========================================================================== F-Secure SSH 1.1 for Windows Trial Version ========================================================================== This 30-day trial version of F-Secure SSH is subject to the Trial License Agreement supplied at the end of this document. ========================================================================== New Features ========================================================================== * Line Draw Font Support F-Secure SSH 1.1 supports line draw fonts. During installation Linedraw.ttf is copied to F-Secure SSH installation directory, normally c:\f-secure\ssh. The user must then install the font manually. To use linedraw fonts the user does not have to select the font Linedraw in F-Secure SSH client. They work with whichever normal font the user wants to use. * Application to Start There is a new edit box in Edit Local and Remote Forwarding dialog called Application to Start. The edit box allows the user to define the application to be started when starting F-Secure SSH. If there is an application defined when starting F-Secure SSH by double clicking a .ssh file the user is prompted for authentication. After the authentication F-Secure SSH client is minimized and the application defined in Properties is started automatically. ========================================================================== Installation Instructions ========================================================================== * Installation Before starting the F-Secure SSH installation process, close all running applications. 1. Insert the F-Secure SSH setup disk into the floppy disk drive. 2.If you're running Windows 95 or Windows NT 4.0, choose Run from the Start menu. Otherwise, choose Run from the File menu. 3.Type "a:setup" and press Enter. If your floppy disk drive is associated to another drive letter, use that instead of "a:". 4.Follow the instructions of the setup program to install F-Secure SSH on your computer. The F-Secure SSH Wizard will be launched automatically after the setup to help you generate an RSA Identity. See section "Running F-Secure SSH" for more information on how to use F-Secure SSH. ========================================================================== Instructions for Users of Previous Alpha/Beta Versions ========================================================================== * Upgrading This version is not compatible with the previous F-Secure SSH file formats. Please delete all .SSH files. We recommend using version 1.2.17 or later of the F-Secure SSH UNIX server for full compatibility and best performance. * Client-Server Issues The TCP/IP forwarding code works properly only with version 1.2.17 and above. IDENTITY files are encrypted with 3DES, old servers that have been compiled to use IDEA have an incompatible IDENTITY file format. We recommend using version 1.2.17 ssh-keygen utility to update the IDEA encrypted IDENTITY file to 3DES encrypted format. This format is also compatible with the Windows version. We strongly recommend you to upgrade the UNIX server to version 1.2.17 for best performance and compatibility between the UNIX and Windows programs. ========================================================================== Running F-Secure SSH ========================================================================== * What do I need to run F-Secure SSH? You must have WINSOCK.DLL (version 1.1 or higher) installed on your Windows system, a Local Area Network or an Internet connection before you can use F-Secure SSH. To connect to a remote server the server must be running an F-Secure SSH Server for UNIX. This version is compatible with the version 1.2.14 and above. Blowfish block cipher only works with 1.2.16 and above. * Connecting to a Remote Host To connect to a remote computer using password authentication: 1. From the Edit menu, choose Properties. 2. In the Connection tab, type the name of the remote host you want to connect to, and the user name for your account. 3. From the options group select Password as your authentication type. 4. Choose the OK button. 5. Press Enter or from the File menu, choose connect. 6. Type in the password for you account to the Connect Using Password Authentication dialog box. 7. Choose the OK button to connect. If this is the first time you're connecting to the host, SSH may ask you to accept the host's previously unknown host key. NOTE: The quickest way to make the connection if your setting are correct is to press the Enter key on the empty terminal windows. This will bring up the connection dialog box immediately. * Getting Help See the SSH.HLP file for information on all F-Secure SSH Features by pressing the Help button on one of the F-Secure SSH dialog boxes. The SSH.HLP file contains installation instructions and a User's and Adminitrstor's Guide ========================================================================== Known Issues & Bugs ========================================================================== Known Issues - On-Line help is not context sensitive. ========================================================================== Support ========================================================================== If you have a question about F-Secure SSH that the documentation does not address, please feel free to contact your local F-Secure SSH distributor or Data Fellows Ltd. directly. Should you need to call the technical support team, please try to be at your computer to facilitate the call. Having the following information available will make it easier for your technical support representative to answer your questions: - Any specific error messages. - F-Secure SSH version number. - Computer make and model. - Any other information you may think useful in resolving the problem. Data Fellows provides technical support through a variety of electronic services: Support: F-Secure-SSH-Support@DataFellows.com World-Wide Web: http://www.DataFellows.com, http://www.Europe.DataFellows.com Anonymous FTP: ftp.DataFellows.com, ftp.Europe.DataFellows.com You may also contact us by mail or phone and ask to speak to our technical support staff: USA: Europe: Data Fellows Inc. Data Fellows Ltd. 675 N. First Street, Suite 605 Paivantaite 8 San Jose, CA 95117 FIN-02210 Espoo USA FINLAND tel (408) 938 6700 tel +358 9 478 444 fax (408) 938 6701 fax +358 9 478 445 99 ========================================================================== Copyrights ========================================================================== * F-Secure SSH Copyright (c) 1996-97 Data Fellows Ltd. Copyright (c) 1995-97 SSH Communications Security Ltd. * GMP.DLL Copyright (c) 1991-1996 Free Software Foundation, Inc. See COPYING.GPL on setup DISK1 for details. GMP.DLL source code is available upon request from . ========================================================================== Trial License Agreement ========================================================================== F-SECURE SSH FOR WINDOWS TRIAL LICENSE AGREEMENT (Version 1, December 20th, 1996) BY EXERCISING YOUR RIGHTS TO MAKE AND USE COPIES OF THIS SOFTWARE YOU AGREE TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT COPY OR USE THE SOFTWARE. GRANT. Data Fellows Ltd. grants you a non-exclusive license to use this version of the F-Secure SSH software (the "Software") free of charge for (90) days for evaluation and trial purposes only. This License does not entitle you to hard-copy documentation, support or telephone assistance. While Data Fellows intends to distribute a commercial release of the Software, Data Fellows reserves the right at any time not to release a commercial release of the Software or, if released, to alter prices, features, specifications, capabilities, functions, licensing terms or other characteristics of the commercial release. You may not publish or provide any results of benchmark tests run on the Software to a third party without Data Fellows' prior written consent. You may make a single copy of the Software for archival purposes, provided such copy must contain all of the original Software's proprietary notices. ENCRYPTION. As the Software contains cryptographic features, you are responsible for ensuring that your use of the Software does not contradict any local legislation or other requirements and rules. In no situation does Data Fellows assume any responsibility for your use of the Software. DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON- INFRINGEMENT. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS BORNE BY YOU. SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU AND NOT DATA FELLOWS ASSUME THE ENTIRE COST OF ANY SERVICE AND REPAIR. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THE AGREEMENT. SOME JURISDICTIONS DO NOT ALLOW EXCLUSIONS OF AN IMPLIED WARRANTY, SO THIS DISCLAIMER MAY NOT APPLY TO YOU AND YOU MAY HAVE OTHER LEGAL RIGHTS THAT VARY BY JURISDICTION. LIMITATIONS. You may not: - permit other individuals to use the Software except under the terms listed above; modify, translate, reverse engineer, decompile, disassemble (except to the extent applicable laws specifically allow such restriction), or create derivative works based on the Software; - copy the Software other than as specified above; rent, lease, grant a security interest in, or otherwise transfer rights to the Software; or - remove any proprietary notices or labels on the Software. TITLE. Title, ownership rights, and intellectual property rights in the Software shall remain in Data Fellows, and/or its suppliers. The Software is protected by the copyright laws of the United States and international copyright treaties. This license does not grant you any right to any enhancement or update to the Software. TERMINATION. The license will terminate automatically if you fail to comply with the limitations described herein. Upon termination of this License, or in any event after the thirty (90) day trial period, you agree to destroy all copies of the Software. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, TORT, CONTRACT, OR OTHERWISE, SHALL DATA FELLOWS OR ITS SUPPLIERS OR RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES. IN NO EVENT WILL DATA FELLOWS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES, EVEN IF DATA FELLOWS AND/OR ITS SUPPLIERS SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. FURTHERMORE, SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION MAY NOT APPLY TO YOU. HIGH RISK ACTIVITIES. The Software is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of the Software could lead directly to death, personal injury, or severe physical or environmental damage ("High Risk Activities"). Data Fellows and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities. U.S. GOVERNMENT RIGHTS. If you are acquiring the Software (including the related documentation) on behalf of any part of the United States Government, the following provisions apply. The Software is deemed to be "commercial software" and "commercial computer software documentation," respectively, pursuant to DFAR Section 227.7202 and FAR 12.212, as applicable. Any use, modification, reproduction, release, performance, display or disclosure of the Software (including the related documentation) by the U.S. Government or any of its agencies shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement. MISCELLANEOUS. This Agreement represents the complete agreement concerning this license and may amended only by a writing executed by both parties. This license is personal to you and you agree not to assign your rights in herein, and any attempted assignment by you shall be null and void. If any provision of this Agreement is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This Agreement shall be governed by the laws of Finland.