[BACK]Return to LICENCE CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/LICENCE, Revision 1.6

1.3       stevesk     1: This file is part of the OpenSSH software.
1.1       deraadt     2:
1.3       stevesk     3: The licences which components of this software fall under are as
                      4: follows.  First, we will summarize and say that all components
1.1       deraadt     5: are under a BSD licence, or a licence more free than that.
                      6:
                      7: OpenSSH contains no GPL code.
                      8:
                      9: 1)
                     10:      * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                     11:      *                    All rights reserved
                     12:      *
                     13:      * As far as I am concerned, the code I have written for this software
                     14:      * can be used freely for any purpose.  Any derived versions of this
                     15:      * software must be clearly marked as such, and if the derived work is
                     16:      * incompatible with the protocol description in the RFC file, it must be
                     17:      * called by a name other than "ssh" or "Secure Shell".
                     18:
                     19:     [Tatu continues]
                     20:      *  However, I am not implying to give any licenses to any patents or
                     21:      * copyrights held by third parties, and the software includes parts that
                     22:      * are not under my direct control.  As far as I know, all included
                     23:      * source code is used in accordance with the relevant license agreements
                     24:      * and can be used freely for any purpose (the GNU license being the most
                     25:      * restrictive); see below for details.
                     26:
                     27:     [However, none of that term is relevant at this point in time.  All of
                     28:     these restrictively licenced software components which he talks about
1.4       stevesk    29:     have been removed from OpenSSH, i.e.,
1.1       deraadt    30:
                     31:      - RSA is no longer included, found in the OpenSSL library
1.3       stevesk    32:      - IDEA is no longer included, its use is deprecated
1.1       deraadt    33:      - DES is now external, in the OpenSSL library
                     34:      - GMP is no longer used, and instead we call BN code from OpenSSL
                     35:      - Zlib is now external, in a library
                     36:      - The make-ssh-known-hosts script is no longer included
                     37:      - TSS has been removed
                     38:      - MD5 is now external, in the OpenSSL library
1.2       deraadt    39:      - RC4 support has been replaced with ARC4 support from OpenSSL
1.1       deraadt    40:      - Blowfish is now external, in the OpenSSL library
                     41:
                     42:     [The licence continues]
                     43:
                     44:     Note that any information and cryptographic algorithms used in this
                     45:     software are publicly available on the Internet and at any major
                     46:     bookstore, scientific library, and patent office worldwide.  More
                     47:     information can be found e.g. at "http://www.cs.hut.fi/crypto".
                     48:
                     49:     The legal status of this program is some combination of all these
                     50:     permissions and restrictions.  Use only at your own responsibility.
                     51:     You will be responsible for any legal consequences yourself; I am not
                     52:     making any claims whether possessing or using this is legal or not in
                     53:     your country, and I am not taking any responsibility on your behalf.
                     54:
                     55:
                     56:                            NO WARRANTY
                     57:
                     58:     BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
                     59:     FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
                     60:     OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
                     61:     PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
                     62:     OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
                     63:     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
                     64:     TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
                     65:     PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
                     66:     REPAIR OR CORRECTION.
                     67:
                     68:     IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
                     69:     WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
                     70:     REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
                     71:     INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
                     72:     OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
                     73:     TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
                     74:     YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
                     75:     PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
                     76:     POSSIBILITY OF SUCH DAMAGES.
                     77:
                     78: 2)
                     79:     The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
                     80:     Comments in the file indicate it may be used for any purpose without
                     81:     restrictions:
                     82:
                     83:      * COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or
                     84:      * code or tables extracted from it, as desired without restriction.
                     85:
                     86: 3)
                     87:     The 32-bit CRC compensation attack detector in deattack.c was
1.4       stevesk    88:     contributed by CORE SDI S.A. under a BSD-style license.
1.1       deraadt    89:
                     90:      * Cryptographic attack detector for ssh - source code
                     91:      *
                     92:      * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
                     93:      *
                     94:      * All rights reserved. Redistribution and use in source and binary
                     95:      * forms, with or without modification, are permitted provided that
                     96:      * this copyright notice is retained.
                     97:      *
                     98:      * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
                     99:      * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
                    100:      * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
                    101:      * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
                    102:      * SOFTWARE.
                    103:      *
                    104:      * Ariel Futoransky <futo@core-sdi.com>
                    105:      * <http://www.core-sdi.com>
1.4       stevesk   106:
                    107: 4)
                    108:     ssh-keygen was contributed by David Mazieres under a BSD-style
                    109:     license.
                    110:
                    111:      * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
                    112:      *
                    113:      * Modification and redistribution in source and binary forms is
                    114:      * permitted provided that due credit is given to the author and the
                    115:      * OpenBSD project by leaving this copyright notice intact.
                    116:
                    117: 5)
1.5       markus    118:     The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers
                    119:     and Paulo Barreto is in the public domain and distributed
                    120:     with the following license:
1.4       stevesk   121:
1.5       markus    122:      * @version 3.0 (December 2000)
                    123:      *
                    124:      * Optimised ANSI C code for the Rijndael cipher (now AES)
                    125:      *
                    126:      * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
                    127:      * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
                    128:      * @author Paulo Barreto <paulo.barreto@terra.com.br>
                    129:      *
                    130:      * This code is hereby placed in the public domain.
                    131:      *
                    132:      * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
                    133:      * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
                    134:      * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                    135:      * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
                    136:      * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
                    137:      * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
                    138:      * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
                    139:      * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
                    140:      * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
                    141:      * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
                    142:      * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.6     ! deraadt   143:
1.4       stevesk   144: 6)
1.6     ! deraadt   145:     Two components of the ssh source code are under a 4-clause BSD license,
        !           146:     held by the University of California, since we pulled these parts from
        !           147:     original Berkeley code.  The Regents of the University of California
        !           148:     have declared that term 3 is no longer enforceable on their source code,
        !           149:     but we retain that license as is.
        !           150:
        !           151:      * Copyright (c) 1980, 1993
        !           152:      *      The Regents of the University of California.  All rights reserved.
        !           153:      *
        !           154:      * Redistribution and use in source and binary forms, with or without
        !           155:      * modification, are permitted provided that the following conditions
        !           156:      * are met:
        !           157:      * 1. Redistributions of source code must retain the above copyright
        !           158:      *    notice, this list of conditions and the following disclaimer.
        !           159:      * 2. Redistributions in binary form must reproduce the above copyright
        !           160:      *    notice, this list of conditions and the following disclaimer in the
        !           161:      *    documentation and/or other materials provided with the distribution.
        !           162:      * 3. All advertising materials mentioning features or use of this software
        !           163:      *    must display the following acknowledgement:
        !           164:      *      This product includes software developed by the University of
        !           165:      *      California, Berkeley and its contributors.
        !           166:      * 4. Neither the name of the University nor the names of its contributors
        !           167:      *    may be used to endorse or promote products derived from this software
        !           168:      *    without specific prior written permission.
        !           169:      *
        !           170:      * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
        !           171:      * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
        !           172:      * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
        !           173:      * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
        !           174:      * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
        !           175:      * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
        !           176:      * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
        !           177:      * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
        !           178:      * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
        !           179:      * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
        !           180:      * SUCH DAMAGE.
        !           181:
        !           182: 7)
1.1       deraadt   183:     Remaining components of the software are provided under a standard
                    184:     2-term BSD licence with the following names as copyright holders:
                    185:
                    186:        Markus Friedl
                    187:        Theo de Raadt
                    188:        Niels Provos
                    189:        Dug Song
                    190:        Aaron Campbell
1.4       stevesk   191:        Damien Miller
                    192:        Kevin Steves
1.1       deraadt   193:
                    194:      * Redistribution and use in source and binary forms, with or without
                    195:      * modification, are permitted provided that the following conditions
                    196:      * are met:
                    197:      * 1. Redistributions of source code must retain the above copyright
                    198:      *    notice, this list of conditions and the following disclaimer.
                    199:      * 2. Redistributions in binary form must reproduce the above copyright
                    200:      *    notice, this list of conditions and the following disclaimer in the
                    201:      *    documentation and/or other materials provided with the distribution.
                    202:      *
                    203:      * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                    204:      * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                    205:      * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                    206:      * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                    207:      * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                    208:      * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                    209:      * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                    210:      * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                    211:      * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                    212:      * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.