1 | SSH (Secure Shell) NON-COMMERCIAL LICENSE (Version 1, May 27th, 1996) |
---|
2 | |
---|
3 | Copyright (C) 1995, 1996, 1997, 1998 SSH Communications Security Ltd., Finland |
---|
4 | <info@ssh.fi>. All rights reserved. |
---|
5 | |
---|
6 | For commercial licensing please contact Data Fellows, Ltd. Data |
---|
7 | Fellows has exclusive licensing rights for the technology for |
---|
8 | commercial purposes. Data Fellows offers commercial versions of SSH |
---|
9 | with maintenance agreements in addition to various licensing options |
---|
10 | for the technology itself. You can contact Data Fellows at |
---|
11 | <f-secure-ssh-sales@datafellows.com>, http://www.datafellows.com/, tel |
---|
12 | Int.+358-9-478 444 or fax Int.+358-9-4784 4599. |
---|
13 | |
---|
14 | This License applies to the computer program(s) known as "SSH (Secure |
---|
15 | Shell)." The "Program", below, refers to such program, and a "work |
---|
16 | based on the Program" means either the Program or any derivative work |
---|
17 | of the Program, such as a translation or a modification. The Program |
---|
18 | is a copyrighted work whose copyright is held by SSH Communications |
---|
19 | Security (the "Licensor"). |
---|
20 | |
---|
21 | BY USING, MODIFYING AND/OR DISTRIBUTING THE PROGRAM (OR ANY WORK BASED ON |
---|
22 | THE PROGRAM), YOU INDICATE YOUR ACCEPTANCE OF THIS LICENSE, AND ALL ITS |
---|
23 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTING OR MODIFYING THE PROGRAM OR |
---|
24 | WORKS BASED ON IT. NOTHING OTHER THAN THIS LICENSE GRANTS YOU PERMISSION |
---|
25 | TO USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM OR ITS DERIVATIVE WORKS. |
---|
26 | THESE ACTIONS ARE PROHIBITED BY LAW. IF YOU DO NOT ACCEPT THESE TERMS AND |
---|
27 | CONDITIONS, DO NOT USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM. |
---|
28 | |
---|
29 | 1. Licenses. |
---|
30 | |
---|
31 | Licensor hereby grants you the following rights, provided that you comply |
---|
32 | with all of the restrictions set forth in this License and provided, |
---|
33 | further, that you distribute an unmodified copy of this License with the |
---|
34 | Program: |
---|
35 | |
---|
36 | (a) You may copy and distribute literal (i.e., verbatim) copies of the |
---|
37 | Program's source code as you receive it throughout the world, in any |
---|
38 | medium. |
---|
39 | |
---|
40 | Local regulations may exist which limit your rights to distribute or use |
---|
41 | cryptographic software. The Licensor is not responsible for unauthorized |
---|
42 | distribution or use of the Program in such territories. |
---|
43 | |
---|
44 | (b) You may use the program for non-commercial purposes only, meaning |
---|
45 | that the program must not be sold commercially as a separate product, |
---|
46 | as part of a bigger product or project, or otherwise used for |
---|
47 | financial gain without a separate license. Please see Section 2, |
---|
48 | Restrictions, for more details. |
---|
49 | |
---|
50 | Use by individuals and non-profit organizations is always allowed. |
---|
51 | Companies are permitted to use this program as long as it is not used for |
---|
52 | revenue-generating purposes. For example, an Internet service provider is |
---|
53 | allowed to install this program on their systems and permit clients to use |
---|
54 | SSH to connect; however, actively distributing SSH to clients for the |
---|
55 | purpose of providing added value requires separate licensing. Similarly, |
---|
56 | a consultant may freely install this software on a client's machine for |
---|
57 | his own use, but if he/she sells the client a system that uses SSH as a |
---|
58 | component, a separate license is required. If a company includes this |
---|
59 | program or a derivative work thereof, as part of its product, commercial |
---|
60 | licensing is required. |
---|
61 | |
---|
62 | (c) You may build derived versions of this software under the restrictions |
---|
63 | stated in Section 2, Restrictions, of this license. The derived versions |
---|
64 | must be clearly marked as such and must be called by a name other than SSH |
---|
65 | or F-Secure SSH. SSH and F-Secure SSH are trademarks of SSH Communications |
---|
66 | Security and Data Fellows. |
---|
67 | |
---|
68 | All derived versions of the Program must be made freely available under |
---|
69 | the terms of this license. SSH Communications Security and Data Fellows |
---|
70 | must be given the right to use the modified source code in their products |
---|
71 | without any compensation and without being required to separately name the |
---|
72 | parties whose modifications are being used. |
---|
73 | |
---|
74 | 2. Restrictions. |
---|
75 | |
---|
76 | (a) Distribution of the Program or any work based on the Program by a |
---|
77 | commercial organization to any third party is prohibited if any payment is |
---|
78 | made in connection with such distribution, whether directly (as in payment |
---|
79 | for a copy of the Program) or indirectly (as in payment for some service |
---|
80 | related to the Program, or payment for some product or service that |
---|
81 | includes a copy of the Program "without charge", or payment for some |
---|
82 | product or service the delivery of which requires for the recipient to |
---|
83 | retrieve/download or otherwise obtain a copy of the Program; these are |
---|
84 | only examples, and not an exhaustive enumeration of prohibited |
---|
85 | activities). |
---|
86 | |
---|
87 | As an exception to the above rule, putting this program on CD-ROMs |
---|
88 | containing other free software is explicitly permitted even when a modest |
---|
89 | distribution fee is charged for the CD, as long as this software is not a |
---|
90 | primary selling argument for the CD. |
---|
91 | |
---|
92 | (b) Activities other than copying, distribution and modification of the |
---|
93 | Program are not subject to this License and they are outside its scope. |
---|
94 | Functional use (running) of the Program is not restricted. |
---|
95 | |
---|
96 | (c) You must meet all of the following conditions with respect to the |
---|
97 | distribution of any work based on the Program: |
---|
98 | |
---|
99 | (i) All modified versions of the Program, must carry prominent notice |
---|
100 | stating that the Program has been modified. The notice must indicate who |
---|
101 | made the modifications and how the Program's files were modified and the |
---|
102 | date of any change; |
---|
103 | |
---|
104 | (ii) You must cause any work that you distribute or publish, that in whole |
---|
105 | or in part contains or is derived from the Program or any part thereof, to |
---|
106 | be licensed as a whole and at no charge to all third parties under the |
---|
107 | terms of this License; |
---|
108 | |
---|
109 | (iii) You must cause the Program, at each time it commences operation, to |
---|
110 | print or display an announcement including an appropriate copyright notice |
---|
111 | and a notice that there is no warranty (or else, saying that you provide a |
---|
112 | warranty). The notice must also tell the user how to view the copy of the |
---|
113 | License included with the Program, and state that users may redistribute |
---|
114 | the Program only under the terms of this License; |
---|
115 | |
---|
116 | (iv) You must accompany any such work based on the Program with the |
---|
117 | complete corresponding machine-readable source code, delivered on a medium |
---|
118 | customarily used for software interchange. The source code for a work |
---|
119 | means the preferred form of the work for making modifications to it; |
---|
120 | |
---|
121 | (v) If you distribute any written or printed material at all with the |
---|
122 | Program or any work based on the Program, such material must include |
---|
123 | either a written copy of this License, or a prominent written indication |
---|
124 | that the Program or the work based on the Program is covered by this |
---|
125 | License and written instructions for printing and/or displaying the copy |
---|
126 | of the License on the distribution medium; |
---|
127 | |
---|
128 | (vi) You may not change the terms in this License or impose any further |
---|
129 | restrictions on the recipient's exercise of the rights granted herein. |
---|
130 | |
---|
131 | 3. Reservation of Rights. |
---|
132 | |
---|
133 | No rights are granted to the Program except as expressly set forth herein. |
---|
134 | You may not copy, modify, sublicense, or distribute the Program except as |
---|
135 | expressly provided under this License. Any attempt otherwise to copy, |
---|
136 | modify, sublicense or distribute the Program is void, and will |
---|
137 | automatically terminate your rights under this License. However, parties |
---|
138 | who have received copies, or rights, from you under this License will not |
---|
139 | have their licenses terminated so long as such parties remain in full |
---|
140 | compliance. |
---|
141 | |
---|
142 | 4. Limitations. |
---|
143 | |
---|
144 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR |
---|
145 | THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN |
---|
146 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES |
---|
147 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED |
---|
148 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
---|
149 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS |
---|
150 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE |
---|
151 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, |
---|
152 | REPAIR OR CORRECTION. |
---|
153 | |
---|
154 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL |
---|
155 | ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY USE, MODIFY AND/OR |
---|
156 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, |
---|
157 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES |
---|
158 | ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT |
---|
159 | LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES |
---|
160 | SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE |
---|
161 | WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN |
---|
162 | ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. |
---|
163 | |
---|
164 | 5. General. |
---|
165 | |
---|
166 | Some of the source code aggregated with this distribution is licensed by |
---|
167 | third parties under different terms, so the restrictions above may not |
---|
168 | apply to such components. |
---|
169 | |
---|
170 | We do not imply to give any licenses to any patents or copyrights held by |
---|
171 | third parties. As far as we know, all included source code is used in |
---|
172 | accordance with the relevant license agreements and can be used and |
---|
173 | distributed freely for any purpose (the GNU license being the most |
---|
174 | restrictive); see below for details. |
---|
175 | |
---|
176 | The RSA algorithm and even the concept of public key encryption are |
---|
177 | claimed to be patented in the United States. These patents may interfere |
---|
178 | with your right to use this software. It is possible to compile the |
---|
179 | software using the RSAREF2 library by giving --with-rsaref on the |
---|
180 | configure command line. This may or may not make it legal to use this |
---|
181 | software for non-commercial purposes in the United States (we have sent a |
---|
182 | query about this to RSADSI (on July 10, 1995), but have not received a |
---|
183 | final answer yet). The RSAREF2 distribution is not included in this |
---|
184 | distribution, but can be obtained from almost any ftp site world-wide |
---|
185 | containing cryptographic materials. Using RSAREF is not recommended |
---|
186 | outside the United States. See "http://www.cs.hut.fi/crypto/" if you have |
---|
187 | trouble finding the RSAREF library. |
---|
188 | |
---|
189 | The IDEA algorithm is claimed to be patented in the United States and |
---|
190 | several other countries. We have been told by Ascom-Tech (the patent |
---|
191 | holder) that IDEA can be used freely for non-commercial use. A copy of |
---|
192 | their letter is at the end. The software can be compiled without IDEA by |
---|
193 | specifying the --without-idea option on the configure command line. |
---|
194 | |
---|
195 | The DES implementation in this distribution is derived from the libdes |
---|
196 | library by Eric Young <eay@mincom.oz.au>. It can be used under the Gnu |
---|
197 | General Public License (libdes-COPYING) or the Artistic License |
---|
198 | (libdes-ARTISTIC), at your option. See libdes-README for more |
---|
199 | information. Eric Young has kindly given permission to distribute the |
---|
200 | derived version under these terms. The file crypt.c is fcrypt.c from |
---|
201 | SSLeay-0.4.3a by Eric Young; he permits free use. |
---|
202 | |
---|
203 | The GNU Multiple Precision Library, included in this release and linked |
---|
204 | into the executable, is distributed under the GNU Library Public License. |
---|
205 | A copy can be found in gmp-2.0/COPYING.LIB. |
---|
206 | |
---|
207 | The zlib compression library is copyright Jean-loup Gailly and Mark Adler. |
---|
208 | Anyone is permitted to use the library for any purpose. A copy of the |
---|
209 | license conditions can be found in zlib-1.0.4/README. |
---|
210 | |
---|
211 | The make-ssh-known-hosts script was contributed by Tero Kivinen |
---|
212 | <kivinen@niksula.hut.fi> and is distributed under the GNU General |
---|
213 | Public License. A copy can be found in gnu-COPYING-GPL. |
---|
214 | |
---|
215 | Some files, such as memmove.c and random.c, are owned by the Regents of |
---|
216 | the University of California, and can be freely used and distributed. |
---|
217 | License terms are included in the affected files. The file scp.c is |
---|
218 | derived from code owned by the Regents of the University of California, |
---|
219 | and can be used freely. |
---|
220 | |
---|
221 | The TSS encryption algorithm implementation in tss.c is copyright Timo |
---|
222 | Rinne <tri@iki.fi> and Cirion Oy. It is used with permission, and |
---|
223 | permission has been given for anyone to use it for any purpose as part of |
---|
224 | SSH. |
---|
225 | |
---|
226 | The MD5 implementation in md5.c was taken from PGP and is due to Colin |
---|
227 | Plumb. Comments in the file indicate that it is in the public domain. |
---|
228 | |
---|
229 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. Comments |
---|
230 | in the file indicate it may be used for any purpose without restrictions. |
---|
231 | |
---|
232 | In some countries, particularly France, Russia, Iraq, and Pakistan, it may |
---|
233 | be illegal to use any encryption at all without a special permit, and the |
---|
234 | rumor is that you cannot get a permit for any strong encryption. |
---|
235 | |
---|
236 | If you are in the United States, you should be aware that while this |
---|
237 | software was written outside the United States using information |
---|
238 | publicly available everywhere, the United States Government may |
---|
239 | consider it a criminal offence to export this software from the United |
---|
240 | States once it has been imported. The rumor is that "the federal |
---|
241 | mandatory sentencing guidelines for this offence are 41 to 51 months |
---|
242 | in federal prison". The rumor says that the US government considers |
---|
243 | putting the software available on an ftp site the same as exporting |
---|
244 | it. Contact the Office of Defence Trade Controls if you need more |
---|
245 | information. Also, please write to your congress and senate |
---|
246 | representatives to get these silly and unconstitutional restrictions |
---|
247 | dropped. |
---|
248 | |
---|
249 | Note that any information and cryptographic algorithms used in this |
---|
250 | software are publicly available on the Internet and at any major |
---|
251 | bookstore, scientific library, and patent office world-wide. More |
---|
252 | information can be found e.g. at "http://www.cs.hut.fi/crypto/". |
---|
253 | |
---|
254 | The legal status of this program is some combination of all these |
---|
255 | permissions and restrictions. Use only at your own responsibility. You |
---|
256 | will be responsible for any legal consequences yourself; we are not making |
---|
257 | any claims whether possessing or using this is legal or not in your |
---|
258 | country, and we are not taking any responsibility on your behalf. |
---|
259 | |
---|
260 | Below is a copy of a message that we received from Ascom, the holder of |
---|
261 | the IDEA patent. |
---|
262 | |
---|
263 | Date: Tue, 15 Aug 95 09:09:59 CET |
---|
264 | From: IDEA@ascom.ch (Licensing Systec) |
---|
265 | Encoding: 3001 Text |
---|
266 | To: ylo@cs.hut.fi |
---|
267 | Subject: Phone Call 15.8.95 |
---|
268 | |
---|
269 | Dear Mr. Ylonen |
---|
270 | |
---|
271 | Thank you for your inquiry about the IDEA encryption algorithm. |
---|
272 | Please excuse the delay in answering your fax sent 26.6.95. |
---|
273 | Here is the information you requested : |
---|
274 | |
---|
275 | Non commercial use of IDEA is free. The following examples (regarding |
---|
276 | PGP) should clarify what we mean by commercial and non-commercial use |
---|
277 | |
---|
278 | Here are some examples of commercial use of PGP: |
---|
279 | |
---|
280 | 1. When PGP is used for signing and/or encrypting e-mail messages |
---|
281 | exchanged between two corporations. |
---|
282 | |
---|
283 | 2. When a consultant uses PGP for his communications with his client |
---|
284 | corporations. |
---|
285 | |
---|
286 | 3. When a bank makes PGP available to its clients for telebanking and |
---|
287 | charges them money for it (directly or indirectly). |
---|
288 | |
---|
289 | 4. When you use the software you receive from a company for commercial |
---|
290 | purposes (telebanking included). |
---|
291 | |
---|
292 | |
---|
293 | Some examples of non commercial use: |
---|
294 | |
---|
295 | 1. When an individual uses PGP for his private communications. |
---|
296 | |
---|
297 | 2. When an individual obtains PGP on the Internet and uses it for |
---|
298 | telebanking (assuming this is approved by the bank). |
---|
299 | |
---|
300 | 3. When you use the software you receive from a company for private |
---|
301 | purposes (telebanking excluded). |
---|
302 | |
---|
303 | |
---|
304 | You may use IDEA freely within your software for non commercial use. |
---|
305 | If you include IDEA in your software, it must include the following |
---|
306 | copy right statement : |
---|
307 | |
---|
308 | 1. Copyright and Licensing Statement |
---|
309 | IDEA(tm) is a trademark of Ascom Systec AG. There is no license fee |
---|
310 | required for non-commercial use. Commercial users of IDEA may |
---|
311 | obtain licensing information from Ascom Systec AG. |
---|
312 | e-mail: IDEA@ascom.ch |
---|
313 | fax: ++41 64 56 59 54 |
---|
314 | |
---|
315 | |
---|
316 | For selling the software commercially a product license is required: |
---|
317 | |
---|
318 | The PRODUCT LICENSE gives a software developer the right to implement |
---|
319 | IDEA in a software product and to sell this product worldwide. With |
---|
320 | the PRODUCT LICENSE we supply a source listing in C and a software |
---|
321 | manual. We charge an initial fee per company and a percentage of sales |
---|
322 | of the software product or products (typically between .5 and 4 per |
---|
323 | cent of the sales price, depending on the price and the importance of |
---|
324 | IDEA for the product). |
---|
325 | |
---|
326 | |
---|
327 | For further information please do not hesitate to contact us. |
---|
328 | |
---|
329 | Best regards, |
---|
330 | |
---|
331 | Roland Weinhart |
---|
332 | |
---|
333 | |
---|
334 | Ascom Systec Ltd |
---|
335 | IDEA Licensing @@@@@ @@@@@ @@@@@ @@@@@ @@@@@@@ |
---|
336 | Gewerbepark @ @ @ @ @ @ @ @ |
---|
337 | CH-5506 Maegenwil @@@@@ @@@@@ @ @ @ @ @ @ |
---|
338 | Switzerland @ @ @ @ @ @ @ @ @ |
---|
339 | Phone ++41 64 56 59 54 @@@@@ @@@@@ @@@@@ @@@@@ @ @ @ |
---|
340 | Fax ++41 64 56 59 98 |
---|