Annotation of src/usr.bin/ssh/COPYING.Ylonen, Revision 1.6
1.1 deraadt 1: This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
2:
3:
4: COPYING POLICY AND OTHER LEGAL ISSUES
5:
6: As far as I am concerned, the code I have written for this software
7: can be used freely for any purpose. Any derived versions of this
8: software must be clearly marked as such, and if the derived work is
9: incompatible with the protocol description in the RFC file, it must be
10: called by a name other than "ssh" or "Secure Shell".
11:
12: However, I am not implying to give any licenses to any patents or
13: copyrights held by third parties, and the software includes parts that
14: are not under my direct control. As far as I know, all included
15: source code is used in accordance with the relevant license agreements
16: and can be used freely for any purpose (the GNU license being the most
17: restrictive); see below for details.
18:
1.3 deraadt 19: [ RSA is no longer included. ]
1.2 deraadt 20: [ IDEA is no longer included. ]
21: [ DES is now external. ]
1.3 deraadt 22: [ GMP is now external. No more GNU licence. ]
1.2 deraadt 23: [ Zlib is now external. ]
24: [ The make-ssh-known-hosts script is no longer included. ]
25: [ TSS has been removed. ]
1.4 deraadt 26: [ MD5 is now external. ]
1.6 ! dugsong 27: [ RC4 support has been removed. ]
1.5 deraadt 28: [ Blowfish is now external. ]
1.1 deraadt 29:
30: The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
31: Comments in the file indicate it may be used for any purpose without
32: restrictions.
1.6 ! dugsong 33:
! 34: The 32-bit CRC compensation attack detector in deattack.c was
! 35: contributed by CORE SDI S.A. under a BSD-style license. See
! 36: http://www.core-sdi.com/english/ssh/ for details.
1.1 deraadt 37:
38: Note that any information and cryptographic algorithms used in this
39: software are publicly available on the Internet and at any major
40: bookstore, scientific library, and patent office worldwide. More
41: information can be found e.g. at "http://www.cs.hut.fi/crypto".
42:
43: The legal status of this program is some combination of all these
44: permissions and restrictions. Use only at your own responsibility.
45: You will be responsible for any legal consequences yourself; I am not
46: making any claims whether possessing or using this is legal or not in
47: your country, and I am not taking any responsibility on your behalf.
48:
49:
50: NO WARRANTY
51:
52: BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
53: FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
54: OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
55: PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
56: OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
57: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
58: TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
59: PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
60: REPAIR OR CORRECTION.
61:
62: IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
63: WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
64: REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
65: INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
66: OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
67: TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
68: YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
69: PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
70: POSSIBILITY OF SUCH DAMAGES.