mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-22 10:00:14 +00:00
2bbb9d0c99
Renamed sshd.init to sshd.init.redhat
71 lines
3.3 KiB
Plaintext
71 lines
3.3 KiB
Plaintext
This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
|
|
|
|
|
|
COPYING POLICY AND OTHER LEGAL ISSUES
|
|
|
|
As far as I am concerned, the code I have written for this software
|
|
can be used freely for any purpose. Any derived versions of this
|
|
software must be clearly marked as such, and if the derived work is
|
|
incompatible with the protocol description in the RFC file, it must be
|
|
called by a name other than "ssh" or "Secure Shell".
|
|
|
|
However, I am not implying to give any licenses to any patents or
|
|
copyrights held by third parties, and the software includes parts that
|
|
are not under my direct control. As far as I know, all included
|
|
source code is used in accordance with the relevant license agreements
|
|
and can be used freely for any purpose (the GNU license being the most
|
|
restrictive); see below for details.
|
|
|
|
[ RSA is no longer included. ]
|
|
[ IDEA is no longer included. ]
|
|
[ DES is now external. ]
|
|
[ GMP is now external. No more GNU licence. ]
|
|
[ Zlib is now external. ]
|
|
[ The make-ssh-known-hosts script is no longer included. ]
|
|
[ TSS has been removed. ]
|
|
[ MD5 is now external. ]
|
|
[ RC4 support has been removed (RC4 is used internally for arc4random). ]
|
|
[ Blowfish is now external. ]
|
|
|
|
The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
|
|
Comments in the file indicate it may be used for any purpose without
|
|
restrictions.
|
|
|
|
The 32-bit CRC compensation attack detector in deattack.c was
|
|
contributed by CORE SDI S.A. under a BSD-style license. See
|
|
http://www.core-sdi.com/english/ssh/ for details.
|
|
|
|
Note that any information and cryptographic algorithms used in this
|
|
software are publicly available on the Internet and at any major
|
|
bookstore, scientific library, and patent office worldwide. More
|
|
information can be found e.g. at "http://www.cs.hut.fi/crypto".
|
|
|
|
The legal status of this program is some combination of all these
|
|
permissions and restrictions. Use only at your own responsibility.
|
|
You will be responsible for any legal consequences yourself; I am not
|
|
making any claims whether possessing or using this is legal or not in
|
|
your country, and I am not taking any responsibility on your behalf.
|
|
|
|
|
|
NO WARRANTY
|
|
|
|
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
|
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
|
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
|
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
|
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
|
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
|
REPAIR OR CORRECTION.
|
|
|
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
|
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
|
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
|
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
|
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
|
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
|
POSSIBILITY OF SUCH DAMAGES.
|