI C code for the Rijndael cipher (now AES) | |
125 | * | |
126 | * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> | |
127 | * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> | |
128 | * @author Paulo Barreto <paulo.barreto@terra.com.br> | |
129 | * | |
130 | * This code is hereby placed in the public domain. | |
131 | * | |
132 | * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS | |
133 | * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED | |
134 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
135 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE | |
136 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
137 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
138 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR | |
139 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, | |
140 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE | |
141 | * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, | |
142 | * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
e9a17296 | 143 | |
3c0ef626 | 144 | 6) |
e9a17296 | 145 | One component of the ssh source code is under a 4-clause BSD license, |
146 | held by the University of California, since we pulled these parts from | |
147 | original Berkeley code. The Regents of the University of California | |
148 | have declared that term 3 is no longer enforceable on their source code, | |
149 | but we retain that license as is. | |
150 | ||
151 | * Copyright (c) 1983, 1990, 1992, 1993, 1995 | |
152 | * The Regents of the University of California. All rights reserved. | |
153 | * | |
154 | * Redistribution and use in source and binary forms, with or without | |
155 | * modification, are permitted provided that the following conditions | |
156 | * are met: | |
157 | * 1. Redistributions of source code must retain the above copyright | |
158 | * notice, this list of conditions and the following disclaimer. | |
159 | * 2. Redistributions in binary form must reproduce the above copyright | |
160 | * notice, this list of conditions and the following disclaimer in the | |
161 | * documentation and/or other materials provided with the distribution. | |
162 | * 3. All advertising materials mentioning features or use of this software | |
163 | * must display the following acknowledgement: | |
164 | * This product includes software developed by the University of | |
165 | * California, Berkeley and its contributors. | |
166 | * 4. Neither the name of the University nor the names of its contributors | |
167 | * may be used to endorse or promote products derived from this software | |
168 | * without specific prior written permission. | |
169 | * | |
170 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
171 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
172 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
173 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
174 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
175 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
176 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
177 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
178 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
179 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
180 | * SUCH DAMAGE. | |
181 | ||
182 | 7) | |
3c0ef626 | 183 | Remaining components of the software are provided under a standard |
184 | 2-term BSD licence with the following names as copyright holders: | |
185 | ||
186 | Markus Friedl | |
187 | Theo de Raadt | |
188 | Niels Provos | |
189 | Dug Song | |
190 | Aaron Campbell | |
191 | Damien Miller | |
192 | Kevin Steves | |
2980ea68 | 193 | Daniel Kouril |
3c0ef626 | 194 | |
195 | * Redistribution and use in source and binary forms, with or without | |
196 | * modification, are permitted provided that the following conditions | |
197 | * are met: | |
198 | * 1. Redistributions of source code must retain the above copyright | |
199 | * notice, this list of conditions and the following disclaimer. | |
200 | * 2. Redistributions in binary form must reproduce the above copyright | |
201 | * notice, this list of conditions and the following disclaimer in the | |
202 | * documentation and/or other materials provided with the distribution. | |
203 | * | |
204 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | |
205 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | |
206 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | |
207 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | |
208 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
209 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
210 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
211 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
212 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | |
213 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |