source: trunk/third/ssh/COPYING @ 11534

Revision 11534, 16.5 KB checked in by danw, 27 years ago (diff)
This commit was generated by cvs2svn to compensate for changes in r11533, which included commits to RCS files with non-trunk default branches.
Line 
1SSH (Secure Shell) NON-COMMERCIAL LICENSE (Version 1, May 27th, 1996)
2
3Copyright (C) 1995, 1996, 1997, 1998 SSH Communications Security Ltd., Finland
4<info@ssh.fi>.  All rights reserved.
5
6For commercial licensing please contact Data Fellows, Ltd.  Data
7Fellows has exclusive licensing rights for the technology for
8commercial purposes.  Data Fellows offers commercial versions of SSH
9with maintenance agreements in addition to various licensing options
10for the technology itself.  You can contact Data Fellows at
11<f-secure-ssh-sales@datafellows.com>, http://www.datafellows.com/, tel
12Int.+358-9-478 444 or fax Int.+358-9-4784 4599.
13
14This License applies to the computer program(s) known as "SSH (Secure
15Shell)."  The "Program", below, refers to such program, and a "work
16based on the Program" means either the Program or any derivative work
17of the Program, such as a translation or a modification.  The Program
18is a copyrighted work whose copyright is held by SSH Communications
19Security (the "Licensor").
20
21BY USING, MODIFYING AND/OR DISTRIBUTING THE PROGRAM (OR ANY WORK BASED ON
22THE PROGRAM), YOU INDICATE YOUR ACCEPTANCE OF THIS LICENSE, AND ALL ITS
23TERMS AND CONDITIONS FOR COPYING, DISTRIBUTING OR MODIFYING THE PROGRAM OR
24WORKS BASED ON IT.  NOTHING OTHER THAN THIS LICENSE GRANTS YOU PERMISSION
25TO USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM OR ITS DERIVATIVE WORKS.
26THESE ACTIONS ARE PROHIBITED BY LAW.  IF YOU DO NOT ACCEPT THESE TERMS AND
27CONDITIONS, DO NOT USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM.
28
291. Licenses.
30
31Licensor hereby grants you the following rights, provided that you comply
32with all of the restrictions set forth in this License and provided,
33further, that you distribute an unmodified copy of this License with the
34Program:
35
36(a) You may copy and distribute literal (i.e., verbatim) copies of the
37Program's source code as you receive it throughout the world, in any
38medium.
39
40Local regulations may exist which limit your rights to distribute or use
41cryptographic software. The Licensor is not responsible for unauthorized
42distribution or use of the Program in such territories.
43
44(b) You may use the program for non-commercial purposes only, meaning
45that the program must not be sold commercially as a separate product,
46as part of a bigger product or project, or otherwise used for
47financial gain without a separate license. Please see Section 2,
48Restrictions, for more details.
49
50Use by individuals and non-profit organizations is always allowed.
51Companies are permitted to use this program as long as it is not used for
52revenue-generating purposes. For example, an Internet service provider is
53allowed to install this program on their systems and permit clients to use
54SSH to connect; however, actively distributing SSH to clients for the
55purpose of providing added value requires separate licensing.  Similarly,
56a consultant may freely install this software on a client's machine for
57his own use, but if he/she sells the client a system that uses SSH as a
58component, a separate license is required. If a company includes this
59program or a derivative work thereof, as part of its product, commercial
60licensing is required.
61
62(c) You may build derived versions of this software under the restrictions
63stated in Section 2, Restrictions, of this license. The derived versions
64must be clearly marked as such and must be called by a name other than SSH
65or F-Secure SSH. SSH and F-Secure SSH are trademarks of SSH Communications
66Security and Data Fellows.
67
68All derived versions of the Program must be made freely available under
69the terms of this license. SSH Communications Security and Data Fellows
70must be given the right to use the modified source code in their products
71without any compensation and without being required to separately name the
72parties whose modifications are being used.
73
742. Restrictions.
75
76(a) Distribution of the Program or any work based on the Program by a
77commercial organization to any third party is prohibited if any payment is
78made in connection with such distribution, whether directly (as in payment
79for a copy of the Program) or indirectly (as in payment for some service
80related to the Program, or payment for some product or service that
81includes a copy of the Program "without charge", or payment for some
82product or service the delivery of which requires for the recipient to
83retrieve/download or otherwise obtain a copy of the Program; these are
84only examples, and not an exhaustive enumeration of prohibited
85activities).
86
87As an exception to the above rule, putting this program on CD-ROMs
88containing other free software is explicitly permitted even when a modest
89distribution fee is charged for the CD, as long as this software is not a
90primary selling argument for the CD.
91
92(b) Activities other than copying, distribution and modification of the
93Program are not subject to this License and they are outside its scope.
94Functional use (running) of the Program is not restricted.
95
96(c) You must meet all of the following conditions with respect to the
97distribution of any work based on the Program:
98
99(i) All modified versions of the Program, must carry prominent notice
100stating that the Program has been modified. The notice must indicate who
101made the modifications and how the Program's files were modified and the
102date of any change;
103
104(ii) You must cause any work that you distribute or publish, that in whole
105or in part contains or is derived from the Program or any part thereof, to
106be licensed as a whole and at no charge to all third parties under the
107terms of this License;
108
109(iii) You must cause the Program, at each time it commences operation, to
110print or display an announcement including an appropriate copyright notice
111and a notice that there is no warranty (or else, saying that you provide a
112warranty).  The notice must also tell the user how to view the copy of the
113License included with the Program, and state that users may redistribute
114the Program only under the terms of this License;
115
116(iv) You must accompany any such work based on the Program with the
117complete corresponding machine-readable source code, delivered on a medium
118customarily used for software interchange. The source code for a work
119means the preferred form of the work for making modifications to it;
120
121(v) If you distribute any written or printed material at all with the
122Program or any work based on the Program, such material must include
123either a written copy of this License, or a prominent written indication
124that the Program or the work based on the Program is covered by this
125License and written instructions for printing and/or displaying the copy
126of the License on the distribution medium;
127
128(vi) You may not change the terms in this License or impose any further
129restrictions on the recipient's exercise of the rights granted herein.
130
1313. Reservation of Rights.
132
133No rights are granted to the Program except as expressly set forth herein.
134You may not copy, modify, sublicense, or distribute the Program except as
135expressly provided under this License.  Any attempt otherwise to copy,
136modify, sublicense or distribute the Program is void, and will
137automatically terminate your rights under this License.  However, parties
138who have received copies, or rights, from you under this License will not
139have their licenses terminated so long as such parties remain in full
140compliance.
141
1424. Limitations.
143
144BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
145THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
146OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
147PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
148OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
149MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
150TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
151PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
152REPAIR OR CORRECTION.
153
154IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
155ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY USE, MODIFY AND/OR
156REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
157INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
158ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
159LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
160SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
161WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
162ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
163
1645. General.
165
166Some of the source code aggregated with this distribution is licensed by
167third parties under different terms, so the restrictions above may not
168apply to such components.
169
170We do not imply to give any licenses to any patents or copyrights held by
171third parties.  As far as we know, all included source code is used in
172accordance with the relevant license agreements and can be used and
173distributed freely for any purpose (the GNU license being the most
174restrictive); see below for details.
175
176The RSA algorithm and even the concept of public key encryption are
177claimed to be patented in the United States.  These patents may interfere
178with your right to use this software.  It is possible to compile the
179software using the RSAREF2 library by giving --with-rsaref on the
180configure command line. This may or may not make it legal to use this
181software for non-commercial purposes in the United States (we have sent a
182query about this to RSADSI (on July 10, 1995), but have not received a
183final answer yet).  The RSAREF2 distribution is not included in this
184distribution, but can be obtained from almost any ftp site world-wide
185containing cryptographic materials.  Using RSAREF is not recommended
186outside the United States.  See "http://www.cs.hut.fi/crypto/" if you have
187trouble finding the RSAREF library.
188
189The IDEA algorithm is claimed to be patented in the United States and
190several other countries.  We have been told by Ascom-Tech (the patent
191holder) that IDEA can be used freely for non-commercial use.  A copy of
192their letter is at the end.  The software can be compiled without IDEA by
193specifying the --without-idea option on the configure command line.
194
195The DES implementation in this distribution is derived from the libdes
196library by Eric Young <eay@mincom.oz.au>.  It can be used under the Gnu
197General Public License (libdes-COPYING) or the Artistic License
198(libdes-ARTISTIC), at your option.  See libdes-README for more
199information. Eric Young has kindly given permission to distribute the
200derived version under these terms.  The file crypt.c is fcrypt.c from
201SSLeay-0.4.3a by Eric Young; he permits free use.
202
203The GNU Multiple Precision Library, included in this release and linked
204into the executable, is distributed under the GNU Library Public License.
205A copy can be found in gmp-2.0/COPYING.LIB.
206
207The zlib compression library is copyright Jean-loup Gailly and Mark Adler.
208Anyone is permitted to use the library for any purpose.  A copy of the
209license conditions can be found in zlib-1.0.4/README.
210
211The make-ssh-known-hosts script was contributed by Tero Kivinen
212<kivinen@niksula.hut.fi> and is distributed under the GNU General
213Public License.  A copy can be found in gnu-COPYING-GPL.
214
215Some files, such as memmove.c and random.c, are owned by the Regents of
216the University of California, and can be freely used and distributed.
217License terms are included in the affected files.  The file scp.c is
218derived from code owned by the Regents of the University of California,
219and can be used freely.
220
221The TSS encryption algorithm implementation in tss.c is copyright Timo
222Rinne <tri@iki.fi> and Cirion Oy.  It is used with permission, and
223permission has been given for anyone to use it for any purpose as part of
224SSH.
225
226The MD5 implementation in md5.c was taken from PGP and is due to Colin
227Plumb.  Comments in the file indicate that it is in the public domain.
228
229The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. Comments
230in the file indicate it may be used for any purpose without restrictions.
231
232In some countries, particularly France, Russia, Iraq, and Pakistan, it may
233be illegal to use any encryption at all without a special permit, and the
234rumor is that you cannot get a permit for any strong encryption.
235
236If you are in the United States, you should be aware that while this
237software was written outside the United States using information
238publicly available everywhere, the United States Government may
239consider it a criminal offence to export this software from the United
240States once it has been imported.  The rumor is that "the federal
241mandatory sentencing guidelines for this offence are 41 to 51 months
242in federal prison".  The rumor says that the US government considers
243putting the software available on an ftp site the same as exporting
244it.  Contact the Office of Defence Trade Controls if you need more
245information.  Also, please write to your congress and senate
246representatives to get these silly and unconstitutional restrictions
247dropped.
248
249Note that any information and cryptographic algorithms used in this
250software are publicly available on the Internet and at any major
251bookstore, scientific library, and patent office world-wide.  More
252information can be found e.g. at "http://www.cs.hut.fi/crypto/".
253
254The legal status of this program is some combination of all these
255permissions and restrictions.  Use only at your own responsibility. You
256will be responsible for any legal consequences yourself; we are not making
257any claims whether possessing or using this is legal or not in your
258country, and we are not taking any responsibility on your behalf.
259
260Below is a copy of a message that we received from Ascom, the holder of
261the IDEA patent.
262
263Date: Tue, 15 Aug 95 09:09:59 CET
264From: IDEA@ascom.ch (Licensing Systec)
265Encoding: 3001 Text
266To: ylo@cs.hut.fi
267Subject: Phone Call 15.8.95
268
269     Dear Mr. Ylonen
270     
271     Thank you for your inquiry about the IDEA encryption algorithm.
272     Please excuse the delay in answering your fax sent 26.6.95.
273     Here is the information you requested :
274     
275     Non commercial use of IDEA is free. The following examples (regarding
276     PGP) should clarify what we mean by commercial and non-commercial use
277     
278     Here are some examples of commercial use of PGP:
279     
280     1. When PGP is used for signing and/or encrypting e-mail messages
281     exchanged between two corporations.
282     
283     2. When a consultant uses PGP for his communications with his client
284     corporations.
285     
286     3. When a bank makes PGP available to its clients for telebanking and
287     charges them money for it (directly or indirectly).
288     
289     4. When you use the software you receive from a company for commercial
290     purposes (telebanking included).
291     
292     
293     Some examples of non commercial use:
294     
295     1. When an individual uses PGP for his private communications.
296     
297     2. When an individual obtains PGP on the Internet and uses it for
298     telebanking (assuming this is approved by the bank).
299     
300     3. When you use the software you receive from a company for private
301     purposes (telebanking excluded).
302     
303     
304     You may use IDEA freely within your software for non commercial use.
305     If you include IDEA in your software, it must include the following 
306     copy right statement :
307     
308     1. Copyright and Licensing Statement
309        IDEA(tm) is a trademark of Ascom Systec AG. There is no license fee
310        required for non-commercial use. Commercial users of IDEA may       
311        obtain licensing information from Ascom Systec AG. 
312        e-mail: IDEA@ascom.ch
313        fax: ++41 64 56 59 54
314     
315     
316     For selling the software commercially a product license is required:
317     
318     The PRODUCT LICENSE gives a software developer the right to implement
319     IDEA in a software product and to sell this product worldwide. With
320     the PRODUCT LICENSE we supply a source listing in C and a software
321     manual. We charge an initial fee per company and a percentage of sales
322     of the software product or products (typically between .5 and 4 per
323     cent of the sales price, depending on the price and the importance of
324     IDEA for the product).
325     
326     
327     For further information please do not hesitate to contact us.
328     
329     Best regards,
330     
331     Roland Weinhart
332     
333     
334     Ascom Systec Ltd
335     IDEA Licensing                    @@@@@ @@@@@ @@@@@ @@@@@ @@@@@@@
336     Gewerbepark                           @ @     @     @   @ @  @  @
337     CH-5506 Maegenwil                 @@@@@ @@@@@ @     @   @ @  @  @
338     Switzerland                       @   @     @ @     @   @ @  @  @
339     Phone ++41 64 56 59 54            @@@@@ @@@@@ @@@@@ @@@@@ @  @  @
340     Fax   ++41 64 56 59 98
Note: See TracBrowser for help on using the repository browser.