RELEASE NOTES F-Secure® Scanning and Reputation Server

Transcription

RELEASE NOTES F-Secure® Scanning and Reputation Server
RELEASE NOTES
F-Secure® Scanning and Reputation Server
Version 11.00 build 556 (RTM)
Copyright © 1993-2013 F-Secure Corporation. All Rights Reserved.
Portions Copyright © 2004 BackWeb Technologies Inc.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372, GB2366691, GB2366692, GB2366693, GB2367933, GB2368233, GB2374260
This product includes third-party source code. Please check the copyrights and license terms section
below in this document before installing this software.
1. General
This document contains important information about F-Secure Scanning and Reputation Server 11.00
release. We strongly recommend you read the entire document before installing the software.
2. Product contents
F-Secure Scanning and Reputation Server comes as the virtual appliance that can be easily deployed in
your virtualization environment. It provides malware scanning and content reputation services for Client
and Server Security products with F-Secure Offload Scanning Agent installed. The virtual appliance is
based on hardened CentOS 6.4 operating system.
3. What’s new
3.1 New features and improvements




Virtual appliance for VMware hypervisor, Citrix XenServer and Microsoft Hyper-V – it is easy to
deploy F-Secure Scanning and Reputation Server by importing the virtual appliance to your
virtualization platform.
Centralized administration – F-Secure Scanning and Reputation Server can be managed with FSecure Policy Manager.
Persistent cache – cached items are now maintained in a database that allows to retain them after
the server restart.
Database update check randomization – the server is now capable to check and apply new
database updates on random intervals, which should allow to mitigate so-called AV storm effect
when security products running on virtual machines attempt to receive updates simultaneously.
3.2 Fixed issues
This section lists important issues resolved since the previous Beta and RC releases:




SVCE-387: SRS VA for VMware should use VMXNET3 network adapter
SVCE-377: Scanning and Reputation server appliance exposes internal network DNS server
(BUG-22994)
SVCE-397: SRS crashed during night tests
SVCE-384: Unnecessary process running on SRS (BUG-22996)


SVCE-372: Cannot change static IP address back to DHCP
SVCE-371: FSMA crashes on policy changes
4. System requirements
4.1 Virtualization hypervisor
F-Secure Scanning and Reputation Server is available as a virtual appliance that can be deployed in your
virtual infrastructure based on one of the following virtualization hypervisors:



VMware ESXi 5.0, 5.1
Citrix XenServer 6.2 or newer
Microsoft Hyper-V Server 2008 R2, 2012, 2012 R2
4.2 Virtual appliance hardware
The minimum hardware requirements for F-Secure Scanning and Reputation Server virtual appliance are:




Number of virtual CPUs: 2
Memory: 2 GB
Hard disk: 20 GB
Number of network cards: 1
Please refer to the deployment guide for recommended hardware requirements based on the number of
protected clients.
4.3 Centralized management
The following versions of F-Secure Policy Manager are required to centrally manage F-Secure Scanning
and Reputation Server:


F-Secure Policy Manager (Windows) 11.10 or newer
F-Secure Policy Manager (Linux) 10.30 or newer
5. License key
F-Secure Scanning and Reputation Server virtual appliance is provided with 60 day evaluation license.
When the license gets expired, the server ceases providing malware scanning and content reputation
services. You can use the Admin menu of the virtual appliance to check the status of the license and enter
the new license key.
6. Installation and configuration
As there is no common standard supported by all hypervisor vendors, the F-Secure Scanning and
Reputation Server virtual appliance is provided in different formats. Depending on your virtualization
platform, use one of the following virtual appliance files:



fssrs-va-11.00.556.152.ova – for VMware ESXi hypervisor
fssrs-va-11.00.556.70.xva – for Citrix XenServer, Xen hypervisors
fssrs-va-11.00.556.21.vhd – Microsoft Hyper-V hypervisor
Please refer to F-Secure Security for Virtual and Cloud Environments release notes for information about
installation and configuration of F-Secure Scanning and Reputation Server.
7. Known issues
This section lists currently known problems in this release.



SVCE-385: SRS doesn’t provide log rotation. This issue will be fixed in a next release.
SVCE-326: AUA in SRS does not support HTTP proxy. The SRS is deemed to receive updates
directly from Policy Manager Server and thus HTTP proxy shouldn’t be required. Nevertheless,
HTTP proxy support will be considered in a next release.
SVCE-417: Eicar is reported as ‘Suspicious:W32/Malware.<hashsum>!Online’. The SRS may
receive a content reputation from the F-Secure cloud based services without scanning it with the
AV engines. Thus, it may report the malware with a generic name.
8. Contact information and feedback
We look forward to hearing your comments and feedback on the product functionality, usability and
performance.
Please report any technical issues via:


F-Secure support web site: http://support.f-secure.com/
F-Secure Community: http://community.f-secure.com/t5/Business/ctp/Business_Security_Solutions
When reporting a technical problem, please attach the F-Secure diagnostic report(s) to the feedback. This
report contains basic information about hardware, operating system, network configuration and installed FSecure and third-party software.
8.1 Creating Diagnostic information
You can create diagnostic information package that contains configuration details of the server, system
and log files. The information is required for troubleshooting.
Follow these instruction to create diagnostic package:
1. Log in to the VM console.
2. Enter admin as your login name.
3. Enter your administrator password.
The 'Admin menu' opens.
4. Press 4 to Create a diagnostic package
Download the package from the link displayed in the above step to get the diagnostic package out from the
appliance.
9. Copyrights and license terms
Please read and accept the license terms below before installing the software.
9.1 F-SECURE® LICENSE TERMS (July 2013)
IMPORTANT – BEFORE INSTALLING OR USING THE F-SECURE SOFTWARE, CAREFULLY READ
THE FOLLOWING LEGAL TERMS (”TERMS”). BY SELECTING THE ACCEPTING OPTION, OR BY
INSTALLING, COPYING OR USING THE SOFTWARE OR SOFTWARE-BASED SERVICE YOU (EITHER
AN INDIVIDUAL OR AN ENTITY) AGREE THAT YOU HAVE READ THESE TERMS, UNDERSTAND
THEM AND AGREE TO BE LEGALLY BOUND BY THEM. IF YOU DO NOT AGREE TO ALL OF THE
TERMS, DO NOT INSTALL, USE OR COPY THE SOFTWARE.
These Terms cover any and all F-Secure programs and software based services and web applications
licensed by or made available to you, including support tools, web portals directly supporting your use of
the Software, related documentation and any updates and upgrades to any of above (together the
"Software"). These Terms also apply to such programs that are made available to you under the purchased
license or related service agreement where these Terms are specifically appended. You acknowledge and
accept that the Software is subject to specific limitations such as purpose of use and certain technical
requirements including but not limited to operating system, storage space, geographical location or network
connectivity.
COMMERCIAL LICENSE
Subject to the payment of applicable license fees and subject to the following terms and conditions, you
have been granted a non-exclusive, non-transferable right to use the specified Software for a specified
time period as separately agreed between yourself and F-Secure or its distributors. F-Secure and its
licensors reserve any and all rights not expressly granted to you.
You may:
A) install and use the Software only on as many units (typically handheld devices, personal computers,
servers or other hardware, jointly referred to as “Device”) as stated in the Software, F-Secure License
Certificate, applicable invoice, product packaging or agreement where these Terms have been appended.
If the Software and/or its services are shared through a network or the Software is used to filter traffic at
servers, firewalls or gateways, you must have a license for either scanning capacity or for the total number
of users whom the Software provides services to. In such cases you may install the Software on as many
units as needed;
B) create copies of the Software for installation and backup purposes only; and
C) extend the number of licenses by purchasing more licenses.
FREE LICENSE AND EVALUATION LICENSE
This chapter applies when you use, download or install a trial, beta or freeware version of the Software or
you are granted a license by F-Secure or its distributor expressly for evaluation purposes. Such licenses
are always granted on non-exclusive and non-transferable basis. Software (as well as related services)
licensed under these schemes are more prone to changes than those licensed under commercial licenses
and may have enhanced usage analysis and advertising features. You acknowledge that because the
license is non-chargeable; (i) F-Secure have no obligation to provide support or maintenance services, and
(ii) F-Secure may at any time terminate your license to the Software, the availability thereof, any of its
features, limit or readjust the quota available to you or convert free features to chargeable. Even if you
purchase added features to such Software, the above applies to the whole. The above changes or a
prolonged period of inactivity may also lead to deletion of or limiting the access to your content managed
via the Software. Where such changes effect your use of the Software, you shall be separately notified.
This type of license is granted either on a time-limited basis or until terminated by a separate notification.
Where the license is granted on a time-limited basis; the license is granted for the sole purpose of
evaluating the Software and only for a specified trial period, which will begin on the date that the Software
is first downloaded by or delivered to you. After the specified time period you must either buy the Software
license from F-Secure or its distributor, or destroy and stop using the Software.
LICENSE FOR FREE TOOLS
A non-commercial license is applicable when you use, download or install a Software made available to
you by F-Secure or its distributor to be used as a supplementary or case-specific tool. Such Software is
licensed to you only for a limited period as a non-exclusive, non-transferable license and is not intended for
continuous content security or for other long-term purposes. F-Secure reserve the right to end the ability to
use this type of Software at any time and is under no obligation to provide support or maintenance
services.
LICENSE LIMITATIONS
You may not:
A) install and use the Software against these Terms, the F-Secure License Certificate or other related
documentation;
B) distribute copies of the Software to a third party, electronically transfer the Software to a computer
belonging to a third party, or permit a third party to copy the Software, except and to the extent where such
activity is expressly stated in related documentation;
C) modify, adapt, translate, rent, lease, resell, distribute or create derivative works based upon the
Software and/or related files (including but not limited to databases, news, descriptions or any other
content) or any part thereof;
D) decompile, reverse engineer, disassemble, or otherwise reduce the Software and/or related files
(including but not limited to databases, news, descriptions or communications between applications) to any
human-perceivable form (except to the limited extent permitted under mandatory copyright legislation) as
the Software contains or may contain trade secrets of F-Secure and its licensors;
E) use the documentation for any purpose except to support your use of the Software;
F) disclose the license authorization code provided for the application installation (including but not limited
to subscription key) to any third party;
G) use the Software or any portion thereof to implement any product or service to operate on or in
connection with the Software for any other purpose than for which the Software is provided; or
H) where the Software includes an Automatic Update Agent component, use such component to publish,
distribute and/or obtain software or content (i) not specifically related to F-Secure products and/or services
and (ii) not security-related (or any updates to any such software or content).
Please contact F-Secure directly if you are interested in any other rights to the Software than those granted
in these Terms.
TITLE
Title, ownership rights, and intellectual property rights in the Software shall remain with F-Secure and/or its
licensors. The Software is protected by copyright laws and international copyright and other intellectual
property treaties.
OPEN SOURCE LICENSES
You acknowledge that certain components of the Software may be covered by so-called “open source”
software licenses (“OSS Licenses”), which means any software licenses approved as open source licenses
by the Open Source Initiative or any substantially similar licenses, including without any limitation any
license that, as a condition of distribution of the software licensed under such license, requires that the
distributor make the software available in source code format (“Open Source Components”). In respect of
the Open Source Components, the following stipulations shall apply; i) to the extent expressly required by
the OSS licenses, the terms of relevant OSS licenses (including in particular the scope of license as well
as disclaimers of warranties and liabilities) shall apply to the respective Open Source Component(s) in lieu
of these Terms and ii) to the extent the applicable terms of OSS Licenses prohibit any of the restrictions in
these Terms such restrictions will not apply to respective Open Source Components. Such OSS Licenses
relating to respective Open Source Components are located at the installation directory of the Software or
in such other place as indicated in the Software, when so required by the terms of OSS Licenses.
LIMITED WARRANTY AND DISCLAIMERS
Limited Warranty on Media. F-Secure warrants the physical media, if any, produced by F-Secure on which
the Software is recorded to be free from defects in material and workmanship under normal use for 30
days from the date of delivery. F-Secure does not give any warranties on media if the Software is delivered
bundled in or with a third party Device. Any implied warranties on the media, including implied warranties of
merchantability and fitness for a particular purpose, are limited in duration to 30 days from the date of
delivery. F-Secure will, at its option, replace the media or refund the purchase price of the media. F-Secure
shall have no responsibility to replace or refund the purchase price of media which is damaged by
accident, abuse, or misapplication.
Disclaimer of Warranty on Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT ANY
WARRANTY. F-SECURE, ITS LICENSORS AND DISTRIBUTORS DO NOT GUARANTEE THE
SOFTWARE OR RELATED DOCUMENTATION IN TERMS OF THEIR CORRECTNESS, ACCURACY,
RELIABILITY, OR OTHERWISE. F-SECURE AND ITS LICENSORS AND DISTRIBUTORS EXPRESSLY
DISCLAIM ALL IMPLIED WARRANTIES, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES
OF TITLE, AVAILABILITY, PERFORMANCE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. YOU ASSUME THE ENTIRE RISK AS TO THE RESULTS AND
PERFORMANCE OF THE SOFTWARE AND RELATED DOCUMENTATION.
Complete Statement of Warranty. The limited warranty on media provided in the paragraph above is the
only warranty that is made by F-Secure. No oral or written information or instructions given by F-Secure, its
dealers, distributors, agents, or employees shall create a warranty or in any way increase the scope of the
foregoing limited warranty and you may not rely on any such information or instructions. Some jurisdictions
do not allow the limitation or exclusion of express or implied warranties, so the above exclusion may not
apply to you, and you may have other rights, which may vary from jurisdiction to jurisdiction.
LIMITATION OF LIABILITY
Limitation of Liability for Certain Categories of Damages. IN NO EVENT AND UNDER NO LEGAL
THEORY, INCLUDING BUT NOT LIMITED TO TORT OR CONTRACT, SHALL F-SECURE, ITS
EMPLOYEES, ITS LICENSORS, ITS DISTRIBUTORS OR ITS SUPPLIERS BE LIABLE TO YOU FOR
ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, INCLUDING, BUT NOT
LIMITED TO, LOSS OF REVENUE OR PROFIT, LOST OR DAMAGED DATA, FILES, DEVICE OR
APPLICATION FAILURE OR MALFUNCTION OR OTHER COMMERCIAL OR ECONOMIC LOSS,
ARISING OUT OF THE USE OF, OR INABILITY TO USE, THE SOFTWARE OR RELATED
DOCUMENTATION, EVEN IF F-SECURE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Limitation of Aggregate Liability. F-SECURE’S, ITS LICENSORS’ OR ITS DISTRIBUTORS’ MAXIMUM
AGGREGATE LIABILITY TO YOU FOR ACTUAL DAMAGES FOR ANY CAUSE WHATSOEVER SHALL
IN NO EVENT EXCEED THE AMOUNT PAID BY YOU FOR THE SOFTWARE. IN CASE OF DAMAGE
RESULTING FROM A FAILURE OF THE SOFTWARE LEADING TO LOSS, CORRUPTION,
UNAUTHORIZED DISCLOSURE OR EXTENDED UNAVAILABILITY OF THE CONTENT, THE LIABILITY
SHALL BE EXPRESSLY LIMITED TO THE AMOUNT PAID FOR YOUR LICENSE TO THE SOFTWARE
FOR SIX MONTHS IMMEDIATELY PRECEDING SUCH FAILURE.
Unalienable Consumer Rights, Beneficiaries to Terms. Some jurisdictions do not allow the limitation or
exclusion of liability for incidental or consequential damages so the above limitation or exclusion may not
apply to you or may apply to you only in part. Nothing contained in these Terms shall prejudice the
statutory rights of any party dealing as a consumer. F-Secure is acting also on behalf of its employees,
distributors, licensors, suppliers and affiliates to disclaim, exclude and restrict obligations, warranties, and
liability as provided in these Terms, but in no other respects and for no other purpose.
Limitation of Liability under German and Austrian Laws. In respect of licenses purchased by consumers
residing in Germany or Austria, the following limitations of liabilities shall apply in lieu of sections 1 and 2
above: Concerning claims for damages, claims for compensation of expenses and other liability claims,
whether arising in contract, tort, breach of statutory duty or otherwise under this license the following
applies: F-Secure, its licensors, its distributors or its suppliers shall be liable without restriction for i)
damage caused intentionally or through gross negligence, ii) for claims according to the German/Austrian
Product Liability Act and iii) in the case of violating life, body or health. In case of simple negligence, the
following applies: F-Secure, its licensors, its distributors or its suppliers shall only be liable insofar as it has
breached an essential contractual obligation (cardinal contractual obligation). This liability shall be
restricted to the contractually typical and foreseeable damage in the case of material and pecuniary
damages.
CONTENT
In addition to other terms herein, the following specific terms and conditions apply to Software with content
synchronization and backup features.
Purpose. The content management Software is made available to you for the purpose of backing up,
transferring, viewing, editing, adapting, copying, synchronizing and sharing (jointly “managing”) content (i)
that is located on your device and on designated external services, (ii) for which you hold the reproduction
and/or communication rights and (iii) that is not illegal under applicable laws. The Software is not an
archiving software.
Limitation on Use. The Software is intended to be used for managing only individual files of certain
commonly used desktop applications, for example document, photo and video file types. The Software may
also be used to manage files / data in third party services, but it does not back-up files from such sources.
The Software management capabilities may vary from one Device to another. The Software is not intended
to be used to manage (i) content from/made available through corporate network services, (ii) programs,
(iii) operating systems or (iv) data formats commonly held on servers such as but not limited to databases.
You shall refrain from using the Software from backing up content that is not primarily located and stored
on your Device and/or internal computer hardware (e.g. external storage devices or content stored on an
internal and/or external network). Operations are carried out by the Software automatically by default
during a determined period depending on related technical constraints and thus no guarantee is provided
for specific period of time during which the backup operations may be finalized.
Data Transfer Costs. You acknowledge that use of Software may result in additional data transfer costs.
Such added costs may vary based on type of Device / connection / operator network and you, not FSecure, are responsible for such costs.
Content Deleted. Content stored by the Software may be deleted because of Software settings, quota
changes or your commands. F-Secure have no obligation to store any of your content beyond termination
or expiration of the license, but may retain the content / data thereof for a limited period of time in
accordance to its privacy policy or may provide a grace period at its discretion.
Permissible Content. You will refrain from managing any i) illegal or infringing content ii) any unlawful,
offensive, abusive, obscene, pornographic, harassing, libelous or otherwise inappropriate content or
material or iii) any content that is against the permissible content guidelines maintained by the operator
from whom you have acquired the Software. You specifically agree to strictly abide by the provisions of the
applicable copyright laws and warrant that you have necessary rights and consents where you share
content to third parties. IN THIS RESPECT, YOU ARE REMINDED THAT ANY REPRODUCTION,
COMMUNICATION OF A WORK AND/OR ANY BROADCASTING OF A PERFORMANCE, AN AUDIO
RECORDING OR A VIDEO RECORDING MADE WITHOUT AUTHORIZATION MAY CONSTITUTE AN
OFFENCE OR A COPYRIGHT INFRINGEMENT. You alone shall be responsible for the content managed
via the Software and more generally for your use of the Software. You are informed that F-Secure and its
distributors co-operate with appropriate authorities in regards to illegal or infringing content shared or
transferred by you and are entitled to cease or prevent your use of the Software for such activities and
remove such content or access to it.
Indemnity. You shall indemnify, defend and hold harmless F-Secure, its licensors, distributors, suppliers
(collectively the “Indemnitees”) against (i) any and all costs, charges, claims, damages, liabilities incurred
and/or proceedings taken against any of the Indemnitees, including without limitation outside legal counsel
and consultants fees, resulting from illegal conduct and/or violation of rights of third parties, and/or (ii) any
damage that you may cause through your use of the Software.
Security and Access to Content. You are informed that while efforts are taken to make access to and
transfer of content secure against third party intrusion, F-Secure provides no guarantees against intrusions
due to unlawful interception of data transfers, security breaches on data repositories, incorrect or
incomplete implementations of security measures on user Devices or browsers. You are responsible for
managing your content, including the access permissions to the content. When you are sharing your
content, anyone receiving your copy of the sharing link may access the files you have shared. F-Secure or
its distributors shall not be held liable for unauthorized access by third parties to the content you share or
store through your use of the Software.
PRIVACY
Personal Data. To provide you with the services related to the Software and for customer relationship
purposes, F-Secure may need to collect and process personal data that relates to your use of the Software
and other related services. Such collected personal data typically consists of i) data you actively send to us
(e.g. contact / registration information, information disclosed to solve a support issue) and/or ii) data
automatically collected by the Software or triggered by your use of particular features (e.g. license/ Device/
software information, phone number, information on your user account activity, geographic location of your
Device).
Your Content. The above also applies to content that you manage or back-up via Software. F-Secure
restrict its visibility to your content and treats it as private, except for specific cases where F-Secure have a
legally established need to access.
Technical Data and Security Data. For F-Secure to provide you with the services related to the Software
and to further develop them; the Software has to collect data relating to software applications, Internet,
your Device, your content and use of the above. Such data is typically collected in the form of object
security data, analysis data, statistics, file metadata, location data and other similar data. This type of data
is aggregated or otherwise made anonymous whenever feasibly possible.
Analytics Data. For F-Secure to maintain, develop and enhance the Software and related services; data on
performance, environment, usage of the Software and your feedback on the same may also be collected
by the Software. This type of data is aggregated or otherwise made anonymous whenever feasibly
possible.
Transfers. F-Secure may further disclose or transfer any of the above data to its affiliates, sub-contractors,
distributors and operator partners. Such parties may be located in the EEA or outside the EEA. Any
transfer of data is done in a secure manner. F-Secure may also process and disclose data where it is
necessary to do so to pursue legitimate interests in accordance to applicable laws.
More Information. The collected data varies per Software. You can find more detailed information on
personal data processing and contact information in relevant F-Secure privacy policies. F-Secure privacy
policies can be found via product user interface or in privacy-section of F-Secure website.
AUTHORIZATIONS FROM YOU TO F-SECURE
For the Software to function as intended, you assign F-Secure to do the following where it is necessary for
providing the related Services to you.
Security Operations. You authorize F-Secure, on your behalf, to copy suspicious files containing
executable code from your Device or from your third party service accounts linked to Software to F-Secure
backend systems, so F-Secure can more effectively analyse them for malicious activity.
Conveying Your Files. Where you are causing the content to be backed up, transferred, copied, duplicated,
adapted, altered, utilized, synchronized or published through your use of the Software, you acknowledge
that F-Secure (and/or F-Secure’s operator partner, as applicable) may also need to process the same
content on your behalf for the Software to function. To that effect; you grant F-Secure (and/or F-Secure’s
operator partner, where applicable) a license to process the content to the extent necessary to enable us to
provide you with applicable content management services. You will retain the control of your content.
GENERAL
Suitability. The Software is subject to certain functional restrictions as informed by F-Secure (or by FSecure’s distributor from whom you have acquired this license) from time to time. You hereby acknowledge
and confirm that you have checked its suitability for your own requirements before registering for the
Software.
Changes. F-Secure are constantly improving its services. F-Secure reserve the right to modify features or
functionality of the Software. F-Secure do such things to provide you with better products or services, to
adjust the Software to changes in the market or regulations, to take into account any subsequent technical
constraints or for other similar, valid reasons. Hence, F-Secure need to upgrade and make changes to the
Software from time to time. Such changes may include adding new features or dropping existing features.
You should use the latest version of the Software for optimized security and usability. F-Secure reserve the
right to end the maintenance and support for certain versions or for certain operation systems of the
Software in accordance to its product life cycle practices. As most F-Secure Software are reliant on
frequent updates, this may lead to Software becoming inoperable. Use of Software, for which the
maintenance is discontinued, is not recommended and such use is entirely at your own responsibility. More
information on product life cycle practices is available on F-Secure website. As the Software is likely to
evolve and change during your subscription, F-Secure may need to revise these Terms in connection of
update and the revised Terms shall automatically apply to the corresponding versions of the Software
distributed with the revised Terms. If any part of these Terms is found void and unenforceable, it will not
affect the validity of rest of the Terms, which shall remain valid and enforceable.
Additional Terms. The Software may contain web applications or web portals (‘sites’). The use of such sites
may be subject to additional terms. You agree to review such sites for additional terms of use and only use
such sites accordingly. Such sites may also be those of F-Secure’s distributor or of other third parties. FSecure have no liability whatsoever on any third party sites.
Availability. You are informed and hereby accept that all or part of the Software may be temporarily
unavailable / nonoperational for repairs, upgrades, maintenance or for reasons beyond F-Secure’s
reasonable control (force majeure). F-Secure, its licensors or its distributors shall not be held liable for the
consequences of such interruptions and shall undertake to restore the availability / operation of the
Software as rapidly as reasonably possible, depending on the technical constraints encountered.
Termination. Without prejudice to any other rights of termination or expiration in these Terms or under
contract or law; your license to the Software will end immediately without notice if you are in breach of any
of these Terms or use the Software's functions for purposes other than those indicated in official
documentation. Where F-Secure observes that you are using the Software i) in breach of these Terms, ii)
other applicable terms or iii) its intended purpose, iv) in a manifestly excessive manner, or v) in a manner
that could jeopardize its use by a third party (e.g. by monopolizing the access bandwidth); F-Secure
reserve the right (i) not to renew your license, (ii) limit your use of the Software and/or part thereof (such as
diminishing any available storage space) and/or (iii) terminate the license. In case of termination of the
agreement between F-Secure and F-Secure’s distributor providing you with the Software, F-Secure or its
distributor shall have the option to notify you on premature termination of your license. You shall not be
entitled to a refund, damages or other compensation from F-Secure because of such termination. The
Terms on restrictions on use shall survive any termination.
Export Restrictions. You acknowledge and agree that the Software may be subject to restrictions and
controls imposed by national laws and regulations, including but not limited to European Union export
regulations or the United States Export Administration Act (collectively "Export Rules"). You agree and
certify that neither the Software nor any direct product thereof is being or will be acquired, shipped,
transferred, or re-exported, directly or indirectly, into any country for which such export is prohibited under
the Export Rules and the regulations thereunder, nor will it be used for any purpose prohibited by the
same. By using the Software, you are acknowledging and agreeing to the foregoing, and you are
representing and warranting that you will comply with the Export Rules when either exporting or reexporting or importing the Software or any underlying information technology. Further, you represent and
warrant that you are not a national of any US embargoed country, or a party listed in the U.S. Table of
Denial Orders or U.S. Treasury Department's list of Specially Designated Nationals.
U.S. Government License Rights. If this license is acquired for or on behalf of the United States of
America, its agencies and/or instrumentalities ("U.S. Government"), you acknowledge that the Software
and the documentation are “commercial computer software” and respectively “commercial computer
software documentation” as those terms are defined for purposes of the Federal Acquisition Regulations
(FARs) in the case of procurement by civilian agencies (48 C.F.R. 2.101) and the Department of Defense
Federal Acquisition Regulation Supplement (DFARS) in the case of procurement by units of the
Department of Defense (48 C.F.R. 252.227-7014(a)(1) and (5)). Consistent with 48 C.F.R. 12.212 of FARs
and 48 C.F.R. 227.7202 of DFARS and other applicable regulations, any use, modification, reproduction,
release, performance, display, disclosure or distribution of the Software and documentation by or for the
U.S. Government shall be governed solely by these Terms and shall be prohibited except to the extent
expressly permitted by these Terms.
High Risk Activities. The Software is not fault-tolerant unless expressly stated in product documentation
and is not designed, manufactured or intended for use or resale as control equipment in hazardous
environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft
navigation or communication systems, air traffic control, direct life support machines, or weapons systems,
in which the failure of the Software could lead directly to death, personal injury, or severe physical or
environmental damage ("High Risk Activities"). F-Secure and its suppliers specifically disclaim any express
or implied warranty of fitness for High Risk Activities.
Governing Law. Unless otherwise stated below, these Terms shall be governed under the laws of Finland
without regard to conflict of laws rules and principles and without regard to the United Nations Convention
of Contracts for the International Sale of Goods. The courts of Finland shall have the exclusive jurisdiction
and venue to adjudicate any dispute arising out of these Terms. In the case of licenses purchased within or
on behalf of licensees residing within the United States or operating under the laws of the United States the
governing law of these Terms shall be the laws of the State of California without regard to conflict of laws
rules and principles and without regard to the United Nations Convention of Contracts for the International
Sale of Goods. In such cases, the exclusive jurisdiction and venue to adjudicate any dispute arising out of
these Terms shall be of the federal and state courts located in California. In respect of licenses purchased
by consumers residing outside Finland or the United States, these Terms may be governed by the
mandatory local laws of such jurisdictions. Where F-Secure should elect not to insist upon enforcing its
rights in line with these Terms, this shall not be interpreted as a waiver of F-Secure’s right to enforce the
same in the future.
If you have any questions on these Terms or if you would like to contact F-Secure for any other reason,
please write: F-Secure Corporation, PL24, FI-00181 Helsinki, Finland, e-mail: helsinki@f-secure.com or
call: +358 9 2520 0700.
9.2 Third party copyrights and license terms
CentOS
Copyright (C) 2007 The CentOS Project
CentOS-6 comes with no guarantees or warranties of any sorts, either written or implied.
The Distribution is released as GNU GENERAL PUBLIC LICENSE Version 2, June 1991 (see GNU
General Public License (GPL) v2). Individual packages in the distribution come with their own licenses.
civetweb
Copyright (c) 2004-2013 Sergey Lyubka
Copyright (c) 2013 No Face Press, LLC (Thomas Davis)
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Intel Open Source License for CDSA/CSSM Implementation
Copyright (c) 1996-2001 Intel Corporation
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:



Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
JSON-C
Copyright (c) 2009-2012 Eric Haszlakiewicz
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Copyright (c) 2004, 2005 Metaparadigm Pte Ltd
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and
associated documentation files (the "Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Libcurl
COPYRIGHT AND PERMISSION NOTICE
Copyright (c) 1996 - 2009, Daniel Stenberg, <daniel@haxx.se>.
All rights reserved.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby
granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or
otherwise to promote the sale, use or other dealings in this Software without prior written authorization of
the copyright holder.
Libevent
Libevent is available for use under the following license, commonly known as the 3-clause (or "modified")
BSD license:
==============================
Copyright (c) 2000-2007 Niels Provos <provos@citi.umich.edu>
Copyright (c) 2007-2010 Niels Provos and Nick Mathewson
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
==============================
Portions of Libevent are based on works by others, also made available by them under the three-clause
BSD license above. The copyright notices are available in the corresponding source files; the license is as
above. Here's a list:
log.c:
Copyright (c) 2000 Dug Song <dugsong@monkey.org>
Copyright (c) 1993 The Regents of the University of California.
strlcpy.c:
Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
win32select.c:
Copyright (c) 2003 Michael A. Davis <mike@datanerds.net>
evport.c:
Copyright (c) 2007 Sun Microsystems
ht-internal.h:
Copyright (c) 2002 Christopher Clark
minheap-internal.h:
Copyright (c) 2006 Maxim Yegorushkin <maxim.yegorushkin@gmail.com>
==============================
The arc4module is available under the following, sometimes called the "OpenBSD" license:
Copyright (c) 1996, David Mazieres <dm@uun.org>
Copyright (c) 2008, Damien Miller <djm@openbsd.org>
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby
granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT,
OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE.