1 THE EXIM MAIL TRANSFER AGENT
2 ----------------------------
4 Copyright (c) 2004 University of Cambridge
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 In addition, for the avoidance of any doubt, permission is granted to
12 link this program with OpenSSL or any other library package and to
13 (re)distribute the binaries produced as the result of such linking.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
28 The use, supply or promotion of Exim for the purpose of sending bulk,
29 unsolicited electronic mail is incompatible with the basic aims of the program,
30 which revolve around the free provision of a service that enhances the quality
31 of personal communications. The author of Exim regards indiscriminate
32 mass-mailing as an antisocial, irresponsible abuse of the Internet.
38 A number of pieces of external code are included in the Exim distribution.
40 . Support for the cdb (Constant DataBase) lookup method is provided by code
41 contributed by Nigel Metheringham of Planet Online Ltd. which contains
42 the following statements:
43 _________________________________________________________________________
45 Copyright (c) 1998 Nigel Metheringham, Planet Online Ltd
47 This program is free software; you can redistribute it and/or modify it
48 under the terms of the GNU General Public License as published by the
49 Free Software Foundation; either version 2 of the License, or (at your
50 option) any later version.
52 This code implements Dan Bernstein's Constant DataBase (cdb) spec.
53 Information, the spec and sample code for cdb can be obtained from
54 http://www.pobox.com/~djb/cdb.html. This implementation borrows some code
55 from Dan Bernstein's implementation (which has no license restrictions
57 _________________________________________________________________________
59 The implementation is completely contained within the code of Exim. It
60 does not link against an external cdb library.
62 . Client support for Microsoft's "Secure Password Authentication" is pro-
63 vided by code contributed by Marc Prud'hommeaux. Server support was
64 contributed by Tom Kistner. This includes code taken from the Samba
65 project, which is released under the Gnu GPL.
68 . Support for calling the Cyrus "pwcheck" and "saslauthd" daemons is
69 provided by code taken from the Cyrus-SASL library and adapted by
70 Alexander S. Sabourenkov. The permission notice appears below, in
71 accordance with the conditions expressed therein.
73 _________________________________________________________________________
75 Copyright (c) 2001 Carnegie Mellon University. All rights reserved.
77 Redistribution and use in source and binary forms, with or without
78 modification, are permitted provided that the following conditions are
81 1. Redistributions of source code must retain the above copyright
82 notice, this list of conditions and the following disclaimer.
84 2. Redistributions in binary form must reproduce the above copyright
85 notice, this list of conditions and the following disclaimer in the
86 documentation and/or other materials provided with the distribution.
88 3. The name 'Carnegie Mellon University' must not be used to endorse or
89 promote products derived from this software without prior written
90 permission. For permission or any other legal details, please
93 Office of Technology Transfer
94 Carnegie Mellon University
96 Pittsburgh, PA 15213-3890
97 (412) 268-4387, fax: (412) 268-7395
98 tech-transfer@andrew.cmu.edu
100 4. Redistributions of any form whatsoever must retain the following
102 This product includes software developed by Computing Services at
103 Carnegie Mellon University (http://www.cmu.edu/computing/).
105 CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
106 SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
107 FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY
108 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
109 RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
110 CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
111 CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
112 _________________________________________________________________________
115 . The Exim Monitor program, which is an X-Window application, includes
116 modified versions of the Athena StripChart and TextPop widgets. This code
117 is copyright by DEC and MIT, and their permission notice appears below,
118 in accordance with the conditions expressed therein.
120 _________________________________________________________________________
122 Copyright 1987, 1988 by Digital Equipment Corporation, Maynard,
123 Massachusetts, and the Massachusetts Institute of Technology, Cambridge,
128 Permission to use, copy, modify, and distribute this software and its
129 documentation for any purpose and without fee is hereby granted, provided
130 that the above copyright notice appear in all copies and that both that
131 copyright notice and this permission notice appear in supporting documen-
132 tation, and that the names of Digital or MIT not be used in advertising
133 or publicity pertaining to distribution of the software without specific,
134 written prior permission.
136 DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING
137 ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
138 DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
139 ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
140 WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
141 ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
143 _________________________________________________________________________
146 . Some of the code to support the use of maildirsize files for maildir
147 deliveries is taken from the Courier Imapd source code. This code is
148 released under the GPL.
149 _________________________________________________________________________
152 Philip Hazel University of Cambridge Computing Service,