Cisco Systems IPS 7.1 Home Security System User Manual


  Open as PDF
of 1042
 
E-97
Cisco Intrusion Prevention System CLI Sensor Configuration Guide for IPS 7.1
OL-19892-01
Appendix E Open Source License Files Used In Cisco IPS 7.1
openssh 5.1p1
[However, none of that term is relevant at this point in time. All of these restrictively licensed software
components which he talks about have been removed from OpenSSH, i.e.,
RSA is no longer included, found in the OpenSSL library
IDEA is no longer included, its use is deprecated
DES is now external, in the OpenSSL library
GMP is no longer used, and instead we call BN code from OpenSSL
Zlib is now external, in a library
The make-ssh-known-hosts script is no longer included
TSS has been removed
MD5 is now external, in the OpenSSL library
RC4 support has been replaced with ARC4 support from OpenSSL
Blowfish is now external, in the OpenSSL library
[The licence continues]
Note that any information and cryptographic algorithms used in this software are publicly available on
the Internet and at any major bookstore, scientific library, and patent office worldwide. More information
can be found e.g. at “http://www.cs.hut.fi/crypto”.
The legal status of this program is some combination of all these permissions and restrictions. Use only
at your own responsibility.
You will be responsible for any legal consequences yourself; I am not making any claims whether
possessing or using this is legal or not in your country, and I am not taking any responsibility on your
behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2)
The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under a
BSD-style license.
Cryptographic attack detector for ssh - source code