D 13373.08
NOVEMBER 2007
MPS
Table of
Contents
TANDBERG MPS
ADMINISTRATOR GUIDE
Introduction
with Netscapes SSL.
This library is free for commercial and non-com-
mercial use as long as the following conditions are
aheared to. The following conditions apply to all
code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The
SSL documentation included with this distribution is
covered by the same copyright terms except that the
holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any
Copyright notices in the code are not to be removed.
If this package is used in a product, Eric Young
should be given attribution as the author of the parts
of the library used.
This can be in the form of a textual message at pro-
gram startup or in documentation (online or textual)
provided with the package.
Redistribution and use in source and binary forms,
with or without modification, are permitted provided
that the following conditions are met:
Redistributions of source code must retain the 1.
copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce 2.
the above copyright notice, this list of conditions
and the following disclaimer in the documenta-
tion and/or other materials provided with the
distribution.
All advertising materials mentioning features or 3.
use of this software must display the following
acknowledgement: “This product includes cryp-
tographic software written by Eric Young (eay@
cryptsoft.com)”. The word ‘cryptographic’ can be
left out if the rouines from the library being used
are not cryptographic related :-).
If you include any Windows specific code (or a 4.
derivative thereof) from the apps directory (ap-
plication code) you must include an acknowledge-
ment: “This product includes software written by
Tim Hudson (tjh@cryptsoft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS
IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAM-
AGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS INTER-
RUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POS-
SIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically
available version or derivative of this code cannot be
changed. i.e. this code cannot simply be copied and
put under another distribution licence [including the
GNU Public Licence.]
LICENSEFORopenssh
The licences which components of this software fall
under are as follows. First, we will summarize and
say that all components are under a BSD licence, or
a licence more free than that.
OpenSSHcontainsnoGPLcode.
Part1
Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>,
Espoo, Finland. All rights reserved
As far as I am concerned, the code I have written
for this software can be used freely for any purpose.
Any derived versions of this software must be clearly
marked as such, and if the derived work is incompat-
ible with the protocol description in the RFC file, it
must be called by a name other than “ssh” or “Se-
cure Shell”. However, I am not implying to give any
licenses to any patents or copyrights held by third
parties, and the software includes parts that are not
under my direct control. As far as I know, all included
source code is used in accordance with the relevant
license agreements and can be used freely for any
purpose (the GNU license being the most restrictive);
see below for details.
However, none of that term is relevant at this point in
time. All of these restrictively licenced software com-
ponents which he talks about have been removed
from OpenSSH, i.e.,
RSA is no longer included, found in the OpenSSL •
library
IDEA is no longer included, its use is deprecated•
DES is now external, in the OpenSSL library•
GMP is no longer used, and instead we call BN •
code from OpenSSL
Zlib is now external, in a library•
The make-ssh-known-hosts script is no longer •
included
TSS has been removed•
MD5 is now external, in the OpenSSL library•
RC4 support has been replaced with ARC4 sup-•
port from OpenSSL
Blowfish is now external, in the OpenSSL library•
Note that any information and cryptographic algo-
rithms used in this software are publicly available on
the Internet and at any major bookstore, scientific
library, and patent office worldwide. More information
can be found e.g. at “http://www.cs.hut.fi/crypto”.
The legal status of this program is some combination
of all these permissions and restrictions. Use only
at your own responsibility. You will be responsible
for any legal consequences yourself; I am not mak-
ing any claims whether possessing or using this is
legal or not in your country, and I am not taking any
responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF
CHARGE, THERE IS NO WARRANTY FOR THE PRO-
GRAM, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. EXCEPT WHEN OTHERWISE STATED IN WRIT-
ING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE
RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE
COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE
LAW OR AGREED TO IN WRITING WILL ANY COPY-
RIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARIS-
ING OUT OF THE USE OR INABILITY TO USE THE
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS
OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES
OR A FAILURE OF THE PROGRAM TO OPERATE WITH
ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR
OTHER PARTY HAS BEEN ADVISED OF THE POSSIBIL-
ITY OF SUCH DAMAGES.
Part2
The 32-bit CRC compensation attack detector in
deattack.c was contributed by CORE SDI S.A. under
a BSD-style license.
Cryptographic attack detector for ssh - source code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires,
Argentina.
All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are
permitted provided that this copyright notice is
retained.
THIS SOFTWARE IS PROVIDED “AS IS” AND ANY EX-
PRESS OR IMPLIED WARRANTIES ARE DISCLAIMED.
IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR
Third Party Software, Licenses and Copyright (2:6)
9
Quick
Setup
Using
the MPS
System
Status
System
Configuration
Installation
Gateway
Configuration
MCU
Configuration
Technical
Descriptions
Appendices
Main
Introduction