[10563] | 1 | SSH (Secure Shell) NON-COMMERCIAL LICENSE (Version 1, May 27th, 1996) |
---|
| 2 | |
---|
[11071] | 3 | Copyright (C) 1995, 1996, 1997, 1998 SSH Communications Security Ltd., Finland |
---|
[10563] | 4 | <info@ssh.fi>. All rights reserved. |
---|
| 5 | |
---|
| 6 | For commercial licensing please contact Data Fellows, Ltd. Data |
---|
| 7 | Fellows has exclusive licensing rights for the technology for |
---|
| 8 | commercial purposes. Data Fellows offers commercial versions of SSH |
---|
| 9 | with maintenance agreements in addition to various licensing options |
---|
| 10 | for the technology itself. You can contact Data Fellows at |
---|
| 11 | <f-secure-ssh-sales@datafellows.com>, http://www.datafellows.com/, tel |
---|
[11533] | 12 | Int.+358-9-478 444 or fax Int.+358-9-4784 4599. |
---|
[10563] | 13 | |
---|
| 14 | This License applies to the computer program(s) known as "SSH (Secure |
---|
| 15 | Shell)." The "Program", below, refers to such program, and a "work |
---|
| 16 | based on the Program" means either the Program or any derivative work |
---|
| 17 | of the Program, such as a translation or a modification. The Program |
---|
| 18 | is a copyrighted work whose copyright is held by SSH Communications |
---|
| 19 | Security (the "Licensor"). |
---|
| 20 | |
---|
| 21 | BY USING, MODIFYING AND/OR DISTRIBUTING THE PROGRAM (OR ANY WORK BASED ON |
---|
| 22 | THE PROGRAM), YOU INDICATE YOUR ACCEPTANCE OF THIS LICENSE, AND ALL ITS |
---|
| 23 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTING OR MODIFYING THE PROGRAM OR |
---|
| 24 | WORKS BASED ON IT. NOTHING OTHER THAN THIS LICENSE GRANTS YOU PERMISSION |
---|
| 25 | TO USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM OR ITS DERIVATIVE WORKS. |
---|
| 26 | THESE ACTIONS ARE PROHIBITED BY LAW. IF YOU DO NOT ACCEPT THESE TERMS AND |
---|
| 27 | CONDITIONS, DO NOT USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM. |
---|
| 28 | |
---|
| 29 | 1. Licenses. |
---|
| 30 | |
---|
| 31 | Licensor hereby grants you the following rights, provided that you comply |
---|
| 32 | with all of the restrictions set forth in this License and provided, |
---|
| 33 | further, that you distribute an unmodified copy of this License with the |
---|
| 34 | Program: |
---|
| 35 | |
---|
| 36 | (a) You may copy and distribute literal (i.e., verbatim) copies of the |
---|
| 37 | Program's source code as you receive it throughout the world, in any |
---|
| 38 | medium. |
---|
| 39 | |
---|
| 40 | Local regulations may exist which limit your rights to distribute or use |
---|
| 41 | cryptographic software. The Licensor is not responsible for unauthorized |
---|
| 42 | distribution or use of the Program in such territories. |
---|
| 43 | |
---|
| 44 | (b) You may use the program for non-commercial purposes only, meaning |
---|
| 45 | that the program must not be sold commercially as a separate product, |
---|
| 46 | as part of a bigger product or project, or otherwise used for |
---|
| 47 | financial gain without a separate license. Please see Section 2, |
---|
| 48 | Restrictions, for more details. |
---|
| 49 | |
---|
| 50 | Use by individuals and non-profit organizations is always allowed. |
---|
| 51 | Companies are permitted to use this program as long as it is not used for |
---|
| 52 | revenue-generating purposes. For example, an Internet service provider is |
---|
| 53 | allowed to install this program on their systems and permit clients to use |
---|
| 54 | SSH to connect; however, actively distributing SSH to clients for the |
---|
| 55 | purpose of providing added value requires separate licensing. Similarly, |
---|
| 56 | a consultant may freely install this software on a client's machine for |
---|
| 57 | his own use, but if he/she sells the client a system that uses SSH as a |
---|
| 58 | component, a separate license is required. If a company includes this |
---|
| 59 | program or a derivative work thereof, as part of its product, commercial |
---|
| 60 | licensing is required. |
---|
| 61 | |
---|
| 62 | (c) You may build derived versions of this software under the restrictions |
---|
| 63 | stated in Section 2, Restrictions, of this license. The derived versions |
---|
| 64 | must be clearly marked as such and must be called by a name other than SSH |
---|
| 65 | or F-Secure SSH. SSH and F-Secure SSH are trademarks of SSH Communications |
---|
| 66 | Security and Data Fellows. |
---|
| 67 | |
---|
| 68 | All derived versions of the Program must be made freely available under |
---|
| 69 | the terms of this license. SSH Communications Security and Data Fellows |
---|
| 70 | must be given the right to use the modified source code in their products |
---|
| 71 | without any compensation and without being required to separately name the |
---|
| 72 | parties whose modifications are being used. |
---|
| 73 | |
---|
| 74 | 2. Restrictions. |
---|
| 75 | |
---|
| 76 | (a) Distribution of the Program or any work based on the Program by a |
---|
| 77 | commercial organization to any third party is prohibited if any payment is |
---|
| 78 | made in connection with such distribution, whether directly (as in payment |
---|
| 79 | for a copy of the Program) or indirectly (as in payment for some service |
---|
| 80 | related to the Program, or payment for some product or service that |
---|
| 81 | includes a copy of the Program "without charge", or payment for some |
---|
| 82 | product or service the delivery of which requires for the recipient to |
---|
| 83 | retrieve/download or otherwise obtain a copy of the Program; these are |
---|
| 84 | only examples, and not an exhaustive enumeration of prohibited |
---|
| 85 | activities). |
---|
| 86 | |
---|
| 87 | As an exception to the above rule, putting this program on CD-ROMs |
---|
| 88 | containing other free software is explicitly permitted even when a modest |
---|
| 89 | distribution fee is charged for the CD, as long as this software is not a |
---|
| 90 | primary selling argument for the CD. |
---|
| 91 | |
---|
| 92 | (b) Activities other than copying, distribution and modification of the |
---|
| 93 | Program are not subject to this License and they are outside its scope. |
---|
| 94 | Functional use (running) of the Program is not restricted. |
---|
| 95 | |
---|
| 96 | (c) You must meet all of the following conditions with respect to the |
---|
| 97 | distribution of any work based on the Program: |
---|
| 98 | |
---|
| 99 | (i) All modified versions of the Program, must carry prominent notice |
---|
| 100 | stating that the Program has been modified. The notice must indicate who |
---|
| 101 | made the modifications and how the Program's files were modified and the |
---|
| 102 | date of any change; |
---|
| 103 | |
---|
| 104 | (ii) You must cause any work that you distribute or publish, that in whole |
---|
| 105 | or in part contains or is derived from the Program or any part thereof, to |
---|
| 106 | be licensed as a whole and at no charge to all third parties under the |
---|
| 107 | terms of this License; |
---|
| 108 | |
---|
| 109 | (iii) You must cause the Program, at each time it commences operation, to |
---|
| 110 | print or display an announcement including an appropriate copyright notice |
---|
| 111 | and a notice that there is no warranty (or else, saying that you provide a |
---|
| 112 | warranty). The notice must also tell the user how to view the copy of the |
---|
| 113 | License included with the Program, and state that users may redistribute |
---|
| 114 | the Program only under the terms of this License; |
---|
| 115 | |
---|
| 116 | (iv) You must accompany any such work based on the Program with the |
---|
| 117 | complete corresponding machine-readable source code, delivered on a medium |
---|
| 118 | customarily used for software interchange. The source code for a work |
---|
| 119 | means the preferred form of the work for making modifications to it; |
---|
| 120 | |
---|
| 121 | (v) If you distribute any written or printed material at all with the |
---|
| 122 | Program or any work based on the Program, such material must include |
---|
| 123 | either a written copy of this License, or a prominent written indication |
---|
| 124 | that the Program or the work based on the Program is covered by this |
---|
| 125 | License and written instructions for printing and/or displaying the copy |
---|
| 126 | of the License on the distribution medium; |
---|
| 127 | |
---|
| 128 | (vi) You may not change the terms in this License or impose any further |
---|
| 129 | restrictions on the recipient's exercise of the rights granted herein. |
---|
| 130 | |
---|
| 131 | 3. Reservation of Rights. |
---|
| 132 | |
---|
| 133 | No rights are granted to the Program except as expressly set forth herein. |
---|
| 134 | You may not copy, modify, sublicense, or distribute the Program except as |
---|
| 135 | expressly provided under this License. Any attempt otherwise to copy, |
---|
| 136 | modify, sublicense or distribute the Program is void, and will |
---|
| 137 | automatically terminate your rights under this License. However, parties |
---|
| 138 | who have received copies, or rights, from you under this License will not |
---|
| 139 | have their licenses terminated so long as such parties remain in full |
---|
| 140 | compliance. |
---|
| 141 | |
---|
| 142 | 4. Limitations. |
---|
| 143 | |
---|
| 144 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR |
---|
| 145 | THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
---|
| 146 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
---|
| 147 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
---|
| 148 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
---|
| 149 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
---|
| 150 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
---|
| 151 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
---|
| 152 | REPAIR OR CORRECTION. |
---|
| 153 | |
---|
| 154 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL |
---|
| 155 | ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY USE, MODIFY AND/OR |
---|
| 156 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
---|
| 157 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES |
---|
| 158 | ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT |
---|
| 159 | LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES |
---|
| 160 | SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE |
---|
| 161 | WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN |
---|
| 162 | ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. |
---|
| 163 | |
---|
| 164 | 5. General. |
---|
| 165 | |
---|
| 166 | Some of the source code aggregated with this distribution is licensed by |
---|
| 167 | third parties under different terms, so the restrictions above may not |
---|
| 168 | apply to such components. |
---|
| 169 | |
---|
| 170 | We do not imply to give any licenses to any patents or copyrights held by |
---|
| 171 | third parties. As far as we know, all included source code is used in |
---|
| 172 | accordance with the relevant license agreements and can be used and |
---|
| 173 | distributed freely for any purpose (the GNU license being the most |
---|
| 174 | restrictive); see below for details. |
---|
| 175 | |
---|
| 176 | The RSA algorithm and even the concept of public key encryption are |
---|
| 177 | claimed to be patented in the United States. These patents may interfere |
---|
| 178 | with your right to use this software. It is possible to compile the |
---|
| 179 | software using the RSAREF2 library by giving --with-rsaref on the |
---|
| 180 | configure command line. This may or may not make it legal to use this |
---|
| 181 | software for non-commercial purposes in the United States (we have sent a |
---|
| 182 | query about this to RSADSI (on July 10, 1995), but have not received a |
---|
| 183 | final answer yet). The RSAREF2 distribution is not included in this |
---|
| 184 | distribution, but can be obtained from almost any ftp site world-wide |
---|
| 185 | containing cryptographic materials. Using RSAREF is not recommended |
---|
| 186 | outside the United States. See "http://www.cs.hut.fi/crypto/" if you have |
---|
| 187 | trouble finding the RSAREF library. |
---|
| 188 | |
---|
| 189 | The IDEA algorithm is claimed to be patented in the United States and |
---|
| 190 | several other countries. We have been told by Ascom-Tech (the patent |
---|
| 191 | holder) that IDEA can be used freely for non-commercial use. A copy of |
---|
| 192 | their letter is at the end. The software can be compiled without IDEA by |
---|
| 193 | specifying the --without-idea option on the configure command line. |
---|
| 194 | |
---|
| 195 | The DES implementation in this distribution is derived from the libdes |
---|
| 196 | library by Eric Young <eay@mincom.oz.au>. It can be used under the Gnu |
---|
| 197 | General Public License (libdes-COPYING) or the Artistic License |
---|
| 198 | (libdes-ARTISTIC), at your option. See libdes-README for more |
---|
| 199 | information. Eric Young has kindly given permission to distribute the |
---|
| 200 | derived version under these terms. The file crypt.c is fcrypt.c from |
---|
| 201 | SSLeay-0.4.3a by Eric Young; he permits free use. |
---|
| 202 | |
---|
| 203 | The GNU Multiple Precision Library, included in this release and linked |
---|
| 204 | into the executable, is distributed under the GNU Library Public License. |
---|
| 205 | A copy can be found in gmp-2.0/COPYING.LIB. |
---|
| 206 | |
---|
| 207 | The zlib compression library is copyright Jean-loup Gailly and Mark Adler. |
---|
| 208 | Anyone is permitted to use the library for any purpose. A copy of the |
---|
| 209 | license conditions can be found in zlib-1.0.4/README. |
---|
| 210 | |
---|
| 211 | The make-ssh-known-hosts script was contributed by Tero Kivinen |
---|
| 212 | <kivinen@niksula.hut.fi> and is distributed under the GNU General |
---|
| 213 | Public License. A copy can be found in gnu-COPYING-GPL. |
---|
| 214 | |
---|
| 215 | Some files, such as memmove.c and random.c, are owned by the Regents of |
---|
| 216 | the University of California, and can be freely used and distributed. |
---|
| 217 | License terms are included in the affected files. The file scp.c is |
---|
| 218 | derived from code owned by the Regents of the University of California, |
---|
| 219 | and can be used freely. |
---|
| 220 | |
---|
| 221 | The TSS encryption algorithm implementation in tss.c is copyright Timo |
---|
| 222 | Rinne <tri@iki.fi> and Cirion Oy. It is used with permission, and |
---|
| 223 | permission has been given for anyone to use it for any purpose as part of |
---|
| 224 | SSH. |
---|
| 225 | |
---|
| 226 | The MD5 implementation in md5.c was taken from PGP and is due to Colin |
---|
| 227 | Plumb. Comments in the file indicate that it is in the public domain. |
---|
| 228 | |
---|
| 229 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. Comments |
---|
| 230 | in the file indicate it may be used for any purpose without restrictions. |
---|
| 231 | |
---|
| 232 | In some countries, particularly France, Russia, Iraq, and Pakistan, it may |
---|
| 233 | be illegal to use any encryption at all without a special permit, and the |
---|
| 234 | rumor is that you cannot get a permit for any strong encryption. |
---|
| 235 | |
---|
| 236 | If you are in the United States, you should be aware that while this |
---|
| 237 | software was written outside the United States using information |
---|
| 238 | publicly available everywhere, the United States Government may |
---|
| 239 | consider it a criminal offence to export this software from the United |
---|
| 240 | States once it has been imported. The rumor is that "the federal |
---|
| 241 | mandatory sentencing guidelines for this offence are 41 to 51 months |
---|
| 242 | in federal prison". The rumor says that the US government considers |
---|
| 243 | putting the software available on an ftp site the same as exporting |
---|
| 244 | it. Contact the Office of Defence Trade Controls if you need more |
---|
| 245 | information. Also, please write to your congress and senate |
---|
| 246 | representatives to get these silly and unconstitutional restrictions |
---|
| 247 | dropped. |
---|
| 248 | |
---|
| 249 | Note that any information and cryptographic algorithms used in this |
---|
| 250 | software are publicly available on the Internet and at any major |
---|
| 251 | bookstore, scientific library, and patent office world-wide. More |
---|
| 252 | information can be found e.g. at "http://www.cs.hut.fi/crypto/". |
---|
| 253 | |
---|
| 254 | The legal status of this program is some combination of all these |
---|
| 255 | permissions and restrictions. Use only at your own responsibility. You |
---|
| 256 | will be responsible for any legal consequences yourself; we are not making |
---|
| 257 | any claims whether possessing or using this is legal or not in your |
---|
| 258 | country, and we are not taking any responsibility on your behalf. |
---|
| 259 | |
---|
| 260 | Below is a copy of a message that we received from Ascom, the holder of |
---|
| 261 | the IDEA patent. |
---|
| 262 | |
---|
| 263 | Date: Tue, 15 Aug 95 09:09:59 CET |
---|
| 264 | From: IDEA@ascom.ch (Licensing Systec) |
---|
| 265 | Encoding: 3001 Text |
---|
| 266 | To: ylo@cs.hut.fi |
---|
| 267 | Subject: Phone Call 15.8.95 |
---|
| 268 | |
---|
| 269 | Dear Mr. Ylonen |
---|
| 270 | |
---|
| 271 | Thank you for your inquiry about the IDEA encryption algorithm. |
---|
| 272 | Please excuse the delay in answering your fax sent 26.6.95. |
---|
| 273 | Here is the information you requested : |
---|
| 274 | |
---|
| 275 | Non commercial use of IDEA is free. The following examples (regarding |
---|
| 276 | PGP) should clarify what we mean by commercial and non-commercial use |
---|
| 277 | |
---|
| 278 | Here are some examples of commercial use of PGP: |
---|
| 279 | |
---|
| 280 | 1. When PGP is used for signing and/or encrypting e-mail messages |
---|
| 281 | exchanged between two corporations. |
---|
| 282 | |
---|
| 283 | 2. When a consultant uses PGP for his communications with his client |
---|
| 284 | corporations. |
---|
| 285 | |
---|
| 286 | 3. When a bank makes PGP available to its clients for telebanking and |
---|
| 287 | charges them money for it (directly or indirectly). |
---|
| 288 | |
---|
| 289 | 4. When you use the software you receive from a company for commercial |
---|
| 290 | purposes (telebanking included). |
---|
| 291 | |
---|
| 292 | |
---|
| 293 | Some examples of non commercial use: |
---|
| 294 | |
---|
| 295 | 1. When an individual uses PGP for his private communications. |
---|
| 296 | |
---|
| 297 | 2. When an individual obtains PGP on the Internet and uses it for |
---|
| 298 | telebanking (assuming this is approved by the bank). |
---|
| 299 | |
---|
| 300 | 3. When you use the software you receive from a company for private |
---|
| 301 | purposes (telebanking excluded). |
---|
| 302 | |
---|
| 303 | |
---|
| 304 | You may use IDEA freely within your software for non commercial use. |
---|
| 305 | If you include IDEA in your software, it must include the following |
---|
| 306 | copy right statement : |
---|
| 307 | |
---|
| 308 | 1. Copyright and Licensing Statement |
---|
| 309 | IDEA(tm) is a trademark of Ascom Systec AG. There is no license fee |
---|
| 310 | required for non-commercial use. Commercial users of IDEA may |
---|
| 311 | obtain licensing information from Ascom Systec AG. |
---|
| 312 | e-mail: IDEA@ascom.ch |
---|
| 313 | fax: ++41 64 56 59 54 |
---|
| 314 | |
---|
| 315 | |
---|
| 316 | For selling the software commercially a product license is required: |
---|
| 317 | |
---|
| 318 | The PRODUCT LICENSE gives a software developer the right to implement |
---|
| 319 | IDEA in a software product and to sell this product worldwide. With |
---|
| 320 | the PRODUCT LICENSE we supply a source listing in C and a software |
---|
| 321 | manual. We charge an initial fee per company and a percentage of sales |
---|
| 322 | of the software product or products (typically between .5 and 4 per |
---|
| 323 | cent of the sales price, depending on the price and the importance of |
---|
| 324 | IDEA for the product). |
---|
| 325 | |
---|
| 326 | |
---|
| 327 | For further information please do not hesitate to contact us. |
---|
| 328 | |
---|
| 329 | Best regards, |
---|
| 330 | |
---|
| 331 | Roland Weinhart |
---|
| 332 | |
---|
| 333 | |
---|
| 334 | Ascom Systec Ltd |
---|
| 335 | IDEA Licensing @@@@@ @@@@@ @@@@@ @@@@@ @@@@@@@ |
---|
| 336 | Gewerbepark @ @ @ @ @ @ @ @ |
---|
| 337 | CH-5506 Maegenwil @@@@@ @@@@@ @ @ @ @ @ @ |
---|
| 338 | Switzerland @ @ @ @ @ @ @ @ @ |
---|
| 339 | Phone ++41 64 56 59 54 @@@@@ @@@@@ @@@@@ @@@@@ @ @ @ |
---|
| 340 | Fax ++41 64 56 59 98 |
---|