source: trunk/COPYING

Last change on this file was 531, checked in by katerina, 2 years ago

Fix for ticket #424 (make deb broken).

File size: 15.6 KB
Line 
1
2SAMHAIN distributed host monitoring system
3------------------------------------------
4
5Copyright (C) 1999-2009 Rainer Wichmann                                   
6                                                                     
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or     
10(at your option) any later version.                                   
11                                                                     
12This program is distributed in the hope that it will be useful,       
13but WITHOUT ANY WARRANTY; without even the implied warranty of       
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         
15GNU General Public License for more details.                         
16                                                                     
17You should have received a copy of the GNU General Public License     
18along with this program; if not, write to the Free Software           
19Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20
21On Debian-based systems, see /usr/share/common-licenses
22
23Incorporated code
24-----------------
25
26  (i) Support for the TIGER cryptographic checksum algorithm
27  is provided by the reference implementation, which includes
28  the following statement:
29
30         * Tiger: A Fast New Hash Function
31         *
32         * Ross Anderson and Eli Biham
33         *
34         * Tiger has no usage restrictions nor patents. It can be used freely,
35         * with the reference implementation,
36         * with other implementations or with
37         * a modification to the reference implementation (as long as it still
38         * implements Tiger). We only ask you to let us know about your
39         * implementation and to cite the origin of Tiger and of the reference
40         * implementation.
41         *
42         * The authors' home pages can be found both in
43         * http://www.cs.technion.ac.il/~biham/ and in
44         * http://www.cl.cam.ac.uk/users/rja14/.
45         * The authors' email addresses are biham@cs.technion.ac.il
46         * and rja14@cl.cam.ac.uk.
47
48
49
50  (ii) Support for testing write access by untrusted users
51  to any element in the path of a file is provided by the
52  public domain trustfile library, which includes the following
53  statement:
54
55         * Author information:
56         * Matt Bishop
57         * Department of Computer Science
58         * University of California at Davis
59         * Davis, CA  95616-8562
60         * phone (916) 752-8060
61         * email bishop@cs.ucdavis.edu
62         *
63         * This code is placed in the public domain.  I do ask that
64         * you keep my name associated with it, that you not represent
65         * it as written by you, and that you preserve these comments.
66         * This software is provided "as is" and without any guarantees
67         * of any sort.
68
69  (iii) Support for big integer arithmetic is provided by the bignum
70  package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE,
71  which includes the following statement:
72
73        * Everyone is allowed to distribute this package to anyone
74        * else, as long as all changes are recorded and mentioned.
75        * If you are including this in a commercial product, be sure
76        * to distribute _all_ of the package with the product.
77        *
78        * (...writing more stuff here later, but I guess everyone
79        * knows the approximate contents of it - no warranty, no
80        * charge, and so on.  I guess it is like the GNU concept.
81        * Read that for further details...)
82
83  (iv) Support for compression is provided by the (mini) LZO library,
84  which includes the following statement:
85
86       * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
87       * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
88       * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
89       * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
90       *
91       * The LZO library is free software; you can redistribute it and/or
92       * modify it under the terms of the GNU General Public License as
93       * published by the Free Software Foundation; either version 2 of
94       * the License, or (at your option) any later version.
95       *
96       * The LZO library is distributed in the hope that it will be useful,
97       * but WITHOUT ANY WARRANTY; without even the implied warranty of
98       * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
99       * GNU General Public License for more details.
100       *
101       * You should have received a copy of the GNU General Public License
102       * along with the LZO library; see the file COPYING.
103       * If not, write to the Free Software Foundation, Inc.,
104       * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
105       *
106       * Markus F.X.J. Oberhumer
107       * <markus.oberhumer@jk.uni-linz.ac.at>
108       * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
109
110  (v) Support for determining the type of a file system is provided by
111  code from the GNU find(1) utility which includes the following statement:
112
113   /* fstype.c -- determine type of filesystems that files are on
114      Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
115
116      This program is free software; you can redistribute it and/or modify
117      it under the terms of the GNU General Public License as published by
118      the Free Software Foundation; either version 2, or (at your option)
119      any later version.
120
121      This program is distributed in the hope that it will be useful,
122      but WITHOUT ANY WARRANTY; without even the implied warranty of
123      MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
124      GNU General Public License for more details.
125
126      You should have received a copy of the GNU General Public License
127      along with this program; if not, write to the Free Software
128      Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA  */
129
130   /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
131
132
133  (vi) Support for the MD5 hash algorithm is provided by code
134  from busybox which is distributed under the GPL.
135
136   /* md5.c - Functions to compute MD5 message digest of files or memory blocks
137    *         according to the definition of MD5 in RFC 1321 from April 1992.
138    * Copyright (C) 1995, 1996 Free Software Foundation, Inc.
139    *
140    * NOTE: The canonical source of this file is maintained with the GNU C
141    * Library.  Bugs can be reported to bug-glibc@prep.ai.mit.edu.
142    *
143    * This program is free software; you can redistribute it and/or modify it
144    * under the terms of the GNU General Public License as published by the
145    * Free Software Foundation; either version 2, or (at your option) any
146    * later version.
147    *
148    * This program is distributed in the hope that it will be useful,
149    * but WITHOUT ANY WARRANTY; without even the implied warranty of
150    * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
151    * GNU General Public License for more details.
152    *
153    * You should have received a copy of the GNU General Public License
154    * along with this program; if not, write to the Free Software Foundation,
155    * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
156    */
157
158   /* Written by Ulrich Drepper <drepper@gnu.ai.mit.edu>, 1995.  */
159
160
161  (vi) Support for the SHA-1 hash algorithm is provided by code
162  from mhash which includes the following statement:
163
164       /* sha.c - Implementation of the Secure Hash Algorithm
165        *
166        * Copyright (C) 1995, A.M. Kuchling
167        *
168        * Distribute and use freely; there are no restrictions on further
169        * dissemination and usage except those imposed by the laws of your
170        * country of residence.
171        *
172        * Adapted to pike and some cleanup by Niels Möller.
173        */
174
175       /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
176
177       /* SHA: NIST's Secure Hash Algorithm */
178
179       /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
180          in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
181          Modified to test for endianness on creation of SHA objects by AMK.
182          Also, the original specification of SHA was found to have a weakness
183          by NSA/NIST.  This code implements the fixed version of SHA.
184       */
185
186  (vii) Support for AVL Trees is provided by code
187  from AVLTree which includes the following statement:
188
189    /* zAVLTree.h: Header file for zAVLTrees.
190     * Copyright (C) 1998,2001  Michael H. Buselli
191     * This is version 0.1.3 (alpha).
192     * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
193     *
194     * This library is free software; you can redistribute it and/or
195     * modify it under the terms of the GNU Library General Public
196     * License as published by the Free Software Foundation; either
197     * version 2 of the License, or (at your option) any later version.
198     *
199     * This library is distributed in the hope that it will be useful,
200     * but WITHOUT ANY WARRANTY; without even the implied warranty of
201     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
202     * Library General Public License for more details.
203     *
204     * You should have received a copy of the GNU Library General Public
205     * License along with this library; if not, write to the Free
206     * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
207     *
208     * The author of this library can be reached at the following address:
209     * Michael H. Buselli
210     * 30051 N. Waukegan Rd. Apt. 103
211     * Lake Bluff, IL  60044-5412
212     *
213     * Or you can send email to <cosine@cosine.org>.
214     * The official web page for this product is:
215     * http://www.cosine.org/project/AVLTree/
216     */
217
218   (viii) The modules sh_userfiles.c and sh_mounts.c have been
219   contributed by Eircom Net Computer Incident Response Team and
220   are authored by Jerry Connolly and Cian Synnott, respectively.
221
222   They are released under the terms of the GNU General Public
223   License as published by the Free Software Foundation; either
224   version 2 of the License, or (at your option) any later version:
225   
226   "Feel free to GPL those files -
227   they were fully released by our company to the project.
228   
229   Cian
230   
231   --
232   Cian Synnott
233   Eircom Net Computer Incident Response Team"
234
235   (ix) Enhanced functionality for the SUID check has been
236   contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
237   The patch is licensed under the GPL with the following statement:
238
239   "Here is the patch with the aforementioned feature enhancements, and I
240   license all changes within this patch under the GNU Public License (GPL)
241   GNU General Public License as published by the Free Software Foundation;
242   either version 2 of the License, or (at your option) any later version."
243
244   (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
245   CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
246
247     * Copyright (c) 2003 Asim Jalis
248     *
249     * This software is provided 'as-is', without any express or implied
250     * warranty. In no event will the authors be held liable for any damages
251     * arising from the use of this software.
252     *
253     * Permission is granted to anyone to use this software for any purpose,
254     * including commercial applications, and to alter it and redistribute it
255     * freely, subject to the following restrictions:
256     *
257     * 1. The origin of this software must not be misrepresented; you must not
258     * claim that you wrote the original software. If you use this software in
259     * a product, an acknowledgment in the product documentation would be
260     * appreciated but is not required.
261     *
262     * 2. Altered source versions must be plainly marked as such, and must not
263     * be misrepresented as being the original software.
264     *
265     * 3. This notice may not be removed or altered from any source
266     * distribution.
267
268   (xi) The dnmalloc library used by samhain is Copyright (C) 2005, Yves Younan,
269   Wouter Joosen and Frank Piessens, and licensed under the LGPL:
270
271     *   This library is free software; you can redistribute it and/or
272     *   modify it under the terms of the GNU Lesser General Public
273     *   License as published by the Free Software Foundation; either
274     *   version 2.1 of the License, or (at your option) any later version.
275     *
276     *   This library is distributed in the hope that it will be useful,
277     *   but WITHOUT ANY WARRANTY; without even the implied warranty of
278     *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
279     *   Lesser General Public License for more details.
280     *
281     *   You should have received a copy of the GNU Lesser General Public
282     *   License along with this library; if not, write to the Free Software
283     *   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
284 
285
286Other
287-----
288
289  Depending on the compilation options used, samhain may use the
290  SRP authentication algorithm (in an independent implementation,
291  without any use of code from the SRP software).
292  The original SRP software contains the following license statement:
293
294    The SRP License
295    ---------------
296 
297    SRP and all related technologies are free for both commercial and
298    non-commercial use.  They are distributed under a standard
299    X11-style Open Source license which is shown below.
300   
301    The SRP distribution contains parts from various freeware
302    packages; these parts fall under both the SRP Open Source license
303    and any existing licenses.  Care has been taken to ensure that
304    these licenses are compatible with Open Source distribution,
305    but it is the responsibility of the licensee to comply with these
306    licenses.  The file "Copyrights" contains a list of the copyrights
307    incorporated by portions of the software.
308   
309    This software is covered under the following copyright:
310 
311    /*
312     * Copyright (c) 1997-1999  The Stanford SRP Authentication Project
313     * All Rights Reserved.
314     *
315     * Permission is hereby granted, free of charge, to any person obtaining
316     * a copy of this software and associated documentation files (the
317     * "Software"), to deal in the Software without restriction, including
318     * without limitation the rights to use, copy, modify, merge, publish,
319     * distribute, sublicense, and/or sell copies of the Software, and to
320     * permit persons to whom the Software is furnished to do so, subject to
321     * the following conditions:
322     *
323     * The above copyright notice and this permission notice shall be
324     * included in all copies or substantial portions of the Software.
325     *
326     * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
327     * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
328     * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
329     *
330     * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
331     * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
332     * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
333     * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
334     * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
335     *
336     * In addition, the following conditions apply:
337     *
338     * 1. Any software that incorporates the SRP authentication technology
339     *    must display the following acknowlegment:
340     *    "This product uses the 'Secure Remote Password' cryptographic
341     *     authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
342     *
343     * 2. Any software that incorporates all or part of the SRP distribution
344     *    itself must also display the following acknowledgment:
345     *    "This product includes software developed by Tom Wu and Eugene
346     *     Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
347     *
348     * 3. Redistributions in source or binary form must retain an intact copy
349     *    of this copyright notice and list of conditions.
350     */
Note: See TracBrowser for help on using the repository browser.