diff options
author | Damien Miller <djm@mindrot.org> | 2000-09-30 14:40:39 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-09-30 14:40:39 +1100 |
commit | 7294baaf6ab389fd206899d68a1ad400ba2f4508 (patch) | |
tree | 14d1cfbff2a3fc2c1507bd96496406cea90f2298 | |
parent | b27ef9e17a7a23f3e4eecee47b0345ad7a5fd361 (diff) |
- (djm) Forgot to cvs add LICENSE file
-rw-r--r-- | ChangeLog | 1 | ||||
-rw-r--r-- | LICENCE | 136 |
2 files changed, 137 insertions, 0 deletions
@@ -8,6 +8,7 @@ | |||
8 | <oetiker@ee.ethz.ch>. Fix from Markus Friedl <markus@cvs.openbsd.org> | 8 | <oetiker@ee.ethz.ch>. Fix from Markus Friedl <markus@cvs.openbsd.org> |
9 | - (djm) Add recent InitScripts as a RPM dependancy for openssh-server | 9 | - (djm) Add recent InitScripts as a RPM dependancy for openssh-server |
10 | patch from Pekka Savola <pekkas@netcore.fi> | 10 | patch from Pekka Savola <pekkas@netcore.fi> |
11 | - (djm) Forgot to cvs add LICENSE file | ||
11 | - (djm) CVS OpenBSD sync: | 12 | - (djm) CVS OpenBSD sync: |
12 | - markus@cvs.openbsd.org 2000/09/26 13:59:59 | 13 | - markus@cvs.openbsd.org 2000/09/26 13:59:59 |
13 | [clientloop.c] | 14 | [clientloop.c] |
diff --git a/LICENCE b/LICENCE new file mode 100644 index 000000000..7c2346a04 --- /dev/null +++ b/LICENCE | |||
@@ -0,0 +1,136 @@ | |||
1 | This file is part of the ssh software. | ||
2 | |||
3 | The licences which components of this software falls under are as | ||
4 | follows. First, we will summarize and say that that all components | ||
5 | are under a BSD licence, or a licence more free than that. | ||
6 | |||
7 | OpenSSH contains no GPL code. | ||
8 | |||
9 | 1) | ||
10 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||
11 | * All rights reserved | ||
12 | * | ||
13 | * As far as I am concerned, the code I have written for this software | ||
14 | * can be used freely for any purpose. Any derived versions of this | ||
15 | * software must be clearly marked as such, and if the derived work is | ||
16 | * incompatible with the protocol description in the RFC file, it must be | ||
17 | * called by a name other than "ssh" or "Secure Shell". | ||
18 | |||
19 | [Tatu continues] | ||
20 | * However, I am not implying to give any licenses to any patents or | ||
21 | * copyrights held by third parties, and the software includes parts that | ||
22 | * are not under my direct control. As far as I know, all included | ||
23 | * source code is used in accordance with the relevant license agreements | ||
24 | * and can be used freely for any purpose (the GNU license being the most | ||
25 | * restrictive); see below for details. | ||
26 | |||
27 | [However, none of that term is relevant at this point in time. All of | ||
28 | these restrictively licenced software components which he talks about | ||
29 | have been removed from OpenSSH, ie. | ||
30 | |||
31 | - RSA is no longer included, found in the OpenSSL library | ||
32 | - IDEA is no longer included, it's use is depricated | ||
33 | - DES is now external, in the OpenSSL library | ||
34 | - GMP is no longer used, and instead we call BN code from OpenSSL | ||
35 | - Zlib is now external, in a library | ||
36 | - The make-ssh-known-hosts script is no longer included | ||
37 | - TSS has been removed | ||
38 | - MD5 is now external, in the OpenSSL library | ||
39 | - RC4 support has been replaced with ARC4 support from OpenSSL | ||
40 | - Blowfish is now external, in the OpenSSL library | ||
41 | |||
42 | [The licence continues] | ||
43 | |||
44 | Note that any information and cryptographic algorithms used in this | ||
45 | software are publicly available on the Internet and at any major | ||
46 | bookstore, scientific library, and patent office worldwide. More | ||
47 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | ||
48 | |||
49 | The legal status of this program is some combination of all these | ||
50 | permissions and restrictions. Use only at your own responsibility. | ||
51 | You will be responsible for any legal consequences yourself; I am not | ||
52 | making any claims whether possessing or using this is legal or not in | ||
53 | your country, and I am not taking any responsibility on your behalf. | ||
54 | |||
55 | |||
56 | NO WARRANTY | ||
57 | |||
58 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | ||
59 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | ||
60 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | ||
61 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | ||
62 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | ||
63 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | ||
64 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | ||
65 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | ||
66 | REPAIR OR CORRECTION. | ||
67 | |||
68 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | ||
69 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | ||
70 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | ||
71 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | ||
72 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | ||
73 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | ||
74 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | ||
75 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | ||
76 | POSSIBILITY OF SUCH DAMAGES. | ||
77 | |||
78 | 2) | ||
79 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | ||
80 | Comments in the file indicate it may be used for any purpose without | ||
81 | restrictions: | ||
82 | |||
83 | * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or | ||
84 | * code or tables extracted from it, as desired without restriction. | ||
85 | |||
86 | 3) | ||
87 | The 32-bit CRC compensation attack detector in deattack.c was | ||
88 | contributed by CORE SDI S.A. under a BSD-style license. See | ||
89 | http://www.core-sdi.com/english/ssh/ for details. | ||
90 | |||
91 | * Cryptographic attack detector for ssh - source code | ||
92 | * | ||
93 | * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. | ||
94 | * | ||
95 | * All rights reserved. Redistribution and use in source and binary | ||
96 | * forms, with or without modification, are permitted provided that | ||
97 | * this copyright notice is retained. | ||
98 | * | ||
99 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED | ||
100 | * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE | ||
101 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR | ||
102 | * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS | ||
103 | * SOFTWARE. | ||
104 | * | ||
105 | * Ariel Futoransky <futo@core-sdi.com> | ||
106 | * <http://www.core-sdi.com> | ||
107 | |||
108 | 4) | ||
109 | Remaining components of the software are provided under a standard | ||
110 | 2-term BSD licence with the following names as copyright holders: | ||
111 | |||
112 | Markus Friedl | ||
113 | Theo de Raadt | ||
114 | Niels Provos | ||
115 | Dug Song | ||
116 | Aaron Campbell | ||
117 | |||
118 | * Redistribution and use in source and binary forms, with or without | ||
119 | * modification, are permitted provided that the following conditions | ||
120 | * are met: | ||
121 | * 1. Redistributions of source code must retain the above copyright | ||
122 | * notice, this list of conditions and the following disclaimer. | ||
123 | * 2. Redistributions in binary form must reproduce the above copyright | ||
124 | * notice, this list of conditions and the following disclaimer in the | ||
125 | * documentation and/or other materials provided with the distribution. | ||
126 | * | ||
127 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | ||
128 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | ||
129 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | ||
130 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | ||
131 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
132 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | ||
133 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | ||
134 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
135 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | ||
136 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||