This library is free for commercial and non-com-
mercial use as long as the following conditions are
aheared to. The following conditions apply to all
code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The
SSL documentation included with this distribution is
covered by the same copyright terms except that the
holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any
Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young
should be given attribution as the author of the parts
of the library used.
This can be in the form of a textual message at pro-
gram startup or in documentation (online or textual)
provided with the package.
Redistribution and use in source and binary forms,
with or without modification, are permitted provided
that the following conditions are met:
!B.Redistributions of source code must retain the
copyright notice, this list of conditions and the
following disclaimer.
8B.Redistributions in binary form must reproduce
the above copyright notice, this list of conditions
and the following disclaimer in the documenta-
tion and/or other materials provided with the
distribution.
>B.All advertising materials mentioning features or
use of this software must display the following
acknowledgement: “This product includes cryp-
tographic software written by Eric Young (eay@
cryptsoft.com)”. The word ‘cryptographic’ can be
left out if the rouines from the library being used
are not cryptographic related :-).
?B. If you include any Windows specific code (or a
derivative thereof) from the apps directory (ap-
plication code) you must include an acknowledge-
ment: “This product includes software written by
Tim Hudson (tjh@cryptsoft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically
available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and
put under another distribution licence [including the
GNU Public Licence.]
;=56?@6"ABC"$G(1--+
The licences which components of this software fall
under are as follows. First, we will summarize and
say that all components are under a BSD licence, or
a licence more free than that.
BG(1@@#".$1&),1-"1$"E8;".$*(I
8)'&"J
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>,
Espoo, Finland. All rights reserved
As far as I am concerned, the code I have written
for this software can be used freely for any purpose.
Any derived versions of this software must be
clearly marked as such, and if the derived work is
incompatible with the protocol description in the RFC
file, it must be called by a name other than “ssh” or
“Secure Shell”. However, I am not implying to give
any licenses to any patents or copyrights held by
third parties, and the software includes parts that
are not under my direct control. As far as I know, all
included source code is used in accordance with the
relevant license agreements and can be used freely
for any purpose (the GNU license being the most
restrictive); see below for details.
However, none of that term is relevant at this point in
time. All of these restrictively licenced software com-
ponents which he talks about have been removed
from OpenSSH, i.e.,
!" RSA is no longer included, found in the OpenSSL
library
!" IDEA is no longer included, its use is deprecated
!" DES is now external, in the OpenSSL library
!" GMP is no longer used, and instead we call BN
code from OpenSSL
!" Zlib is now external, in a library
!" The make-ssh-known-hosts script is no longer
included
!" TSS has been removed
!" MD5 is now external, in the OpenSSL library
!" RC4 support has been replaced with ARC4 sup-
port from OpenSSL
!" Blowfish is now external, in the OpenSSL library
Note that any information and cryptographic algo-
rithms used in this software are publicly available on
the Internet and at any major bookstore, scientific li-
brary, and patent office worldwide. More information
can be found e.g. at “http://www.cs.hut.fi/crypto”.
The legal status of this program is some combina-
tion of all these permissions and restrictions. Use
only at your own responsibility. You will be respon-
sible for any legal consequences yourself; I am not
making any claims whether possessing or using this
is legal or not in your country, and I am not taking
any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF
CHARGE, THERE IS NO WARRANTY FOR THE PRO-
GRAM, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. EXCEPT WHEN OTHERWISE STATED IN WRIT-
ING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE
COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE
LAW OR AGREED TO IN WRITING WILL ANY COPY-
RIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARIS-
ING OUT OF THE USE OR INABILITY TO USE THE
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS
OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES
OR A FAILURE OF THE PROGRAM TO OPERATE WITH
ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR
OTHER PARTY HAS BEEN ADVISED OF THE POSSIBIL-
ITY OF SUCH DAMAGES.
8)'&"K
The 32-bit CRC compensation attack detector in
deattack.c was contributed by CORE SDI S.A. under
a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires,
Argentina.
All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are
permitted provided that this copyright notice is
retained.
THIS SOFTWARE IS PROVIDED “AS IS” AND ANY EX-
PRESS OR IMPLIED WARRANTIES ARE DISCLAIMED.
IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EX-
EMPLARY OR CONSEQUENTIAL DAMAGES RESULT-
ING FROM THE USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
Third Party Software, Licenses and Copyright, cont...
D14033.10—APRIL 2009 D
MPS 200/800 Administrator Guide
Contents Introduction Getting started Using the MPS System status System configuration Gateway configuration MCU configuration Contact usAppendices
Introduction