Annotation of src/usr.bin/ssh/LICENCE, Revision 1.1
1.1 ! deraadt 1: This file is part of the ssh software.
! 2:
! 3: The licences which components of this software falls under are as
! 4: follows. First, we will summarize and say that that all components
! 5: are under a BSD licence, or a licence more free than that.
! 6:
! 7: OpenSSH contains no GPL code.
! 8:
! 9: 1)
! 10: * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
! 11: * All rights reserved
! 12: *
! 13: * As far as I am concerned, the code I have written for this software
! 14: * can be used freely for any purpose. Any derived versions of this
! 15: * software must be clearly marked as such, and if the derived work is
! 16: * incompatible with the protocol description in the RFC file, it must be
! 17: * called by a name other than "ssh" or "Secure Shell".
! 18:
! 19: [Tatu continues]
! 20: * However, I am not implying to give any licenses to any patents or
! 21: * copyrights held by third parties, and the software includes parts that
! 22: * are not under my direct control. As far as I know, all included
! 23: * source code is used in accordance with the relevant license agreements
! 24: * and can be used freely for any purpose (the GNU license being the most
! 25: * restrictive); see below for details.
! 26:
! 27: [However, none of that term is relevant at this point in time. All of
! 28: these restrictively licenced software components which he talks about
! 29: have been removed from OpenSSH, ie.
! 30:
! 31: - RSA is no longer included, found in the OpenSSL library
! 32: - IDEA is no longer included, it's use is depricated
! 33: - DES is now external, in the OpenSSL library
! 34: - GMP is no longer used, and instead we call BN code from OpenSSL
! 35: - Zlib is now external, in a library
! 36: - The make-ssh-known-hosts script is no longer included
! 37: - TSS has been removed
! 38: - MD5 is now external, in the OpenSSL library
! 39: - RC4 support has been removed
! 40: - Blowfish is now external, in the OpenSSL library
! 41:
! 42: [The licence continues]
! 43:
! 44: Note that any information and cryptographic algorithms used in this
! 45: software are publicly available on the Internet and at any major
! 46: bookstore, scientific library, and patent office worldwide. More
! 47: information can be found e.g. at "http://www.cs.hut.fi/crypto".
! 48:
! 49: The legal status of this program is some combination of all these
! 50: permissions and restrictions. Use only at your own responsibility.
! 51: You will be responsible for any legal consequences yourself; I am not
! 52: making any claims whether possessing or using this is legal or not in
! 53: your country, and I am not taking any responsibility on your behalf.
! 54:
! 55:
! 56: NO WARRANTY
! 57:
! 58: BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
! 59: FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
! 60: OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
! 61: PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
! 62: OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
! 63: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
! 64: TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
! 65: PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
! 66: REPAIR OR CORRECTION.
! 67:
! 68: IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
! 69: WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
! 70: REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
! 71: INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
! 72: OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
! 73: TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
! 74: YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
! 75: PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
! 76: POSSIBILITY OF SUCH DAMAGES.
! 77:
! 78: 2)
! 79: The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
! 80: Comments in the file indicate it may be used for any purpose without
! 81: restrictions:
! 82:
! 83: * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
! 84: * code or tables extracted from it, as desired without restriction.
! 85:
! 86: 3)
! 87: The 32-bit CRC compensation attack detector in deattack.c was
! 88: contributed by CORE SDI S.A. under a BSD-style license. See
! 89: http://www.core-sdi.com/english/ssh/ for details.
! 90:
! 91: * Cryptographic attack detector for ssh - source code
! 92: *
! 93: * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
! 94: *
! 95: * All rights reserved. Redistribution and use in source and binary
! 96: * forms, with or without modification, are permitted provided that
! 97: * this copyright notice is retained.
! 98: *
! 99: * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
! 100: * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
! 101: * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
! 102: * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
! 103: * SOFTWARE.
! 104: *
! 105: * Ariel Futoransky <futo@core-sdi.com>
! 106: * <http://www.core-sdi.com>
! 107:
! 108: 4)
! 109: Remaining components of the software are provided under a standard
! 110: 2-term BSD licence with the following names as copyright holders:
! 111:
! 112: Markus Friedl
! 113: Theo de Raadt
! 114: Niels Provos
! 115: Dug Song
! 116: Aaron Campbell
! 117:
! 118: * Redistribution and use in source and binary forms, with or without
! 119: * modification, are permitted provided that the following conditions
! 120: * are met:
! 121: * 1. Redistributions of source code must retain the above copyright
! 122: * notice, this list of conditions and the following disclaimer.
! 123: * 2. Redistributions in binary form must reproduce the above copyright
! 124: * notice, this list of conditions and the following disclaimer in the
! 125: * documentation and/or other materials provided with the distribution.
! 126: *
! 127: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
! 128: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
! 129: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
! 130: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
! 131: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
! 132: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
! 133: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
! 134: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
! 135: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
! 136: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.