summaryrefslogtreecommitdiff
path: root/COPYING.Ylonen
diff options
context:
space:
mode:
Diffstat (limited to 'COPYING.Ylonen')
-rw-r--r--COPYING.Ylonen70
1 files changed, 0 insertions, 70 deletions
diff --git a/COPYING.Ylonen b/COPYING.Ylonen
deleted file mode 100644
index ad17df17a..000000000
--- a/COPYING.Ylonen
+++ /dev/null
@@ -1,70 +0,0 @@
1This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
2
3
4COPYING POLICY AND OTHER LEGAL ISSUES
5
6As far as I am concerned, the code I have written for this software
7can be used freely for any purpose. Any derived versions of this
8software must be clearly marked as such, and if the derived work is
9incompatible with the protocol description in the RFC file, it must be
10called by a name other than "ssh" or "Secure Shell".
11
12However, I am not implying to give any licenses to any patents or
13copyrights held by third parties, and the software includes parts that
14are not under my direct control. As far as I know, all included
15source code is used in accordance with the relevant license agreements
16and can be used freely for any purpose (the GNU license being the most
17restrictive); see below for details.
18
19[ RSA is no longer included. ]
20[ IDEA is no longer included. ]
21[ DES is now external. ]
22[ GMP is now external. No more GNU licence. ]
23[ Zlib is now external. ]
24[ The make-ssh-known-hosts script is no longer included. ]
25[ TSS has been removed. ]
26[ MD5 is now external. ]
27[ RC4 support has been removed (RC4 is used internally for arc4random). ]
28[ Blowfish is now external. ]
29
30The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
31Comments in the file indicate it may be used for any purpose without
32restrictions.
33
34The 32-bit CRC compensation attack detector in deattack.c was
35contributed by CORE SDI S.A. under a BSD-style license. See
36http://www.core-sdi.com/english/ssh/ for details.
37
38Note that any information and cryptographic algorithms used in this
39software are publicly available on the Internet and at any major
40bookstore, scientific library, and patent office worldwide. More
41information can be found e.g. at "http://www.cs.hut.fi/crypto".
42
43The legal status of this program is some combination of all these
44permissions and restrictions. Use only at your own responsibility.
45You will be responsible for any legal consequences yourself; I am not
46making any claims whether possessing or using this is legal or not in
47your country, and I am not taking any responsibility on your behalf.
48
49
50 NO WARRANTY
51
52BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
53FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
54OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
55PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
56OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
57MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
58TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
59PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
60REPAIR OR CORRECTION.
61
62IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
63WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
64REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
65INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
66OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
67TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
68YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
69PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
70POSSIBILITY OF SUCH DAMAGES.