components/nmap/nmap.license
changeset 5791 08bbb1f1f01f
parent 1205 6c6c27bcf9ac
equal deleted inserted replaced
5790:9ae20789c796 5791:08bbb1f1f01f
     1 /***************************************************************************
     1 /***************************************************************************
     2  * COPYING -- Describes the terms under which Nmap is distributed.  A copy *
     2  * COPYING -- Describes the terms under which Nmap is distributed.         *
     3  * of the GNU GPL is appended to this file.                                *
       
     4  *                                                                         *
     3  *                                                                         *
     5  ***********************IMPORTANT NMAP LICENSE TERMS************************
     4  ***********************IMPORTANT NMAP LICENSE TERMS************************
     6  *                                                                         *
     5  *                                                                         *
     7  * The Nmap Security Scanner is (C) 1996-2012 Insecure.Com LLC. Nmap is    *
     6  * The Nmap Security Scanner is (C) 1996-2015 Insecure.Com LLC. Nmap is    *
     8  * also a registered trademark of Insecure.Com LLC.  This program is free  *
     7  * also a registered trademark of Insecure.Com LLC.  This program is free  *
     9  * software; you may redistribute and/or modify it under the terms of the  *
     8  * software; you may redistribute and/or modify it under the terms of the  *
    10  * GNU General Public License as published by the Free Software            *
     9  * GNU General Public License as published by the Free Software            *
    11  * Foundation; Version 2 with the clarifications and exceptions described  *
    10  * Foundation; Version 2 ("GPL"), BUT ONLY WITH ALL OF THE CLARIFICATIONS  *
    12  * below.  This guarantees your right to use, modify, and redistribute     *
    11  * AND EXCEPTIONS DESCRIBED HEREIN.  This guarantees your right to use,    *
    13  * this software under certain conditions.  If you wish to embed Nmap      *
    12  * modify, and redistribute this software under certain conditions.  If    *
    14  * technology into proprietary software, we sell alternative licenses      *
    13  * you wish to embed Nmap technology into proprietary software, we sell    *
    15  * (contact [email protected]).  Dozens of software vendors already       *
    14  * alternative licenses (contact [email protected]).  Dozens of software      *
    16  * license Nmap technology such as host discovery, port scanning, OS       *
    15  * vendors already license Nmap technology such as host discovery, port    *
    17  * detection, version detection, and the Nmap Scripting Engine.            *
    16  * scanning, OS detection, version detection, and the Nmap Scripting       *
    18  *                                                                         *
    17  * Engine.                                                                 *
    19  * Note that the GPL places important restrictions on "derived works", yet *
    18  *                                                                         *
    20  * it does not provide a detailed definition of that term.  To avoid       *
    19  * Note that the GPL places important restrictions on "derivative works",  *
       
    20  * yet it does not provide a detailed definition of that term.  To avoid   *
    21  * misunderstandings, we interpret that term as broadly as copyright law   *
    21  * misunderstandings, we interpret that term as broadly as copyright law   *
    22  * allows.  For example, we consider an application to constitute a        *
    22  * allows.  For example, we consider an application to constitute a        *
    23  * "derivative work" for the purpose of this license if it does any of the *
    23  * derivative work for the purpose of this license if it does any of the   *
    24  * following:                                                              *
    24  * following with any software or content covered by this license          *
    25  * o Integrates source code from Nmap                                      *
    25  * ("Covered Software"):                                                   *
    26  * o Reads or includes Nmap copyrighted data files, such as                *
    26  *                                                                         *
    27  *   nmap-os-db or nmap-service-probes.                                    *
    27  * o Integrates source code from Covered Software.                         *
    28  * o Executes Nmap and parses the results (as opposed to typical shell or  *
    28  *                                                                         *
    29  *   execution-menu apps, which simply display raw Nmap output and so are  *
    29  * o Reads or includes copyrighted data files, such as Nmap's nmap-os-db   *
    30  *   not derivative works.)                                                *
    30  * or nmap-service-probes.                                                 *
    31  * o Integrates/includes/aggregates Nmap into a proprietary executable     *
    31  *                                                                         *
    32  *   installer, such as those produced by InstallShield.                   *
    32  * o Is designed specifically to execute Covered Software and parse the    *
    33  * o Links to a library or executes a program that does any of the above   *
    33  * results (as opposed to typical shell or execution-menu apps, which will *
    34  *                                                                         *
    34  * execute anything you tell them to).                                     *
    35  * The term "Nmap" should be taken to also include any portions or derived *
    35  *                                                                         *
    36  * works of Nmap, as well as other software we distribute under this       *
    36  * o Includes Covered Software in a proprietary executable installer.  The *
    37  * license such as Zenmap, Ncat, and Nping.  This list is not exclusive,   *
    37  * installers produced by InstallShield are an example of this.  Including *
    38  * but is meant to clarify our interpretation of derived works with some   *
    38  * Nmap with other software in compressed or archival form does not        *
    39  * common examples.  Our interpretation applies only to Nmap--we don't     *
    39  * trigger this provision, provided appropriate open source decompression  *
    40  * speak for other people's GPL works.                                     *
    40  * or de-archiving software is widely available for no charge.  For the    *
    41  *                                                                         *
    41  * purposes of this license, an installer is considered to include Covered *
    42  * If you have any questions about the GPL licensing restrictions on using *
    42  * Software even if it actually retrieves a copy of Covered Software from  *
    43  * Nmap in non-GPL works, we would be happy to help.  As mentioned above,  *
    43  * another source during runtime (such as by downloading it from the       *
    44  * we also offer alternative license to integrate Nmap into proprietary    *
    44  * Internet).                                                              *
       
    45  *                                                                         *
       
    46  * o Links (statically or dynamically) to a library which does any of the  *
       
    47  * above.                                                                  *
       
    48  *                                                                         *
       
    49  * o Executes a helper program, module, or script to do any of the above.  *
       
    50  *                                                                         *
       
    51  * This list is not exclusive, but is meant to clarify our interpretation  *
       
    52  * of derived works with some common examples.  Other people may interpret *
       
    53  * the plain GPL differently, so we consider this a special exception to   *
       
    54  * the GPL that we apply to Covered Software.  Works which meet any of     *
       
    55  * these conditions must conform to all of the terms of this license,      *
       
    56  * particularly including the GPL Section 3 requirements of providing      *
       
    57  * source code and allowing free redistribution of the work as a whole.    *
       
    58  *                                                                         *
       
    59  * As another special exception to the GPL terms, Insecure.Com LLC grants  *
       
    60  * permission to link the code of this program with any version of the     *
       
    61  * OpenSSL library which is distributed under a license identical to that  *
       
    62  * listed in the included docs/licenses/OpenSSL.txt file, and distribute   *
       
    63  * linked combinations including the two.                                  *
       
    64  *                                                                         *
       
    65  * Any redistribution of Covered Software, including any derived works,    *
       
    66  * must obey and carry forward all of the terms of this license, including *
       
    67  * obeying all GPL rules and restrictions.  For example, source code of    *
       
    68  * the whole work must be provided and free redistribution must be         *
       
    69  * allowed.  All GPL references to "this License", are to be treated as    *
       
    70  * including the terms and conditions of this license text as well.        *
       
    71  *                                                                         *
       
    72  * Because this license imposes special exceptions to the GPL, Covered     *
       
    73  * Work may not be combined (even as part of a larger work) with plain GPL *
       
    74  * software.  The terms, conditions, and exceptions of this license must   *
       
    75  * be included as well.  This license is incompatible with some other open *
       
    76  * source licenses as well.  In some cases we can relicense portions of    *
       
    77  * Nmap or grant special permissions to use it in other open source        *
       
    78  * software.  Please contact [email protected] with any such requests.       *
       
    79  * Similarly, we don't incorporate incompatible open source software into  *
       
    80  * Covered Software without special permission from the copyright holders. *
       
    81  *                                                                         *
       
    82  * If you have any questions about the licensing restrictions on using     *
       
    83  * Nmap in other works, are happy to help.  As mentioned above, we also    *
       
    84  * offer alternative license to integrate Nmap into proprietary            *
    45  * applications and appliances.  These contracts have been sold to dozens  *
    85  * applications and appliances.  These contracts have been sold to dozens  *
    46  * of software vendors, and generally include a perpetual license as well  *
    86  * of software vendors, and generally include a perpetual license as well  *
    47  * as providing for priority support and updates.  They also fund the      *
    87  * as providing for priority support and updates.  They also fund the      *
    48  * continued development of Nmap.  Please email [email protected] for     *
    88  * continued development of Nmap.  Please email [email protected] for further *
    49  * further information.                                                    *
    89  * information.                                                            *
    50  *                                                                         *
    90  *                                                                         *
    51  * As a special exception to the GPL terms, Insecure.Com LLC grants        *
    91  * If you have received a written license agreement or contract for        *
    52  * permission to link the code of this program with any version of the     *
    92  * Covered Software stating terms other than these, you may choose to use  *
    53  * OpenSSL library which is distributed under a license identical to that  *
    93  * and redistribute Covered Software under those terms instead of these.   *
    54  * listed in the included docs/licenses/OpenSSL.txt file, and distribute   *
       
    55  * linked combinations including the two. You must obey the GNU GPL in all *
       
    56  * respects for all of the code used other than OpenSSL.  If you modify    *
       
    57  * this file, you may extend this exception to your version of the file,   *
       
    58  * but you are not obligated to do so.                                     *
       
    59  *                                                                         *
       
    60  * If you received these files with a written license agreement or         *
       
    61  * contract stating terms other than the terms above, then that            *
       
    62  * alternative license agreement takes precedence over these comments.     *
       
    63  *                                                                         *
    94  *                                                                         *
    64  * Source is provided to this software because we believe users have a     *
    95  * Source is provided to this software because we believe users have a     *
    65  * right to know exactly what a program is going to do before they run it. *
    96  * right to know exactly what a program is going to do before they run it. *
    66  * This also allows you to audit the software for security holes (none     *
    97  * This also allows you to audit the software for security holes.          *
    67  * have been found so far).                                                *
       
    68  *                                                                         *
    98  *                                                                         *
    69  * Source code also allows you to port Nmap to new platforms, fix bugs,    *
    99  * Source code also allows you to port Nmap to new platforms, fix bugs,    *
    70  * and add new features.  You are highly encouraged to send your changes   *
   100  * and add new features.  You are highly encouraged to send your changes   *
    71  * to [email protected] for possible incorporation into the main       *
   101  * to the [email protected] mailing list for possible incorporation into the    *
    72  * distribution.  By sending these changes to Fyodor or one of the         *
   102  * main distribution.  By sending these changes to Fyodor or one of the    *
    73  * Insecure.Org development mailing lists, or checking them into the Nmap  *
   103  * Insecure.Org development mailing lists, or checking them into the Nmap  *
    74  * source code repository, it is understood (unless you specify otherwise) *
   104  * source code repository, it is understood (unless you specify otherwise) *
    75  * that you are offering the Nmap Project (Insecure.Com LLC) the           *
   105  * that you are offering the Nmap Project (Insecure.Com LLC) the           *
    76  * unlimited, non-exclusive right to reuse, modify, and relicense the      *
   106  * unlimited, non-exclusive right to reuse, modify, and relicense the      *
    77  * code.  Nmap will always be available Open Source, but this is important *
   107  * code.  Nmap will always be available Open Source, but this is important *
    81  * If you wish to specify special license conditions of your               *
   111  * If you wish to specify special license conditions of your               *
    82  * contributions, just say so when you send them.                          *
   112  * contributions, just say so when you send them.                          *
    83  *                                                                         *
   113  *                                                                         *
    84  * This program is distributed in the hope that it will be useful, but     *
   114  * This program is distributed in the hope that it will be useful, but     *
    85  * WITHOUT ANY WARRANTY; without even the implied warranty of              *
   115  * WITHOUT ANY WARRANTY; without even the implied warranty of              *
    86  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU       *
   116  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the Nmap      *
    87  * General Public License v2.0 for more details at                         *
   117  * license file for more details (it's in a COPYING file included with     *
    88  * http://www.gnu.org/licenses/gpl-2.0.html , or in the COPYING file       *
   118  * Nmap, and also available from https://svn.nmap.org/nmap/COPYING)        *
    89  * included with Nmap.                                                     *
       
    90  *                                                                         *
   119  *                                                                         *
    91  ***************************************************************************/
   120  ***************************************************************************/
    92 
   121 
    93 GNU General Public License
   122 GNU General Public License
    94 
   123 
   434 This General Public License does not permit incorporating your program into
   463 This General Public License does not permit incorporating your program into
   435 proprietary programs. If your program is a subroutine library, you may
   464 proprietary programs. If your program is a subroutine library, you may
   436 consider it more useful to permit linking proprietary applications with the
   465 consider it more useful to permit linking proprietary applications with the
   437 library. If this is what you want to do, use the GNU Library General Public
   466 library. If this is what you want to do, use the GNU Library General Public
   438 License instead of this License.
   467 License instead of this License.
   439 
       
   440   LICENSE ISSUES
       
   441   ==============
       
   442 
       
   443   The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
       
   444   the OpenSSL License and the original SSLeay license apply to the toolkit.
       
   445   See below for the actual license texts. Actually both licenses are BSD-style
       
   446   Open Source licenses. In case of any license issues related to OpenSSL
       
   447   please contact [email protected].
       
   448 
       
   449   OpenSSL License
       
   450   ---------------
       
   451 
       
   452 /* ====================================================================
       
   453  * Copyright (c) 1998-2004 The OpenSSL Project.  All rights reserved.
       
   454  *
       
   455  * Redistribution and use in source and binary forms, with or without
       
   456  * modification, are permitted provided that the following conditions
       
   457  * are met:
       
   458  *
       
   459  * 1. Redistributions of source code must retain the above copyright
       
   460  *    notice, this list of conditions and the following disclaimer. 
       
   461  *
       
   462  * 2. Redistributions in binary form must reproduce the above copyright
       
   463  *    notice, this list of conditions and the following disclaimer in
       
   464  *    the documentation and/or other materials provided with the
       
   465  *    distribution.
       
   466  *
       
   467  * 3. All advertising materials mentioning features or use of this
       
   468  *    software must display the following acknowledgment:
       
   469  *    "This product includes software developed by the OpenSSL Project
       
   470  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
       
   471  *
       
   472  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
       
   473  *    endorse or promote products derived from this software without
       
   474  *    prior written permission. For written permission, please contact
       
   475  *    [email protected].
       
   476  *
       
   477  * 5. Products derived from this software may not be called "OpenSSL"
       
   478  *    nor may "OpenSSL" appear in their names without prior written
       
   479  *    permission of the OpenSSL Project.
       
   480  *
       
   481  * 6. Redistributions of any form whatsoever must retain the following
       
   482  *    acknowledgment:
       
   483  *    "This product includes software developed by the OpenSSL Project
       
   484  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
       
   485  *
       
   486  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
       
   487  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
       
   488  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
       
   489  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
       
   490  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
       
   491  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
       
   492  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
       
   493  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
       
   494  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
       
   495  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
       
   496  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
       
   497  * OF THE POSSIBILITY OF SUCH DAMAGE.
       
   498  * ====================================================================
       
   499  *
       
   500  * This product includes cryptographic software written by Eric Young
       
   501  * ([email protected]).  This product includes software written by Tim
       
   502  * Hudson ([email protected]).
       
   503  *
       
   504  */
       
   505 
       
   506  Original SSLeay License
       
   507  -----------------------
       
   508 
       
   509 /* Copyright (C) 1995-1998 Eric Young ([email protected])
       
   510  * All rights reserved.
       
   511  *
       
   512  * This package is an SSL implementation written
       
   513  * by Eric Young ([email protected]).
       
   514  * The implementation was written so as to conform with Netscapes SSL.
       
   515  * 
       
   516  * This library is free for commercial and non-commercial use as long as
       
   517  * the following conditions are aheared to.  The following conditions
       
   518  * apply to all code found in this distribution, be it the RC4, RSA,
       
   519  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
       
   520  * included with this distribution is covered by the same copyright terms
       
   521  * except that the holder is Tim Hudson ([email protected]).
       
   522  * 
       
   523  * Copyright remains Eric Young's, and as such any Copyright notices in
       
   524  * the code are not to be removed.
       
   525  * If this package is used in a product, Eric Young should be given attribution
       
   526  * as the author of the parts of the library used.
       
   527  * This can be in the form of a textual message at program startup or
       
   528  * in documentation (online or textual) provided with the package.
       
   529  * 
       
   530  * Redistribution and use in source and binary forms, with or without
       
   531  * modification, are permitted provided that the following conditions
       
   532  * are met:
       
   533  * 1. Redistributions of source code must retain the copyright
       
   534  *    notice, this list of conditions and the following disclaimer.
       
   535  * 2. Redistributions in binary form must reproduce the above copyright
       
   536  *    notice, this list of conditions and the following disclaimer in the
       
   537  *    documentation and/or other materials provided with the distribution.
       
   538  * 3. All advertising materials mentioning features or use of this software
       
   539  *    must display the following acknowledgement:
       
   540  *    "This product includes cryptographic software written by
       
   541  *     Eric Young ([email protected])"
       
   542  *    The word 'cryptographic' can be left out if the rouines from the library
       
   543  *    being used are not cryptographic related :-).
       
   544  * 4. If you include any Windows specific code (or a derivative thereof) from 
       
   545  *    the apps directory (application code) you must include an acknowledgement:
       
   546  *    "This product includes software written by Tim Hudson ([email protected])"
       
   547  * 
       
   548  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
       
   549  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
       
   550  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
       
   551  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
       
   552  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
       
   553  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
       
   554  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
       
   555  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
       
   556  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
       
   557  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
       
   558  * SUCH DAMAGE.
       
   559  * 
       
   560  * The licence and distribution terms for any publically available version or
       
   561  * derivative of this code cannot be changed.  i.e. this code cannot simply be
       
   562  * copied and put under another distribution licence
       
   563  * [including the GNU Public Licence.]