[BACK]Return to LICENCE CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/LICENCE, Revision 1.1

1.1     ! deraadt     1: This file is part of the ssh software.
        !             2:
        !             3: The licences which components of this software falls under are as
        !             4: follows.  First, we will summarize and say that that all components
        !             5: are under a BSD licence, or a licence more free than that.
        !             6:
        !             7: OpenSSH contains no GPL code.
        !             8:
        !             9: 1)
        !            10:      * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
        !            11:      *                    All rights reserved
        !            12:      *
        !            13:      * As far as I am concerned, the code I have written for this software
        !            14:      * can be used freely for any purpose.  Any derived versions of this
        !            15:      * software must be clearly marked as such, and if the derived work is
        !            16:      * incompatible with the protocol description in the RFC file, it must be
        !            17:      * called by a name other than "ssh" or "Secure Shell".
        !            18:
        !            19:     [Tatu continues]
        !            20:      *  However, I am not implying to give any licenses to any patents or
        !            21:      * copyrights held by third parties, and the software includes parts that
        !            22:      * are not under my direct control.  As far as I know, all included
        !            23:      * source code is used in accordance with the relevant license agreements
        !            24:      * and can be used freely for any purpose (the GNU license being the most
        !            25:      * restrictive); see below for details.
        !            26:
        !            27:     [However, none of that term is relevant at this point in time.  All of
        !            28:     these restrictively licenced software components which he talks about
        !            29:     have been removed from OpenSSH, ie.
        !            30:
        !            31:      - RSA is no longer included, found in the OpenSSL library
        !            32:      - IDEA is no longer included, it's use is depricated
        !            33:      - DES is now external, in the OpenSSL library
        !            34:      - GMP is no longer used, and instead we call BN code from OpenSSL
        !            35:      - Zlib is now external, in a library
        !            36:      - The make-ssh-known-hosts script is no longer included
        !            37:      - TSS has been removed
        !            38:      - MD5 is now external, in the OpenSSL library
        !            39:      - RC4 support has been removed
        !            40:      - Blowfish is now external, in the OpenSSL library
        !            41:
        !            42:     [The licence continues]
        !            43:
        !            44:     Note that any information and cryptographic algorithms used in this
        !            45:     software are publicly available on the Internet and at any major
        !            46:     bookstore, scientific library, and patent office worldwide.  More
        !            47:     information can be found e.g. at "http://www.cs.hut.fi/crypto".
        !            48:
        !            49:     The legal status of this program is some combination of all these
        !            50:     permissions and restrictions.  Use only at your own responsibility.
        !            51:     You will be responsible for any legal consequences yourself; I am not
        !            52:     making any claims whether possessing or using this is legal or not in
        !            53:     your country, and I am not taking any responsibility on your behalf.
        !            54:
        !            55:
        !            56:                            NO WARRANTY
        !            57:
        !            58:     BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
        !            59:     FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
        !            60:     OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
        !            61:     PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
        !            62:     OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
        !            63:     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
        !            64:     TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
        !            65:     PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
        !            66:     REPAIR OR CORRECTION.
        !            67:
        !            68:     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
        !            69:     WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
        !            70:     REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
        !            71:     INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
        !            72:     OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
        !            73:     TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
        !            74:     YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
        !            75:     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
        !            76:     POSSIBILITY OF SUCH DAMAGES.
        !            77:
        !            78: 2)
        !            79:     The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
        !            80:     Comments in the file indicate it may be used for any purpose without
        !            81:     restrictions:
        !            82:
        !            83:      * COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or
        !            84:      * code or tables extracted from it, as desired without restriction.
        !            85:
        !            86: 3)
        !            87:     The 32-bit CRC compensation attack detector in deattack.c was
        !            88:     contributed by CORE SDI S.A. under a BSD-style license. See
        !            89:     http://www.core-sdi.com/english/ssh/ for details.
        !            90:
        !            91:      * Cryptographic attack detector for ssh - source code
        !            92:      *
        !            93:      * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
        !            94:      *
        !            95:      * All rights reserved. Redistribution and use in source and binary
        !            96:      * forms, with or without modification, are permitted provided that
        !            97:      * this copyright notice is retained.
        !            98:      *
        !            99:      * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
        !           100:      * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
        !           101:      * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
        !           102:      * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
        !           103:      * SOFTWARE.
        !           104:      *
        !           105:      * Ariel Futoransky <futo@core-sdi.com>
        !           106:      * <http://www.core-sdi.com>
        !           107:
        !           108: 4)
        !           109:     Remaining components of the software are provided under a standard
        !           110:     2-term BSD licence with the following names as copyright holders:
        !           111:
        !           112:        Markus Friedl
        !           113:        Theo de Raadt
        !           114:        Niels Provos
        !           115:        Dug Song
        !           116:        Aaron Campbell
        !           117:
        !           118:      * Redistribution and use in source and binary forms, with or without
        !           119:      * modification, are permitted provided that the following conditions
        !           120:      * are met:
        !           121:      * 1. Redistributions of source code must retain the above copyright
        !           122:      *    notice, this list of conditions and the following disclaimer.
        !           123:      * 2. Redistributions in binary form must reproduce the above copyright
        !           124:      *    notice, this list of conditions and the following disclaimer in the
        !           125:      *    documentation and/or other materials provided with the distribution.
        !           126:      *
        !           127:      * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
        !           128:      * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
        !           129:      * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
        !           130:      * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
        !           131:      * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
        !           132:      * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
        !           133:      * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
        !           134:      * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
        !           135:      * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
        !           136:      * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.