1 THE EXIM MAIL TRANSFER AGENT
2 ----------------------------
4 Copyright (c) 2004 University of Cambridge
5 SPDX-License-Identifier: GPL-2.0-or-later
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 In addition, for the avoidance of any doubt, permission is granted to
13 link this program with OpenSSL or any other library package and to
14 (re)distribute the binaries produced as the result of such linking.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program; if not, write to the Free Software
23 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
29 The use, supply or promotion of Exim for the purpose of sending bulk,
30 unsolicited electronic mail is incompatible with the basic aims of the program,
31 which revolve around the free provision of a service that enhances the quality
32 of personal communications. The author of Exim regards indiscriminate
33 mass-mailing as an antisocial, irresponsible abuse of the Internet.
39 A number of pieces of external code are included in the Exim distribution.
41 . Support for the cdb (Constant DataBase) lookup method is provided by code
42 contributed by Nigel Metheringham of Planet Online Ltd. which contains
43 the following statements:
44 _________________________________________________________________________
46 Copyright (c) 1998 Nigel Metheringham, Planet Online Ltd
48 This program is free software; you can redistribute it and/or modify it
49 under the terms of the GNU General Public License as published by the
50 Free Software Foundation; either version 2 of the License, or (at your
51 option) any later version.
53 This code implements Dan Bernstein's Constant DataBase (cdb) spec.
54 Information, the spec and sample code for cdb can be obtained from
55 http://www.pobox.com/~djb/cdb.html. This implementation borrows some code
56 from Dan Bernstein's implementation (which has no license restrictions
58 _________________________________________________________________________
60 The implementation is completely contained within the code of Exim. It
61 does not link against an external cdb library.
63 . Client support for Microsoft's "Secure Password Authentication" is pro-
64 vided by code contributed by Marc Prud'hommeaux. Server support was
65 contributed by Tom Kistner. This includes code taken from the Samba
66 project, which is released under the Gnu GPL.
69 . Support for calling the Cyrus "pwcheck" and "saslauthd" daemons is
70 provided by code taken from the Cyrus-SASL library and adapted by
71 Alexander S. Sabourenkov. The permission notice appears below, in
72 accordance with the conditions expressed therein.
74 _________________________________________________________________________
76 Copyright (c) 2001 Carnegie Mellon University. All rights reserved.
78 Redistribution and use in source and binary forms, with or without
79 modification, are permitted provided that the following conditions are
82 1. Redistributions of source code must retain the above copyright
83 notice, this list of conditions and the following disclaimer.
85 2. Redistributions in binary form must reproduce the above copyright
86 notice, this list of conditions and the following disclaimer in the
87 documentation and/or other materials provided with the distribution.
89 3. The name 'Carnegie Mellon University' must not be used to endorse or
90 promote products derived from this software without prior written
91 permission. For permission or any other legal details, please
94 Office of Technology Transfer
95 Carnegie Mellon University
97 Pittsburgh, PA 15213-3890
98 (412) 268-4387, fax: (412) 268-7395
99 tech-transfer@andrew.cmu.edu
101 4. Redistributions of any form whatsoever must retain the following
103 This product includes software developed by Computing Services at
104 Carnegie Mellon University (http://www.cmu.edu/computing/).
106 CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
107 SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
108 FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY
109 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
110 RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF
111 CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
112 CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
113 _________________________________________________________________________
116 . The Exim Monitor program, which is an X-Window application, includes
117 modified versions of the Athena StripChart and TextPop widgets. This code
118 is copyright by DEC and MIT, and their permission notice appears below,
119 in accordance with the conditions expressed therein.
121 _________________________________________________________________________
123 Copyright 1987, 1988 by Digital Equipment Corporation, Maynard,
124 Massachusetts, and the Massachusetts Institute of Technology, Cambridge,
129 Permission to use, copy, modify, and distribute this software and its
130 documentation for any purpose and without fee is hereby granted, provided
131 that the above copyright notice appear in all copies and that both that
132 copyright notice and this permission notice appear in supporting documen-
133 tation, and that the names of Digital or MIT not be used in advertising
134 or publicity pertaining to distribution of the software without specific,
135 written prior permission.
137 DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING
138 ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
139 DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
140 ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
141 WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
142 ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
144 _________________________________________________________________________
147 . Some of the code to support the use of maildirsize files for maildir
148 deliveries is taken from the Courier Imapd source code. This code is
149 released under the GPL.
150 _________________________________________________________________________
153 Philip Hazel University of Cambridge Computing Service,