DRGOS 1.12.1 GUI USER GUIDE
DRGOS 1.12.1 GUI User Guide Rev. A GEN-DOC-DRGOS_112-GUI-USER. Printed May 29, 2014
Copyright and Legal Notice Copyright © 2014 Genexis B.V. All rights reserved.
Genexis B.V., Genexis Holding B.V. and subsidiaries herein collectively known as Genexis.
DRGOS, DRG, HRG, Hybrid, GAPS, program models and other software content and this documentation ("the Intellectual Property Rights") are protected by the Dutch Copyright Act ('Auteurswet') and Genexis declares that it is the author and claims copyright ('Auteursrecht') for the Intellectual Property Rights. Reproduction and distribution without authorization by Genexis B.V. is prohibited. The prohibition includes every form of reproduction and distribution.
Every effort has been made to ensure that the information in this document is complete and accurate at the time of printing. However, information is subject to change without notice. Genexis assumes no liability for damages incurred directly or indirectly from errors, omissions or discrepancies between the software and this document.
Genexis, FiberXport and DRG are trademarks of Genexis.
All other trademarks, service marks and trade names are the property of their respective owners.
Purchasers, licensees and users accept and acknowledge that the products contain components (including components carrying certain firmware) and combinations of components that constitute trade secrets protected by Genexis or its partners. Purchasers, licensees and users warrant that the delivered products will not be opened or dismantled, copied, altered or in any other way modified. Furthermore, purchasers, licensees and users agree not to attempt to reverse engineer, disassemble, modify, translate, create derivate works, rent, lease, loan, or without written permission distribute or sublicense the software, in whole or in part.
The products and its hardware, firmware and software, including technical data, may be subject to EU and U.S export control laws, including the U.S Export Administration Act and its associated regulations and the International Traffic in Arms Regulations administered by the US Department of State, and may be subject to export or import regulations in other countries. Purchasers and licensees agree to comply strictly with all such regulations and acknowledges that it has the responsibility to obtain licenses to export, re-export, or import hardware, firmware and software.
Purchasers and licensees are not entitled to, and Genexis is not in any event liable to pay, compensation for damages which delivered products or software has caused to other property or to persons or any other consequential damages, including but not limited to loss of
DRGOS 1.12.1 GUI User Guide Rev. A GEN-DOC-DRGOS_112-GUI-USER. Printed May 29, 2014
Copyright and Legal Notice Copyright © 2014 Genexis B.V. All rights reserved.
Genexis B.V., Genexis Holding B.V. and subsidiaries herein collectively known as Genexis.
DRGOS, DRG, HRG, Hybrid, GAPS, program models and other software content and this documentation ("the Intellectual Property Rights") are protected by the Dutch Copyright Act ('Auteurswet') and Genexis declares that it is the author and claims copyright ('Auteursrecht') for the Intellectual Property Rights. Reproduction and distribution without authorization by Genexis B.V. is prohibited. The prohibition includes every form of reproduction and distribution.
Every effort has been made to ensure that the information in this document is complete and accurate at the time of printing. However, information is subject to change without notice. Genexis assumes no liability for damages incurred directly or indirectly from errors, omissions or discrepancies between the software and this document.
Genexis, FiberXport and DRG are trademarks of Genexis.
All other trademarks, service marks and trade names are the property of their respective owners.
Purchasers, licensees and users accept and acknowledge that the products contain components (including components carrying certain firmware) and combinations of components that constitute trade secrets protected by Genexis or its partners. Purchasers, licensees and users warrant that the delivered products will not be opened or dismantled, copied, altered or in any other way modified. Furthermore, purchasers, licensees and users agree not to attempt to reverse engineer, disassemble, modify, translate, create derivate works, rent, lease, loan, or without written permission distribute or sublicense the software, in whole or in part.
The products and its hardware, firmware and software, including technical data, may be subject to EU and U.S export control laws, including the U.S Export Administration Act and its associated regulations and the International Traffic in Arms Regulations administered by the US Department of State, and may be subject to export or import regulations in other countries. Purchasers and licensees agree to comply strictly with all such regulations and acknowledges that it has the responsibility to obtain licenses to export, re-export, or import hardware, firmware and software.
Purchasers and licensees are not entitled to, and Genexis is not in any event liable to pay, compensation for damages which delivered products or software has caused to other property or to persons or any other consequential damages, including but not limited to loss of
INTRODUCTION INTRODUCTIO N............... ............................... ................................. ................................. ................................ ................................. ................................. ................................. ...................... ..... 5
ABOUT THIS GUIDE .................................................................................................................................................................. 5 R ELATED ELATED M ANUALS .................................................................................................................................................................. 5 T YPING CONVENTIONS ............................................................................................................................................................ 5 TERMINOLOGY .......................................................................................................................................................................... 5 PREPARATIONS ................ ................................ ................................. ................................. ................................ ................................. ................................. ................................. ...................... ..... 7 EQUIREMENT ..................................................................................................................................................... 7 TECHNICAL R EQUIREMENT EB SERVER .................................................................................................................................................. 7 ACCESSING RG RG W W EB
GUI T GUI T ABS ................................................................................................................................................................................... 8 SETTING GUI L ANGUAGE ....................................................................................................................................................... 9 INFO............................. INFO............ ................................. ................................ ................................. ................................. ................................. ................................. ................................ ............................. ............. 10 STATUS ............... ................................ ................................. ................................. ................................. ................................ ................................. ................................. ................................. ..................... .... 11
INTERFACES .............................................................................................................................................................................. 11 DHCP CLIENTS ....................................................................................................................................................................... 12 CATV ........................................................................................................................................................................................ 13 V OIP..........................................................................................................................................................................................14 DIAGNOSTICS ........................................................................................................................................................................... 15 Using ping .......................................................................................................................................................................... 15 Using traceroute .................................................................................................................................................................. 16 Using Ping6 ....................................................................................................................................................................... 16
SYSTEM .............. ............................... ................................. ................................. ................................. ................................ ................................. ................................. ................................. ..................... .... 17
P ASSWORD ................................................................................................................................................................................ 17 EBOOT .................................................................................................................................................................................... 18 R EBOOT
Reboot ................................................................................................................................................................................ 18 Factory Reboot .................................................................................................................................................................... 18
Page 3 of 62
B ACKUP AND R ESTORATION ................................................................................................................................................. 19 NETWORK ................................................................................................................................................ 20
WAN ......................................................................................................................................................................................... 21 WAN configuration using DHCP ..................................................................................................................................... 21 WAN configuration using Static IP .................................................................................................................................... 22 WAN configuration using PPPoE ..................................................................................................................................... 22
LAN........................................................................................................................................................................................... 24 W IRELESS .................................................................................................................................................................................. 25 Wireless Configuration for 2.4 GHZ WLAN ................................................................................................................... 25 Wireless Configuration for 5 GHZ WLAN ...................................................................................................................... 27 Wireless Security ................................................................................................................................................................. 29
WLAN ACCESS ........................................................................................................................................................................ 30 To set the WLAN Access Policy ........................................................................................................................................ 30 To set the WLAN Access Control list................................................................................................................................ 30
WPS ........................................................................................................................................................................................... 31 Push Button Configuration method ...................................................................................................................................... 31 PIN method ....................................................................................................................................................................... 31
DHCP ....................................................................................................................................................................................... 32 DHCP Server .................................................................................................................................................................... 32 Static Address Assignment ................................................................................................................................................. 32
UPNP.........................................................................................................................................................................................34 DNS........................................................................................................................................................................................... 35 PORT FORWARD ....................................................................................................................................................................... 36 IP V 6 PORT FORWARD ............................................................................................................................................................. 38 DMZ HOST .............................................................................................................................................................................. 39 PARENTAL CONTROLS......................................................................................................................... 40
TIMED ACCESS CONTROL ...................................................................................................................................................... 40 WLAN CONTROL .................................................................................................................................................................... 40 CONTENT FILTER .................................................................................................................................................................... 41 APPENDIX OPEN SOURCE LICENSES ............................................................................................... 42 Page 4 of 62
Introduction This chapter provides basic information about this guide.
About This Guide This guide provides home users with procedures for configuring or managing Genexis Residential Gateways (RGs) through the graphical user interface (GUI). This guide is applicable to the Digital Residential Gateway (DRG) 700, the Hybrid Live! and the Platinum products.
Related Manuals This guide is related to the following guides: •
DRG 700 Quick Guide
•
Hybrid Live! Quick Installation Guide
•
Platinum Quick Installation Guide
Typing Conventions
Typeface
Description
the Info tab
Indicates a GUI element, e.g. the name of a tab, a button, or a field
DRG 700 Quick Guide
Reference to another document
http://router
Indicates a Uniform Resource Locator (URL) address, or an E -mail address
Note:
A note indicates neutral or positive information that emphasizes or supplements important points of the main text.
Terminology
Terminology
Description
CATV
cable television
DHCP
Dynamic Host Control Protocol
DNS
Domain Name Server
Page 5 of 62
Introduction
DRGOS 1.12.1 GUI User Guide
DRG
Digital Residential Gateway
GUI
graphical user interface
HRG
Hybrid Residential Gateway
ISP
Internet Service Provider
LAN
Local Area Network
NAT
Network address translation
PBC
Push Button Configuration
PPPoE
Point-to-Point Protocol over Ethernet
RG
Residential Gateway
SSID
Service Set Identifier
UPnP
Universal Plug and Play
URL
Uniform Resource Locator
VoIP
Voice over IP
WAN
Wide Area Network
WLAN
Wireless Local Area Network
WPS
Wi-Fi Protected Setup
Page 6 of 62
Preparations This chapter provides instructions on accessing the web server of an RG.
Each RG contains an HTTP web server. You can connect to the server and configure the RG using your web browser.
Technical Requirement The following requirements should be satisfied before you access to the RG web server: • •
Your PC is physically connected to the RG using a cable or through Wi-Fi. Your browser must support JavaScript. The configuration program has been tested on the following browsers: •
Safari version 1.2 or later
•
Firefox version 2.0 or later
Internet Explorer version 7.0 or later To connect to the RG over IPv6, use an IPv6-enabled browser. •
Note: For the procedure for connecting to the RG, see DRG 700 Quick Guide or Hybrid Live! Quick Installation Guide .
Accessing RG Web Server To access the RG web server, perform the following steps: 1. Start your web browser. 2. Go to: http://router or http:// 192.168.1.254. Note: http://router always points to the RG while a user-configured IP address may vary. By default the RG’s IP address is 192.168.1.254.
To connect over IPv6, go to: http://[
]. For example, http://[2001:468:181:f101:20c:29ff:fe5d:10b4]/ Result: The login screen is displayed.
Page 7 of 62
Preparations
DRGOS 1.12.1 GUI User Guide
3. Enter the username admin and the password admin. Click OK . Result: The System Information page is displayed.
GUI Tabs You can switch between the following tabs in the GUI: •
Info displays the system-wide information for the RG
•
Status displays the status and statistics information for different modules of the RG
•
System is used to administer the RG
•
Network configures the networking parameters
Page 8 of 62
Preparations
DRGOS 1.12.1 GUI User Guide
Setting GUI Language The GUI can be displayed in one of the following languages: English, Danish, Dutch, German, Portuguese, Russian, Spanish, and Swedish. The default language is English. To switch to another language, perform the following steps: 1. 2.
Click the down arrow ( ) on the language label in the upper right corner of the web page, the list of supported languages is displayed. Select the desired language from the language list.
Page 9 of 62
Info The Info tab has one page ― Status . This page shows the device information and the software information.
Page 10 of 62
Status The Status tab has the following pages: •
Interfaces
•
DHCP clients
•
CATV
• •
VoIP Diagnostics
Interfaces Interfaces are the physical connections to RG. Statistics for the RG interfaces are displayed here.
WAN
Displays real-time information for the uplink interface to the broadband network.
LAN
Displays real-time information for the devices connected to the RG LAN ports.
WLAN
Displays real-time information for the wireless devices connected to the RG
Page 11 of 62
Status
DRGOS 1.12.1 GUI User Guide
DHCP Clients DHCP clients are the devices connected to your home network. This page allows you to see which devices are using the RG at any given point in time, as well as how long they have been connected.
DHCP Leases
Additional information
•
MAC Address: ID for the client device.
•
IP address: IP for the client device.
•
Name: Name for the client device.
•
Expires in: Amount of time left until the lease ends.
•
MAC Address
•
IP address
•
HW Type
•
Flags
•
Mask
Page 12 of 62
Status
DRGOS 1.12.1 GUI User Guide
CATV The status of CATV can be viewed in the GUI. If the CATV cable is inserted and the signal strength is in the normal range (-10 dBm ~ 0 dBm), a green bar is displayed with the indication “CATV power is good”.
If the power is outside this range, a red bar is displayed. The following figure shows the screen when the signal power is too high.
The following figure shows the screen when the signal power is too low or no signal is detected.
The following figure shows the screen if no CATV module is present on the RG.
Page 13 of 62
Status
DRGOS 1.12.1 GUI User Guide
VoIP The VoIP information shows the line status and call statistics.
Page 14 of 62
Status
DRGOS 1.12.1 GUI User Guide
Diagnostics In this page, you can use the network utilities ping, traceroute , and ping6 to troubleshoot the Internet connection status. You can change the target websites by editing the URL in the appropriate text fields.
Ping
This is the target hostname used by the ping utility. Enter a website address using alphanumeric characters (A-Z, 0-9), for example, google.com. Blank spaces are not allowed. You can enter the IP address for the target, for example209.85.135.147.
TraceRoute
This is the target hostname used by the traceroute utility. . Enter a website address using alphanumeric characters (AZ, 0-9), for example, google.com. Blank spaces are not allowed. You can enter the IP address for the target, for example 209.85.135.147.
Ping6
This is the target hostname used by the ping6 utility. Enter a website address using alphanumeric characters (A-Z, 0-9), for example, ipv6.google.com. Blank spaces are not allowed. You can enter the IPv6 address for the target, for example 3000:199:1321:8811::1.
Using ping
The ping tool is a network utility used to test whether a particular website is reachable across the Internet Protocol (IP) network. It also measures the round-trip time for packets sent from the RG to a specified destination. Use this to verify that the RG has Internet access. Figure 1.
Example output from ping for google.com
Pinging google.com [209.85.135.147] with 32 bytes of data: Reply from 209.85.135.147: bytes=32 time=33ms TTL=51 Reply from 209.85.135.147: bytes=32 time=34ms TTL=51 Reply from 209.85.135.147: bytes=32 time=33ms TTL=51 Reply from 209.85.135.147: bytes=32 time=34ms TTL=51 Ping statistics for 209.85.135.147:
Page 15 of 62
Status
DRGOS 1.12.1 GUI User Guide
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milliseconds: Minimum = 33ms, Maximum = 34ms, Average = 33ms
Using traceroute
The traceroute tool is a network utility used to show the route taken by packets across the IP network. The tool sends successive batches of packets and increases the number of servers that the packets traverse on their way to the target destination. The returning packets then produce a list of hosts that the packets have passed through to reach the destination. In this way, statistics are produced that can help identify routing problems, for example if a firewall configuration is blocking some types of traffic. Figure 2.
Example output from traceroute for google.com
traceroute to google.com (209.85.135.99), 30 hops max, 40 byte packets 1 192.168.29.254 (192.168.29.254) 5.801 ms 5.766 ms 5.758 ms 2 *** 3 kst-pe-1.swip.net (130.244.0.183) 1.223 ms 1.180 ms 1.198 ms 4 kst-ncore-2.tengigabiteth2-3.swip.net (130.244.53.73) 85.809 ms86.118 ms 86.436 ms 5 avk3-ncore-1.tengigabiteth2-1.swip.net (130.244.52.114) 1.461 ms1.455 ms 1.450 ms 6 avk-ncore-1.tengigabiteth4-2.swip.net (130.244.193.13) 58.725 ms57.577 ms 57.560 ms 7 avk-core-3.tengigabiteth2-2.swip.net (130.244.49.102) 1.186 ms1.252 ms 1.242 ms 8 avk-core-2.tengigabiteth4-3.swip.net (130.244.39.102) 14.233 ms13.625 ms 13.307 ms 9 some.stockholm.router.google.com (130.244.200.46) 1.287 ms 1.296 ms 1.640 ms 10 209.85.252.186 (209.85.252.186) 1.367 ms 209.85.250.192(209.85.250.192) 1.765 ms 1.752 ms 11 209.85.254.153 (209.85.254.153) 30.203 ms 209.85.248.132(209.85.248.132 ) 30.216 ms 30.208 ms 12 209.85.248.58 (209.85.248.58) 31.436 ms 34.317 ms 216.239.46.241(216.239.46.241) 30.363 ms 13 209.85.241.187 (209.85.241.187) 31.418 ms 31.389 ms 209.85.241.189(209.85.241.189) 31.386 ms 14 209.85.253.26 (209.85.253.26) 33.976 ms 34.241 ms 72.14.239.58(72.14.239.58) 34.472 ms 15 mu-in-f99.1e100.net (209.85.135.99) 32.103 ms 32.377 ms 32.350 ms
Using Ping6
The ping6 tool is a network utility used to test the IPv6 connectivity between the RG and a remote host by sending ICMPv6 echo requests to the host. Figure 3.
Example output for ping6
PING 3000:199:1321:8811::1 (3000:199:1321:8811::1): 56 data bytes 64 bytes from 3000:199:1321:8811::1: seq=0 ttl=64 time=2.756 ms 64 bytes from 3000:199:1321:8811::1: seq=1 ttl=64 time=1.531 ms 64 bytes from 3000:199:1321:8811::1: seq=2 ttl=64 time=1.823 ms 64 bytes from 3000:199:1321:8811::1: seq=3 ttl=64 time=1.479 ms --- 3000:199:1321:8811::1 ping statistics --4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 1.479/1.897/2.756 ms
Page 16 of 62
System The System tab has the following pages: •
Password
•
Reboot
•
Backup
Password The default password is admin for all RG devices. You should change this to prevent unauthorized use of the configuration program. From this page, you can change the password used to logon to the web server.
Current password
Enter the current password used to login to the system. This is required to prevent unauthorized persons gaining access to the system.
New password
Enter the new password, valid input is A-Z, 0-9. Blank spaces are not allowed.
Confirm new password
Re-enter the password. If it is not identical to the first entry, you will receive an error message. This is to prevent typing errors.
Click Save Password. The new password takes effect when you log onto the web server next time.
Page 17 of 62
System
DRGOS 1.12.1 GUI User Guide
Reboot You can choose one of the following options to reboot the RG: •
Reboot
•
Factory Reboot
Reboot
Rebooting will restart the RG and restore the last saved configuration. This option has the same effect as pressing the physical Reset button on the side of the RG. Click Reboot . It starts rebooting immediately.
Note: Any unsaved changes to the configuration will be lost!
Factory Reboot
Clicking Factory Reboot will erase all saved user configurations, restore the default user settings and restart the RG. Click Factory Reboot. It starts rebooting immediately.
Note: All user-configured settings will be lost!
Page 18 of 62
System
DRGOS 1.12.1 GUI User Guide
Backup and Restoration To secure the configuration you made on the RG, you can back up the configuration on a regular basis or before a factory reboot. Afterwards you can restore the configuration with the previously backed up copy of the configuration.
To back up the existing configuration, click Backup. The browser automatically downloads a file containing the configuration. To restore the configuration, perform the following steps: 1. Click Choose File and select the configuration file. 2. Click Restore.
Page 19 of 62
Network Under this tab, you can configure the user settings for the following network interfaces: •
WAN
•
LAN
•
Wireless
•
WLAN Access
•
WPS
•
DHCP
•
UPnP
•
Port Forward
Page 20 of 62
Network
DRGOS 1.12.1 GUI User Guide
WAN This northbound interface for the RG does not usually need to be reconfigured. There are currently three methods for connecting to the RG: DHCP, static IP, and PPPoE. Note: Incorrect configuration can disrupt your network access.
WAN configuration using DHCP
DHCP is the method most commonly used to connect the RG to the Internet and is the default setting.
Interface
If the Internet IP address from your ISP is allocated automatically upon connection (using dynamic IP address), the, the WAN interface is configurable (“WAN” is displayed in the “Interface” drop-down). In this case, t he default interface is WAN. If the Internet IP Address from your ISP is fixed or static, the WAN interface is not configurable (“WAN” is not displayed in the “Interface” drop-down). If the network operator has defined other interfaces using dynamic IP addresses, for example VLAN interfaces, they can also be selected from the drop-down and be configured here.
Connection Type
This is the method used to assign the IP address for the RG. Only change this if you have received explicit instructions from your ISP or network operator.
Domain Name Server 1
If permitted by your operator, you may configure up to two alternative upstream DNS servers. These servers convert hostnames to IP addresses, and may provide domain-based web content protection for your home network clients.
Domain Name Server 2
Page 21 of 62
Network
DRGOS 1.12.1 GUI User Guide
WAN configuration using Static IP
If required by your ISP, select this option to configure the device with the static IP Address information.
IP Address
Enter the static IP address provided by your ISP. The format is X.X.X.X (four IP octets separated by a dot).
Netmask
Enter the network mask provided by your ISP.
Default Gateway
Enter the IP address of the default gateway provided by your ISP.
Domain Name Server
Enter the IP address of the DNS server provided by your ISP.
Domain Name Server 1
If permitted by your operator, you may configure up to two alternative upstream DNS servers. These servers convert hostnames to IP addresses, and may provide domain-based web content protection for for your home network clients.
Domain Name Server 2
WAN configuration using PPPoE
The default case for for PPPoE is to to configure Internet Internet access on the the WAN interface.
Page 22 of 62
Network
DRGOS 1.12.1 GUI User Guide
Username
Set the PPPoE username.
Password
Set the PPPoE password.
Service Name
The name of the service offered by the service provider. If this information is not provided by your service provider, then leave this blank.
AC Name
The name of the access access concentrator. If this information information is not provided by your service provider, then leave this blank.
Idle Time
The specified idle period after which the network connection will be dropped.
Domain Name Server 1
If permitted by your operator, you may configure up to two alternative upstream DNS servers. These servers convert hostnames to IP addresses, and may provide domain-based web content protection for for your home network clients.
Domain Name Server 2
Page 23 of 62
Network
DRGOS 1.12.1 GUI User Guide
LAN
LAN IP Address
IP address for the RG, as seen from the local LAN. Use the default value unless the address is already in use or your LAN is using a different IP address range. In the latter case, enter an unused IP Address from within the range used by your LAN.
Netmask
The default value 255.255.255 255.255.255.0 .0 is standard for small (class "C") networks. For other networks, use the Network Mask for the LAN segment to which the RG is attached. i.e. the same value as the PCs on that LAN segment.
Page 24 of 62
Network
DRGOS 1.12.1 GUI User Guide
Wireless Wireless Configuration for 2.4 GHZ WLAN
The Wireless Configuration page allows you to configure the parameters for the 2.4 GHz wireless network. For example, you may wish to change the default SSID and password.
Enable Radio
Enable or disable the wireless LAN radio. By default it is enabled.
Country
Select your country from the drop-down list. Countries apply their own regulations to both the allowable channels and allowed maximum power levels within these frequency ranges. If your country is not listed, please check with your local government agency for which channels you are allowed to use, and select a country which allows those channels. (The channel list changes according to the selected country.)
Mode
Normally use the default setting—Mixed 802.11b, 802.11g, and 802.11n. The following options are available: •
•
•
•
802.11b—Only 802.11b devices can use the wireless network 802.11g—Only 802.11g devices can use the wireless network 802.11n—Only 802.11n devices can use the wireless network Mixed 802.11b and 802.11g—Excludes 802.11n devices
Page 25 of 62
Network
DRGOS 1.12.1 GUI User Guide
from the wireless network •
•
Mixed 802.11g and 802.11n—Excludes 802.11b devices from the wireless network Mixed 802.11b, 802.11g and 802.11n (the default setting)—All 802.11b, 802.11g and 802.11n wireless devices can use the wireless network
Channel
This field determines which channelwill be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. The default is Auto.
Channel Bandwidth
IEEE802.11n allows for the use of wideband channels (40MHz). This effectively doubles the bandwidth of the data channel. NOTE: Selecting 40MHz channel bandwidth will adversely affect any other nearby WLANs. Therefore, as required by the standard, if other WLANs are detected the bandwidth used will fall back to 20MHz.
SSID
The name of the wireless network
Broadcast SSID
On your PC, some wireless status screens may display the SSID as the Access Point in use. If using an ESS (Extended Service Set, with multiple access points) this ID is called an ESSID (Extended Service Set Identifier). To communicate, all wireless devices should use the same SSID/ESSID for the network.
Authentication Method
The wireless security encryption method. The default value is WPA2. See Wireless Security for more information.
Encryption Method
The default value is AES. See Wireless Security for more information.
Encryption Key
The key used for the selected encryption method. See Wireless Security for more information.
Enable Wi-Fi Protected Setup
WPS has a major security flaw that allows unauthorized parties to gain access to the network. By default WPS is enabled. To defend against brute-force attacks, you can disable WPS.
Page 26 of 62
Network
DRGOS 1.12.1 GUI User Guide
Wireless Configuration for 5 GHZ WLAN
Note: This page is only applicable to models supporting concurrent dual bands (2.4 GHz and 5 GHz).
The Wireless 5GHz Configuration page allows you to configure the parameters for the 5 GHz wireless network. For example, you may wish to change the default SSID and password.
Enable Radio
Enable or disable the wireless LAN radio. By default it is enabled.
Country
Select your country from the drop-down list. Countries apply their own regulations to both the allowable channels and allowed maximum power levels within these frequency ranges. If your country is not listed, please check with your local government agency for which channels you are allowed to use, and select a country which allows those channels. (The channel list changes according to the selected country.)
Mode
Normally use the default setting—Mixed 802.11a and 802.11n. The following options are available: •
•
•
Channel
802.11a—Only 802.11a devices can use the wireless network 802.11n—Only 802.11n devices can use the wireless network Mixed 802.11a and 802.11n (the default setting)—All 802.11a and 802.11n wireless devices can use the wireless network
This field determines which channel will be used. It should
Page 27 of 62
Network
DRGOS 1.12.1 GUI User Guide
not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. The default is Auto. Channel Bandwidth
IEEE802.11n allows for the use of wideband channels (40MHz). This effectively doubles the bandwidth of the data channel. NOTE: Selecting 40MHz channel bandwidth will adversely affect any other nearby WLANs. Therefore, as required by the standard, if other WLANs are detected the bandwidth used will fall back to 20MHz.
SSID
The name of the wireless network
Broadcast SSID
On your PC, some wireless status screens may display the SSID as the Access Point in use. If using an ESS (Extended Service Set, with multiple access points) this ID is called an ESSID (Extended Service Set Identifier). To communicate, all wireless devices should use the same SSID/ESSID for the network.
Authentication Method
The wireless security encryption method. The default value is WPA2. See Wireless Security for more information.
Encryption Method
The default value is AES. See Wireless Security for more information.
Encryption Key
The key used for the selected encryption method. See Wireless Security for more information.
Enable Wi-Fi Protected Setup
WPS has a major security flaw that allows unauthorized parties to gain access to the network. By default WPS is enabled. To defend against brute-force attacks, you can disable WPS.
Page 28 of 62
Network
DRGOS 1.12.1 GUI User Guide
Wireless Security
It is recommended to use WPA2 as the wireless authentication method. There are four options for wireless security: •
•
Disabled― no data encryption is used. It is strongly recommended that this mode is not used. All WLAN data will be visible to anyone with range of the WLAN. WEP― data is encrypted using the WEP standard. If selected, additional fields must be entered:
The standard passphrase is the same as the WPA key shown on the label. WEP keys are automatically generated from this passphrase. Note: The WEP protocol is severely compromised and, therefore, it is not recommended to use this encryption type. •
•
WPA ―data is encrypted using the WPA standard. This is a later standard than WEP, and provides much better security than WEP. WPA2 ― a further development of WPA and the best level of security.
Page 29 of 62
Network
DRGOS 1.12.1 GUI User Guide
WLAN Access You can define a policy to allow or reject access to devices defined in the WLAN Access Control list. The access control is disabled by default. To set the WLAN Access Policy
Perform the following steps: 1. Select one of the following options from the WLAN Filter drop-down: • •
•
Disabled : WLAN access policies are not applied. Allow : The WLAN policy allows access to any devices listed in the WLAN Access Control list. Devices which are not in the list are not permitted to access the network. Reject: The WLAN policy rejects access to any devices listed in the WLAN Access Control list. Devices which are not in the list are permitted to access the network.
2. Click Save WLAN Access Settings. To set the WLAN Access Control list
Specify WLAN devices by MAC address. The list of devices is subject to the access policy, i.e. if the policy is to allow access, then all listed devices can access the WLAN. Or if the policy is to reject access, then all listed devices cannot access the WLAN. Perform the following steps: 1. Click Add WLAN Device. A new field is displayed to enter the MAC address.
2. Enter the MAC address in the field. The format is XX:XX:XX:XX:XX:X. Click Save. The MAC address is added to the list. You can add several MAC addresses to the WLAN Access Control list. You can also edit or delete the existing MAC addresses.
Page 30 of 62
Network
DRGOS 1.12.1 GUI User Guide
WPS The RG supports Wi-Fi Protected Setup (WPS). WPS provides a simple mechanism for users to add clients to a wireless network without the need to administer complicated settings like SSID, authentication, encryption types, and so on. WPS was defined by the Wi-Fi Alliance. Further details can be found at http://www.wi-fi.org/wifi-protected-setup. The RG supports both push button (PBC) and PIN methods for using WPS. For details, see Push Button Configuration method and PIN method. Push Button Configuration method
Push Button Configuration (PBC) can be used if supported by the client. To join the wireless network in this mode, the end user can press a physical button on the WPS-enabled client device, or a “soft” button on the client GUI. If the WPS button is subsequently pressed on the RG within 2 minutes, the client and RG will exchange information that associates the client with the RG and sets up all necessary parameters on the client, e.g. SSID, authentication type and keys. The end user does not need to know anything about the configuration settings. When the WPS button is pressed on the RG, the WLAN LED will blink orange for up to two minutes, during which time the client communication can start. Once the client has been successfully connected to the network, the LED will return to the normal green color. If the client does not successfully connect to the network, this will be indicated to the client via the user interface ― please see the client documentation for details of how the client indicates connection status. PIN method
As an alternative to PBC, the PIN method allows for the entry of a unique 8-digit PIN number to be entered onto the RG. In PIN mode, the end user must first connect to the network using either a cable plugged into a LAN port on the RG or a wireless device. The user can then navigate to the WPS page on the RG by entering the following URL in their web browser: http://router/cgi-bin/webif/network-wps.sh. Users can then use the client default PIN code, or generate a new PIN code provided by the client or client GUI. The 8-digit code can then be entered into the RG GUI.
Select Configuration Method
Select the WPS configuration mode. If you select PIN Configuration, you can enter a new PIN code.
When you have finished configuring WPS, click Start WPS Configuration .
Page 31 of 62
Network
DRGOS 1.12.1 GUI User Guide
DHCP The RG can be acting as a Dynamic Host Control Protocol (DHCP) server. The DHCP server gives out IP addresses when a device in the LAN is starting up and requests an IP address to be logged on to the network. The device must be set as a DHCP client to "obtain the IP address automatically". By default, the DHCP Server is enabled on the RG. The DHCP address pool contains the range of the IP addresses that will automatically be assigned to the clients in the LAN.
DHCP Server
Fill in the DHCP Server fields and click Save DHCP Server Settings to save the configuration.
Enable DHCP Server
Controls whether the RG can be acting as a DHCP server. By default, it is enabled.
DHCP Address Start
The start address of the DHCP server address pool
DHCP Address End
The end address of the DHCP server address pool
Lease Duration
This field controls how often the DHCP clients will request new leases in seconds. A lease of 1 day (86400s) is suitable for most home networks. The minimum is 120s.
Domain Name
This field defines the LAN domain name provided to the DHCP clients.
Static Address Assignment
A static host entry allows one to define a specific IP address for a host based on its MAC address or hostname. If the host is using DHCP, then the DHCP server will assign the defined IP address to the host for each lease. Additionally it will be possible to address the host using its name rather than its IP address. This is useful for local servers.
Page 32 of 62
Network
DRGOS 1.12.1 GUI User Guide
To add a static host entry, click Add Static Host.
Fill in the fields and click Save. The static host entry is then added.
Hostname
Enter the hostname of the host.
MAC Address
Enter the MAC address in XX:XX:XX:XX:XX:XX format. You can enter either the hostname or the MAC address.
IP Address
Enter the IP address to be assigned to the host.
Lease time
Optionally, enter the lease time for the host. If the lease time is not set, the value in the Lease Duration field is used.
The following example shows a static host entry added using the hostname of the host:
The following example shows a static host entry added using the MAC address of the host:
To edit the entry, click edit. Modify the values in the fields and click Save.
To delete the entry, click delete.
Page 33 of 62
Network
DRGOS 1.12.1 GUI User Guide
UPnP Universal Plug and Play (UPnP) enables zero-configuration and automatic discovery so that supported devices can seamlessly join and leave the network. UPnP devices can: • Dynamically join a network • Obtain an IP address • Announce its name • Convey its capabilities upon request • Learn about the presence and capabilities of other devices • Leave a network smoothly and automatically
For more information about UPnP, see http://upnp.org .
UPnP is disabled by default. Although UPnP is a useful feature, there are security implications in allowing programs to create holes in the firewall. You must understand the security implications for your network before enabling UPnP.
Page 34 of 62
Network
DRGOS 1.12.1 GUI User Guide
DNS To allow the RG to provide DNS services to the LAN hosts, you can add hostname and IP address mappings on this page.
Page 35 of 62
Network
DRGOS 1.12.1 GUI User Guide
Port Forward Port forwarding is also referred to as NAT port forwarding. Network address translation (NAT) allows traffic only when the conversation originates from the internal network (e.g. private LAN), and blocks access attempts originating from the external network (e.g. the Internet). For example, a web browser in the internal network can browse a web site outside, but a web browser outside could not browse a web site on the internal network. Port forwarding can be useful when a server (e.g. web server, game console, FTP server, mail server, and so on) is running within the private network and external access to the server is permitted. If port forwarding is enabled for a specific service, the RG can be viewed as a “Virtual Server” for the service.
To configure a port forwarding rule, click Add New Rule. The fields for defining the new rule are displayed.
Service Name
Optionally, enter the name of the service. This is useful as a reminder of the purpose of the specific ru le.
Port Range
Specify the range of the external ports, through which traffic is forwarded to the local ports. You can use the following format: •
A single port, e.g. “21”
•
A port list, e.g. “10080, 18000, 18080”
•
A port range, e.g. “20000-20019”
•
A combination of port list and port range, such as, “80,30003007,8800”.
Note: Port ranges can only be used when the internal and external ports are the same.
Local IP Address
Enter the IP address of the local host to which the traffic is forwarded.
Local Port Range
Specify the port range of the local host. It is in the same format
Page 36 of 62
Network
DRGOS 1.12.1 GUI User Guide
as the external port range. Note: If you do not specify a local port range, the external port range will be used on the internal host.
Protocol
Select one of the following options from the drop-down: •
TCP: Only TCP packets are forwarded.
•
UDP: Only UDP packets are forwarded.
•
BOTH: Both TCP and UDP packets are forwarded.
When the fields are filled, click Save to create the new rule. The newly created rule is displayed.
To edit the rule, click edit. Modify the fields and click Save.
To delete the rule, click delete. Note: The RG does not forward traffic on management ports as doing this may break the management connectivity. Examples of the management ports are 22/TCP, 161/UDP, and 8082/TCP. If you intend to forward management traffic, use port remapping in the port forwarding rules. For example: Service Name
Port Range
Local IP Address
Local Port Range
Protocol
ssh
1022
192.168.1.183
22
TCP
Page 37 of 62
Network
DRGOS 1.12.1 GUI User Guide
IPv6 Port Forward IPv6 port forwarding makes it possible to forward IPv6 traffic through the firewall to a specified LAN host. This is useful when setting up servers, e.g. HTTP, FTP etc. Some games also require port forwarding to enable or enhance operation. To configure an IPv6 port forwarding rule, click Add New Rule. The fields for defining the new rule are displayed.
Fill in the fields per instructions on the page and click Save New Rule. To edit a rule, click edit. To delete a rule, click delete.
Page 38 of 62
Network
DRGOS 1.12.1 GUI User Guide
DMZ Host Defining a DMZ host allows all traffic, which are otherwise not forwarded, to be forwarded to a specific host on the LAN. This allows the DMZ host to provide services to devices on the external network.
To enable the DMZ host on LAN, perform the following steps: 1. 2. 3.
Select the Enable DMZ Host check box. Enter the IP address of the DMZ host in the DMZ Host field. Click Save DMZ Host Settings .
To disable the DMZ host, clear the Enable DMZ Host check box and click Save DMZ Host Settings.
Page 39 of 62
Parental Controls
DRGOS 1.12.1 GUI User Guide
Parental Controls Parental controls include the following sub-features:
Timed Access Control WLAN Control Content Filter
Timed Access Control Timed access control makes it possible to block specific devices from accessing the Internet at certain times. This makes it possible to restrict the hours of access available to phones, tablets and PCs. By default all devices have access to the Internet at all times. You can configure sessions for timed access control. A session defines the times when to block which client. To create a session, perform the following steps: 1.
Click Add New Session. The following controls are displayed.
2.
Select a client from the Host drop-down list. Note: If a client is not visible in the list of hosts, ensure that the host uses DHCP and is present on the network at the time you want to define the session.
3. 4. 5.
Select the frequency how often to block the client from the Blocked drop-down list. Set the start time and the end time. Click Save New Session.
You can use the status control to quickly enable or disable the session.
WLAN Control WLAN control allows you to disable the WLAN interface completely. This is useful if you want to ensure that no WLAN clients can connect, e.g. at night, or outside office hours. A WLAN control session defines when to disable the WLAN interface in a day. To create a session, perform the following steps: 1.
Click Add WLAN Control.
Page 40 of 62
Parental Controls
DRGOS 1.12.1 GUI User Guide
2. 3.
Set the start time and the end time. Click Save Session.
Content Filter By setting your own DNS server, you can restrict the websites that can be visited by the LAN hosts. You can configure up to two alternative upstream DNS servers. Click Network > WAN and set the DNS servers.
Page 41 of 62
Appendix Open Source Licenses Open source packages are used to provide some functionality. These packages are licensed under standard open source licenses, which are shown below for each package. License for package(s):
libpcap 1.1.1 tcpdump 4.1.1 Li cense: BSD Redi st r i but i on and use i n sour ce and bi nary f orms, wi t h or wi t hout modi f i cat i on, ar e per mi t t ed pr ovi ded t hat t he f ol l owi ng condi t i ons ar e met : 1. Redi st r i but i ons of sour ce code must r etai n t he above copyr i ght not i c e, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer . 2. Redi st r i but i ons i n bi nar y f or m must r epr oduce the above copyri ght not i c e, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer i n t he document at i on and/ or ot her mat er i al s provi ded wi t h t he di s t r i but i on. 3. The names of t he aut hor s may not be used t o endor se or pr omot e pr oducts der i ved f r om t hi s sof t war e wi t hout speci f i c pr i or wr i t t en per mi ssi on. THI S SOFTWARE I S PROVI DED ` ` AS I S' ' AND WI THOUT ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, WI THOUT LI MI TATI ON, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE.
License for package(s):
pcre 8.11 PCRE LI CENCE PCRE i s a l i br ary of f unct i ons t o support r egul ar expr essi ons whose synt ax and semant i cs are as cl ose as possi bl e t o t hose of t he Perl 5 l anguage. Rel ease 8 of PCRE i s di st r i but ed under t he t er ms of t he "BSD" l i cence, as speci f i ed bel ow. The document ati on f or PCRE, suppl i ed i n t he "doc" di r ect or y, i s di st r i but ed under t he same t er ms as t he sof t war e i t sel f . The basi c l i br ar y f unct i ons ar e wr i t t en i n C and ar e f r eest andi ng. Al so i ncl uded i n t he di st r i but i on i s a set of C++ wr apper f unct i ons. THE BASI C LI BRARY FUNCTI ONS --Wr i t t en by: Phi l i p Hazel Emai l l ocal par t : ph10 Emai l domai n: cam. ac. uk Uni ver si t y of Cambri dge Comput i ng Ser vi ce, Cambr i dge, Engl and. Copyr i ght ( c) 1997- 2010 Uni ver si t y of Cambri dge Al l r i ght s r es er ved. THE C++ WRAPPER FUNCTI ONS Cont r i but ed by: Googl e I nc. Copyr i ght ( c) 2007- 2010, Googl e I nc. Al l r i ght s r es er ved. THE " BSD" LI CENCE
Page 42 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
Redi st r i but i on and use i n sour ce and bi nary f orms, wi t h or wi t hout modi f i cat i on, ar e per mi t t ed pr ovi ded t hat t he f ol l owi ng condi t i ons ar e met : * Redi st r i but i ons of sour ce code must r etai n t he above copyr i ght noti ce, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer . * Redi st r i but i ons i n bi nary f orm must r epr oduce t he above copyr i ght not i c e, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer i n t he document at i on and/ or ot her mat er i al s provi ded wi t h t he di st r i but i on. * Nei t her t he name of t he Uni ver si t y of Cambr i dge nor t he name of Googl e I nc. nor t he names of t hei r cont r i but or s may be used t o endor se or pr omot e pr oduct s der i ved f r om t hi s sof t war e wi t hout speci f i c pr i or wr i t t en per mi ssi on. THI S SOFTWARE I S PROVI DED BY THE COPYRI GHT HOLDERS AND CONTRI BUTORS " AS I S" AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE COPYRI GHT OWNER OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, STRI CT L I ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE. End
License for package(s):
dropbear 0.51 Dr opbear cont ai ns a number of component s f r om di f f er ent sour ces, hence t her e ar e a f ew l i censes and aut hor s i nvol ved. Al l l i censes ar e f ai r l y non- r e st r i c t i ve. The maj or i t y of code i s wr i t t en by Mat t J ohnst on, under t he l i cense bel ow. Por t i ons of t he cl i ent - mode wor k ar e ( c) 2004 Mi hnea Stoenescu, under t he same l i cense: Copyr i ght ( c) 2002- 2006 Mat t J ohnst on Por t i ons copyr i ght ( c) 2004 Mi hnea St oenescu Al l r i ght s r es er ved. Per mi ssi on i s her eby gr ant ed, f r ee of charge, t o any per son obt ai ni ng a copy of t hi s sof t war e and associ at ed document at i on f i l es ( t he "Sof t war e") , t o deal i n t he Sof t war e wi t hout r es t r i c t i on, i nc l udi ng wi t hout l i mi t at i on t he r i ght s t o use, copy, modi f y, mer ge, publ i sh, di st r i but e, subl i cense, and/ or sel l copi es of t he Sof t ware, and t o permi t persons t o whom t he Sof t ware i s f ur ni shed t o do so, subj ect t o the f ol l owi ng condi t i ons: The above copyr i ght not i ce and t hi s per mi ss i on not i ce shal l be i ncl uded i n al l copi es or subst ant i al por t i ons of t he Sof t war e. THE SOFTWARE I S PROVI DED " AS I S" , WI THOUT WARRANTY OF ANY KI ND, EXPRESS OR I MPLI ED, I NCLUDI NG BUT NOT LI MI TED TO THE WARRANTI ES OF MERCHANTABI LI TY, FI TNESS F OR A PARTI CULAR PURPOSE AND NONI NFRI NGEMENT. I N NO EVENT SHALL THE AUTHORS OR COPYRI GHT HOLDERS BE L I ABLE FOR ANY CLAI M, DAMAGES OR OTHER LI ABI LI TY, WHETHER I N AN ACTI ON OF CONTRACT, TORT OR OTHERWI SE, ARI SI NG FROM, OUT OF OR I N CONNECTI ON WI TH THE SOFTWARE OR THE USE OR OTHER DEALI NGS I N THE SOFTWARE. ===== Li bTomCr ypt and Li bTomMat h ar e wr i t t en by Tom St Deni s, and ar e Publ i c Domai n. ===== sshpt y. c i s t aken f r om OpenSSH 3. 5p1, Copyr i ght ( c) 1995 Tatu Yl onen , Espoo, Fi nl and Al l r i ght s r es er ved "As f ar as I am concer ned, t he code I have wr i t t en f or t hi s sof t war e can be used f r eel y f or any pur pose. Any deri ved ver si ons of t hi s
Page 43 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
sof t war e must be cl ear l y mar ked as such, and i f t he der i ved wor k i s i ncompat i bl e wi t h t he pr ot ocol descri pt i on i n t he RFC f i l e, i t must be cal l ed by a name ot her t han " ssh" or " Secur e Shel l " . " ===== l ogi nr e c. c l ogi nr ec . h at omi ci o. h at omi ci o. c and st r l cat ( ) ( i ncl uded i n ut i l . c) ar e f r om OpenSSH 3. 6. 1p2, and ar e l i censed under t he 2 poi nt BSD l i cense. l ogi nr ec i s wr i t t en pr i mari l y by Andr e Lucas, atomi ci o. c by Theo de Raadt . s t r l c at ( ) i s ( c ) Todd C. Mi l l er ===== I mpor t code i n keyi mpor t . c i s modi f i ed f r om PuTTY' s i mpor t . c, l i censed as f ol l ows : PuTTY i s copyr i ght 1997- 2003 Si mon Tat ham. Por t i ons copyri ght Rober t de Bat h, J or i s van Rant wi j k, Del i an Del chev, Andr eas Schul t z, J eroen Massar , Wez Fur l ong, Ni col as Barr y, J ust i n Br adf or d, and CORE SDI S. A. Per mi ssi on i s hereby gr ant ed, f r ee of charge, t o any per son obt ai ni ng a copy of t hi s sof t ware and associ at ed document ati on f i l es ( t he "Sof t war e") , t o deal i n t he Sof t war e wi t hout r est r i cti on, i ncl udi ng wi t hout l i mi t at i on t he r i ght s t o use, copy, modi f y, mer ge, publ i s h, di s t r i but e, s ubl i c ens e, and/ or s el l c opi es of t he Sof t war e , and to per mi t persons t o whom t he Sof t ware i s f ur ni shed to do so, subj ect t o t he f ol l owi ng condi t i ons: The above copyr i ght not i ce and t hi s per mi ss i on not i ce shal l be i ncl uded i n al l copi es or subst ant i al por t i ons of t he Sof t war e. THE SOFTWARE I S PROVI DED " AS I S" , WI THOUT WARRANTY OF ANY KI ND, EXPRESS OR I MPLI ED, I NCLUDI NG BUT NOT LI MI TED TO THE WARRANTI ES OF MERCHANTABI LI TY, FI TNESS FOR A PARTI CULAR PURPOSE AND NONI NFRI NGEMENT. I N NO EVENT SHALL THE COPYRI GHT HOLDERS BE LI ABLE FOR ANY CLAI M, DAMAGES OR OTHER LI ABI LI TY, WHETHER I N AN ACTI ON OF CONTRACT, TORT OR OTHERWI SE, ARI SI NG FROM, OUT OF OR I N CONNECTI ON WI TH THE SOFTWARE OR THE USE OR OTHER DEALI NGS I N THE SOFTWARE.
License for package(s):
argp-standalone 1.3 base-files 14 bridge-utils 1.4 busybox 1.11.2 dnsmasq 2.55 e2fsprogs 1.40.11 ethtool 3 gdb-server 7.0 gmp 4.2.1
Page 44 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
haserl 0.9.29 hotplug2 0.9 iproute2 2.6.39 iptables 1.4.7 libcli 1.9.3 libgdbm 1.8.3 libnetfilter_conntrack 0.0.100 libnetfilter_log 1.0.0 libnetfilter_queue 1.0.0 libnfnetlink 1.0.0 libtool 1.5.24 libupnp 1.6.18 lighttpd 1.4.32 linux-atm 2.4.1 mtd 8 ncurses 5.6 ndisc6 1.0.1 net-snmp 5.4.2.1 ntpclient 2007_365 openssl 1.0.0g ppp 2.4.3 readline 5.2 rp-pppoe 3.8 uci 0.7.3 udev 106
Page 45 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
ulogd 1.24 watchdog 5.9 wireless-tools 29 zlib 1.2.3 GNU GENERAL PUBLI C LI CENSE Vers i on 2, J une 1991 Copyr i ght ( C) 1989, 1991 Fr ee Sof t ware Foundat i on, I nc. , 51 Fr ankl i n St r eet , Fi f t h Fl oor , Bost on, MA 02110- 1301 USA Ever yone i s per mi t t ed to copy and di st r i but e ver bat i m copi es of t hi s l i cense document , but changi ng i t i s not al l owed. Pr eambl e The l i censes f or most sof t war e ar e desi gned t o t ake away your f r eedom t o share and change i t . By cont r ast , t he GNU General Publ i c Li cense i s i nt ended t o guar ant ee your f r eedom t o shar e and change f r ee sof t war e- - t o make sur e t he sof t war e i s f r ee f or al l i t s user s. Thi s General Publ i c Li cense appl i es t o most of t he Fr ee Sof t ware Foundat i on' s s of t war e and t o any ot her progr am whose aut hor s commi t t o usi ng i t . ( Some ot her Fr ee Sof t ware Foundati on sof t ware i s cover ed by t he GNU Lesser General Publ i c Li cense i nst ead. ) You can appl y i t t o your progr ams, t oo. When we speak of f r ee sof t war e, we ar e r ef er r i ng t o f r eedom, not pri ce. Our Gener al Publ i c Li censes ar e desi gned t o make sur e t hat you have t he f r eedom t o di st r i but e copi es of f r ee sof t war e ( and char ge f or t hi s ser vi ce i f you wi sh) , t hat you r ecei ve sour ce code or can get i t i f you want i t , t hat you can change t he sof t ware or use pi eces of i t i n new f r ee pr ogr ams; and t hat you know you can do t hese t hi ngs. To pr ot ect your r i ght s, we need t o make r est r i ct i ons t hat f or bi d anyone t o deny you these ri ght s or t o ask you t o sur r ender t he ri ght s. These r est r i ct i ons t r ansl at e t o cer t ai n r esponsi bi l i t i es f or you i f you di st r i but e copi es of t he sof t war e, or i f you modi f y i t . For exampl e, i f you di st r i but e copi es of such a pr ogr am, whether gr at i s or f or a f ee, you must gi ve t he r eci pi ent s al l t he r i ght s t hat you have. You must make sur e t hat t hey, t oo, r ecei ve or can get t he sour ce code. And you must show t hem t hese t er ms so t hey know t hei r r i ght s . We pr otect your r i ght s wi t h t wo st eps: ( 1) copyr i ght t he sof t ware, and ( 2) of f er you t hi s l i cense whi ch gi ves you l egal per mi ssi on t o copy, di st r i but e and/ or modi f y t he sof t war e. Al so, f or each aut hor' s prot ect i on and our s, we want t o make cer t ai n t hat everyone underst ands t hat t her e i s no war r ant y f or t hi s f r ee sof t war e. I f t he sof t ware i s modi f i ed by someone el se and passed on, we want i t s r eci pi ent s t o know t hat what t hey have i s not t he or i gi nal , so t hat any pr obl ems i nt r oduced by ot her s wi l l not r ef l ect on t he or i gi nal aut hor s' r eput at i ons. Fi nal l y, any f r ee pr ogr am i s t hr eat ened const ant l y by sof t war e pat ent s. We wi sh to avoi d the danger t hat r edi st r i but or s of a f r ee pr ogr am wi l l i ndi vi dual l y obt ai n pat ent l i censes, i n ef f ect maki ng t he pr ogr am pr opr i etar y. To pr event t hi s, we have made i t cl ear t hat any pat ent must be l i censed f or ever yone' s f r ee use or not l i censed at al l . The pr eci se t er ms and condi t i ons f or copyi ng, di st r i but i on and modi f i c at i on f o l l ow. GNU GENERAL PUBLI C LI CENSE TERMS AND CONDI TI ONS FOR COPYI NG, DI STRI BUTI ON AND MODI FI CATI ON 0. Thi s Li cense appl i es to any pr ogr am or ot her work whi ch cont ai ns a noti ce pl aced by t he copyr i ght hol der sayi ng i t may be di st r i but ed under t he t erms of t hi s General Publ i c Li cense. The "Pr ogr am" , bel ow,
Page 46 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
r ef er s t o any such pr ogr am or wor k, and a " wor k based on t he Pr ogr am" means ei t her t he Pr ogr amor any der i vat i ve wor k under copyr i ght l aw: t hat i s t o say, a wor k cont ai ni ng t he Pr ogr am or a por t i on of i t , ei t her ver bat i m or wi t h modi f i cat i ons and/ or t r ansl at ed i nt o anot her l anguage. ( Her ei naf t er , t r ans l at i on i s i nc l uded wi t hout l i mi t at i on i n t he t er m "modi f i cat i on". ) Each l i censee i s addr essed as "you". Acti vi t i es ot her t han copyi ng, di st r i but i on and modi f i cat i on ar e not cover ed by t hi s Li cense; t hey ar e out si de i t s scope. The act of r unni ng t he Pr ogr am i s not r est r i ct ed, and t he out put f r om t he Progr am i s cover ed onl y i f i t s cont ent s const i t ut e a wor k based on the Pr ogr am ( i ndependent of havi ng been made by r unni ng t he Pr ogr am) . Whet her t hat i s t r ue depends on what t he Pr ogr am does. 1. You may copy and di st r i but e verbat i m copi es of t he Pr ogr am' s sour ce code as you recei ve i t , i n any medi um, provi ded t hat you conspi cuousl y and appropri at el y publ i sh on each copy an appropr i at e copyri ght not i ce and di scl ai mer of war r ant y; keep i nt act al l t he noti ces t hat r ef er t o t hi s Li cense and t o t he absence of any warr ant y; and gi ve any ot her r eci pi ent s of t he Pr ogr am a copy of t hi s Li cense al ong wi t h t he Pr ogr am. You may char ge a f ee f or t he physi cal act of t r ansf er r i ng a copy, and you may at your opt i on of f er warr ant y pr otect i on i n exchange f or a f ee. 2. You may modi f y your copy or copi es of t he Pr ogr am or any por t i on of i t , t hus f or mi ng a wor k based on t he Pr ogr am, and copy and di st r i but e such modi f i cat i ons or work under t he ter ms of Sect i on 1 above, pr ovi ded t hat you al so meet al l of t hese condi t i ons: a) You must cause t he modi f i ed f i l es t o car r y pr omi nent noti ces st at i ng t hat you changed t he f i l es and t he dat e of any change. b) You must cause any wor k t hat you di st r i but e or publ i sh, t hat i n whol e or i n par t cont ai ns or i s der i ved f r om t he Progr am or any par t t her eof , t o be l i censed as a whol e at no char ge to al l t hi r d par t i es under t he t er ms of t hi s Li cense. c) I f t he modi f i ed pr ogr am normal l y r eads commands i nt er act i vel y when r un, you must cause i t , when st ar t ed r unni ng f or such i nt er act i ve use i n t he most or di nar y way, t o pr i nt or di spl ay an announcement i ncl udi ng an appropr i at e copyr i ght not i ce and a not i ce t hat t her e i s no war r ant y (or el se, sayi ng t hat you pr ovi de a warr ant y) and t hat users may redi st r i but e t he pr ogr amunder t hese condi t i ons, and tel l i ng the user how t o vi ew a copy of t hi s L i c ens e. ( Exc ept i on: i f t he Pr ogr am i t s el f i s i nt er ac t i ve but does not nor mal l y pr i nt such an announcement , your wor k based on t he Progr am i s not r equi r ed t o pr i nt an announcement . ) These r equi r ement s appl y t o t he modi f i ed wor k as a whol e. I f i dent i f i abl e sect i ons of t hat wor k ar e not der i ved f r om t he Progr am, and can be r easonabl y consi der ed i ndependent and separ at e wor ks i n t hemsel ves, t hen t hi s Li cense, and i t s t erms, do not appl y t o t hose sect i ons when you di st r i but e t hem as separ at e wor ks. But when you di st r i but e t he same sect i ons as part of a whol e whi ch i s a wor k based on t he Pr ogr am, t he di st r i but i on of t he whol e must be on t he t er ms of t hi s Li cense, whose permi ssi ons f or other l i censees ext end t o t he ent i r e whol e, and thus t o each and every par t r egardl ess of who wr ote i t . Thus, i t i s not t he i nt ent of t hi s sec t i on t o cl ai m r i ght s or cont est your r i ght s t o wor k wr i t t en ent i r el y by you; r at her , t he i nt ent i s t o exer c i s e t he r i ght t o c ont r ol t he di s t r i but i on of der i vat i ve or col l ect i ve works based on t he Pr ogr am. I n addi t i on, mer e aggr egat i on of anot her wor k not based on t he Pr ogr am wi t h t he Pr ogr am ( or wi t h a wor k based on t he Pr ogr am) on a vol ume of a st orage or di st r i but i on medi um does not br i ng the ot her work under t he scope of t hi s Li cense. 3. You may copy and di st r i but e t he Pr ogr am ( or a wor k based on i t , under Sect i on 2) i n obj ect code or execut abl e f orm under t he t erms of Sect i ons 1 and 2 above pr ovi ded t hat you al so do one of t he f ol l owi ng:
Page 47 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
a) Accompany i t wi t h t he compl et e cor r espondi ng machi ne- r eadabl e sour ce code, whi ch must be di st r i but ed under t he t er ms of Sect i ons 1 and 2 above on a medi um cust omari l y used f or s of t war e i nt er change; or , b) Accompany i t wi t h a wr i t t en of f er , val i d f or at l east t hr ee year s, t o gi ve any t hi r d part y, f or a charge no more t han your cost of physi cal l y per f or mi ng sour ce di st r i but i on, a compl et e machi ne- r eadabl e copy of t he cor r espondi ng sour ce code, t o be di st r i but ed under t he t er ms of Sect i ons 1 and 2 above on a medi um cust omar i l y used f or sof t war e i nt er change; or , c) Accompany i t wi t h the i nf ormati on you recei ved as t o the of f er t o di st r i but e cor r espondi ng sour ce code. ( Thi s al t er nat i ve i s al l owed onl y f or noncommerci al di st r i but i on and onl y i f you r ecei ved t he pr ogr am i n obj ect code or execut abl e f orm wi t h such an of f er , i n accor d wi t h Subsect i on b above. ) The sour ce code f or a wor k means t he pr ef er r ed f or m of t he wor k f or maki ng modi f i cat i ons t o i t . For an execut abl e work, compl ete sour ce code means al l t he sour ce code f or al l modul es i t cont ai ns, pl us any as s oc i at ed i nt er f ac e def i ni t i on f i l es , pl us t h e s cr i pt s us ed t o cont r ol compi l at i on and i nst al l at i on of t he execut abl e. However , as a speci al except i on, t he sour ce code di st r i but ed need not i ncl ude anyt hi ng t hat i s nor mal l y di st r i but ed ( i n ei t her sour ce or bi nar y f orm) wi t h t he maj or component s ( compi l er , ker nel , and so on) of t he operat i ng syst em on whi ch t he execut abl e runs, unl ess t hat component i t sel f accompani es t he execut abl e. I f di st r i but i on of execut abl e or obj ect code i s made by of f er i ng access t o copy f r om a desi gnat ed pl ace, t hen of f er i ng equi val ent access t o copy t he sour ce code f r om t he same pl ace count s as di st r i but i on of t he sour ce code, even t hough t hi r d par t i es are not compel l ed t o copy t he sour ce al ong wi t h t he obj ect code. 4. You may not copy, modi f y, subl i cense, or di st r i but e t he Progr am except as expr essl y pr ovi ded under t hi s Li cense. Any at t empt ot her wi se t o copy, modi f y, subl i cense or di st r i but e t he Progr am i s voi d, and wi l l aut omat i cal l y t er mi nat e your r i ght s under t hi s Li cense. However, part i es who have recei ved copi es, or r i ght s, f r om you under t hi s Li cense wi l l not have t hei r l i censes t er mi nat ed so l ong as such par t i es r emai n i n f ul l compl i ance. 5. You are not r equi r ed t o accept t hi s Li cense, si nce you have not si gned i t . However, nothi ng el se gr ant s you permi ssi on t o modi f y or di st r i but e the Pr ogr am or i t s der i vat i ve wor ks. These acti ons are pr ohi bi t ed by l aw i f you do not accept t hi s Li cense. Ther ef or e, by modi f yi ng or di st r i but i ng t he Pr ogr am ( or any work based on t he Progr am) , you i ndi cat e your accept ance of t hi s Li cense t o do so, and al l i t s t er ms and condi t i ons f or copyi ng, di st r i but i ng or modi f yi ng t he Progr am or works based on i t . 6. Each t i me you r edi st r i but e t he Pr ogr am ( or any wor k based on t he Progr am) , t he r eci pi ent aut omat i cal l y r ecei ves a l i cense f r om t he or i gi nal l i censor t o copy, di st r i but e or modi f y the Pr ogr am subj ect t o t hese t er ms and condi t i ons. You may not i mpose any f ur t her r est r i cti ons on t he r eci pi ent s' exer ci se of t he r i ght s gr ant ed her ei n. You ar e not r esponsi bl e f or enf or ci ng compl i ance by t hi r d par t i es t o t hi s Li c ens e. 7. I f , as a consequence of a cour t j udgment or al l egati on of patent i nf r i ngement or f or any ot her r eason ( not l i mi t ed t o pat ent i ssues) , condi t i ons ar e i mposed on you ( whet her by cour t or der , agr eement or ot her wi se) t hat cont r adi ct t he condi t i ons of t hi s Li cense, t hey do not excuse you f r om t he condi t i ons of t hi s Li cense. I f you cannot di st r i but e so as t o sat i sf y si mul t aneousl y your obl i gat i ons under t hi s Li cense and any ot her per t i nent obl i gat i ons, t hen as a consequence you may not di st r i but e t he Pr ogr am at al l . For exampl e, i f a pat ent l i cense woul d not per mi t r oyal t y-f r ee redi st r i but i on of t he Pr ogr am by al l t hose who r ecei ve copi es di r ect l y or i ndi r ect l y t hr ough you, t hen
Page 48 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
t he onl y way you coul d sat i sf y both i t and thi s Li cense woul d be to r ef r ai n ent i r e l y f r om di s t r i but i on of t he Pr ogr am. I f any por t i on of t hi s secti on i s hel d i nval i d or unenf or ceabl e under any par t i cul ar ci r cumst ance, t he bal ance of t he sect i on i s i nt ended to appl y and the secti on as a whol e i s i nt ended t o appl y i n ot her ci r cumst ances. I t i s not t he pur pose of t hi s sect i on t o i nduce you t o i nf r i nge any pat ent s or ot her pr oper t y r i ght cl ai ms or t o cont est val i di t y of any such cl ai ms; t hi s sect i on has t he sol e pur pose of pr ot ect i ng the i nt egr i t y of t he f r ee sof t war e di st r i but i on syst em, whi ch i s i mpl ement ed by publ i c l i cense pr act i ces. Many peopl e have made generous cont r i but i ons t o t he wi de r ange of sof t ware di st r i but ed t hr ough t hat syst em i n r el i ance on consi st ent appl i cat i on of t hat syst em; i t i s up t o the aut hor / donor t o deci de i f he or she i s wi l l i ng t o di st r i but e sof t ware t hr ough any ot her syst em and a l i censee cannot i mpose t hat choi ce. Thi s sec t i on i s i nt ended t o make t hor oughl y cl ear what i s bel i eved t o be a consequence of t he r est of t hi s Li cense. 8. I f t he di s t r i but i on and/ or us e of t he Pr ogr am i s r e st r i c t e d i n cer t ai n count r i es ei t her by pat ent s or by copyri ght ed i nt er f aces, t he or i gi nal copyri ght hol der who pl aces t he Pr ogr am under t hi s Li cense may add an expl i ci t geogr aphi cal di st r i but i on l i mi t at i on excl udi ng t hose count r i es, so t hat di st r i but i on i s per mi t t ed onl y i n or among count r i es not t hus excl uded. I n such case, t hi s Li cense i ncor por at es t he l i mi t at i on as i f wr i t t en i n t he body of t hi s L i c ens e. 9. The Fr ee Sof t war e Foundat i on may publ i sh r evi sed and/ or new ver si ons of t he Gener al Publ i c Li cense f r om t i me to t i me. Such new ver si ons wi l l be s i mi l ar i n s pi r i t t o t he pr es ent ver s i on, but may di f f er i n det ai l t o addr ess new pr obl ems or concer ns. Each ver si on i s gi ven a di st i ngui shi ng ver si on number . I f t he Pr ogr am speci f i es a ver si on number of t hi s Li cense whi ch appl i es t o i t and " any l at er ver si on", you have t he opt i on of f ol l owi ng the t er ms and condi t i ons ei t her of t hat ver si on or of any l at er ver si on publ i shed by the Free Sof t ware Foundati on. I f t he Pr ogr am does not speci f y a ver si on number of t hi s Li cense, you may choose any ver si on ever publ i shed by t he Fr ee Sof t war e Foundati on. 10. I f you wi sh t o i ncor por at e par t s of t he Pr ogr am i nt o ot her f r ee pr ogr ams whose di st r i but i on condi t i ons ar e di f f er ent , wr i t e t o t he aut hor t o ask f or per mi ssi on. For sof t ware whi ch i s copyr i ght ed by t he Fr ee Sof t war e Foundat i on, wr i t e t o t he Fr ee Sof t ware Foundat i on; we somet i mes make except i ons f or t hi s. Our deci si on wi l l be gui ded by t he t wo goal s of pr eser vi ng t he f r ee st at us of al l der i vat i ves of our f r ee sof t war e and of pr omoti ng t he shari ng and reuse of sof t ware general l y. NO WARRANTY 11. BECAUSE THE PROGRAM I S LI CENSED FREE OF CHARGE, THERE I S NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMI TTED BY APPLI CABLE LAW. EXCEPT WHEN OTHERWI SE STATED I N WRI TI NG THE COPYRI GHT HOLDERS AND/ OR OTHER PARTI ES PROVI DE THE PROGRAM " AS I S" WI THOUT WARRANTY OF ANY KI ND, EI THER EXPRESSED OR I MPLI ED, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE. THE ENTI RE RI SK AS TO THE QUALI TY AND PERFORMANCE OF THE PROGRAM I S WI TH YOU. SHOULD THE PROGRAM PROVE DEFECTI VE, YOU ASSUME THE COST OF ALL NECESSARY SERVI CI NG, REPAI R OR CORRECTI ON. 12. I N NO EVENT UNLESS REQUI RED BY APPLI CABLE LAW OR AGREED TO I N WRI TI NG WI LL ANY COPYRI GHT HOLDER, OR ANY OTHER PARTY WHO MAY MODI FY AND/ OR REDI STRI BUTE THE PROGRAM AS PERMI TTED ABOVE, BE LI ABLE TO YOU FOR DAMAGES, I NCLUDI NG ANY GENERAL, SPECI AL, I NCI DENTAL OR CONSEQUENTI AL DAMAGES ARI SI NG OUT OF THE USE OR I NABI LI TY TO USE THE PROGRAM ( I NCLUDI NG BUT NOT LI MI TED TO L OSS OF DATA OR DATA BEI NG RENDERED I NACCURATE OR LOSSES SUSTAI NED BY YOU OR THI RD PARTI ES OR A FAI LURE OF THE PROGRAM TO OPERATE WI TH ANY OTHER PROGRAMS) , EVEN I F SUCH HOLDER OR OTHER PARTY HAS BEEN ADVI SED OF THE
Page 49 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
POSSI BI LI TY OF SUCH DAMAGES. END OF TERMS AND CONDI TI ONS How t o Appl y These Ter ms t o Your New Pr ogr ams I f you devel op a new program, and you want i t t o be of t he great est possi bl e use to t he publ i c, t he best way t o achi eve t hi s i s t o make i t f r ee sof t war e whi ch ever yone can r edi st r i but e and change under t hese t er ms. To do so, at t ach t he f ol l owi ng not i ces t o t he pr ogr am. I t i s saf est t o at t ach t hem t o t he st ar t of each sour ce f i l e t o most ef f ecti vel y convey t he excl usi on of warr ant y; and each f i l e shoul d have at l east t he "copyri ght " l i ne and a poi nt er t o wher e the f ul l not i ce i s f ound. Copyr i ght ( C) Thi s pr ogr am i s f r ee sof t war e; you can r edi st r i but e i t and/ or modi f y i t under t he t er ms of t he GNU General Publ i c Li cense as publ i shed by t he Fr ee Sof t war e Foundat i on; ei t her ver si on 2 of t he Li cense, or ( at your opt i on) any l at er ver si on. Thi s pr ogr am i s di st r i but ed i n t he hope t hat i t wi l l be usef ul , but WI THOUT ANY WARRANTY; wi t hout even t he i mpl i ed war r ant y of MERCHANTABI LI TY or FI TNESS FOR A PARTI CULAR PURPOSE. See t he GNU General Publ i c Li cense f or more detai l s. You shoul d have r ecei ved a copy of t he GNU Gener al Publ i c Li cense al ong wi t h thi s pr ogr am; i f not , wr i t e to t he Fr ee Sof t war e Foundat i on, I nc. , 51 Fr ankl i n St r eet , Fi f t h Fl oor , Bost on, MA 02110- 1301 USA. Al so add i nf ormat i on on how t o cont act you by el ect r oni c and paper mai l . I f t he pr ogr am i s i nt er ac t i ve, make i t out put a shor t not i c e l i ke t hi s when i t st ar t s i n an i nt er act i ve mode: Gnomovi si on ver si on 69, Copyr i ght ( C) year name of aut hor Gnomovi si on comes wi t h ABSOLUTELY NO WARRANTY; f or det ai l s t ype `s how w' . Thi s i s f r ee sof t war e, and you ar e wel come t o r edi st r i but e i t under cer t ai n condi t i ons; t ype `show c' f or det ai l s. The hypot het i cal commands ` show w' and ` show c ' shoul d show t he appr opr i at e par t s of t he Gener al Publ i c Li cense. Of cour se, t he commands you use may be cal l ed somet hi ng ot her t han `show w' and `show c' ; t hey coul d even be mouse- cl i cks or menu i t ems- - what ever sui t s your progr am. You shoul d al so get your empl oyer ( i f you wor k as a pr ogr ammer ) or your school , i f any, t o si gn a "copyri ght di scl ai mer " f or t he pr ogr am, i f necessary. Here i s a sampl e; al t er t he names: Yoyodyne, I nc. , her eby di sc l ai ms al l copyr i ght i nt er est i n t he pr ogr am `Gnomovi si on' ( whi ch makes passes at compi l ers ) wr i t t en by J ames Hacker . , 1 Apr i l 1989 Ty Coon, Pr esi dent of Vi ce Thi s Gener al Publ i c Li cense does not per mi t i ncor por at i ng your pr ogr am i nt o pr opr i et ar y pr ogr ams. I f your pr ogr am i s a subr out i ne l i br ar y, you may consi der i t mor e usef ul t o per mi t l i nki ng pr opr i et ar y appl i cat i ons wi t h the l i br ary. I f t hi s i s what you want t o do, use the GNU Lesser General Publ i c Li cense i nst ead of t hi s Li cense.
License for package(s):
coreutils 7.2 GNU GENERAL PUBLI C LI CENSE Ver si on 3, 29 J une 2007 Copyri ght ( C) 2007 Free Sof t war e Foundat i on, I nc. Ever yone i s per mi t t ed to copy and di st r i but e ver bat i m copi es of t hi s l i cense document , but changi ng i t i s not al l owed. Pr eambl e The GNU Gener al Publ i c Li cense i s a f r ee, copyl ef t l i cense f or sof t ware and ot her ki nds of works. The l i censes f or most sof t war e and ot her pr act i cal wor ks ar e desi gned t o t ake away your f r eedom t o shar e and change t he wor ks. By cont r ast ,
Page 50 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
t he GNU General Publ i c Li cense i s i nt ended t o guarant ee your f r eedom t o shar e and change al l ver si ons of a progr am- - t o make sur e i t r emai ns f r ee sof t war e f or al l i t s user s. We, t he Fr ee Sof t war e Foundat i on, use the GNU General Publ i c Li cense f or most of our sof t ware; i t appl i es al so t o any ot her work r el eased t hi s way by i t s aut hor s. You can appl y i t t o your progr ams, t oo. When we speak of f r ee sof t war e, we ar e r ef er r i ng t o f r eedom, not pri ce. Our Gener al Publ i c Li censes ar e desi gned t o make sur e t hat you have t he f r eedom t o di st r i but e copi es of f r ee sof t war e ( and char ge f or t hem i f you wi sh) , t hat you r ecei ve sour ce code or can get i t i f you want i t , t hat you can change t he sof t ware or use pi eces of i t i n new f r ee pr ogr ams, and t hat you know you can do t hese t hi ngs. To pr ot ect your r i ght s, we need t o pr event ot her s f r om denyi ng you t hese ri ght s or aski ng you to surr ender t he ri ght s. Ther ef or e, you have c er t ai n r es pons i bi l i t i es i f you di s t r i but e c opi es of t he s of t war e, or i f you modi f y i t : r esponsi bi l i t i es to respect t he f r eedom of ot her s. For exampl e, i f you di st r i but e copi es of such a pr ogr am, whether gr at i s or f or a f ee, you must pass on to t he reci pi ent s t he same f r eedoms t hat you r ecei ved. You must make sur e t hat t hey, t oo, r ecei ve or can get t he sour ce code. And you must show t hem t hese t er ms s o t hey know t hei r r i ght s. Devel oper s t hat use t he GNU GPL pr ot ect your r i ght s wi t h t wo st eps: ( 1) asser t copyri ght on t he sof t war e, and ( 2) of f er you t hi s Li cense gi vi ng you l egal per mi ssi on to copy, di st r i but e and/ or modi f y i t . For t he devel oper s' and aut hor s' pr ot ect i on, t he GPL cl ear l y expl ai ns t hat t her e i s no war r ant y f or t hi s f r ee sof t war e. For bot h user s' and aut hor s' sake, t he GPL requi r es t hat modi f i ed ver si ons be mar ked as changed, so that t hei r pr obl ems wi l l not be at t r i but ed er r oneousl y t o aut hor s of pr evi ous ver si ons. Some devi ces ar e desi gned t o deny user s access t o i nst al l or r un modi f i ed ver si ons of t he sof t ware i nsi de t hem, al t hough t he manuf act ur er can do so. Thi s i s f undament al l y i ncompat i bl e wi t h the ai m of pr ot ect i ng users' f r eedom t o change t he sof t ware. The syst emati c pat t er n of such abuse occur s i n the ar ea of pr oduct s f or i ndi vi dual s t o use, whi ch i s pr eci sel y where i t i s most unaccept abl e. Theref ore, we have desi gned t hi s ver si on of t he GPL to pr ohi bi t t he pr act i ce f or t hose pr oduct s. I f such pr obl ems ari se subst ant i al l y i n ot her domai ns, we st and r eady to ext end t hi s pr ovi si on t o t hose domai ns i n f ut ur e ver si ons of t he GPL, as needed t o pr otect t he f r eedomof users . Fi nal l y, ever y pr ogr am i s t hr eat ened const ant l y by sof t war e pat ent s. St at es shoul d not al l ow patent s t o rest r i ct devel opment and use of sof t war e on gener al - pur pose comput er s, but i n t hose t hat do, we wi sh t o avoi d t he speci al danger t hat pat ent s appl i ed t o a f r ee pr ogr am coul d make i t ef f ect i vel y pr opr i et ar y. To pr event t hi s, t he GPL assur es t hat patent s cannot be used t o r ender t he pr ogr amnon- f r ee. The pr eci se t er ms and condi t i ons f or copyi ng, di st r i but i on and modi f i c at i on f o l l ow. TERMS AND CONDI TI ONS 0. Def i ni t i ons . "Thi s Li cense" r ef er s t o ver si on 3 of t he GNU Gener al Publ i c Li cense. "Copyri ght " al so means copyri ght - l i ke l aws t hat appl y t o ot her ki nds of wor ks, such as s emi conduct or masks. " The Pr ogr am" r ef ers t o any copyr i ght abl e work l i censed under t hi s Li cense. Each l i censee i s addr essed as "you" . " Li censees" and "r eci pi ent s" may be i ndi vi dual s or or gani zat i ons. To " modi f y" a wor k means t o copy f r om or adapt al l or par t of t he wor k i n a f ashi on r equi r i ng copyr i ght permi ssi on, other t han t he maki ng of an exact copy. The resul t i ng wor k i s cal l ed a "modi f i ed ver si on" of t he ear l i er work or a work "based on" t he ear l i er work. A " cover ed wor k" means ei t her t he unmodi f i ed Pr ogr am or a wor k based on t he Pr ogr am.
Page 51 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
To " pr opagat e" a wor k means t o do anyt hi ng wi t h i t t hat , wi t hout per mi ssi on, woul d make you di r ect l y or secondar i l y l i abl e f or i nf r i ngement under appl i cabl e copyri ght l aw, except execut i ng i t on a comput er or modi f yi ng a pr i vat e copy. Propagat i on i ncl udes copyi ng, di st r i but i on ( wi t h or wi t hout modi f i cat i on) , maki ng avai l abl e to the publ i c, and i n some count r i es ot her acti vi t i es as wel l . To " convey" a wor k means any ki nd of pr opagat i on t hat enabl es ot her part i es t o make or r ecei ve copi es. Mere i nt eract i on wi t h a user t hr ough a comput er net work, wi t h no t r ansf er of a copy, i s not conveyi ng. An i nt er act i ve user i nt er f ace di spl ays "Appr opr i at e Legal Not i ces" t o t he extent t hat i t i ncl udes a conveni ent and pr omi nent l y vi si bl e f eat ur e t hat ( 1) di spl ays an appr opr i at e copyri ght not i ce, and ( 2) t el l s t he user t hat t her e i s no war r ant y f or t he wor k (except t o the ext ent t hat warr ant i es ar e pr ovi ded) , t hat l i censees may convey t he work under t hi s Li cense, and how t o vi ew a copy of t hi s Li cense. I f t he i nt erf ace pr esent s a l i st of user commands or opt i ons, such as a menu, a pr omi nent i t em i n t he l i st meet s t hi s cri t er i on. 1. Source Code. The " sour ce code" f or a wor k means t he pr ef er r ed f or m of t he wor k f or maki ng modi f i cat i ons t o i t . " Obj ect code" means any non- sour ce f or m of a wor k. A "St andar d I nt er f ace" means an i nt er f ace t hat ei t her i s an of f i ci al st andard def i ned by a recogni zed st andards body, or, i n the case of i nt er f aces speci f i ed f or a par t i cul ar pr ogr ammi ng l anguage, one t hat i s wi del y used among devel oper s worki ng i n t hat l anguage. The " Syst em Li br ar i es" of an execut abl e wor k i ncl ude anyt hi ng, ot her t han the wor k as a whol e, t hat ( a) i s i ncl uded i n the nor mal f or m of packagi ng a Maj or Component , but whi ch i s not par t of t hat Maj or Component , and ( b) ser ves onl y t o enabl e use of t he work wi t h t hat Maj or Component , or t o i mpl ement a St andar d I nt er f ace f or whi ch an i mpl ement ati on i s avai l abl e t o t he publ i c i n sour ce code f orm. A " Maj or Component " , i n t hi s cont ext , means a maj or essent i al component ( ker nel , wi ndow syst em, and so on) of t he speci f i c operat i ng syst em ( i f any) on whi ch the execut abl e work r uns, or a compi l er used t o pr oduce t he work, or an obj ect code i nt erpr eter used t o r un i t . The " Cor r espondi ng Sour ce" f or a wor k i n obj ect code f or m means al l t he sour ce code needed t o generat e, i nst al l , and ( f or an execut abl e work) r un t he obj ect code and t o modi f y t he work, i ncl udi ng scr i pt s t o cont r ol t hose act i vi t i es. However , i t does not i ncl ude t he wor k' s Syst em Li br ar i es, or gener al - pur pose t ool s or gener al l y avai l abl e f r ee pr ogr ams whi ch ar e used unmodi f i ed i n perf ormi ng t hose act i vi t i es but whi ch ar e not par t of t he wor k. For exampl e, Cor r espondi ng Source i nc l udes i nt er f ac e def i ni t i on f i l es as s oc i at ed wi t h s our c e f i l es f or t he work, and the sour ce code f or s hared l i br ari es and dynami cal l y l i nked subpr ogr ams t hat t he wor k i s speci f i cal l y desi gned t o requi r e, such as by i nt i mat e dat a communi cat i on or cont r ol f l ow bet ween t hose subprogr ams and ot her par t s of t he wor k. The Cor r espondi ng Sour ce need not i ncl ude anyt hi ng t hat user s can r egenerat e aut omati cal l y f r omot her par t s of t he Cor r espondi ng Sour ce. The Cor r espondi ng Sour ce f or a wor k i n sour ce code f or m i s t hat same wor k. 2. Basi c Per mi ssi ons. Al l r i ght s gr ant ed under t hi s Li cense ar e gr ant ed f or t he term of copyr i ght on t he Pr ogr am, and ar e i r r evocabl e pr ovi ded t he st ated condi t i ons are met . Thi s Li cense expl i ci t l y af f i r ms your unl i mi t ed per mi ssi on t o r un t he unmodi f i ed Pr ogr am. The out put f r om r unni ng a cover ed wor k i s cover ed by t hi s Li cense onl y i f t he out put , gi ven i t s cont ent , const i t ut es a cover ed work. Thi s Li cense acknowl edges your r i ght s of f ai r use or ot her equi val ent , as pr ovi ded by copyri ght l aw. You may make, r un and pr opagat e cover ed wor ks t hat you do not
Page 52 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
convey, wi t hout condi t i ons so l ong as your l i cense ot her wi se r emai ns i n f or ce. You may convey cover ed wor ks t o ot her s f or t he sol e purpose of havi ng t hem make modi f i cat i ons excl usi vel y f or you, or provi de you wi t h f aci l i t i es f or r unni ng t hose wor ks, pr ovi ded t hat you compl y wi t h t he t erms of t hi s Li cense i n conveyi ng al l mat eri al f or whi ch you do not cont r ol copyr i ght . Those t hus maki ng or r unni ng t he cover ed works f or you must do so excl usi vel y on your behal f , under your di r ect i on and cont r ol , on ter ms t hat pr ohi bi t t hem f r om maki ng any copi es of your copyri ght ed mat er i al out si de t hei r r el at i onshi p wi t h you. Conveyi ng under any ot her ci r cumst ances i s per mi t t ed sol el y under t he condi t i ons st at ed bel ow. Subl i censi ng i s not al l owed; sect i on 10 makes i t unnecessar y. 3. Prot ect i ng User s' Legal Ri ght s From Ant i - Ci r cumvent i on Law. No cover ed work shal l be deemed par t of an ef f ect i ve t echnol ogi cal measur e under any appl i cabl e l aw f ul f i l l i ng obl i gat i ons under ar t i cl e 11 of t he WI PO copyr i ght t r eat y adopt ed on 20 December 1996, or si mi l ar l aws pr ohi bi t i ng or r est r i cti ng ci r cumvent i on of such measur es. When you convey a cover ed wor k, you wai ve any l egal power t o f or bi d ci r cumvent i on of t echnol ogi cal measur es t o t he ext ent such ci r cumvent i on i s ef f ect ed by exer ci si ng r i ght s under t hi s Li cense wi t h r espect t o t he cover ed wor k, and you di scl ai m any i nt ent i on t o l i mi t oper at i on or modi f i cat i on of t he work as a means of enf orci ng, agai nst t he work' s user s, your or t hi r d par t i es' l egal r i ght s to f or bi d ci r cumvent i on of t echnol ogi cal measures. 4. Conveyi ng Verbat i m Copi es. You may convey ver bat i m copi es of t he Pr ogr am' s sour ce code as you r ecei ve i t , i n any medi um, provi ded t hat you conspi cuousl y and appr opr i atel y publ i sh on each copy an appr opr i ate copyri ght noti ce; keep i nt act al l not i ces st at i ng t hat t hi s Li cense and any non- per mi ssi ve t er ms added i n accor d wi t h sect i on 7 appl y t o t he code; keep i nt act al l not i ces of t he absence of any war r ant y; and gi ve al l r eci pi ent s a copy of t hi s Li cense al ong wi t h t he Progr am. You may char ge any pr i ce or no pr i ce f or each copy t hat you convey, and you may of f er s upport or warr ant y pr otect i on f or a f ee. 5. Conveyi ng Modi f i ed Sour ce Versi ons. You may convey a wor k based on t he Pr ogr am, or t he modi f i cat i ons t o pr oduce i t f r om t he Progr am, i n t he f orm of sour ce code under t he t er ms of sect i on 4, pr ovi ded that you al so meet al l of t hese condi t i ons: a) The wor k must car r y pr omi nent not i ces st at i ng t hat you modi f i ed i t , and gi vi ng a r el evant dat e. b) The work must car r y pr omi nent noti ces st ati ng t hat i t i s r el eased under t hi s Li cense and any condi t i ons added under sect i on 7. Thi s r equi r ement modi f i es t he requi r ement i n secti on 4 t o " k eep i nt ac t al l not i c es " . c) You must l i cense t he ent i r e work, as a whol e, under t hi s Li cense t o anyone who comes i nt o possess i on of a copy. Thi s Li cense wi l l t her ef or e appl y, al ong wi t h any appl i cabl e sect i on 7 addi t i onal t er ms, t o the whol e of t he wor k, and al l i t s par t s, r egar dl ess of how t hey ar e packaged. Thi s Li cense gi ves no permi ssi on t o l i cense t he work i n any ot her way, but i t does not i nval i dat e such per mi ssi on i f you have separ at el y recei ved i t . d) I f t he wor k has i nt er act i ve user i nt er f aces, each must di spl ay Appr opr i at e Legal Not i ces; however , i f t he Progr am has i nt er act i ve i nt er f aces t hat do not di spl ay Appr opr i at e Legal Not i ces, your wor k need not make t hem do so. A compi l at i on of a covered wor k wi t h ot her separ at e and i ndependent works, whi ch ar e not by t hei r natur e ext ensi ons of t he cover ed work, and whi ch ar e not combi ned wi t h i t such as t o f or m a l arger pr ogr am, i n or on a vol ume of a stor age or di st r i but i on medi um, i s cal l ed an "aggr egat e" i f t he compi l at i on and i t s r esul t i ng copyri ght ar e not
Page 53 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
used to l i mi t t he access or l egal r i ght s of t he compi l at i on' s user s beyond what t he i ndi vi dual works per mi t . I ncl usi on of a cover ed wor k i n an aggr egat e does not cause t hi s Li cense t o appl y t o t he ot her par t s of t he aggr egat e. 6. Conveyi ng Non- Sour ce For ms. You may convey a cover ed wor k i n obj ect code f or m under t he t er ms of sect i ons 4 and 5, provi ded t hat you al so convey t he machi ne- r eadabl e Cor r espondi ng Sour ce under t he t er ms of t hi s Li cense, i n one of t hese ways: a) Convey t he obj ect code i n, or embodi ed i n, a physi cal pr oduct ( i ncl udi ng a physi cal di st r i but i on medi um) , accompani ed by t he Corr espondi ng Source f i xed on a dur abl e physi cal medi um cust omari l y used f or sof t ware i nt er change. b) Convey t he obj ect code i n, or embodi ed i n, a physi cal pr oduct ( i ncl udi ng a physi cal di st r i but i on medi um) , accompani ed by a wr i t t en of f er , val i d f or at l eas t t hr ee year s and val i d f or as l ong as you of f er s pare part s or cust omer s upport f or t hat pr oduct model , t o gi ve anyone who possesses t he obj ect code ei t her ( 1) a copy of t he Corr espondi ng Sour ce f or al l t he sof t ware i n t he pr oduct t hat i s cover ed by t hi s Li cense, on a dur abl e physi cal medi um cust omari l y used f or sof t war e i nt erchange, f or a pr i ce no more t han your r easonabl e cost of physi cal l y perf ormi ng t hi s conveyi ng of sour ce, or ( 2) access t o copy t he Corr espondi ng Source f r om a net work ser ver at no char ge. c) Convey i ndi vi dual copi es of t he obj ect code wi t h a copy of t he wr i t t en of f er t o pr ovi de the Cor r espondi ng Sour ce. Thi s al t ernat i ve i s al l owed onl y occasi onal l y and noncommerci al l y, and onl y i f you recei ved the obj ect code wi t h such an of f er , i n accor d wi t h subsecti on 6b. d) Convey t he obj ect code by of f eri ng access f r om a desi gnated pl ace ( gr at i s or f or a char ge) , and of f er equi val ent access t o t he Cor r espondi ng Sour ce i n t he same way t hr ough t he same pl ace at no f ur t her char ge. You need not r equi r e r eci pi ent s t o copy the Corr espondi ng Sour ce al ong wi t h t he obj ect code. I f t he pl ace to copy t he obj ect code i s a net wor k server , t he Cor r espondi ng Source may be on a di f f erent server ( operat ed by you or a t hi r d part y) t hat suppor t s equi val ent copyi ng f aci l i t i es, pr ovi ded you mai nt ai n cl ear di r ect i ons next t o the obj ect code sayi ng wher e to f i nd the Corr espondi ng Source. Regar dl ess of what ser ver host s t he Corr espondi ng Sour ce, you r emai n obl i gated t o ensure t hat i t i s avai l abl e f or as l ong as needed to sati sf y t hese requi r ement s. e) Convey t he obj ect code usi ng peer- t o- peer t r ansmi ssi on, pr ovi ded you i nf or m ot her peer s wher e t he obj ect code and Cor r espondi ng Sour ce of t he work ar e bei ng of f ered t o t he general publ i c at no char ge under subsect i on 6d. A separ abl e por t i on of t he obj ect code, whose source code i s excl uded f r om t he Corr espondi ng Sour ce as a Syst em Li br ary, need not be i ncl uded i n conveyi ng t he obj ect code work. A " User Pr oduct " i s ei t her ( 1) a "consumer product " , whi ch means any t angi bl e per sonal pr oper t y whi ch i s nor mal l y used f or per sonal , f ami l y, or househol d pur poses, or ( 2) anyt hi ng desi gned or sol d f or i ncor porat i on i nt o a dwel l i ng. I n deter mi ni ng whether a pr oduct i s a consumer pr oduct , doubt f ul cases shal l be r esol ved i n f avor of cover age. For a par t i cul ar pr oduct r ecei ved by a par t i cul ar user , "nor mal l y used" r ef er s t o a t ypi cal or common use of t hat cl ass of pr oduct , r egardl ess of t he st atus of t he par t i cul ar user or of t he way i n whi ch t he par t i cul ar user act ual l y uses, or expect s or i s expect ed t o use, t he pr oduct . A pr oduct i s a consumer pr oduct r egardl ess of whether t he pr oduct has subst ant i al commerci al , i ndust r i al or non- consumer uses, unl ess such uses r epr esent t he onl y si gni f i cant mode of use of t he pr oduct . " I nst al l ati on I nf ormati on" f or a User Product means any methods,
Page 54 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
pr ocedur es, aut hor i zat i on keys, or ot her i nf or mat i on requi r ed to i nst al l and execut e modi f i ed ver si ons of a cover ed work i n t hat User Pr oduct f r om a modi f i ed ver si on of i t s Corr espondi ng Sour ce. The i nf ormati on must suf f i ce t o ensur e that t he cont i nued f unct i oni ng of t he modi f i ed obj ect code i s i n no case pr event ed or i nt erf ered wi t h sol el y because modi f i cat i on has been made. I f you convey an obj ect code wor k under t hi s sect i on i n, or wi t h, or speci f i cal l y f or use i n, a User Product , and t he conveyi ng occur s as par t of a t r ansact i on i n whi ch t he ri ght of possessi on and use of t he User Pr oduct i s t r ansf er r ed t o t he r eci pi ent i n per pet ui t y or f or a f i xed t er m ( r egar dl ess of how t he t r ansacti on i s char acteri zed) , t he Cor r espondi ng Sour ce conveyed under t hi s sect i on must be accompani ed by the I nst al l at i on I nf or mat i on. But t hi s r equi r ement does not appl y i f nei t her you nor any t hi r d par t y r et ai ns t h e abi l i t y t o i ns t a l l modi f i ed obj ect code on t he User Pr oduct ( f or exampl e, t he wor k has been i nst al l ed i n ROM) . The r equi r ement t o pr ovi de I nst al l at i on I nf or mat i on does not i ncl ude a r equi r ement t o cont i nue t o pr ovi de support servi ce, warr ant y, or updates f or a wor k that has been modi f i ed or i nst al l ed by the r eci pi ent , or f or t he User Pr oduct i n whi ch i t has been modi f i ed or i nst al l ed. Access t o a net wor k may be deni ed when t he modi f i cat i on i t sel f mat eri al l y and adver sel y af f ect s t he oper at i on of t he net wor k or vi ol at es t he rul es and prot ocol s f or communi cat i on acr oss t he net work. Corr espondi ng Sour ce conveyed, and I nst al l ati on I nf ormat i on pr ovi ded, i n accor d wi t h t hi s sect i on must be i n a f or mat t hat i s publ i cl y document ed ( and wi t h an i mpl ement at i on avai l abl e t o t he publ i c i n sour ce code f or m) , and must r equi r e no speci al passwor d or key f or unpacki ng, r eadi ng or copyi ng. 7. Addi t i onal Ter ms. " Addi t i onal permi ssi ons" are t erms t hat s uppl ement t he t erms of t hi s Li cense by maki ng except i ons f r omone or more of i t s condi t i ons. Addi t i onal per mi ssi ons t hat ar e appl i cabl e to t he ent i r e Pr ogr am shal l be t r eat ed as though t hey were i ncl uded i n t hi s Li cense, t o the ext ent t hat t hey ar e val i d under appl i cabl e l aw. I f addi t i onal per mi ssi ons appl y onl y t o par t of t he Pr ogr am, t hat par t may be used separ at el y under t hose per mi ssi ons, but t he ent i r e Pr ogr am r emai ns gover ned by t hi s Li cense wi t hout r egar d t o t he addi t i onal per mi ssi ons. When you convey a copy of a cover ed wor k, you may at your opt i on r emove any addi t i onal per mi ssi ons f r om t hat copy, or f r om any par t of i t . ( Addi t i onal per mi ssi ons may be wr i t t en t o r equi r e thei r own r emoval i n cer t ai n cases when you modi f y t he wor k. ) You may pl ace addi t i onal per mi ssi ons on mat er i al , added by you t o a cover ed wor k, f or whi ch you have or can gi ve appr opr i ate copyr i ght per mi ssi on. Not wi t hst andi ng any ot her pr ovi si on of t hi s Li cense, f or mat er i al you add t o a covered wor k, you may ( i f aut hor i zed by t he copyr i ght hol der s of t hat mater i al ) suppl ement t he ter ms of t hi s Li cense wi t h t erms: a) Di s cl ai mi ng war r ant y or l i mi t i ng l i abi l i t y di f f er e nt l y f r o m t he t erms of secti ons 15 and 16 of t hi s Li cense; or b) Requi r i ng pr eser vat i on of speci f i ed r easonabl e l egal not i ces or aut hor at t r i but i ons i n that mat er i al or i n the Appr opr i at e Legal Not i ces di spl ayed by wor ks cont ai ni ng i t ; or c) Prohi bi t i ng mi sr epr esent at i on of t he or i gi n of t hat mat er i al , or r equi r i ng t hat modi f i ed ver si ons of such mater i al be mar ked i n r easonabl e ways as di f f er ent f r om t he or i gi nal ver si on; or d) Li mi t i ng t he use f or publ i ci t y pur poses of names of l i censor s or aut hor s of t he mat er i al ; or e) Decl i ni ng t o gr ant r i ght s under t r ademark l aw f or use of some t r ade names, t r ademar ks, or ser vi ce mar ks; or f ) Requi r i ng i ndemni f i cat i on of l i censor s and aut hor s of t hat mat er i al by anyone who conveys t he mat er i al ( or modi f i ed ver si ons of i t ) wi t h c ont r ac t ual as s umpt i ons of l i abi l i t y t o t he r ec i pi ent , f or
Page 55 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
any l i abi l i t y that t hese cont r act ual assumpt i ons di r ect l y i mpose on t hose l i censor s and aut hor s. Al l ot her non- per mi ssi ve addi t i onal t er ms are consi der ed "f ur t her r est r i ct i ons" wi t hi n t he meani ng of sect i on 10. I f t he Progr am as you r ec ei ved i t , or any par t of i t , c ont ai ns a not i c e s t a t i ng t hat i t i s gover ned by thi s Li cense al ong wi t h a ter m t hat i s a f ur t her r estr i ct i on, you may r emove t hat t erm. I f a l i cense document cont ai ns a f ur t her r est r i cti on but per mi t s r el i censi ng or conveyi ng under t hi s Li cense, you may add t o a cover ed wor k mat er i al gover ned by t he t er ms of t hat l i cense document , pr ovi ded t hat t he f ur t her r est r i ct i on does not sur vi ve such r el i censi ng or conveyi ng. I f you add t er ms t o a cover ed work i n accor d wi t h t hi s sect i on, you must pl ace, i n t he rel evant sour ce f i l es, a st at ement of t he addi t i onal t er ms t hat appl y to those f i l es, or a not i ce i ndi cat i ng wher e t o f i nd t he appl i cabl e t erms. Addi t i onal t er ms, permi ssi ve or non- permi ssi ve, may be st ated i n the f or m of a separ at el y wr i t t en l i cense, or st at ed as except i ons; t he above r equi r ement s appl y ei t her way. 8. Ter mi nat i on. You may not pr opagat e or modi f y a cover ed wor k except as expr ess l y provi ded under t hi s Li cense. Any at t empt ot her wi se t o pr opagat e or modi f y i t i s voi d, and wi l l aut omat i cal l y t er mi nat e your r i ght s under t hi s Li cense ( i ncl udi ng any pat ent l i censes gr ant ed under t he thi r d paragr aph of s ect i on 11) . However , i f you cease al l vi ol at i on of t hi s Li cense, t hen your l i c ens e f r om a par t i c ul ar c opyr i ght hol der i s r e i ns t a t e d ( a) pr ovi si onal l y, unl ess and unt i l t he copyri ght hol der expl i ci t l y and f i nal l y t er mi nat es your l i cense, and (b) per manent l y, i f t he copyri ght hol der f ai l s t o noti f y you of t he vi ol ati on by some reasonabl e means pr i or t o 60 days af t er t he cessat i on. Mor eover , your l i cense f r om a par t i cul ar copyr i ght hol der i s r ei nst at ed per manent l y i f t he copyri ght hol der not i f i es you of t he vi ol ati on by some reasonabl e means, t hi s i s t he f i r st t i me you have r ecei ved not i ce of vi ol at i on of t hi s Li cense ( f or any wor k) f r om t hat copyri ght hol der , and you cur e the vi ol at i on pr i or t o 30 days af t er your r ecei pt of t he not i ce. Ter mi nat i on of your r i ght s under t hi s sec t i on does not t er mi nat e t he l i censes of par t i es who have r ecei ved copi es or r i ght s f r om you under t hi s Li cense. I f your r i ght s have been t ermi nated and not permanent l y r ei nst ated, you do not qual i f y t o r ecei ve new l i censes f or t he same mater i al under secti on 10. 9. Accept ance Not Requi r ed f or Havi ng Copi es. You ar e not r equi r ed t o accept t hi s Li cense i n or der t o r ecei ve or r un a copy of t he Pr ogr am. Anci l l ary pr opagat i on of a cover ed wor k occur r i ng sol el y as a consequence of usi ng peer- t o- peer t r ansmi ssi on t o r ecei ve a copy l i kewi se does not r equi r e accept ance. However, nothi ng ot her t han t hi s Li cense gr ant s you per mi ssi on t o pr opagate or modi f y any cover ed work. These act i ons i nf r i nge copyr i ght i f you do not accept t hi s Li cense. Theref ore, by modi f yi ng or pr opagati ng a cover ed work, you i ndi cat e your accept ance of t hi s Li cense t o do so. 10. Aut omati c Li censi ng of Downst r eam Reci pi ent s. Each t i me you convey a cover ed work, t he r eci pi ent aut omat i cal l y r ecei ves a l i cense f r om t he or i gi nal l i censor s, t o r un, modi f y and pr opagat e t hat wor k, subj ect t o t hi s Li cense. You ar e not r esponsi bl e f or enf or ci ng compl i ance by t hi r d par t i es wi t h thi s Li cense. An "ent i t y t r ansacti on" i s a t r ansacti on t r ansf er r i ng cont r ol of an or gani zat i on, or subst ant i al l y al l asset s of one, or subdi vi di ng an or gani zat i on, or mer gi ng or gani zat i ons. I f pr opagat i on of a cover ed wor k resul t s f r om an ent i t y t r ansacti on, each par t y t o that t r ansact i on who r ecei ves a copy of t he wor k al so r ecei ves what ever l i censes t o the wor k t he par t y' s pr edecessor i n i nt er est had or coul d
Page 56 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
gi ve under t he pr evi ous paragr aph, pl us a r i ght t o possessi on of t he Cor r espondi ng Sour ce of t he wor k f r om t he pr edecessor i n i nt er est , i f t he pr edecessor has i t or can get i t wi t h r easonabl e ef f or t s. You may not i mpose any f ur t her r est r i ct i ons on t he exer ci se of t he r i ght s gr ant ed or af f i r med under t hi s Li cense. For exampl e, you may not i mpose a l i cense f ee, r oyal t y, or ot her char ge f or exer ci se of r i ght s gr ant ed under t hi s Li cense, and you may not i ni t i at e l i t i gat i on ( i nc l udi ng a c r os s - c l ai m or c ount er c l ai m i n a l aws ui t ) a l l egi ng t hat any pat ent c l ai m i s i nf r i nged by maki ng, us i ng, s el l i ng, of f er i ng f or sal e, or i mpor t i ng t he Pr ogr am or any por t i on of i t . 11. Pat ent s. A "cont r i but or " i s a copyri ght hol der who aut hor i zes use under t hi s Li cense of t he Pr ogr am or a wor k on whi ch t he Pr ogr am i s based. The wor k t hus l i censed i s cal l ed t he cont r i but or ' s "cont r i but or ver si on". A cont r i but or ' s "essent i al pat ent cl ai ms" are al l pat ent cl ai ms owned or cont r ol l ed by t he cont r i but or, whether al r eady acqui r ed or her eaf t er acqui r ed, t hat woul d be i nf r i nged by some manner , per mi t t ed by t hi s L i c ens e, of maki ng, us i ng, or s el l i ng i t s c ont r i but or ver s i on, but do not i ncl ude cl ai ms t hat woul d be i nf r i nged onl y as a consequence of f ur t her modi f i cat i on of t he cont r i but or ver si on. For pur p os es of t hi s def i ni t i on, " c ont r ol " i nc l udes t he r i ght t o gr ant patent subl i censes i n a manner consi st ent wi t h t he r equi r ement s of t hi s Li c ens e. Each cont r i but or gr ant s you a non- excl usi ve, wor l dwi de, r oyal t y- f r ee pat ent l i cense under t he cont r i but or ' s essent i al pat ent cl ai ms, t o make, use, sel l , of f er f or sal e, i mpor t and ot her wi se run, modi f y and pr opagat e t he cont ent s of i t s cont r i but or ver si on. I n t he f ol l owi ng t hr ee par agr aphs, a "pat ent l i cense" i s any expr ess agr eement or commi t ment , however denomi nat ed, not t o enf or ce a pat ent ( such as an express per mi ssi on t o pract i ce a pat ent or covenant not t o sue f or pat ent i nf r i ngement ) . To "gr ant " such a pat ent l i cense t o a par t y means t o make such an agr eement or commi t ment not t o enf or ce a pat ent agai nst t he par t y. I f you convey a cover ed work, knowi ngl y r el yi ng on a pat ent l i cense, and t he Cor r espondi ng Source of t he wor k i s not avai l abl e f or anyone t o copy, f r ee of charge and under t he t erms of t hi s Li cense, t hr ough a publ i cl y avai l abl e net wor k ser ver or ot her r eadi l y accessi bl e means, t hen you must ei t her ( 1) cause t he Cor r espondi ng Source t o be so avai l abl e, or ( 2) ar r ange t o depr i ve your sel f of t he benef i t of t he pat ent l i cense f or t hi s par t i cul ar wor k, or ( 3) ar r ange, i n a manner consi st ent wi t h the requi r ement s of t hi s Li cense, t o extend the pat ent l i cense t o downst r eam r eci pi ent s. " Knowi ngl y r el yi ng" means you have act ual knowl edge t hat, but f or t he patent l i cense, your conveyi ng t he cover ed work i n a count r y, or your r eci pi ent ' s use of t he cover ed work i n a count r y, woul d i nf r i nge one or mor e i dent i f i abl e pat ent s i n t hat count r y t hat you have r eason t o bel i eve are val i d. I f , pur suant t o or i n connecti on wi t h a si ngl e tr ansacti on or ar r angement , you convey, or pr opagat e by pr ocur i ng conveyance of , a cover ed wor k, and grant a pat ent l i cense t o some of t he par t i es r ecei vi ng t he cover ed wor k aut hori zi ng t hem t o use, pr opagate, modi f y or convey a speci f i c copy of t he covered work, t hen t he patent l i cense you gr ant i s aut omat i cal l y extended t o al l r eci pi ent s of t he cover ed wor k and wor ks based on i t . A pat ent l i cense i s "di scri mi nat or y" i f i t does not i ncl ude wi t hi n t he scope of i t s cover age, pr ohi bi t s t he exer ci se of , or i s condi t i oned on the non- exer ci se of one or more of t he ri ght s t hat ar e speci f i cal l y gr ant ed under t hi s Li cense. You may not convey a cover ed work i f you ar e a part y t o an arr angement wi t h a thi r d part y t hat i s i n t he busi ness of di st r i but i ng sof t war e, under whi ch you make payment t o the t hi r d par t y based on the extent of your act i vi t y of conveyi ng t he work, and under whi ch t he t hi r d part y gr ant s, t o any of t he
Page 57 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
part i es who woul d recei ve t he cover ed work f r om you, a di scr i mi nator y patent l i cense ( a) i n connect i on wi t h copi es of t he cover ed work conveyed by you ( or copi es made f r om t hose copi es) , or ( b) pr i mari l y f or and i n connect i on wi t h speci f i c pr oduct s or compi l at i ons t hat cont ai n t he cover ed wor k, unl ess you ent er ed i nt o t hat ar r angement , or t hat patent l i cense was gr ant ed, pr i or t o 28 March 2007. Not hi ng i n t hi s Li cense shal l be const r ued as excl udi ng or l i mi t i ng any i mpl i ed l i cense or ot her def enses t o i nf r i ngement t hat may other wi se be avai l abl e t o you under appl i cabl e patent l aw. 12. No Surr ender of Ot her s' Fr eedom. I f condi t i ons ar e i mposed on you (whet her by cour t or der , agr eement or ot her wi se) t hat cont r adi ct t he condi t i ons of t hi s Li cense, t hey do not excuse you f r om t he condi t i ons of t hi s Li cense. I f you cannot convey a cover ed work so as t o sati sf y si mul t aneousl y your obl i gati ons under t hi s Li cense and any ot her per t i nent obl i gat i ons, t hen as a consequence you may not convey i t at al l . For exampl e, i f you agr ee to t er ms t hat obl i gat e you t o col l ect a royal t y f or f ur t her conveyi ng f r om t hose to whom you convey t he Pr ogr am, t he onl y way you coul d sat i sf y bot h t hose t er ms and thi s Li cense woul d be t o ref r ai n ent i r el y f r om conveyi ng the Progr am. 13. Use wi t h t he GNU Af f ero General Publ i c Li cense. Notwi t hst andi ng any ot her pr ovi si on of t hi s Li cense, you have per mi ssi on t o l i nk or combi ne any cover ed work wi t h a wor k l i censed under vers i on 3 of t he GNU Af f ero General Publ i c Li cense i nt o a si ngl e combi ned wor k, and t o convey t he r esul t i ng work. The t erms of t hi s Li cense wi l l cont i nue t o appl y t o the par t whi ch i s t he cover ed wor k, but t he speci al r equi r ement s of t he GNU Af f ero General Publ i c Li cense, sect i on 13, concer ni ng i nt er act i on through a net wor k wi l l appl y t o the combi nat i on as such. 14. Revi sed Ver si ons of t hi s Li cense. The Fr ee Sof t war e Foundat i on may publ i sh r evi sed and/ or new ver si ons of t he GNU General Publ i c Li cense f r om t i me t o ti me. Such new ver si ons wi l l be s i mi l ar i n s pi r i t t o t he pr es ent ver s i on, but may di f f er i n det ai l t o addr ess new pr obl ems or concer ns. Each ver si on i s gi ven a di st i ngui shi ng ver si on number . I f t he Pr ogr am speci f i es t hat a cer t ai n number ed ver si on of t he GNU General Publ i c Li cense "or any l at er ver si on" appl i es t o i t , you have t he opt i on of f ol l owi ng t he t erms and condi t i ons ei t her of t hat numbered ver si on or of any l ater ver si on publ i shed by the Fr ee Sof t ware Foundati on. I f t he Pr ogr am does not speci f y a ver si on number of t he GNU Gener al Publ i c Li cense, you may choose any ver si on ever publ i shed by t he Fr ee Sof t war e Foundat i on. I f t he Pr ogr am speci f i es t hat a pr oxy can deci de whi ch f ut ur e ver si ons of t he GNU Gener al Publ i c Li cense can be used, t hat pr oxy' s publ i c st at ement of accept ance of a ver si on per manent l y aut hor i zes you t o choose t hat ver si on f or t he Pr ogr am. Lat er l i cense ver si ons may gi ve you addi t i onal or di f f er ent permi ssi ons. However, no addi t i onal obl i gati ons ar e i mposed on any aut hor or copyri ght hol der as a r esul t of your choosi ng t o f ol l ow a l at e r v er s i on. 15. Di scl ai mer of Warr ant y. THERE I S NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMI TTED BY APPLI CABLE LAW. EXCEPT WHEN OTHERWI SE STATED I N WRI TI NG THE COPYRI GHT HOLDERS AND/ OR OTHER PARTI ES PROVI DE THE PROGRAM " AS I S" WI THOUT WARRANTY OF ANY KI ND, EI THER EXPRESSED OR I MPLI ED, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE. THE ENTI RE RI SK AS TO THE QUALI TY AND PERFORMANCE OF THE PROGRAM I S WI TH YOU. SHOULD THE PROGRAM PROVE DEFECTI VE, YOU ASSUME THE COST OF ALL NECESSARY SERVI CI NG, REPAI R OR CORRECTI ON. 16. Li mi t a t i on of Li abi l i t y . I N NO EVENT UNLESS REQUI RED BY APPLI CABLE L AW OR AGREED TO I N WRI TI NG WI LL ANY COPYRI GHT HOLDER, OR ANY OTHER PARTY WHO MODI FI ES AND/ OR CONVEYS
Page 58 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
THE PROGRAM AS PERMI TTED ABOVE, BE LI ABLE TO YOU FOR DAMAGES, I NCLUDI NG ANY GENERAL, SPECI AL, I NCI DENTAL OR CONSEQUENTI AL DAMAGES ARI SI NG OUT OF THE USE OR I NABI LI TY TO USE THE PROGRAM ( I NCLUDI NG BUT NOT LI MI TED TO LOSS OF DATA OR DATA BEI NG RENDERED I NACCURATE OR LOSSES SUSTAI NED BY YOU OR THI RD PARTI ES OR A FAI LURE OF THE PROGRAM TO OPERATE WI TH ANY OTHER PROGRAMS) , EVEN I F SUCH HOLDER OR OTHER PARTY HAS BEEN ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGES. 17. I nt er pr et at i on of Sect i ons 15 and 16. I f t he di s cl ai mer of war r ant y and l i mi t at i on of l i abi l i t y pr ovi ded above cannot be gi ven l ocal l egal ef f ect accor di ng to t hei r t er ms, r evi ewi ng cour t s shal l appl y l ocal l aw t hat most cl osel y appr oxi mat es an abs ol ut e wai ver of al l c i vi l l i abi l i t y i n c onnec t i on wi t h t he Progr am, unl ess a warr ant y or assumpt i on of l i abi l i t y accompani es a copy of t he Pr ogr am i n r et ur n f or a f ee. END OF TERMS AND CONDI TI ONS How t o Appl y These Ter ms t o Your New Pr ogr ams I f you devel op a new program, and you want i t t o be of t he great est possi bl e use to t he publ i c, t he best way t o achi eve t hi s i s t o make i t f r ee sof t war e whi ch ever yone can r edi st r i but e and change under t hese t er ms. To do so, at t ach t he f ol l owi ng not i ces t o t he pr ogr am. I t i s saf est t o at t ach t hem t o t he st ar t of each sour ce f i l e t o most ef f ecti vel y st at e the excl usi on of war r ant y; and each f i l e shoul d have at l east t he "copyri ght " l i ne and a poi nt er t o wher e the f ul l not i ce i s f ound. Copyr i ght ( C) Thi s pr ogr am i s f r ee sof t war e: you can r edi st r i but e i t and/ or modi f y i t under t he t er ms of t he GNU General Publ i c Li cense as publ i shed by t he Fr ee Sof t war e Foundat i on, ei t her ver si on 3 of t he Li cense, or ( at your opt i on) any l at er ver si on. Thi s pr ogr am i s di st r i but ed i n t he hope t hat i t wi l l be usef ul , but WI THOUT ANY WARRANTY; wi t hout even t he i mpl i ed war r ant y of MERCHANTABI LI TY or FI TNESS FOR A PARTI CULAR PURPOSE. See t he GNU General Publ i c Li cense f or more detai l s. You shoul d have r ecei ved a copy of t he GNU Gener al Publ i c Li cense al ong wi t h t hi s pr ogr am. I f not , see . Al so add i nf ormat i on on how t o cont act you by el ect r oni c and paper mai l . I f t he pr ogr am does t er mi nal i nt er act i on, make i t out put a shor t not i ce l i ke t hi s when i t st ar t s i n an i nt er acti ve mode: Copyr i ght ( C) Thi s pr ogr am comes wi t h ABSOLUTELY NO WARRANTY; f or det ai l s t ype `show w' . Thi s i s f r ee sof t war e, and you ar e wel come t o r edi st r i but e i t under cer t ai n condi t i ons; t ype `show c' f or det ai l s. The hypot het i cal commands ` show w' and ` show c ' shoul d show t he appr opr i at e par t s of t he Gener al Publ i c Li cense. Of cour se, your program' s commands mi ght be di f f erent ; f or a GUI i nt er f ace, you woul d use an " about box" . You shoul d al so get your empl oyer ( i f you wor k as a pr ogr ammer ) or sc hool , i f any, t o si gn a "copyri ght di scl ai mer " f or t he pr ogr am, i f necessar y. For mor e i nf or mat i on on t hi s, and how t o appl y and f ol l ow t he GNU GPL, see . The GNU Gener al Publ i c Li cense does not per mi t i ncor por at i ng your pr ogr am i nt o pr opr i et ar y pr ogr ams. I f your pr ogr am i s a subr out i ne l i br ar y, you may consi der i t mor e usef ul t o per mi t l i nki ng pr opr i et ar y appl i cat i ons wi t h t he l i br ary. I f t hi s i s what you want t o do, use t he GNU Lesser General Publ i c Li cense i nst ead of t hi s Li cense. But f i r st , pl ease r ead .
License for package(s):
wide-dhcpv6 20080615
Page 59 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
$KAME: COPYRI GHT, v 1. 2 2004/ 07/ 29 19: 02: 18 j i nmei Exp $ Copyr i ght ( C) 1998- 2004 WI DE Pr oj ect . Al l r i ght s r es er ved. Redi st r i but i on and use i n sour ce and bi nary f orms, wi t h or wi t hout modi f i cat i on, ar e per mi t t ed pr ovi ded t hat t he f ol l owi ng condi t i ons ar e met : 1. Redi st r i but i ons of sour ce code must r etai n t he above copyr i ght not i c e, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer . 2. Redi st r i but i ons i n bi nar y f or m must r epr oduce the above copyri ght not i c e, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer i n t he document at i on and/ or ot her mat er i al s provi ded wi t h t he di st r i but i on. 3. Nei t her t he name of t he pr oj ect nor t he names of i t s cont r i but or s may be used t o endor se or promot e pr oduct s der i ved f r om t hi s sof t war e wi t hout speci f i c pr i or wr i t t en per mi ssi on. THI S SOFTWARE I S PROVI DED BY THE PROJ ECT AND CONTRI BUTORS ` ` AS I S' ' AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE PROJ ECT OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF L I ABI LI TY, WHETHER I N CONTRACT, STRI CT LI ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE.
License for package(s):
miniupnpd 1.4 Copyr i ght ( c) 2006- 2008, Thomas BERNARD Al l r i ght s r es er ved. Redi st r i but i on and use i n sour ce and bi nary f orms, wi t h or wi t hout modi f i cat i on, ar e per mi t t ed pr ovi ded t hat t he f ol l owi ng condi t i ons ar e met : * Redi st r i but i ons of sour ce code must r etai n t he above copyr i ght noti ce, t hi s l i s t of c ondi t i ons and t he f ol l owi ng di s cl ai mer . * Redi st r i but i ons i n bi nar y f or m must r epr oduce t he above copyri ght not i ce, t hi s l i st of condi t i ons and t he f ol l owi ng di scl ai mer i n t he document at i on and/ or ot her mat er i al s pr ovi ded wi t h the di st r i but i on. * The name of t he aut hor may not be used t o endor se or pr omot e pr oduct s der i ved f r om t hi s sof t war e wi t hout speci f i c pr i or wr i t t en per mi ssi on. THI S SOFTWARE I S PROVI DED BY THE COPYRI GHT HOLDERS AND CONTRI BUTORS " AS I S" AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE COPYRI GHT OWNER OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, STRI CT L I ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE.
License for package(s):
radvd 1.8 The aut hor ( s) gr ant per mi ss i on f or r edi st r i but i on and use i n sour ce and bi nary f orms, wi t h or wi t hout modi f i cat i on, of t he sof t ware and document ati on pr ovi ded that t he f ol l owi ng condi t i ons are met : 0. I f you r ec ei ve a ver s i on of t he s of t war e t hat i s s pec i f i c al l y l abel l ed
Page 60 of 62
Appendix Open Source Licenses
DRGOS 1.12.1 GUI User Guide
as not bei ng f or r edi st r i but i on ( check t he ver si on message and/ or README) , you ar e not per mi t t ed to r edi st r i but e that ver si on of t he sof t war e i n any way or f or m. 1. Al l t er ms of al l ot her appl i cabl e copyri ght s and l i censes must be f ol l owed. 2. Redi st r i but i ons of sour ce code must r et ai n t he aut hor s' copyri ght not i c e( s ) , t hi s l i s t o f c ondi t i ons , and t he f ol l owi ng di s cl ai mer . 3. Redi st r i but i ons i n bi nar y f or m must r epr oduce t he aut hor s' copyri ght not i c e( s ) , t hi s l i s t o f c ondi t i ons , and t he f ol l owi ng di s cl ai mer i n t he document at i on and/ or ot her mat er i al s provi ded wi t h t he di st r i but i on. 4. Al l adver t i si ng mat er i al s ment i oni ng f eat ur es or use of t hi s sof t war e must di spl ay t he f ol l owi ng acknowl edgement wi t h t he name( s) of t he aut hor s as speci f i ed i n t he copyri ght not i ce( s) subst i t ut ed wher e i ndi c at ed: Thi s pr oduct i ncl udes sof t war e devel oped by t he aut hor s whi ch ar e ment i oned at t he st ar t of t he sour ce f i l es and ot her cont r i but or s. 5. Nei t her t he name(s ) of t he aut hor( s) nor t he names of i t s cont r i but ors may be used t o endor se or promot e pr oduct s der i ved f r om t hi s sof t war e wi t hout speci f i c pr i or wr i t t en per mi ssi on. THI S SOFTWARE I S PROVI DED BY I TS AUTHORS AND CONTRI BUTORS ` ` AS I S' ' AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE AUTHORS OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, STRI CT LI ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE.
Page 61 of 62