[BACK]Return to COPYING.Ylonen CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/COPYING.Ylonen, Revision 1.1

1.1     ! deraadt     1: This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
        !             2:
        !             3:
        !             4: COPYING POLICY AND OTHER LEGAL ISSUES
        !             5:
        !             6: As far as I am concerned, the code I have written for this software
        !             7: can be used freely for any purpose.  Any derived versions of this
        !             8: software must be clearly marked as such, and if the derived work is
        !             9: incompatible with the protocol description in the RFC file, it must be
        !            10: called by a name other than "ssh" or "Secure Shell".
        !            11:
        !            12: However, I am not implying to give any licenses to any patents or
        !            13: copyrights held by third parties, and the software includes parts that
        !            14: are not under my direct control.  As far as I know, all included
        !            15: source code is used in accordance with the relevant license agreements
        !            16: and can be used freely for any purpose (the GNU license being the most
        !            17: restrictive); see below for details.
        !            18:
        !            19: [ IDEA is now *only* included if configured with --with-rsa. ]
        !            20: The RSA algorithm and even the concept of public key encryption are
        !            21: claimed to patented in the United States.  These patents may interfere
        !            22: with your right to use this software.  It is possible to compile the
        !            23: software using the RSAREF2 library by giving --with-rsaref on the
        !            24: configure command line.  This may or may not make it legal to use this
        !            25: software for non-commercial purposes in the United States (I have sent
        !            26: a query about this to RSADSI (on July 10, 1995), but have not received
        !            27: an answer yet).  The RSAREF2 distribution is not included in this
        !            28: distribution, but can be obtained from almost any ftp site worldwide
        !            29: containing cryptographic materials.  Using RSAREF is not recommended
        !            30: outside the United States.  See "http://www.cs.hut.fi/crypto" if you
        !            31: have trouble finding the RSAREF library.
        !            32:
        !            33: [ IDEA is now *only* included if configured with --with-idea. ]
        !            34: The IDEA algorithm is claimed to be patented in the United States and
        !            35: several other countries.  I have been told by Ascom-Tech (the patent
        !            36: holder) that IDEA can be used freely for non-commercial use.  A copy
        !            37: of their letter is at the end.  The software can be compiled without
        !            38: IDEA by specifying the --without-idea option on the configure command
        !            39: line.
        !            40:
        !            41: [ All these files are now external to the distribution. ]
        !            42: The DES implementation in this distribution is derived from the libdes
        !            43: library by Eric Young <eay@mincom.oz.au>.  It can be used under the
        !            44: Gnu General Public License (libdes-COPYING) or the Artistic License
        !            45: (libdes-ARTISTIC), at your option.  See libdes-README for more
        !            46: information.  Eric Young has kindly given permission to distribute the
        !            47: derived version under these terms.  The file crypt.c is fcrypt.c from
        !            48: SSLeay-0.4.3a by Eric Young; he permits free use.
        !            49:
        !            50: [ GMP is no longer part of the distribution. ]
        !            51: The GNU Multiple Precision Library, included in this release and
        !            52: linked into the executable, is distributed under the GNU General
        !            53: Public License.  A copy can be found in gmp-1.3.2/COPYING.
        !            54:
        !            55: [ Zlib is no longer part of the distribution. ]
        !            56: The zlib compression library is copyright Jean-loup Gailly and Mark
        !            57: Adler.  Anyone is permitted to use the library for any purpose.  A
        !            58: copy of the license conditions can be found in zlib095/README.
        !            59:
        !            60: [ This script is no longer part of the distribution. ]
        !            61: The make-ssh-known-hosts script was contributed by Tero Kivinen
        !            62: <kivinen@niksula.hut.fi> and is distributed under the GNU General
        !            63: Public License.  A copy can be found in gnu-COPYING-GPL.
        !            64:
        !            65: Some files, such as memmove.c and random.c, are owned by the Regents
        !            66: of the University of California, and can be freely used and
        !            67: distributed.  License terms are included in the affected files.  The
        !            68: file scp.c is derived from code owned by the Regents of the University
        !            69: of California, and can be used freely.
        !            70:
        !            71: [ TSS has been removed from the distribution. ]
        !            72: The TSS encryption algorithm implementation in tss.c is copyright Timo
        !            73: Rinne <tri@iki.fi> and Cirion Oy.  It is used with permission, and
        !            74: permission has been given for anyone to use it for any purpose as part
        !            75: of ssh.
        !            76:
        !            77: The MD5 implementation in md5.c was taken from PGP and is due to Colin
        !            78: Plumb.  Comments in the file indicate that it is in the public domain.
        !            79:
        !            80: The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
        !            81: Comments in the file indicate it may be used for any purpose without
        !            82: restrictions.
        !            83:
        !            84:
        !            85: In some countries, particularly France, Russia, Iraq, and Pakistan, it
        !            86: may be illegal to use any encryption at all without a special permit,
        !            87: and the rumor is that you cannot get a permit for any strong
        !            88: encryption.
        !            89:
        !            90: If you are in the United States, you should be aware that while this
        !            91: software was written outside the United States using information
        !            92: publicly available everywhere, the United States Government may
        !            93: consider it a criminal offence to export this software from the United
        !            94: States once it has been imported.  I have been told that "the federal
        !            95: mandatory sentencing guidelines for this offence are 41 to 51 months
        !            96: in federal prison".  The rumor is that the government considers
        !            97: putting the software available on an ftp site the same as exporting
        !            98: it.  Contact the Office of Defence Trade Controls if you need more
        !            99: information.  Also, please write to your congress and senate
        !           100: representatives to get these silly and unconstitutional restrictions
        !           101: dropped.
        !           102:
        !           103: Note that any information and cryptographic algorithms used in this
        !           104: software are publicly available on the Internet and at any major
        !           105: bookstore, scientific library, and patent office worldwide.  More
        !           106: information can be found e.g. at "http://www.cs.hut.fi/crypto".
        !           107:
        !           108: The legal status of this program is some combination of all these
        !           109: permissions and restrictions.  Use only at your own responsibility.
        !           110: You will be responsible for any legal consequences yourself; I am not
        !           111: making any claims whether possessing or using this is legal or not in
        !           112: your country, and I am not taking any responsibility on your behalf.
        !           113:
        !           114:
        !           115:                            NO WARRANTY
        !           116:
        !           117: BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
        !           118: FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
        !           119: OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
        !           120: PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
        !           121: OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
        !           122: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
        !           123: TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
        !           124: PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
        !           125: REPAIR OR CORRECTION.
        !           126:
        !           127: IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
        !           128: WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
        !           129: REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
        !           130: INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
        !           131: OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
        !           132: TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
        !           133: YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
        !           134: PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
        !           135: POSSIBILITY OF SUCH DAMAGES.
        !           136:
        !           137: ---------------------------------------------------------------------------
        !           138: Below is a copy of a message I received from Ascom, the holder of the IDEA
        !           139: patent.
        !           140:
        !           141: Date: Tue, 15 Aug 95 09:09:59 CET
        !           142: From: IDEA@ascom.ch (Licensing Systec)
        !           143: Encoding: 3001 Text
        !           144: To: ylo@cs.hut.fi
        !           145: Subject: Phone Call 15.8.95
        !           146:
        !           147:      Dear Mr. Ylonen
        !           148:
        !           149:      Thank you for your inquiry about the IDEA encryption algorithm.
        !           150:      Please excuse the delay in answering your fax sent 26.6.95.
        !           151:      Here is the information you requested :
        !           152:
        !           153:      Non commercial use of IDEA is free. The following examples (regarding
        !           154:      PGP) should clarify what we mean by commercial and non-commercial use
        !           155:
        !           156:      Here are some examples of commercial use of PGP:
        !           157:
        !           158:      1. When PGP is used for signing and/or encrypting e-mail messages
        !           159:      exchanged between two corporations.
        !           160:
        !           161:      2. When a consultant uses PGP for his communications with his client
        !           162:      corporations.
        !           163:
        !           164:      3. When a bank makes PGP available to its clients for telebanking and
        !           165:      charges them money for it (directly or indirectly).
        !           166:
        !           167:      4. When you use the software you receive from a company for commercial
        !           168:      purposes (telebanking included).
        !           169:
        !           170:
        !           171:      Some examples of non commercial use:
        !           172:
        !           173:      1. When an individual uses PGP for his private communications.
        !           174:
        !           175:      2. When an individual obtains PGP on the Internet and uses it for
        !           176:      telebanking (assuming this is approved by the bank).
        !           177:
        !           178:      3. When you use the software you receive from a company for private
        !           179:      purposes (telebanking excluded).
        !           180:
        !           181:
        !           182:      You may use IDEA freely within your software for non commercial use.
        !           183:      If you include IDEA in your software, it must include the following
        !           184:      copy right statement :
        !           185:
        !           186:      1. Copyright and Licensing Statement
        !           187:         IDEA(tm) is a trademark of Ascom Systec AG. There is no license fee
        !           188:         required for non-commercial use. Commercial users of IDEA may
        !           189:         obtain licensing information from Ascom Systec AG.
        !           190:         e-mail: IDEA@ascom.ch
        !           191:         fax: ++41 64 56 59 54
        !           192:
        !           193:
        !           194:      For selling the software commercially a product license is required:
        !           195:
        !           196:      The PRODUCT LICENSE gives a software developer the right to implement
        !           197:      IDEA in a software product and to sell this product worldwide. With
        !           198:      the PRODUCT LICENSE we supply a source listing in C and a software
        !           199:      manual. We charge an initial fee per company and a percentage of sales
        !           200:      of the software product or products (typically between .5 and 4 per
        !           201:      cent of the sales price, depending on the price and the importance of
        !           202:      IDEA for the product).
        !           203:
        !           204:
        !           205:      For further information please do not hesitate to contact us.
        !           206:
        !           207:      Best regards,
        !           208:
        !           209:      Roland Weinhart
        !           210:
        !           211:
        !           212:      Ascom Systec Ltd
        !           213:      IDEA Licensing                    @@@@@ @@@@@ @@@@@ @@@@@ @@@@@@@
        !           214:      Gewerbepark                           @ @     @     @   @ @  @  @
        !           215:      CH-5506 Maegenwil                 @@@@@ @@@@@ @     @   @ @  @  @
        !           216:      Switzerland                       @   @     @ @     @   @ @  @  @
        !           217:      Phone ++41 64 56 59 54            @@@@@ @@@@@ @@@@@ @@@@@ @  @  @
        !           218:      Fax   ++41 64 56 59 98
        !           219:
        !           220: