| This file is part of the ssh software. |
| |
| The licences which components of this software falls under are as |
| follows. First, we will summarize and say that that all components |
| are under a BSD licence, or a licence more free than that. |
| |
| OpenSSH contains no GPL code. |
| |
| 1) |
| * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| * All rights reserved |
| * |
| * As far as I am concerned, the code I have written for this software |
| * can be used freely for any purpose. Any derived versions of this |
| * software must be clearly marked as such, and if the derived work is |
| * incompatible with the protocol description in the RFC file, it must be |
| * called by a name other than "ssh" or "Secure Shell". |
| |
| [Tatu continues] |
| * However, I am not implying to give any licenses to any patents or |
| * copyrights held by third parties, and the software includes parts that |
| * are not under my direct control. As far as I know, all included |
| * source code is used in accordance with the relevant license agreements |
| * and can be used freely for any purpose (the GNU license being the most |
| * restrictive); see below for details. |
| |
| [However, none of that term is relevant at this point in time. All of |
| these restrictively licenced software components which he talks about |
| have been removed from OpenSSH, ie. |
| |
| - RSA is no longer included, found in the OpenSSL library |
| - IDEA is no longer included, it's use is depricated |
| - DES is now external, in the OpenSSL library |
| - GMP is no longer used, and instead we call BN code from OpenSSL |
| - Zlib is now external, in a library |
| - The make-ssh-known-hosts script is no longer included |
| - TSS has been removed |
| - MD5 is now external, in the OpenSSL library |
| - RC4 support has been replaced with ARC4 support from OpenSSL |
| - Blowfish is now external, in the OpenSSL library |
| |
| [The licence continues] |
| |
| Note that any information and cryptographic algorithms used in this |
| software are publicly available on the Internet and at any major |
| bookstore, scientific library, and patent office worldwide. More |
| information can be found e.g. at "http://www.cs.hut.fi/crypto". |
| |
| The legal status of this program is some combination of all these |
| permissions and restrictions. Use only at your own responsibility. |
| You will be responsible for any legal consequences yourself; I am not |
| making any claims whether possessing or using this is legal or not in |
| your country, and I am not taking any responsibility on your behalf. |
| |
| |
| NO WARRANTY |
| |
| BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY |
| FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
| OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
| PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
| OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
| TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
| PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
| REPAIR OR CORRECTION. |
| |
| IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
| WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR |
| REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
| INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING |
| OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED |
| TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY |
| YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER |
| PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE |
| POSSIBILITY OF SUCH DAMAGES. |
| |
| 2) |
| The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. |
| Comments in the file indicate it may be used for any purpose without |
| restrictions: |
| |
| * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or |
| * code or tables extracted from it, as desired without restriction. |
| |
| 3) |
| The 32-bit CRC compensation attack detector in deattack.c was |
| contributed by CORE SDI S.A. under a BSD-style license. See |
| http://www.core-sdi.com/english/ssh/ for details. |
| |
| * Cryptographic attack detector for ssh - source code |
| * |
| * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. |
| * |
| * All rights reserved. Redistribution and use in source and binary |
| * forms, with or without modification, are permitted provided that |
| * this copyright notice is retained. |
| * |
| * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED |
| * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE |
| * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR |
| * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS |
| * SOFTWARE. |
| * |
| * Ariel Futoransky <futo@core-sdi.com> |
| * <http://www.core-sdi.com> |
| |
| 4) |
| Remaining components of the software are provided under a standard |
| 2-term BSD licence with the following names as copyright holders: |
| |
| Markus Friedl |
| Theo de Raadt |
| Niels Provos |
| Dug Song |
| Aaron Campbell |
| |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |