[BACK]Return to LICENCE CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/LICENCE, Revision 1.2.2.1

1.2.2.1 ! jason       1: This file is part of the OpenSSH software.
1.1       deraadt     2:
1.2.2.1 ! jason       3: The licences which components of this software fall under are as
        !             4: follows.  First, we will summarize and say that all components
1.1       deraadt     5: are under a BSD licence, or a licence more free than that.
                      6:
                      7: OpenSSH contains no GPL code.
                      8:
                      9: 1)
                     10:      * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                     11:      *                    All rights reserved
                     12:      *
                     13:      * As far as I am concerned, the code I have written for this software
                     14:      * can be used freely for any purpose.  Any derived versions of this
                     15:      * software must be clearly marked as such, and if the derived work is
                     16:      * incompatible with the protocol description in the RFC file, it must be
                     17:      * called by a name other than "ssh" or "Secure Shell".
                     18:
                     19:     [Tatu continues]
                     20:      *  However, I am not implying to give any licenses to any patents or
                     21:      * copyrights held by third parties, and the software includes parts that
                     22:      * are not under my direct control.  As far as I know, all included
                     23:      * source code is used in accordance with the relevant license agreements
                     24:      * and can be used freely for any purpose (the GNU license being the most
                     25:      * restrictive); see below for details.
                     26:
                     27:     [However, none of that term is relevant at this point in time.  All of
                     28:     these restrictively licenced software components which he talks about
                     29:     have been removed from OpenSSH, ie.
                     30:
                     31:      - RSA is no longer included, found in the OpenSSL library
1.2.2.1 ! jason      32:      - IDEA is no longer included, its use is deprecated
1.1       deraadt    33:      - DES is now external, in the OpenSSL library
                     34:      - GMP is no longer used, and instead we call BN code from OpenSSL
                     35:      - Zlib is now external, in a library
                     36:      - The make-ssh-known-hosts script is no longer included
                     37:      - TSS has been removed
                     38:      - MD5 is now external, in the OpenSSL library
1.2       deraadt    39:      - RC4 support has been replaced with ARC4 support from OpenSSL
1.1       deraadt    40:      - Blowfish is now external, in the OpenSSL library
                     41:
                     42:     [The licence continues]
                     43:
                     44:     Note that any information and cryptographic algorithms used in this
                     45:     software are publicly available on the Internet and at any major
                     46:     bookstore, scientific library, and patent office worldwide.  More
                     47:     information can be found e.g. at "http://www.cs.hut.fi/crypto".
                     48:
                     49:     The legal status of this program is some combination of all these
                     50:     permissions and restrictions.  Use only at your own responsibility.
                     51:     You will be responsible for any legal consequences yourself; I am not
                     52:     making any claims whether possessing or using this is legal or not in
                     53:     your country, and I am not taking any responsibility on your behalf.
                     54:
                     55:
                     56:                            NO WARRANTY
                     57:
                     58:     BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
                     59:     FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
                     60:     OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
                     61:     PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
                     62:     OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
                     63:     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
                     64:     TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
                     65:     PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
                     66:     REPAIR OR CORRECTION.
                     67:
                     68:     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
                     69:     WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
                     70:     REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
                     71:     INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
                     72:     OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
                     73:     TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
                     74:     YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
                     75:     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
                     76:     POSSIBILITY OF SUCH DAMAGES.
                     77:
                     78: 2)
                     79:     The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
                     80:     Comments in the file indicate it may be used for any purpose without
                     81:     restrictions:
                     82:
                     83:      * COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or
                     84:      * code or tables extracted from it, as desired without restriction.
                     85:
                     86: 3)
                     87:     The 32-bit CRC compensation attack detector in deattack.c was
                     88:     contributed by CORE SDI S.A. under a BSD-style license. See
                     89:     http://www.core-sdi.com/english/ssh/ for details.
                     90:
                     91:      * Cryptographic attack detector for ssh - source code
                     92:      *
                     93:      * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
                     94:      *
                     95:      * All rights reserved. Redistribution and use in source and binary
                     96:      * forms, with or without modification, are permitted provided that
                     97:      * this copyright notice is retained.
                     98:      *
                     99:      * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
                    100:      * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
                    101:      * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
                    102:      * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
                    103:      * SOFTWARE.
                    104:      *
                    105:      * Ariel Futoransky <futo@core-sdi.com>
                    106:      * <http://www.core-sdi.com>
                    107:
                    108: 4)
                    109:     Remaining components of the software are provided under a standard
                    110:     2-term BSD licence with the following names as copyright holders:
                    111:
                    112:        Markus Friedl
                    113:        Theo de Raadt
                    114:        Niels Provos
                    115:        Dug Song
                    116:        Aaron Campbell
                    117:
                    118:      * Redistribution and use in source and binary forms, with or without
                    119:      * modification, are permitted provided that the following conditions
                    120:      * are met:
                    121:      * 1. Redistributions of source code must retain the above copyright
                    122:      *    notice, this list of conditions and the following disclaimer.
                    123:      * 2. Redistributions in binary form must reproduce the above copyright
                    124:      *    notice, this list of conditions and the following disclaimer in the
                    125:      *    documentation and/or other materials provided with the distribution.
                    126:      *
                    127:      * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                    128:      * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                    129:      * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                    130:      * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                    131:      * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                    132:      * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                    133:      * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                    134:      * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                    135:      * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                    136:      * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.