1 This file is part of the ssh software.
3 The licences which components of this software falls under are as
4 follows. First, we will summarize and say that that all components
5 are under a BSD licence, or a licence more free than that.
7 OpenSSH contains no GPL code.
10 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
13 * As far as I am concerned, the code I have written for this software
14 * can be used freely for any purpose. Any derived versions of this
15 * software must be clearly marked as such, and if the derived work is
16 * incompatible with the protocol description in the RFC file, it must be
17 * called by a name other than "ssh" or "Secure Shell".
20 * However, I am not implying to give any licenses to any patents or
21 * copyrights held by third parties, and the software includes parts that
22 * are not under my direct control. As far as I know, all included
23 * source code is used in accordance with the relevant license agreements
24 * and can be used freely for any purpose (the GNU license being the most
25 * restrictive); see below for details.
27 [However, none of that term is relevant at this point in time. All of
28 these restrictively licenced software components which he talks about
29 have been removed from OpenSSH, ie.
31 - RSA is no longer included, found in the OpenSSL library
32 - IDEA is no longer included, it's use is depricated
33 - DES is now external, in the OpenSSL library
34 - GMP is no longer used, and instead we call BN code from OpenSSL
35 - Zlib is now external, in a library
36 - The make-ssh-known-hosts script is no longer included
37 - TSS has been removed
38 - MD5 is now external, in the OpenSSL library
39 - RC4 support has been replaced with ARC4 support from OpenSSL
40 - Blowfish is now external, in the OpenSSL library
42 [The licence continues]
44 Note that any information and cryptographic algorithms used in this
45 software are publicly available on the Internet and at any major
46 bookstore, scientific library, and patent office worldwide. More
47 information can be found e.g. at "http://www.cs.hut.fi/crypto".
49 The legal status of this program is some combination of all these
50 permissions and restrictions. Use only at your own responsibility.
51 You will be responsible for any legal consequences yourself; I am not
52 making any claims whether possessing or using this is legal or not in
53 your country, and I am not taking any responsibility on your behalf.
58 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
59 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
60 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
61 PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
62 OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
63 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
64 TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
65 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
68 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
69 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
70 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
71 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
72 OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
73 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
74 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
75 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
76 POSSIBILITY OF SUCH DAMAGES.
79 The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
80 Comments in the file indicate it may be used for any purpose without
83 * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or
84 * code or tables extracted from it, as desired without restriction.
87 The 32-bit CRC compensation attack detector in deattack.c was
88 contributed by CORE SDI S.A. under a BSD-style license. See
89 http://www.core-sdi.com/english/ssh/ for details.
91 * Cryptographic attack detector for ssh - source code
93 * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
95 * All rights reserved. Redistribution and use in source and binary
96 * forms, with or without modification, are permitted provided that
97 * this copyright notice is retained.
99 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
100 * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
101 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
102 * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
105 * Ariel Futoransky <futo@core-sdi.com>
106 * <http://www.core-sdi.com>
109 Various parts are from the University of California.
111 * Copyright (c) 1983, 1987, 1989-1995
112 * The Regents of the University of California. All rights reserved.
114 * Redistribution and use in source and binary forms, with or without
115 * modification, are permitted provided that the following conditions
117 * 1. Redistributions of source code must retain the above copyright
118 * notice, this list of conditions and the following disclaimer.
119 * 2. Redistributions in binary form must reproduce the above copyright
120 * notice, this list of conditions and the following disclaimer in the
121 * documentation and/or other materials provided with the distribution.
122 * 3. All advertising materials mentioning features or use of this software
123 * must display the following acknowledgement:
124 * This product includes software developed by the University of
125 * California, Berkeley and its contributors.
126 * 4. Neither the name of the University nor the names of its contributors
127 * may be used to endorse or promote products derived from this software
128 * without specific prior written permission.
130 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
131 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
132 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
133 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
134 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
135 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
136 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
137 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
138 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
139 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
142 * Copyright (c) 1989, 1991, 1993, 1994
143 * The Regents of the University of California. All rights reserved.
145 * Redistribution and use in source and binary forms, with or without
146 * modification, are permitted provided that the following conditions
148 * 1. Redistributions of source code must retain the above copyright
149 * notice, this list of conditions and the following disclaimer.
150 * 2. Redistributions in binary form must reproduce the above copyright
151 * notice, this list of conditions and the following disclaimer in the
152 * documentation and/or other materials provided with the distribution.
154 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
155 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
156 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
157 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
158 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
159 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
160 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
161 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
162 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
163 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
167 Remaining components of the software are provided under a standard
168 2-term BSD licence with the following names as copyright holders:
176 * Redistribution and use in source and binary forms, with or without
177 * modification, are permitted provided that the following conditions
179 * 1. Redistributions of source code must retain the above copyright
180 * notice, this list of conditions and the following disclaimer.
181 * 2. Redistributions in binary form must reproduce the above copyright
182 * notice, this list of conditions and the following disclaimer in the
183 * documentation and/or other materials provided with the distribution.
185 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
186 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
187 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
188 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
189 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
190 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
191 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
192 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
193 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
194 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.