1 |
|
---|
2 | SAMHAIN distributed host monitoring system
|
---|
3 | ------------------------------------------
|
---|
4 |
|
---|
5 | Copyright (C) 1999-2004 Rainer Wichmann
|
---|
6 |
|
---|
7 | This program is free software; you can redistribute it and/or modify
|
---|
8 | it under the terms of the GNU General Public License as published by
|
---|
9 | the Free Software Foundation; either version 2 of the License, or
|
---|
10 | (at your option) any later version.
|
---|
11 |
|
---|
12 | This program is distributed in the hope that it will be useful,
|
---|
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
15 | GNU General Public License for more details.
|
---|
16 |
|
---|
17 | You should have received a copy of the GNU General Public License
|
---|
18 | along with this program; if not, write to the Free Software
|
---|
19 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
---|
20 |
|
---|
21 |
|
---|
22 | Incorporated code
|
---|
23 | -----------------
|
---|
24 |
|
---|
25 | (i) Support for the TIGER cryptographic checksum algorithm
|
---|
26 | is provided by the reference implementation, which includes
|
---|
27 | the following statement:
|
---|
28 |
|
---|
29 | * Tiger: A Fast New Hash Function
|
---|
30 | *
|
---|
31 | * Ross Anderson and Eli Biham
|
---|
32 | *
|
---|
33 | * Tiger has no usage restrictions nor patents. It can be used freely,
|
---|
34 | * with the reference implementation,
|
---|
35 | * with other implementations or with
|
---|
36 | * a modification to the reference implementation (as long as it still
|
---|
37 | * implements Tiger). We only ask you to let us know about your
|
---|
38 | * implementation and to cite the origin of Tiger and of the reference
|
---|
39 | * implementation.
|
---|
40 | *
|
---|
41 | * The authors' home pages can be found both in
|
---|
42 | * http://www.cs.technion.ac.il/~biham/ and in
|
---|
43 | * http://www.cl.cam.ac.uk/users/rja14/.
|
---|
44 | * The authors' email addresses are biham@cs.technion.ac.il
|
---|
45 | * and rja14@cl.cam.ac.uk.
|
---|
46 |
|
---|
47 |
|
---|
48 |
|
---|
49 | (ii) Support for testing write access by untrusted users
|
---|
50 | to any element in the path of a file is provided by the
|
---|
51 | public domain trustfile library, which includes the following
|
---|
52 | statement:
|
---|
53 |
|
---|
54 | * Author information:
|
---|
55 | * Matt Bishop
|
---|
56 | * Department of Computer Science
|
---|
57 | * University of California at Davis
|
---|
58 | * Davis, CA 95616-8562
|
---|
59 | * phone (916) 752-8060
|
---|
60 | * email bishop@cs.ucdavis.edu
|
---|
61 | *
|
---|
62 | * This code is placed in the public domain. I do ask that
|
---|
63 | * you keep my name associated with it, that you not represent
|
---|
64 | * it as written by you, and that you preserve these comments.
|
---|
65 | * This software is provided "as is" and without any guarantees
|
---|
66 | * of any sort.
|
---|
67 |
|
---|
68 | (iii) Support for big integer arithmetic is provided by the bignum
|
---|
69 | package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE,
|
---|
70 | which includes the following statement:
|
---|
71 |
|
---|
72 | * Everyone is allowed to distribute this package to anyone
|
---|
73 | * else, as long as all changes are recorded and mentioned.
|
---|
74 | * If you are including this in a commercial product, be sure
|
---|
75 | * to distribute _all_ of the package with the product.
|
---|
76 | *
|
---|
77 | * (...writing more stuff here later, but I guess everyone
|
---|
78 | * knows the approximate contents of it - no warranty, no
|
---|
79 | * charge, and so on. I guess it is like the GNU concept.
|
---|
80 | * Read that for further details...)
|
---|
81 |
|
---|
82 | (iv) Support for compression is provided by the (mini) LZO library,
|
---|
83 | which includes the following statement:
|
---|
84 |
|
---|
85 | * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
|
---|
86 | * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
|
---|
87 | * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
|
---|
88 | * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
|
---|
89 | *
|
---|
90 | * The LZO library is free software; you can redistribute it and/or
|
---|
91 | * modify it under the terms of the GNU General Public License as
|
---|
92 | * published by the Free Software Foundation; either version 2 of
|
---|
93 | * the License, or (at your option) any later version.
|
---|
94 | *
|
---|
95 | * The LZO library is distributed in the hope that it will be useful,
|
---|
96 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
97 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
98 | * GNU General Public License for more details.
|
---|
99 | *
|
---|
100 | * You should have received a copy of the GNU General Public License
|
---|
101 | * along with the LZO library; see the file COPYING.
|
---|
102 | * If not, write to the Free Software Foundation, Inc.,
|
---|
103 | * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
---|
104 | *
|
---|
105 | * Markus F.X.J. Oberhumer
|
---|
106 | * <markus.oberhumer@jk.uni-linz.ac.at>
|
---|
107 | * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
|
---|
108 |
|
---|
109 | (v) Support for determining the type of a file system is provided by
|
---|
110 | code from the GNU find(1) utility which includes the following statement:
|
---|
111 |
|
---|
112 | /* fstype.c -- determine type of filesystems that files are on
|
---|
113 | Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
|
---|
114 |
|
---|
115 | This program is free software; you can redistribute it and/or modify
|
---|
116 | it under the terms of the GNU General Public License as published by
|
---|
117 | the Free Software Foundation; either version 2, or (at your option)
|
---|
118 | any later version.
|
---|
119 |
|
---|
120 | This program is distributed in the hope that it will be useful,
|
---|
121 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
122 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
123 | GNU General Public License for more details.
|
---|
124 |
|
---|
125 | You should have received a copy of the GNU General Public License
|
---|
126 | along with this program; if not, write to the Free Software
|
---|
127 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
---|
128 |
|
---|
129 | /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
|
---|
130 |
|
---|
131 |
|
---|
132 | (vi) Support for the MD5 hash algorithm is provided by code
|
---|
133 | from beecrypt which is distributed under the LGPL.
|
---|
134 |
|
---|
135 | /*
|
---|
136 | * md5.c
|
---|
137 | *
|
---|
138 | * MD5 hash function, code
|
---|
139 | *
|
---|
140 | * Copyright (c) 2000 Virtual Unlimited B.V.
|
---|
141 | *
|
---|
142 | * Author: Bob Deblier <bob@virtualunlimited.com>
|
---|
143 | *
|
---|
144 | * This library is free software; you can redistribute it and/or
|
---|
145 | * modify it under the terms of the GNU Lesser General Public
|
---|
146 | * License as published by the Free Software Foundation; either
|
---|
147 | * version 2.1 of the License, or (at your option) any later version.
|
---|
148 | *
|
---|
149 | * This library is distributed in the hope that it will be useful,
|
---|
150 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
151 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
152 | * Lesser General Public License for more details.
|
---|
153 | *
|
---|
154 | * You should have received a copy of the GNU Lesser General Public
|
---|
155 | * License along with this library; if not, write to the Free Software
|
---|
156 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
---|
157 | * USA
|
---|
158 | */
|
---|
159 |
|
---|
160 | (vi) Support for the SHA-1 hash algorithm is provided by code
|
---|
161 | from mhash which includes the following statement:
|
---|
162 |
|
---|
163 | /* sha.c - Implementation of the Secure Hash Algorithm
|
---|
164 | *
|
---|
165 | * Copyright (C) 1995, A.M. Kuchling
|
---|
166 | *
|
---|
167 | * Distribute and use freely; there are no restrictions on further
|
---|
168 | * dissemination and usage except those imposed by the laws of your
|
---|
169 | * country of residence.
|
---|
170 | *
|
---|
171 | * Adapted to pike and some cleanup by Niels Möller.
|
---|
172 | */
|
---|
173 |
|
---|
174 | /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
|
---|
175 |
|
---|
176 | /* SHA: NIST's Secure Hash Algorithm */
|
---|
177 |
|
---|
178 | /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
|
---|
179 | in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
|
---|
180 | Modified to test for endianness on creation of SHA objects by AMK.
|
---|
181 | Also, the original specification of SHA was found to have a weakness
|
---|
182 | by NSA/NIST. This code implements the fixed version of SHA.
|
---|
183 | */
|
---|
184 |
|
---|
185 | (vii) Support for AVL Trees is provided by code
|
---|
186 | from AVLTree which includes the following statement:
|
---|
187 |
|
---|
188 | /* zAVLTree.h: Header file for zAVLTrees.
|
---|
189 | * Copyright (C) 1998,2001 Michael H. Buselli
|
---|
190 | * This is version 0.1.3 (alpha).
|
---|
191 | * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
|
---|
192 | *
|
---|
193 | * This library is free software; you can redistribute it and/or
|
---|
194 | * modify it under the terms of the GNU Library General Public
|
---|
195 | * License as published by the Free Software Foundation; either
|
---|
196 | * version 2 of the License, or (at your option) any later version.
|
---|
197 | *
|
---|
198 | * This library is distributed in the hope that it will be useful,
|
---|
199 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
200 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
201 | * Library General Public License for more details.
|
---|
202 | *
|
---|
203 | * You should have received a copy of the GNU Library General Public
|
---|
204 | * License along with this library; if not, write to the Free
|
---|
205 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
---|
206 | *
|
---|
207 | * The author of this library can be reached at the following address:
|
---|
208 | * Michael H. Buselli
|
---|
209 | * 30051 N. Waukegan Rd. Apt. 103
|
---|
210 | * Lake Bluff, IL 60044-5412
|
---|
211 | *
|
---|
212 | * Or you can send email to <cosine@cosine.org>.
|
---|
213 | * The official web page for this product is:
|
---|
214 | * http://www.cosine.org/project/AVLTree/
|
---|
215 | */
|
---|
216 |
|
---|
217 | (viii) The modules sh_userfiles.c and sh_mounts.c have been
|
---|
218 | contributed by Eircom Net Computer Incident Response Team and
|
---|
219 | are authored by Jerry Connolly and Cian Synnott, respectively.
|
---|
220 |
|
---|
221 | They are released under the terms of the GNU General Public
|
---|
222 | License as published by the Free Software Foundation; either
|
---|
223 | version 2 of the License, or (at your option) any later version:
|
---|
224 |
|
---|
225 | "Feel free to GPL those files -
|
---|
226 | they were fully released by our company to the project.
|
---|
227 |
|
---|
228 | Cian
|
---|
229 |
|
---|
230 | --
|
---|
231 | Cian Synnott
|
---|
232 | Eircom Net Computer Incident Response Team"
|
---|
233 |
|
---|
234 | (ix) Enhanced functionality for the SUID check has been
|
---|
235 | contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
|
---|
236 | The patch is licensed under the GPL with the following statement:
|
---|
237 |
|
---|
238 | "Here is the patch with the aforementioned feature enhancements, and I
|
---|
239 | license all changes within this patch under the GNU Public License (GPL)
|
---|
240 | GNU General Public License as published by the Free Software Foundation;
|
---|
241 | either version 2 of the License, or (at your option) any later version."
|
---|
242 |
|
---|
243 | (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
|
---|
244 | CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
|
---|
245 |
|
---|
246 | * Copyright (c) 2003 Asim Jalis
|
---|
247 | *
|
---|
248 | * This software is provided 'as-is', without any express or implied
|
---|
249 | * warranty. In no event will the authors be held liable for any damages
|
---|
250 | * arising from the use of this software.
|
---|
251 | *
|
---|
252 | * Permission is granted to anyone to use this software for any purpose,
|
---|
253 | * including commercial applications, and to alter it and redistribute it
|
---|
254 | * freely, subject to the following restrictions:
|
---|
255 | *
|
---|
256 | * 1. The origin of this software must not be misrepresented; you must not
|
---|
257 | * claim that you wrote the original software. If you use this software in
|
---|
258 | * a product, an acknowledgment in the product documentation would be
|
---|
259 | * appreciated but is not required.
|
---|
260 | *
|
---|
261 | * 2. Altered source versions must be plainly marked as such, and must not
|
---|
262 | * be misrepresented as being the original software.
|
---|
263 | *
|
---|
264 | * 3. This notice may not be removed or altered from any source
|
---|
265 | * distribution.
|
---|
266 |
|
---|
267 |
|
---|
268 | Other
|
---|
269 | -----
|
---|
270 |
|
---|
271 | Depending on the compilation options used, samhain may use the
|
---|
272 | SRP authentication algorithm (in an independent implementation,
|
---|
273 | without any use of code from the SRP software).
|
---|
274 | The original SRP software contains the following license statement:
|
---|
275 |
|
---|
276 | The SRP License
|
---|
277 | ---------------
|
---|
278 |
|
---|
279 | SRP and all related technologies are free for both commercial and
|
---|
280 | non-commercial use. They are distributed under a standard
|
---|
281 | X11-style Open Source license which is shown below.
|
---|
282 |
|
---|
283 | The SRP distribution contains parts from various freeware
|
---|
284 | packages; these parts fall under both the SRP Open Source license
|
---|
285 | and any existing licenses. Care has been taken to ensure that
|
---|
286 | these licenses are compatible with Open Source distribution,
|
---|
287 | but it is the responsibility of the licensee to comply with these
|
---|
288 | licenses. The file "Copyrights" contains a list of the copyrights
|
---|
289 | incorporated by portions of the software.
|
---|
290 |
|
---|
291 | This software is covered under the following copyright:
|
---|
292 |
|
---|
293 | /*
|
---|
294 | * Copyright (c) 1997-1999 The Stanford SRP Authentication Project
|
---|
295 | * All Rights Reserved.
|
---|
296 | *
|
---|
297 | * Permission is hereby granted, free of charge, to any person obtaining
|
---|
298 | * a copy of this software and associated documentation files (the
|
---|
299 | * "Software"), to deal in the Software without restriction, including
|
---|
300 | * without limitation the rights to use, copy, modify, merge, publish,
|
---|
301 | * distribute, sublicense, and/or sell copies of the Software, and to
|
---|
302 | * permit persons to whom the Software is furnished to do so, subject to
|
---|
303 | * the following conditions:
|
---|
304 | *
|
---|
305 | * The above copyright notice and this permission notice shall be
|
---|
306 | * included in all copies or substantial portions of the Software.
|
---|
307 | *
|
---|
308 | * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
|
---|
309 | * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
|
---|
310 | * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
---|
311 | *
|
---|
312 | * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
|
---|
313 | * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
|
---|
314 | * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
|
---|
315 | * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
|
---|
316 | * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
---|
317 | *
|
---|
318 | * In addition, the following conditions apply:
|
---|
319 | *
|
---|
320 | * 1. Any software that incorporates the SRP authentication technology
|
---|
321 | * must display the following acknowlegment:
|
---|
322 | * "This product uses the 'Secure Remote Password' cryptographic
|
---|
323 | * authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
|
---|
324 | *
|
---|
325 | * 2. Any software that incorporates all or part of the SRP distribution
|
---|
326 | * itself must also display the following acknowledgment:
|
---|
327 | * "This product includes software developed by Tom Wu and Eugene
|
---|
328 | * Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
|
---|
329 | *
|
---|
330 | * 3. Redistributions in source or binary form must retain an intact copy
|
---|
331 | * of this copyright notice and list of conditions.
|
---|
332 | */
|
---|