Kevin Steves | d85bf4b | 2001-02-11 16:43:05 +0000 | [diff] [blame] | 1 | This file is part of the OpenSSH software. |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 2 | |
Kevin Steves | d85bf4b | 2001-02-11 16:43:05 +0000 | [diff] [blame] | 3 | The licences which components of this software fall under are as |
| 4 | follows. First, we will summarize and say that all components |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 5 | are under a BSD licence, or a licence more free than that. |
| 6 | |
| 7 | OpenSSH contains no GPL code. |
| 8 | |
| 9 | 1) |
| 10 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| 11 | * All rights reserved |
| 12 | * |
| 13 | * As far as I am concerned, the code I have written for this software |
| 14 | * can be used freely for any purpose. Any derived versions of this |
| 15 | * software must be clearly marked as such, and if the derived work is |
| 16 | * incompatible with the protocol description in the RFC file, it must be |
| 17 | * called by a name other than "ssh" or "Secure Shell". |
| 18 | |
| 19 | [Tatu continues] |
| 20 | * However, I am not implying to give any licenses to any patents or |
| 21 | * copyrights held by third parties, and the software includes parts that |
| 22 | * are not under my direct control. As far as I know, all included |
| 23 | * source code is used in accordance with the relevant license agreements |
| 24 | * and can be used freely for any purpose (the GNU license being the most |
| 25 | * restrictive); see below for details. |
| 26 | |
| 27 | [However, none of that term is relevant at this point in time. All of |
| 28 | these restrictively licenced software components which he talks about |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 29 | have been removed from OpenSSH, i.e., |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 30 | |
| 31 | - RSA is no longer included, found in the OpenSSL library |
Kevin Steves | d85bf4b | 2001-02-11 16:43:05 +0000 | [diff] [blame] | 32 | - IDEA is no longer included, its use is deprecated |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 33 | - DES is now external, in the OpenSSL library |
| 34 | - GMP is no longer used, and instead we call BN code from OpenSSL |
| 35 | - Zlib is now external, in a library |
| 36 | - The make-ssh-known-hosts script is no longer included |
| 37 | - TSS has been removed |
| 38 | - MD5 is now external, in the OpenSSL library |
| 39 | - RC4 support has been replaced with ARC4 support from OpenSSL |
| 40 | - Blowfish is now external, in the OpenSSL library |
| 41 | |
| 42 | [The licence continues] |
| 43 | |
| 44 | Note that any information and cryptographic algorithms used in this |
| 45 | software are publicly available on the Internet and at any major |
| 46 | bookstore, scientific library, and patent office worldwide. More |
| 47 | information can be found e.g. at "http://www.cs.hut.fi/crypto". |
| 48 | |
| 49 | The legal status of this program is some combination of all these |
| 50 | permissions and restrictions. Use only at your own responsibility. |
| 51 | You will be responsible for any legal consequences yourself; I am not |
| 52 | making any claims whether possessing or using this is legal or not in |
| 53 | your country, and I am not taking any responsibility on your behalf. |
| 54 | |
| 55 | |
| 56 | NO WARRANTY |
| 57 | |
| 58 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY |
| 59 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
| 60 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
| 61 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
| 62 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| 63 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
| 64 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
| 65 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
| 66 | REPAIR OR CORRECTION. |
| 67 | |
| 68 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
| 69 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR |
| 70 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
| 71 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING |
| 72 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED |
| 73 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY |
| 74 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER |
| 75 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE |
| 76 | POSSIBILITY OF SUCH DAMAGES. |
| 77 | |
| 78 | 2) |
| 79 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. |
| 80 | Comments in the file indicate it may be used for any purpose without |
| 81 | restrictions: |
| 82 | |
| 83 | * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or |
| 84 | * code or tables extracted from it, as desired without restriction. |
| 85 | |
| 86 | 3) |
| 87 | The 32-bit CRC compensation attack detector in deattack.c was |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 88 | contributed by CORE SDI S.A. under a BSD-style license. |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 89 | |
| 90 | * Cryptographic attack detector for ssh - source code |
| 91 | * |
| 92 | * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. |
| 93 | * |
| 94 | * All rights reserved. Redistribution and use in source and binary |
| 95 | * forms, with or without modification, are permitted provided that |
| 96 | * this copyright notice is retained. |
| 97 | * |
| 98 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED |
| 99 | * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE |
| 100 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR |
| 101 | * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS |
| 102 | * SOFTWARE. |
| 103 | * |
| 104 | * Ariel Futoransky <futo@core-sdi.com> |
| 105 | * <http://www.core-sdi.com> |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 106 | |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 107 | 4) |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 108 | ssh-keygen was contributed by David Mazieres under a BSD-style |
| 109 | license. |
| 110 | |
| 111 | * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
| 112 | * |
| 113 | * Modification and redistribution in source and binary forms is |
| 114 | * permitted provided that due credit is given to the author and the |
| 115 | * OpenBSD project by leaving this copyright notice intact. |
| 116 | |
| 117 | 5) |
Ben Lindstrom | bffa1cb | 2001-09-23 13:58:38 +0000 | [diff] [blame] | 118 | The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers |
| 119 | and Paulo Barreto is in the public domain and distributed |
| 120 | with the following license: |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 121 | |
Ben Lindstrom | bffa1cb | 2001-09-23 13:58:38 +0000 | [diff] [blame] | 122 | * @version 3.0 (December 2000) |
| 123 | * |
| 124 | * Optimised ANSI C code for the Rijndael cipher (now AES) |
| 125 | * |
| 126 | * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> |
| 127 | * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> |
| 128 | * @author Paulo Barreto <paulo.barreto@terra.com.br> |
| 129 | * |
| 130 | * This code is hereby placed in the public domain. |
| 131 | * |
| 132 | * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS |
| 133 | * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| 134 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 135 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE |
| 136 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 137 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 138 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
| 139 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
| 140 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
| 141 | * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, |
| 142 | * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
Damien Miller | 6448ec6 | 2002-02-13 16:48:45 +1100 | [diff] [blame] | 143 | |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 144 | 6) |
Damien Miller | 6448ec6 | 2002-02-13 16:48:45 +1100 | [diff] [blame] | 145 | One component of the ssh source code is under a 4-clause BSD license, |
| 146 | held by the University of California, since we pulled these parts from |
| 147 | original Berkeley code. The Regents of the University of California |
| 148 | have declared that term 3 is no longer enforceable on their source code, |
| 149 | but we retain that license as is. |
| 150 | |
Kevin Steves | 664b243 | 2002-03-05 18:03:10 +0000 | [diff] [blame] | 151 | * Copyright (c) 1983, 1990, 1992, 1993, 1995 |
Damien Miller | 6448ec6 | 2002-02-13 16:48:45 +1100 | [diff] [blame] | 152 | * The Regents of the University of California. All rights reserved. |
| 153 | * |
| 154 | * Redistribution and use in source and binary forms, with or without |
| 155 | * modification, are permitted provided that the following conditions |
| 156 | * are met: |
| 157 | * 1. Redistributions of source code must retain the above copyright |
| 158 | * notice, this list of conditions and the following disclaimer. |
| 159 | * 2. Redistributions in binary form must reproduce the above copyright |
| 160 | * notice, this list of conditions and the following disclaimer in the |
| 161 | * documentation and/or other materials provided with the distribution. |
| 162 | * 3. All advertising materials mentioning features or use of this software |
| 163 | * must display the following acknowledgement: |
| 164 | * This product includes software developed by the University of |
| 165 | * California, Berkeley and its contributors. |
| 166 | * 4. Neither the name of the University nor the names of its contributors |
| 167 | * may be used to endorse or promote products derived from this software |
| 168 | * without specific prior written permission. |
| 169 | * |
| 170 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| 171 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 172 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 173 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| 174 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 175 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 176 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 177 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 178 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 179 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 180 | * SUCH DAMAGE. |
| 181 | |
| 182 | 7) |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 183 | Remaining components of the software are provided under a standard |
| 184 | 2-term BSD licence with the following names as copyright holders: |
| 185 | |
| 186 | Markus Friedl |
| 187 | Theo de Raadt |
| 188 | Niels Provos |
| 189 | Dug Song |
| 190 | Aaron Campbell |
Ben Lindstrom | 033e455 | 2001-09-18 05:36:27 +0000 | [diff] [blame] | 191 | Damien Miller |
| 192 | Kevin Steves |
Kevin Steves | 4408c20 | 2002-03-23 02:20:07 +0000 | [diff] [blame] | 193 | Daniel Kouril |
Ben Lindstrom | 47e1b40 | 2002-06-21 01:19:12 +0000 | [diff] [blame] | 194 | Per Allansson |
Damien Miller | 7294baa | 2000-09-30 14:40:39 +1100 | [diff] [blame] | 195 | |
| 196 | * Redistribution and use in source and binary forms, with or without |
| 197 | * modification, are permitted provided that the following conditions |
| 198 | * are met: |
| 199 | * 1. Redistributions of source code must retain the above copyright |
| 200 | * notice, this list of conditions and the following disclaimer. |
| 201 | * 2. Redistributions in binary form must reproduce the above copyright |
| 202 | * notice, this list of conditions and the following disclaimer in the |
| 203 | * documentation and/or other materials provided with the distribution. |
| 204 | * |
| 205 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 206 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 207 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 208 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 209 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 210 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 211 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 212 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 213 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 214 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |