[BACK]Return to LICENCE CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/LICENCE, Revision 1.4

1.3       stevesk     1: This file is part of the OpenSSH software.
1.1       deraadt     2:
1.3       stevesk     3: The licences which components of this software fall under are as
                      4: follows.  First, we will summarize and say that all components
1.1       deraadt     5: are under a BSD licence, or a licence more free than that.
                      6:
                      7: OpenSSH contains no GPL code.
                      8:
                      9: 1)
                     10:      * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                     11:      *                    All rights reserved
                     12:      *
                     13:      * As far as I am concerned, the code I have written for this software
                     14:      * can be used freely for any purpose.  Any derived versions of this
                     15:      * software must be clearly marked as such, and if the derived work is
                     16:      * incompatible with the protocol description in the RFC file, it must be
                     17:      * called by a name other than "ssh" or "Secure Shell".
                     18:
                     19:     [Tatu continues]
                     20:      *  However, I am not implying to give any licenses to any patents or
                     21:      * copyrights held by third parties, and the software includes parts that
                     22:      * are not under my direct control.  As far as I know, all included
                     23:      * source code is used in accordance with the relevant license agreements
                     24:      * and can be used freely for any purpose (the GNU license being the most
                     25:      * restrictive); see below for details.
                     26:
                     27:     [However, none of that term is relevant at this point in time.  All of
                     28:     these restrictively licenced software components which he talks about
1.4     ! stevesk    29:     have been removed from OpenSSH, i.e.,
1.1       deraadt    30:
                     31:      - RSA is no longer included, found in the OpenSSL library
1.3       stevesk    32:      - IDEA is no longer included, its use is deprecated
1.1       deraadt    33:      - DES is now external, in the OpenSSL library
                     34:      - GMP is no longer used, and instead we call BN code from OpenSSL
                     35:      - Zlib is now external, in a library
                     36:      - The make-ssh-known-hosts script is no longer included
                     37:      - TSS has been removed
                     38:      - MD5 is now external, in the OpenSSL library
1.2       deraadt    39:      - RC4 support has been replaced with ARC4 support from OpenSSL
1.1       deraadt    40:      - Blowfish is now external, in the OpenSSL library
                     41:
                     42:     [The licence continues]
                     43:
                     44:     Note that any information and cryptographic algorithms used in this
                     45:     software are publicly available on the Internet and at any major
                     46:     bookstore, scientific library, and patent office worldwide.  More
                     47:     information can be found e.g. at "http://www.cs.hut.fi/crypto".
                     48:
                     49:     The legal status of this program is some combination of all these
                     50:     permissions and restrictions.  Use only at your own responsibility.
                     51:     You will be responsible for any legal consequences yourself; I am not
                     52:     making any claims whether possessing or using this is legal or not in
                     53:     your country, and I am not taking any responsibility on your behalf.
                     54:
                     55:
                     56:                            NO WARRANTY
                     57:
                     58:     BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
                     59:     FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
                     60:     OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
                     61:     PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
                     62:     OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
                     63:     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
                     64:     TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
                     65:     PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
                     66:     REPAIR OR CORRECTION.
                     67:
                     68:     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
                     69:     WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
                     70:     REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
                     71:     INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
                     72:     OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
                     73:     TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
                     74:     YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
                     75:     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
                     76:     POSSIBILITY OF SUCH DAMAGES.
                     77:
                     78: 2)
                     79:     The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
                     80:     Comments in the file indicate it may be used for any purpose without
                     81:     restrictions:
                     82:
                     83:      * COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or
                     84:      * code or tables extracted from it, as desired without restriction.
                     85:
                     86: 3)
                     87:     The 32-bit CRC compensation attack detector in deattack.c was
1.4     ! stevesk    88:     contributed by CORE SDI S.A. under a BSD-style license.
1.1       deraadt    89:
                     90:      * Cryptographic attack detector for ssh - source code
                     91:      *
                     92:      * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
                     93:      *
                     94:      * All rights reserved. Redistribution and use in source and binary
                     95:      * forms, with or without modification, are permitted provided that
                     96:      * this copyright notice is retained.
                     97:      *
                     98:      * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
                     99:      * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
                    100:      * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
                    101:      * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
                    102:      * SOFTWARE.
                    103:      *
                    104:      * Ariel Futoransky <futo@core-sdi.com>
                    105:      * <http://www.core-sdi.com>
1.4     ! stevesk   106:
        !           107: 4)
        !           108:     ssh-keygen was contributed by David Mazieres under a BSD-style
        !           109:     license.
        !           110:
        !           111:      * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
        !           112:      *
        !           113:      * Modification and redistribution in source and binary forms is
        !           114:      * permitted provided that due credit is given to the author and the
        !           115:      * OpenBSD project by leaving this copyright notice intact.
        !           116:
        !           117: 5)
        !           118:     The Rijndael implementation is from Dr Brian Gladman and is
        !           119:     provided under a BSD-style license.
        !           120:
        !           121:     Copyright (c) 2001 Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK
        !           122:
        !           123:     TERMS
        !           124:
        !           125:     Redistribution and use in source and binary forms, with or without
        !           126:     modification, are permitted provided that the following conditions
        !           127:     are met:
        !           128:     1. Redistributions of source code must retain the above copyright
        !           129:        notice, this list of conditions and the following disclaimer.
        !           130:     2. Redistributions in binary form must reproduce the above copyright
        !           131:        notice, this list of conditions and the following disclaimer in the
        !           132:        documentation and/or other materials provided with the distribution.
        !           133:
        !           134:     This software is provided 'as is' with no guarantees of correctness or
        !           135:     fitness for purpose.
1.1       deraadt   136:
1.4     ! stevesk   137: 6)
1.1       deraadt   138:     Remaining components of the software are provided under a standard
                    139:     2-term BSD licence with the following names as copyright holders:
                    140:
                    141:        Markus Friedl
                    142:        Theo de Raadt
                    143:        Niels Provos
                    144:        Dug Song
                    145:        Aaron Campbell
1.4     ! stevesk   146:        Damien Miller
        !           147:        Kevin Steves
1.1       deraadt   148:
                    149:      * Redistribution and use in source and binary forms, with or without
                    150:      * modification, are permitted provided that the following conditions
                    151:      * are met:
                    152:      * 1. Redistributions of source code must retain the above copyright
                    153:      *    notice, this list of conditions and the following disclaimer.
                    154:      * 2. Redistributions in binary form must reproduce the above copyright
                    155:      *    notice, this list of conditions and the following disclaimer in the
                    156:      *    documentation and/or other materials provided with the distribution.
                    157:      *
                    158:      * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                    159:      * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                    160:      * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                    161:      * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                    162:      * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                    163:      * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                    164:      * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                    165:      * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                    166:      * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                    167:      * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.