source: trunk/COPYING@ 568

Last change on this file since 568 was 531, checked in by katerina, 7 years ago

Fix for ticket #424 (make deb broken).

File size: 15.6 KB
RevLine 
[1]1
2SAMHAIN distributed host monitoring system
3------------------------------------------
4
[209]5Copyright (C) 1999-2009 Rainer Wichmann
[1]6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
[209]19Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
[1]20
[531]21On Debian-based systems, see /usr/share/common-licenses
[1]22
23Incorporated code
24-----------------
25
26 (i) Support for the TIGER cryptographic checksum algorithm
27 is provided by the reference implementation, which includes
28 the following statement:
29
30 * Tiger: A Fast New Hash Function
31 *
32 * Ross Anderson and Eli Biham
33 *
34 * Tiger has no usage restrictions nor patents. It can be used freely,
35 * with the reference implementation,
36 * with other implementations or with
37 * a modification to the reference implementation (as long as it still
38 * implements Tiger). We only ask you to let us know about your
39 * implementation and to cite the origin of Tiger and of the reference
40 * implementation.
41 *
42 * The authors' home pages can be found both in
43 * http://www.cs.technion.ac.il/~biham/ and in
44 * http://www.cl.cam.ac.uk/users/rja14/.
45 * The authors' email addresses are biham@cs.technion.ac.il
46 * and rja14@cl.cam.ac.uk.
47
48
49
50 (ii) Support for testing write access by untrusted users
51 to any element in the path of a file is provided by the
52 public domain trustfile library, which includes the following
53 statement:
54
55 * Author information:
56 * Matt Bishop
57 * Department of Computer Science
58 * University of California at Davis
59 * Davis, CA 95616-8562
60 * phone (916) 752-8060
61 * email bishop@cs.ucdavis.edu
62 *
63 * This code is placed in the public domain. I do ask that
64 * you keep my name associated with it, that you not represent
65 * it as written by you, and that you preserve these comments.
66 * This software is provided "as is" and without any guarantees
67 * of any sort.
68
69 (iii) Support for big integer arithmetic is provided by the bignum
70 package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE,
71 which includes the following statement:
72
73 * Everyone is allowed to distribute this package to anyone
74 * else, as long as all changes are recorded and mentioned.
75 * If you are including this in a commercial product, be sure
76 * to distribute _all_ of the package with the product.
77 *
78 * (...writing more stuff here later, but I guess everyone
79 * knows the approximate contents of it - no warranty, no
80 * charge, and so on. I guess it is like the GNU concept.
81 * Read that for further details...)
82
83 (iv) Support for compression is provided by the (mini) LZO library,
84 which includes the following statement:
85
86 * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
87 * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
88 * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
89 * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
90 *
91 * The LZO library is free software; you can redistribute it and/or
92 * modify it under the terms of the GNU General Public License as
93 * published by the Free Software Foundation; either version 2 of
94 * the License, or (at your option) any later version.
95 *
96 * The LZO library is distributed in the hope that it will be useful,
97 * but WITHOUT ANY WARRANTY; without even the implied warranty of
98 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
99 * GNU General Public License for more details.
100 *
101 * You should have received a copy of the GNU General Public License
102 * along with the LZO library; see the file COPYING.
103 * If not, write to the Free Software Foundation, Inc.,
[209]104 * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
[1]105 *
106 * Markus F.X.J. Oberhumer
107 * <markus.oberhumer@jk.uni-linz.ac.at>
108 * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
109
110 (v) Support for determining the type of a file system is provided by
111 code from the GNU find(1) utility which includes the following statement:
112
113 /* fstype.c -- determine type of filesystems that files are on
114 Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
115
116 This program is free software; you can redistribute it and/or modify
117 it under the terms of the GNU General Public License as published by
118 the Free Software Foundation; either version 2, or (at your option)
119 any later version.
120
121 This program is distributed in the hope that it will be useful,
122 but WITHOUT ANY WARRANTY; without even the implied warranty of
123 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
124 GNU General Public License for more details.
125
126 You should have received a copy of the GNU General Public License
127 along with this program; if not, write to the Free Software
[209]128 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */
[1]129
130 /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
131
132
133 (vi) Support for the MD5 hash algorithm is provided by code
[30]134 from busybox which is distributed under the GPL.
[1]135
[30]136 /* md5.c - Functions to compute MD5 message digest of files or memory blocks
137 * according to the definition of MD5 in RFC 1321 from April 1992.
138 * Copyright (C) 1995, 1996 Free Software Foundation, Inc.
139 *
140 * NOTE: The canonical source of this file is maintained with the GNU C
141 * Library. Bugs can be reported to bug-glibc@prep.ai.mit.edu.
142 *
143 * This program is free software; you can redistribute it and/or modify it
144 * under the terms of the GNU General Public License as published by the
145 * Free Software Foundation; either version 2, or (at your option) any
146 * later version.
147 *
148 * This program is distributed in the hope that it will be useful,
149 * but WITHOUT ANY WARRANTY; without even the implied warranty of
150 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
151 * GNU General Public License for more details.
152 *
153 * You should have received a copy of the GNU General Public License
154 * along with this program; if not, write to the Free Software Foundation,
[209]155 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
[30]156 */
[1]157
[30]158 /* Written by Ulrich Drepper <drepper@gnu.ai.mit.edu>, 1995. */
159
160
[1]161 (vi) Support for the SHA-1 hash algorithm is provided by code
162 from mhash which includes the following statement:
163
164 /* sha.c - Implementation of the Secure Hash Algorithm
165 *
166 * Copyright (C) 1995, A.M. Kuchling
167 *
168 * Distribute and use freely; there are no restrictions on further
169 * dissemination and usage except those imposed by the laws of your
170 * country of residence.
171 *
[209]172 * Adapted to pike and some cleanup by Niels Möller.
[1]173 */
174
175 /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
176
177 /* SHA: NIST's Secure Hash Algorithm */
178
179 /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
180 in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
181 Modified to test for endianness on creation of SHA objects by AMK.
182 Also, the original specification of SHA was found to have a weakness
183 by NSA/NIST. This code implements the fixed version of SHA.
184 */
185
186 (vii) Support for AVL Trees is provided by code
187 from AVLTree which includes the following statement:
188
189 /* zAVLTree.h: Header file for zAVLTrees.
190 * Copyright (C) 1998,2001 Michael H. Buselli
191 * This is version 0.1.3 (alpha).
192 * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
193 *
194 * This library is free software; you can redistribute it and/or
195 * modify it under the terms of the GNU Library General Public
196 * License as published by the Free Software Foundation; either
197 * version 2 of the License, or (at your option) any later version.
198 *
199 * This library is distributed in the hope that it will be useful,
200 * but WITHOUT ANY WARRANTY; without even the implied warranty of
201 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
202 * Library General Public License for more details.
203 *
204 * You should have received a copy of the GNU Library General Public
205 * License along with this library; if not, write to the Free
[209]206 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
[1]207 *
208 * The author of this library can be reached at the following address:
209 * Michael H. Buselli
210 * 30051 N. Waukegan Rd. Apt. 103
211 * Lake Bluff, IL 60044-5412
212 *
213 * Or you can send email to <cosine@cosine.org>.
214 * The official web page for this product is:
215 * http://www.cosine.org/project/AVLTree/
216 */
217
218 (viii) The modules sh_userfiles.c and sh_mounts.c have been
219 contributed by Eircom Net Computer Incident Response Team and
220 are authored by Jerry Connolly and Cian Synnott, respectively.
221
222 They are released under the terms of the GNU General Public
223 License as published by the Free Software Foundation; either
224 version 2 of the License, or (at your option) any later version:
225
226 "Feel free to GPL those files -
227 they were fully released by our company to the project.
228
229 Cian
230
231 --
232 Cian Synnott
233 Eircom Net Computer Incident Response Team"
234
235 (ix) Enhanced functionality for the SUID check has been
236 contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
237 The patch is licensed under the GPL with the following statement:
238
239 "Here is the patch with the aforementioned feature enhancements, and I
240 license all changes within this patch under the GNU Public License (GPL)
241 GNU General Public License as published by the Free Software Foundation;
242 either version 2 of the License, or (at your option) any later version."
243
[18]244 (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
245 CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
[1]246
[18]247 * Copyright (c) 2003 Asim Jalis
248 *
249 * This software is provided 'as-is', without any express or implied
250 * warranty. In no event will the authors be held liable for any damages
251 * arising from the use of this software.
252 *
253 * Permission is granted to anyone to use this software for any purpose,
254 * including commercial applications, and to alter it and redistribute it
255 * freely, subject to the following restrictions:
256 *
257 * 1. The origin of this software must not be misrepresented; you must not
258 * claim that you wrote the original software. If you use this software in
259 * a product, an acknowledgment in the product documentation would be
260 * appreciated but is not required.
261 *
262 * 2. Altered source versions must be plainly marked as such, and must not
263 * be misrepresented as being the original software.
264 *
265 * 3. This notice may not be removed or altered from any source
266 * distribution.
267
[171]268 (xi) The dnmalloc library used by samhain is Copyright (C) 2005, Yves Younan,
269 Wouter Joosen and Frank Piessens, and licensed under the LGPL:
[18]270
[171]271 * This library is free software; you can redistribute it and/or
272 * modify it under the terms of the GNU Lesser General Public
273 * License as published by the Free Software Foundation; either
274 * version 2.1 of the License, or (at your option) any later version.
275 *
276 * This library is distributed in the hope that it will be useful,
277 * but WITHOUT ANY WARRANTY; without even the implied warranty of
278 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
279 * Lesser General Public License for more details.
280 *
281 * You should have received a copy of the GNU Lesser General Public
282 * License along with this library; if not, write to the Free Software
283 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
284
285
[1]286Other
287-----
288
289 Depending on the compilation options used, samhain may use the
290 SRP authentication algorithm (in an independent implementation,
291 without any use of code from the SRP software).
292 The original SRP software contains the following license statement:
293
294 The SRP License
295 ---------------
296
297 SRP and all related technologies are free for both commercial and
298 non-commercial use. They are distributed under a standard
299 X11-style Open Source license which is shown below.
300
301 The SRP distribution contains parts from various freeware
302 packages; these parts fall under both the SRP Open Source license
303 and any existing licenses. Care has been taken to ensure that
304 these licenses are compatible with Open Source distribution,
305 but it is the responsibility of the licensee to comply with these
306 licenses. The file "Copyrights" contains a list of the copyrights
307 incorporated by portions of the software.
308
309 This software is covered under the following copyright:
310
311 /*
312 * Copyright (c) 1997-1999 The Stanford SRP Authentication Project
313 * All Rights Reserved.
314 *
315 * Permission is hereby granted, free of charge, to any person obtaining
316 * a copy of this software and associated documentation files (the
317 * "Software"), to deal in the Software without restriction, including
318 * without limitation the rights to use, copy, modify, merge, publish,
319 * distribute, sublicense, and/or sell copies of the Software, and to
320 * permit persons to whom the Software is furnished to do so, subject to
321 * the following conditions:
322 *
323 * The above copyright notice and this permission notice shall be
324 * included in all copies or substantial portions of the Software.
325 *
326 * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
327 * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
328 * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
329 *
330 * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
331 * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
332 * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
333 * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
334 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
335 *
336 * In addition, the following conditions apply:
337 *
338 * 1. Any software that incorporates the SRP authentication technology
339 * must display the following acknowlegment:
340 * "This product uses the 'Secure Remote Password' cryptographic
341 * authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
342 *
343 * 2. Any software that incorporates all or part of the SRP distribution
344 * itself must also display the following acknowledgment:
345 * "This product includes software developed by Tom Wu and Eugene
346 * Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
347 *
348 * 3. Redistributions in source or binary form must retain an intact copy
349 * of this copyright notice and list of conditions.
350 */
Note: See TracBrowser for help on using the repository browser.