1 | This file is part of the OpenSSH software. |
---|
2 | |
---|
3 | The licences which components of this software fall under are as |
---|
4 | follows. First, we will summarize and say that all components |
---|
5 | are under a BSD licence, or a licence more free than that. |
---|
6 | |
---|
7 | OpenSSH contains no GPL code. |
---|
8 | |
---|
9 | 1) |
---|
10 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
---|
11 | * All rights reserved |
---|
12 | * |
---|
13 | * As far as I am concerned, the code I have written for this software |
---|
14 | * can be used freely for any purpose. Any derived versions of this |
---|
15 | * software must be clearly marked as such, and if the derived work is |
---|
16 | * incompatible with the protocol description in the RFC file, it must be |
---|
17 | * called by a name other than "ssh" or "Secure Shell". |
---|
18 | |
---|
19 | [Tatu continues] |
---|
20 | * However, I am not implying to give any licenses to any patents or |
---|
21 | * copyrights held by third parties, and the software includes parts that |
---|
22 | * are not under my direct control. As far as I know, all included |
---|
23 | * source code is used in accordance with the relevant license agreements |
---|
24 | * and can be used freely for any purpose (the GNU license being the most |
---|
25 | * restrictive); see below for details. |
---|
26 | |
---|
27 | [However, none of that term is relevant at this point in time. All of |
---|
28 | these restrictively licenced software components which he talks about |
---|
29 | have been removed from OpenSSH, i.e., |
---|
30 | |
---|
31 | - RSA is no longer included, found in the OpenSSL library |
---|
32 | - IDEA is no longer included, its use is deprecated |
---|
33 | - DES is now external, in the OpenSSL library |
---|
34 | - GMP is no longer used, and instead we call BN code from OpenSSL |
---|
35 | - Zlib is now external, in a library |
---|
36 | - The make-ssh-known-hosts script is no longer included |
---|
37 | - TSS has been removed |
---|
38 | - MD5 is now external, in the OpenSSL library |
---|
39 | - RC4 support has been replaced with ARC4 support from OpenSSL |
---|
40 | - Blowfish is now external, in the OpenSSL library |
---|
41 | |
---|
42 | [The licence continues] |
---|
43 | |
---|
44 | Note that any information and cryptographic algorithms used in this |
---|
45 | software are publicly available on the Internet and at any major |
---|
46 | bookstore, scientific library, and patent office worldwide. More |
---|
47 | information can be found e.g. at "http://www.cs.hut.fi/crypto". |
---|
48 | |
---|
49 | The legal status of this program is some combination of all these |
---|
50 | permissions and restrictions. Use only at your own responsibility. |
---|
51 | You will be responsible for any legal consequences yourself; I am not |
---|
52 | making any claims whether possessing or using this is legal or not in |
---|
53 | your country, and I am not taking any responsibility on your behalf. |
---|
54 | |
---|
55 | |
---|
56 | NO WARRANTY |
---|
57 | |
---|
58 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY |
---|
59 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
---|
60 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
---|
61 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
---|
62 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
---|
63 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
---|
64 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
---|
65 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
---|
66 | REPAIR OR CORRECTION. |
---|
67 | |
---|
68 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING |
---|
69 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR |
---|
70 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
---|
71 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING |
---|
72 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED |
---|
73 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY |
---|
74 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER |
---|
75 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE |
---|
76 | POSSIBILITY OF SUCH DAMAGES. |
---|
77 | |
---|
78 | 2) |
---|
79 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. |
---|
80 | Comments in the file indicate it may be used for any purpose without |
---|
81 | restrictions: |
---|
82 | |
---|
83 | * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or |
---|
84 | * code or tables extracted from it, as desired without restriction. |
---|
85 | |
---|
86 | 3) |
---|
87 | The 32-bit CRC compensation attack detector in deattack.c was |
---|
88 | contributed by CORE SDI S.A. under a BSD-style license. |
---|
89 | |
---|
90 | * Cryptographic attack detector for ssh - source code |
---|
91 | * |
---|
92 | * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. |
---|
93 | * |
---|
94 | * All rights reserved. Redistribution and use in source and binary |
---|
95 | * forms, with or without modification, are permitted provided that |
---|
96 | * this copyright notice is retained. |
---|
97 | * |
---|
98 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED |
---|
99 | * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE |
---|
100 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR |
---|
101 | * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS |
---|
102 | * SOFTWARE. |
---|
103 | * |
---|
104 | * Ariel Futoransky <futo@core-sdi.com> |
---|
105 | * <http://www.core-sdi.com> |
---|
106 | |
---|
107 | 4) |
---|
108 | ssh-keygen was contributed by David Mazieres under a BSD-style |
---|
109 | license. |
---|
110 | |
---|
111 | * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. |
---|
112 | * |
---|
113 | * Modification and redistribution in source and binary forms is |
---|
114 | * permitted provided that due credit is given to the author and the |
---|
115 | * OpenBSD project by leaving this copyright notice intact. |
---|
116 | |
---|
117 | 5) |
---|
118 | The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers |
---|
119 | and Paulo Barreto is in the public domain and distributed |
---|
120 | with the following license: |
---|
121 | |
---|
122 | * @version 3.0 (December 2000) |
---|
123 | * |
---|
124 | * Optimised ANSI C code for the Rijndael cipher (now AES) |
---|
125 | * |
---|
126 | * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> |
---|
127 | * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> |
---|
128 | * @author Paulo Barreto <paulo.barreto@terra.com.br> |
---|
129 | * |
---|
130 | * This code is hereby placed in the public domain. |
---|
131 | * |
---|
132 | * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS |
---|
133 | * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
---|
134 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
---|
135 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE |
---|
136 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
---|
137 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
---|
138 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
---|
139 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
---|
140 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE |
---|
141 | * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, |
---|
142 | * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
---|
143 | |
---|
144 | 6) |
---|
145 | One component of the ssh source code is under a 4-clause BSD license, |
---|
146 | held by the University of California, since we pulled these parts from |
---|
147 | original Berkeley code. The Regents of the University of California |
---|
148 | have declared that term 3 is no longer enforceable on their source code, |
---|
149 | but we retain that license as is. |
---|
150 | |
---|
151 | * Copyright (c) 1983, 1990, 1992, 1993, 1995 |
---|
152 | * The Regents of the University of California. All rights reserved. |
---|
153 | * |
---|
154 | * Redistribution and use in source and binary forms, with or without |
---|
155 | * modification, are permitted provided that the following conditions |
---|
156 | * are met: |
---|
157 | * 1. Redistributions of source code must retain the above copyright |
---|
158 | * notice, this list of conditions and the following disclaimer. |
---|
159 | * 2. Redistributions in binary form must reproduce the above copyright |
---|
160 | * notice, this list of conditions and the following disclaimer in the |
---|
161 | * documentation and/or other materials provided with the distribution. |
---|
162 | * 3. All advertising materials mentioning features or use of this software |
---|
163 | * must display the following acknowledgement: |
---|
164 | * This product includes software developed by the University of |
---|
165 | * California, Berkeley and its contributors. |
---|
166 | * 4. Neither the name of the University nor the names of its contributors |
---|
167 | * may be used to endorse or promote products derived from this software |
---|
168 | * without specific prior written permission. |
---|
169 | * |
---|
170 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
---|
171 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
---|
172 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
---|
173 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
---|
174 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
---|
175 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
---|
176 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
---|
177 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
---|
178 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
---|
179 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
---|
180 | * SUCH DAMAGE. |
---|
181 | |
---|
182 | 7) |
---|
183 | Remaining components of the software are provided under a standard |
---|
184 | 2-term BSD licence with the following names as copyright holders: |
---|
185 | |
---|
186 | Markus Friedl |
---|
187 | Theo de Raadt |
---|
188 | Niels Provos |
---|
189 | Dug Song |
---|
190 | Aaron Campbell |
---|
191 | Damien Miller |
---|
192 | Kevin Steves |
---|
193 | Daniel Kouril |
---|
194 | Per Allansson |
---|
195 | |
---|
196 | * Redistribution and use in source and binary forms, with or without |
---|
197 | * modification, are permitted provided that the following conditions |
---|
198 | * are met: |
---|
199 | * 1. Redistributions of source code must retain the above copyright |
---|
200 | * notice, this list of conditions and the following disclaimer. |
---|
201 | * 2. Redistributions in binary form must reproduce the above copyright |
---|
202 | * notice, this list of conditions and the following disclaimer in the |
---|
203 | * documentation and/or other materials provided with the distribution. |
---|
204 | * |
---|
205 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
---|
206 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
---|
207 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
---|
208 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
---|
209 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
---|
210 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
---|
211 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
---|
212 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
---|
213 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
---|
214 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
---|