1This file is part of the OpenSSH software. 2 3The licences which components of this software fall under are as 4follows. First, we will summarize and say that all components 5are under a BSD licence, or a licence more free than that. 6 7OpenSSH contains no GPL code. 8 91) 10 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 11 * All rights reserved 12 * 13 * As far as I am concerned, the code I have written for this software 14 * can be used freely for any purpose. Any derived versions of this 15 * software must be clearly marked as such, and if the derived work is 16 * incompatible with the protocol description in the RFC file, it must be 17 * called by a name other than "ssh" or "Secure Shell". 18 19 [Tatu continues] 20 * However, I am not implying to give any licenses to any patents or 21 * copyrights held by third parties, and the software includes parts that 22 * are not under my direct control. As far as I know, all included 23 * source code is used in accordance with the relevant license agreements 24 * and can be used freely for any purpose (the GNU license being the most 25 * restrictive); see below for details. 26 27 [However, none of that term is relevant at this point in time. All of 28 these restrictively licenced software components which he talks about 29 have been removed from OpenSSH, i.e., 30 31 - RSA is no longer included, found in the OpenSSL library 32 - IDEA is no longer included, its use is deprecated 33 - DES is now external, in the OpenSSL library 34 - GMP is no longer used, and instead we call BN code from OpenSSL 35 - Zlib is now external, in a library 36 - The make-ssh-known-hosts script is no longer included 37 - TSS has been removed 38 - MD5 is now external, in the OpenSSL library 39 - RC4 support has been replaced with ARC4 support from OpenSSL 40 - Blowfish is now external, in the OpenSSL library 41 42 [The licence continues] 43 44 Note that any information and cryptographic algorithms used in this 45 software are publicly available on the Internet and at any major 46 bookstore, scientific library, and patent office worldwide. More 47 information can be found e.g. at "http://www.cs.hut.fi/crypto". 48 49 The legal status of this program is some combination of all these 50 permissions and restrictions. Use only at your own responsibility. 51 You will be responsible for any legal consequences yourself; I am not 52 making any claims whether possessing or using this is legal or not in 53 your country, and I am not taking any responsibility on your behalf. 54 55 56 NO WARRANTY 57 58 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY 59 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN 60 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES 61 PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED 62 OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 63 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS 64 TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE 65 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, 66 REPAIR OR CORRECTION. 67 68 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 69 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR 70 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, 71 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING 72 OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED 73 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY 74 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER 75 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE 76 POSSIBILITY OF SUCH DAMAGES. 77 782) 79 The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. 80 Comments in the file indicate it may be used for any purpose without 81 restrictions: 82 83 * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or 84 * code or tables extracted from it, as desired without restriction. 85 863) 87 The 32-bit CRC compensation attack detector in deattack.c was 88 contributed by CORE SDI S.A. under a BSD-style license. 89 90 * Cryptographic attack detector for ssh - source code 91 * 92 * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. 93 * 94 * All rights reserved. Redistribution and use in source and binary 95 * forms, with or without modification, are permitted provided that 96 * this copyright notice is retained. 97 * 98 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 99 * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE 100 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR 101 * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS 102 * SOFTWARE. 103 * 104 * Ariel Futoransky <futo@core-sdi.com> 105 * <http://www.core-sdi.com> 106 1074) 108 ssh-keygen was contributed by David Mazieres under a BSD-style 109 license. 110 111 * Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 112 * 113 * Modification and redistribution in source and binary forms is 114 * permitted provided that due credit is given to the author and the 115 * OpenBSD project by leaving this copyright notice intact. 116 1175) 118 The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers 119 and Paulo Barreto is in the public domain and distributed 120 with the following license: 121 122 * @version 3.0 (December 2000) 123 * 124 * Optimised ANSI C code for the Rijndael cipher (now AES) 125 * 126 * @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> 127 * @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> 128 * @author Paulo Barreto <paulo.barreto@terra.com.br> 129 * 130 * This code is hereby placed in the public domain. 131 * 132 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS 133 * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 134 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 135 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE 136 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 137 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 138 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 139 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 140 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE 141 * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 142 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 143 1446) 145 One component of the ssh source code is under a 4-clause BSD license, 146 held by the University of California, since we pulled these parts from 147 original Berkeley code. The Regents of the University of California 148 have declared that term 3 is no longer enforceable on their source code, 149 but we retain that license as is. 150 151 * Copyright (c) 1983, 1990, 1992, 1993, 1995 152 * The Regents of the University of California. All rights reserved. 153 * 154 * Redistribution and use in source and binary forms, with or without 155 * modification, are permitted provided that the following conditions 156 * are met: 157 * 1. Redistributions of source code must retain the above copyright 158 * notice, this list of conditions and the following disclaimer. 159 * 2. Redistributions in binary form must reproduce the above copyright 160 * notice, this list of conditions and the following disclaimer in the 161 * documentation and/or other materials provided with the distribution. 162 * 3. All advertising materials mentioning features or use of this software 163 * must display the following acknowledgement: 164 * This product includes software developed by the University of 165 * California, Berkeley and its contributors. 166 * 4. Neither the name of the University nor the names of its contributors 167 * may be used to endorse or promote products derived from this software 168 * without specific prior written permission. 169 * 170 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 171 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 172 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 173 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 174 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 175 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 176 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 177 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 178 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 179 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 180 * SUCH DAMAGE. 181 1827) 183 Remaining components of the software are provided under a standard 184 2-term BSD licence with the following names as copyright holders: 185 186 Markus Friedl 187 Theo de Raadt 188 Niels Provos 189 Dug Song 190 Aaron Campbell 191 Damien Miller 192 Kevin Steves 193 Daniel Kouril 194 Per Allansson 195 196 * Redistribution and use in source and binary forms, with or without 197 * modification, are permitted provided that the following conditions 198 * are met: 199 * 1. Redistributions of source code must retain the above copyright 200 * notice, this list of conditions and the following disclaimer. 201 * 2. Redistributions in binary form must reproduce the above copyright 202 * notice, this list of conditions and the following disclaimer in the 203 * documentation and/or other materials provided with the distribution. 204 * 205 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 206 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 207 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 208 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 209 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 210 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 211 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 212 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 213 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 214 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 215