LICENCE revision 65668
172613SkrisThis file is part of the ssh software.
272613Skris
372613SkrisThe licences which components of this software falls under are as
472613Skrisfollows.  First, we will summarize and say that that all components
572613Skrisare under a BSD licence, or a licence more free than that.
672613Skris
772613SkrisOpenSSH contains no GPL code.
872613Skris
972613Skris1)
1072613Skris     * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
1172613Skris     *                    All rights reserved
1272613Skris     *
1372613Skris     * As far as I am concerned, the code I have written for this software
1472613Skris     * can be used freely for any purpose.  Any derived versions of this
1572613Skris     * software must be clearly marked as such, and if the derived work is
1672613Skris     * incompatible with the protocol description in the RFC file, it must be
1772613Skris     * called by a name other than "ssh" or "Secure Shell".
1872613Skris
1972613Skris    [Tatu continues]
2072613Skris     *  However, I am not implying to give any licenses to any patents or
2172613Skris     * copyrights held by third parties, and the software includes parts that
2272613Skris     * are not under my direct control.  As far as I know, all included
2376866Skris     * source code is used in accordance with the relevant license agreements
2472613Skris     * and can be used freely for any purpose (the GNU license being the most
2572613Skris     * restrictive); see below for details.
2672613Skris
2772613Skris    [However, none of that term is relevant at this point in time.  All of
2872613Skris    these restrictively licenced software components which he talks about
2972613Skris    have been removed from OpenSSH, ie.
3072613Skris
3172613Skris     - RSA is no longer included, found in the OpenSSL library
3272613Skris     - IDEA is no longer included, it's use is depricated
3372613Skris     - DES is now external, in the OpenSSL library
3472613Skris     - GMP is no longer used, and instead we call BN code from OpenSSL
35     - Zlib is now external, in a library
36     - The make-ssh-known-hosts script is no longer included
37     - TSS has been removed
38     - MD5 is now external, in the OpenSSL library
39     - RC4 support has been removed
40     - Blowfish is now external, in the OpenSSL library
41
42    [The licence continues]
43
44    Note that any information and cryptographic algorithms used in this
45    software are publicly available on the Internet and at any major
46    bookstore, scientific library, and patent office worldwide.  More
47    information can be found e.g. at "http://www.cs.hut.fi/crypto".
48    
49    The legal status of this program is some combination of all these
50    permissions and restrictions.  Use only at your own responsibility.
51    You will be responsible for any legal consequences yourself; I am not
52    making any claims whether possessing or using this is legal or not in
53    your country, and I am not taking any responsibility on your behalf.
54    
55    
56    			    NO WARRANTY
57    
58    BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
59    FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
60    OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
61    PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
62    OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
63    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
64    TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
65    PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
66    REPAIR OR CORRECTION.
67    
68    IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
69    WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
70    REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
71    INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
72    OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
73    TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
74    YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
75    PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
76    POSSIBILITY OF SUCH DAMAGES.
77
782)
79    The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
80    Comments in the file indicate it may be used for any purpose without
81    restrictions:
82
83     * COPYRIGHT (C) 1986 Gary S. Brown.  You may use this program, or
84     * code or tables extracted from it, as desired without restriction.
85
863)
87    The 32-bit CRC compensation attack detector in deattack.c was
88    contributed by CORE SDI S.A. under a BSD-style license. See
89    http://www.core-sdi.com/english/ssh/ for details.
90
91     * Cryptographic attack detector for ssh - source code
92     *
93     * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
94     *
95     * All rights reserved. Redistribution and use in source and binary
96     * forms, with or without modification, are permitted provided that
97     * this copyright notice is retained.
98     *
99     * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
100     * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
101     * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
102     * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
103     * SOFTWARE.
104     *
105     * Ariel Futoransky <futo@core-sdi.com>
106     * <http://www.core-sdi.com>
107    
1084)
109    Remaining components of the software are provided under a standard
110    2-term BSD licence with the following names as copyright holders:
111
112	Markus Friedl
113	Theo de Raadt
114	Niels Provos
115	Dug Song
116	Aaron Campbell
117
118     * Redistribution and use in source and binary forms, with or without
119     * modification, are permitted provided that the following conditions
120     * are met:
121     * 1. Redistributions of source code must retain the above copyright
122     *    notice, this list of conditions and the following disclaimer.
123     * 2. Redistributions in binary form must reproduce the above copyright
124     *    notice, this list of conditions and the following disclaimer in the
125     *    documentation and/or other materials provided with the distribution.
126     *
127     * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
128     * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
129     * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
130     * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
131     * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
132     * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
133     * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
134     * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
135     * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
136     * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
137