FiSSH NON-COMMERCIAL LICENSE

Copyright 2000, Massachusetts Institute of Technology
All Rights Reserved.


BY USING THE PROGRAM, YOU INDICATE YOUR ACCEPTANCE OF THIS LICENSE, AND ALL ITS
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTING OR MODIFYING THE PROGRAM OR
WORKS BASED ON IT.  NOTHING OTHER THAN THIS LICENSE GRANTS YOU PERMISSION
TO USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM OR ITS DERIVATIVE WORKS.
THESE ACTIONS ARE PROHIBITED BY LAW.  IF YOU DO NOT ACCEPT THESE TERMS AND
CONDITIONS, DO NOT USE, MODIFY AND/OR DISTRIBUTE THE PROGRAM.

This license applies to the computer program(s) known as FiSSH.
The term "program" used in this license agreement refers to such
program, and the term "work based on the program" means
either the program or any derivative work of the program including
its output, such as a translation into another language,
extending the program's functionality, use of parts of the program or
it's output files or any modification of the program or it's output. The
program is a copyrighted work whose copyright is held by
The Massachusetts Institute of Technology ("the licensor").

1. License terms

Licensor hereby grants you the following rights, provided that you
comply with all of the restrictions set forth in this license and
provided further, that you distribute an unmodified copy of this
license with the program:

(a) You may copy and distribute the program's unaltered source code
via any medium, in accordance with US cryptography export regulations.
Any distribution of the program or any programs containing source
code of as well as any output created with the program must contain
an appropriate credit and all additional materials included with the
original distribution, including the unaltered license agreement.

(b) You may use the program for any purpose.  The program must not be
sold commercially as a separate product, as part of another product
(bundled software) or project, or otherwise used for financial gain.
Please see section 2, Restrictions, for details.

(c) You may build derived versions of this software under the
restrictions stated in section 2 (Restrictions) of this license. The
derived versions must be clearly marked as such and must be called by
a name other than FiSSH.

All derived versions of the program must be made freely available under
the terms of this license. The licensor must be given the right to use
the modified source code in their products without any compensation and
without being required to separately name the parties whose modifications
are being used.

Credit for FiSSH must be given to the licensor in all derived
works. This does not affect your ownership of the derived work itself,
and the intent is to assure proper credit for the licensor, not to
interfere with your use of this derived work.

2. Restrictions

(a) Distribution of the program or any work based on the program by a
commercial organization to any third party is prohibited if any payment
is made in connection with such distribution, whether directly (as in
payment for a copy of the program) or indirectly (as in payment for some
service related to the program, or payment for some product or service
that includes a copy of the program without charge, or payment for some
product or service the delivery of which requires for the recipient to
retrieve/download or otherwise obtain a copy of the program; these are
only examples, and not an exhaustive enumeration of prohibited activities).

As an exception to the above rule, putting this program on CD-ROMs
containing other free software is explicitly permitted even when a
modest distribution fee is charged for the CD, as long as this
software is not a primary selling argument for the CD.

(b) Activities other than copying, distribution and modification of
the program are not subject to this license and they are outside it's
scope. Functional use (running) of the program is not restricted.

(c) You must meet all of the following conditions with respect to the
distribution of any work based on the program:

        (i) All modified versions of the program must carry prominent
            notice stating that the program has been modified. The notice
            must indicate who made the modifications and how the program's
            files were modified and the date of any change;

        (ii) You must cause any work that you distribute or publish, that
             in whole or in part contains or is derived from the program
             or any part thereof, to be licensed as a whole and at no charge
             to all third parties under the terms of this license;

        (iii) You must cause the program, at each time it commences operation,
             to print or display an announcement including an appropriate
             copyright notice and a notice that there is no warranty. The
             notice must also tell the user how to view the copy of the
             license included with the program, and state that users may
             redistribute the program only under the terms of this License;

        (iv) You must accompany any such work based on the program with the
             complete corresponding machine-readable source code, delivered
             on a medium customarily used for software interchange. The
             source code for a work means the preferred form of the work for
             making modifications to it;

        (v) If you distribute any written or printed material at all with
            the program or any work based on the program, such material must
            include either a written copy of this license, or a prominent
            written indication that the program or the work based on the
            program is covered by this license and written instructions for
            printing and/or displaying the copy of the License on the
            distribution medium;

        (vi) You may not change the terms in this License or impose any
             further restrictions on the recipient's exercise of the rights
             granted herein.

3. Reservation of Rights

No rights are granted except as expressly set forth herein. You may not
copy, modify, sublicense, or distribute the program or any parts of the
the program, except as expressly provided under this license. Any attempt
otherwise to copy, modify, sublicense or distribute the program or the
HTML output files as a whole or in parts is void, and will automatically
terminate your rights under this license.  However, parties who have
received copies, or rights, from you under this license will not have
their licenses terminated as long as such parties remain in full
compliance with the license.

4. Limitations

BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY USE, MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

5. General

Some of the source code aggregated with this distribution is licensed
by third parties under different terms, so the restrictions above may
not apply to such components. As far as we know, all included source
code is used in accordance with the relevant license agreements and
can be used and distributed freely for any purpose; see below for
details.

We do not imply to give any licenses to any patents or copyrights held by
third parties.  As far as we know, all included source code is used in
accordance with the relevant license agreements and can be used and
distributed freely for any purpose (the GNU license being the most
restrictive).

--------------------------------------------------------------------------

Note that portions of this code utilizes Peter Gutmann's encryption
libraries.  Copyright notices and usage conditions for the library
contained below.  The Massachusetts Institute of Technology has been
granted a special free license as described in the cryptlib documentation.

Copyright Peter Gutmann, Eric Young, and Colin Plumb  1992 - 1996

Author Contact Information:

  Peter Gutmann, pgut001@cs.auckland.ac.nz

  The cryptlib home page, http://www.cs.auckland.ac.nz/~pgut001/cryptlib.html,
  contains more information on the latest cryptlib developments.


Usage Conditions
----------------

This software is distributed as copyrighted freeware, with copyrights on
individual encryption modules being held by the contributing authors.  You are
free to use the code in any way you want, with the following restrictions:

- If you make any changes to the code, you should send a copy of the changes to
  the author or authors to allow them to integrate the changes into the code.
  This is to allow a central consistent version to be maintained.

- If you use the library as part of a product, you should offer a copy to the
  authors of the library.  This is to let the authors know that their work is
  being usefully applied.  You should also give the authors credit in your
  software and/or documentation.  This is to let others know that the authors'
  work is being usefully applied.

- Any commercial software you create with this code may not be merely a set or
  subset of the encryption library, with or without minor added functionality.
  In particular you can't sell the library (or any modified form of it) as
  "your" encryption product.  You can sell your own product which utilizes the
  encryption library, but you can't charge for the library itself or claim it
  as yours.  This is to stop people adding their own wrappers and selling it as
  "their" encryption product.


Patent Issues
-------------

This library contains a number of algorithms which are covered by patents.
These algorithms are Diffie-Hellman, DSA, IDEA, RC5, and RSA.  A number of
patent holders have very generously granted a license for royalty-free use of
the algorithms in the library under certain circumstances, as explained below.

Diffie-Hellman and DSA:

  The practice of Diffie-Hellman key exchange is covered by United States
  Patent No 4,200,770 ('Cryptographic Apparatus and Method') which expires in
  September 1997.  The Canadian equivalent expires in September 1998.

  The practice of all other public key algorithms is covered by United States
  Patent No 4,218,582 ('Public Key Cryptographic Apparatus and Method') which
  expires in October 1998.  Numerous equivalent patents have been issued in
  Europe and Japan which expire in October 1998.  These patents are licensed
  exclusively by Cylink Corporation of Sunnyvale, California.  Cylink has
  granted a license to all users of this library for non-commercial use,
  including research by non-profit institutions.  This means you may
  incorporate this library in software which is distributed for free, provided
  you include the following notice in the software and all collateral
  documentation which states:

  The use of the public key algorithms in this software is covered by US
  Patents No 4,200,770 ('Cryptographic Apparatus and Method') and 4,218,582
  ('Public Key Cryptographic Apparatus and Method') which are licensed
  exclusively by Cylink Corporation.

  In order to promote open standards for public key algorithms, Cylink has
  initiated a low cost licensing program for commercial use of public key.  For
  more information, contact Cylink's web page at www.cylink.com or e-mail
  legal@cylink.com.

IDEA:

  The IDEA algorithm is patented by Ascom Systec Ltd. of CH-5506 Maegenwil,
  Switzerland, who allow it to be used on a royalty-free basis for certain
  non-profit applications.  Commercial users must obtain a license from the
  company in order to use IDEA.  IDEA may be used on a royalty-free basis under
  the following conditions:

  Free use for private purposes:

  The free use of software containing the algorithm is strictly limited to non
  revenue generating data transfer between private individuals, ie not serving
  commercial purposes.  Requests by freeware developers to obtain a
  royalty-free license to spread an application program containing the
  algorithm for non-commercial purposes must be directed to Ascom.

  Special offer for shareware developers:

  There is a special waiver for shareware developers.  Such waiver eliminates
  the upfront fees as well as royalties for the first US$10,000 gross sales of
  a product containing the algorithm if and only if:

  1. The product is being sold for a minimum of US$10 and a maximum of US$50.
  2. The source code for the shareware is available to the public.

  Special conditions for research projects:

  The use of the algorithm in research projects is free provided that it serves
  the purpose of such project and within the project duration.  Any use of the
  algorithm after the termination of a project including activities resulting
  from a project and for purposes not directly related to the project requires
  a license.

  Ascom Tech requires the following notice to be included for freeware
  products:

  This software product contains the IDEA algorithm as described and claimed in
  US patent 5,214,703, EPO patent 0482154 (covering Austria, France, Germany,
  Italy, the Netherlands, Spain, Sweden, Switzerland, and the UK), and Japanese
  patent application 508119/1991, "Device for the conversion of a digital block
  and use of same" (hereinafter referred to as "the algorithm").  Any use of
  the algorithm for commercial purposes is thus subject to a license from Ascom
  Systec Ltd. of CH-5506 Maegenwil (Switzerland), being the patentee and sole
  owner of all rights, including the trademark IDEA.

  Commercial purposes shall mean any revenue generating purpose including but
  not limited to:

  i) Using the algorithm for company internal purposes (subject to a site
     license).

  ii) Incorporating the algorithm into any software and distributing such
      software and/or providing services relating thereto to others (subject to
      a product license).

  iii) Using a product containing the algorithm not covered by an IDEA license
       (subject to an end user license).

  All such end user license agreements are available exclusively from Ascom
  Systec Ltd and may be requested via the WWW at http://www.ascom.ch/systec or
  by email to idea@ascom.ch.

  Use other than for commercial purposes is strictly limited to non-revenue
  generating data transfer between private individuals.  The use by government
  agencies, non-profit organizations, etc is considered as use for commercial
  purposes but may be subject to special conditions.  Any misuse will be
  prosecuted.

RC5:

  The RC5 algorithm is patented by RSA Data Security Inc. 100 Marine Parkway,
  Redwoord City, California 94065, ph.+1 415 595-8782, fax +1 415 595-1873, and
  cannot be used commercially in the US without a license.

RSA:

  The RSA algorithm is patented by RSA Data Security Inc. 100 Marine Parkway,
  Redwoord City, California 94065, ph.+1 415 595-8782, fax +1 415 595-1873, and
  cannot be used commercially in the US without a license.  RSA licenses can
  most easily be obtained by waiting until the year 2000 when the patent
  expires.


Acknowledgements
----------------

The DES and 3DES encryption code was contributed by Eric Young
<eay@psych.psy.uq.oz.au> and is part of his libdes package.  The primary ftp
site for the full libdes is
ftp://ftp.psy.uq.oz.au/pub/Crypto/DES/libdes-x.xx.tar.gz.  libdes is now also
shipped with SSLeay.  The primary site for this is
ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/SSLeay-x.xx.tar.gz.

The IDEA code was written by Colin Plumb, and scanned from the book "PGP Source
Code and Internals", MIT Press, 1995 (see the comments in the code for more
information).

The bignum maths library used for the public-key encryption was contributed by
Colin Plumb.

Matt Thomlinson and Blake Coverett helped fix up and debug the Win32 random
data gathering routines.

Chris Wedgwood and Paul Kendall wrote the Unix random data gathering routines.

Scott Morris did the VMS port.

Cylink Corporation very generously granted permission for the use of their
patents for non-commercial purposes.
