Sophos SafeGuard Disk Encryption for Mac Administrator help Product version: 6.1 Document date: February 2014 Contents 1 About SafeGuard Disk Encryption for Mac............................................................................................3 2 Installation.................................................................................................................................................4 3 Configuration............................................................................................................................................7 4 Working with Disk Encryption for Mac..................................................................................................9 5 Recovery..................................................................................................................................................17 6 Uninstallation from client......................................................................................................................19 7 Technical support....................................................................................................................................20 8 Legal notices............................................................................................................................................21 2 Administrator help 1 About SafeGuard Disk Encryption for Mac Sophos SafeGuard Disk Encryption for Mac offers Mac OS X users the same data protection that the disk encryption feature of SafeGuard Enterprise already offers to Windows users. SafeGuard Disk Encryption for Mac builds on Mac OS X's integrated FileVault 2 encryption technology. It uses FileVault 2 to encrypt the entire hard disk, so that your data is safe even if the computer is lost or stolen. However, it also enables you to provide and manage disk encryption for entire networks. The encryption works transparently. The user will not see any prompts for encryption or decryption when opening, editing, and saving files. In SafeGuard Enterprise´s Management Center, you can select which computers (Windows as well as Macs) to encrypt, monitor their encryption status, and provide recovery for users who forget their passwords. 1.1 About this document This document describes how to install, configure and administer Sophos SafeGuard Disk Encryption for Mac. For detailed information on SafeGuard Management Center operation and policy settings, refer to the SafeGuard Enterprise Administrator help. For user-relevant information refer to the Quick Startup Guide for Sophos SafeGuard Disk Encryption for Mac. 1.2 Terms and acronyms The following terms and acronyms are used in this document: Term or acronym Meaning or explanation GUID Globally Unique Identifier: a unique reference number used as an identifier in computer software. POA Power-On Authentication (synonym: "pre-boot authentication") SGN SafeGuard Enterprise SSL Secure Sockets Layer: a cryptographic protocol that provides communication security over the internet. 3 Sophos SafeGuard Disk Encryption for Mac 2 Installation The following chapter describes the installation of Sophos SafeGuard Disk Encryption on Mac OS X clients. For a description of how to install the administration environment (backend), refer to the SafeGuard Enterprise Installation guide. Two Mac OS X client installation types are possible: ■ manual (attended) installation ■ automated (unattended) installation The installer package is signed. In case of internet problems you may have a delay of up to 20 minutes during the installation procedure. 2.1 Installation prerequisites Before starting the installation, make sure the SGN-SSL server certificate has been imported into the system keychain and is set to Always Trust for SSL: 1. Ask your SafeGuard Server Administrator to provide you with the SGN server certificate for SSL (file <certificate name>.cer). 2. Import the <certificate name>.cer file into your keychain. To do so, go to Applications - Utilities and double-click the Keychain Access.app. 3. In the left pane select System. 4. Open a Finder window and select the <certificate name>.cer file from above. 5. Drag the certificate file and drop it into the System Keychain Access window. 6. You will be prompted to enter your Mac OS X password. 7. After entering the password click Modify Keychain to confirm your action. 8. Then double-click the <certificate name>.cer file. Click on the arrow left beside Trust and open the Trust Chain. 9. For Secure Sockets Layer (SSL) select the option Always Trust. 10. Close the dialog. You will be prompted again to enter your Mac OS X password. 11. Enter the password and confirm by clicking Update Settings. A blue plus symbol in the lower right corner of the certificate icon indicates that this certificate is marked as trusted for all users: 12. Open a web browser and check that your SafeGuard Enterprise Server is available using https:\\<servername>. Now you can start with the installation. Note: 4 Administrator help Certificate import can also be done by running the command sudo /usr/bin/security add-trusted-cert -d -k /Library/Keychains/System.keychain -r trustAsRoot -p ssl "/folder/<certificate name>.cer". This can also be used for automated deployment via script. Change folder and certificate names according to your settings. Note: If you want to bypass the process described above, you can run the command sgdeadmin --disable-server-verify with sudo rights as described here: Command line options (section 4.9). We do not recommend this option as it may create a security vulnerability. 2.2 Manual (attended) installation A manual (or attended) installation allows you to control and test the installation while proceeding step by step. It is performed on a single Mac. Note: Make sure the server verification has been properly set up as described in Installation prerequisites (section 2.1). 1. Copy Sophos SafeGuard DE for OS X 6.10.0.dmg to your desktop. 2. Double-click the file Sophos SafeGuard DE for OS X 6.10.0.dmg to install the application. After reading through the readme file offered, click Sophos SafeGuard DE.pkg and follow the installation wizard. You will be prompted for your password to allow the installation of new software. 3. Click Close to complete the installation. 4. After a restart, logon with your Mac password. 5. Open the System Preferences and click the Sophos Encryption icon to start the application. 6. Click the Server tab. 7. If server and certificate details are shown, skip the next steps and go to Step 11 and click Synchronize. If no information is shown, continue with the next step. 8. Select the configuration zip file (For a description of how to create a configuration package for Macs see SafeGuard Enterprise Administration Help version 6.10, Working with configuration packages > Create configuration package for Macs). 9. Drag the zip file to the Server dialog and drop it into the drop zone. 10. You will be prompted to enter a Mac administrator password. Enter the password and click OK to confirm. 5 Sophos SafeGuard Disk Encryption for Mac 11. Check the connection to the SafeGuard Enterprise server: Company certificate details are shown in the lower part of the Server dialog. Then click Synchronize. A successful connection will result in an updated "Last Contacted" time stamp (Tab Server, Server Info area, Last Contacted:). An unsuccessful connection will display the following icon: Refer to the log file for further information. Refer to Server tab (section 4.7.2) for more information on synchronization and server connection. 2.3 Automated (unattended) installation via Remote Management Software An automated (unattended) installation does not require any user interaction during the installation process. This section describes the basic steps for an automated (unattended) installation of SafeGuard Disk Encryption for Mac. Use the management software installed on your system. Depending on the management solution you are using, the actual steps may vary. Note: To install SafeGuard Disk Encryption for Mac on client computers, perform the following steps: 1. Download the installer file Sophos SafeGuard DE for OS X 6.10.0.dmg. 2. Copy the file to the target machines. 3. Install the file on the target machines. If you use Apple Remote Desktop, steps 2 and 3 are one single step. 4. Select the configuration zip file (For a description of how to create a configuration package for Macs see SafeGuard Enterprise Administration Help version 6.10, Working with configuration packages > Create configuration package for Macs) and copy it to the target machines. 5. Run the following command on the target machines: /usr/bin/sgdeadmin --import-config /full/path/to/file.zip Change /full/path/to/file according to your settings. This command needs to be run with administrator privileges. If you are using Apple Remote Desktop, then enter root in the field user name to specify which user issues the above stated command. 6 Administrator help 3 Configuration Sophos SafeGuard Disk Encryption for Mac OS X is administered in the SafeGuard Management Center. The following chapter focuses on the Mac-specific configuration. Any standard Management Center functionality is described in the most recent SafeGuard Enterprise Administrator help. Note: SafeGuard Disk Encryption for Mac only makes use of policies of the type "Device Protection" and ignores all policy settings except Target and Media encryption mode. 3.1 Centrally administered configuration options Policies are configured centrally in the SafeGuard Management Center. SafeGuard Disk Encryption for Mac only makes use of policies of the type "Device Protection" and ignores all policy settings except Target and Media encryption mode. In order to initiate full disk encryption the settings must be chosen as follows: 1. Create a new policy of type Device Protection. For Device protection target choose Local Storage Devices, Internal Storage or Boot Volumes. Type a name for the policy and click OK. 2. For Media encryption mode select Volume based. A new policy for device protection has been created and configured for full disk encryption for Macs. Note: Make sure that the policy is assigned to the clients that will be encrypted. If all of the endpoints are to be encrypted you might assign the policy to the top level of your domain or workgroup. If IT staff take care of the installation, do not assign the policy before the clients are given to the end-users. There is the risk that the endpoint is encrypted too early and IT staff are registered for FileVault 2 instead of the end-users. 3.2 Locally administered configuration options The following options are configured locally on the Mac client: ■ Define synchronization interval This option allows you to set the intervals at which the client contacts the server to synchronize settings. Use the command sgdeadmin --contact-interval in order to set the interval to a specific time (in minutes). E.g. the command sgdeadmin --contact-interval 120 sets this interval to a time of 2 hours. Info: Default value is 90 minutes. ■ Synchronize database information 7 Sophos SafeGuard Disk Encryption for Mac Use the command sgdeadmin --synchronize to start synchronizing database information from the SafeGuard Enterprise backend such as policies and keys. ■ Enable or disable the system menu Use the command sgdeadmin --enable-systemmenu to activate the system menu in the upper right corner. Use the command sgdeadmin --disable-systemmenu to deactivate the system menu. Note: Default setting after installing SafeGuard Disk Encryption is "disabled", that is, the system menu is deactivated. For more information on the system menu, see Sophos SafeGuard Disk Encryption system menu (section 4.8). Refer to Command line options (section 4.9) for a complete overview of all command line options. 8 Administrator help 4 Working with Disk Encryption for Mac A separate Quick Startup Guide for Disk Encryption explains the user-relevant aspects of the application. You can find the latest version of the product documentation on our Documentation page at http://www.sophos.com/en-us/support/documentation.aspx. In the following sections you will find information on how to work with Disk Encryption for Mac from an administrator's perspective. 4.1 How does encryption work? FileVault 2 keeps all data on the hard drive secure with XTS-AES-128 data encryption at the disk level. The algorithm has been optimized for 512-byte blocks. The conversion from plaintext to ciphertext and back is performed on the fly with low impact on the user experience since it is given a lower priority. One traditional obstacle to usability with full disk encryption is that it was necessary for the end user to authenticate twice: once to unlock the encrypted boot volume (POA), and the second time to log on to the user desktop. However, this is no longer necessary. Users enter their password at the pre-boot logon and the system initiates password-forwarding when the operating system is up and requiring logon credentials. Password-forwarding eliminates the need for users to log on twice after a cold boot. Users are able to reset their passwords at any time without the need to re-encrypt the volume. The reason is that a multi-level key system is employed. The keys shown to the users (e.g. logon keys and recovery keys) are derived encryption keys and therefore can be replaced. The true volume encryption key will never be given to a user. For further information on FileVault 2 see Apple Technical White Paper - Best Practices for Deploying FileVault 2 (Aug. 2012), which can be downloaded from the Apple website. 4.2 Initial encryption If a volume based encryption of the system disk is specified in the policy, then disk encryption will be activated for the user currently logged on. On client side, perform the following tasks: 1. Before encryption starts, a dialog is shown to ask for the logon password. Enter the Mac OS X password. If the dialog is shaking, the password is incorrect. Try again. Note: If the password is empty, please change it. It is not possible to enable disk encryption without a password set. 9 Sophos SafeGuard Disk Encryption for Mac 2. Wait for the Mac to restart. Note: If activation of the encryption fails, an error message will be displayed. More information can be found in the log files. Unless you chose another location, you find them at /var/log/system.log 3. Disk encryption starts and is done in the background. The user can continue working. The user is added as first FileVault 2 user of the endpoint. 4.3 Decryption Usually it is not necessary to decrypt. If you set a policy that specifies No encryption for Mac clients that are already encrypted, they will remain encrypted. But in this case the users have the choice to decrypt. They will find the corresponding button in the preference pane, see Disk Encryption tab (section 4.7.4). Users with local administrator rights cannot be prevented from attempting to manually decrypt their hard disk using built-in FileVault 2 functionality. However, they will be prompted for a restart to complete the decryption. As soon as the Mac has completed the restart, SafeGuard Disk Encryption for Mac will enforce encryption if a corresponding policy has been set. 4.4 Add FileVault 2 user Only users that are already registered for FileVault 2 at the endpoint will be able to log on to the system after a restart. In order to add a user to FileVault 2 proceed as follows: 1. While the Mac is still running, log on with the user you want to register for FileVault 2. 2. Provide the credentials of that user in the dialog Enable Your Account. If you are using Mac OS X version 10.8, not only the user's own credentials are requested, but also those of a user already active in FileVault 2. With Mac OS X version 10.9 this is no longer necessary. Therefore, with the exception of Mac OS X version 10.8, users will be able to log on as easily as if there was no disk encryption enforced. 4.5 Remove FileVault 2 user A user can be removed from the list of users assigned to a Mac in the SafeGuard Management Center. After the next synchronization, the user will be removed from the FileVault 2 users of the endpoint as well. But this does not mean that the user will not be able to log on to that Mac anymore. Like any new user, the user just needs to log on to a running Mac in order to become authorized again. If you really want to prevent a user from booting a Mac, mark the user as blocked in Management Center. The user will then be removed from the FileVault 2 users of the client and no new authorization will be possible. 10 Administrator help Note: It is possible to remove all FileVault 2 users but the last one. Also the owner can be removed, then the next user in the list will be marked as owner. In SafeGuard Disk Encryption for Mac it does not make a difference if a user is owner or not. The last remaining FileVault 2 user cannot be removed. 4.6 Synchronization with backend In the process of synchronization, the states of the clients are reported to the SafeGuard Enterprise backend, policies are updated and the user-machine assignment is checked. Therefore, the following information is sent from the clients and appears in SafeGuard Management Center: ■ As soon as an endpoint is encrypted, "POA" is checked. Other information that is displayed includes drive name, label, type, state, algorithm and operating system. ■ New FileVault 2 users are added also in Management Center. Note: If the SafeGuard Enterprise client software is removed from an endpoint, the endpoint and its users are still visible in SafeGuard Management Center. But the timestamp of the last server contact does not change anymore. On client side the following things are changed: ■ Policies that were changed in Management Center are changed on the client. ■ Users that have been deleted or blocked in Management Center are also removed from the list of FileVault 2 users on the client. 4.7 Preference pane A preference pane allows you to set preferences for a specific application or the system. After installing Sophos Encryption on a Mac client, the following preference pane icon appears in the System Preferences: Click on the icon to open the Sophos Encryption preference pane. The About content is shown. The menu bar allows you to open the following menu information windows: 4.7.1 About tab The About tab informs you about the product version installed on the client and about the copyright and registered trademark(s). If Sophos SafeGuard File Encryption is installed, it will also be listed. 11 Sophos SafeGuard Disk Encryption for Mac Click on the question mark symbol in the lower right corner to open the Sophos SafeGuard Disk Encryption Quick startup guide in the system's language. 4.7.2 Server tab Click on Server to display a window containing the following information and functionality: Server Info ■ Contact interval: shows the interval at which synchronization with the server is started. See also Locally administered configuration options (section 3.2) for information on how to set this interval. Preset default value is 90 minutes. ■ Last Contacted: shows the date when a client last communicated with the server ■ Primary Server URL: URL of the main server connection ■ Secondary Server URL: URL of the secondary server connection ■ Server Verification: shows whether SSL server verification for communication with the SafeGuard Enterprise server is enabled or disabled. Refer to Command line options (section 4.9) (command sgdeadmin --enable-server-verify or sgdeadmin --disable-server-verify) for a description of how to modify this option. Drag configuration zip file here Drag the configuration zip file to this drop zone in order to apply configuration information from the Management Center to the Mac client. See also Manual (attended) installation (section 2.2). Synchronize Click this button to start manually synchronizing database information such as policies. This might be required after having performed modifications in the SafeGuard Management Center. If the synchronization fails, the following icon will appear: Open the log file to retrieve information about possible causes. You can modify the automatic synchronization contact interval by modifying the corresponding parameter. See also Locally administered configuration options (section 3.2). Company Certificate 12 ■ Valid from: the date the certificate has become valid ■ Valid to: the date the certificate validity expires ■ Issuer: the instance which has issued the certificate ■ Serial: the serial number of the company certificate Administrator help 4.7.3 User tab Click on User to display information about: ■ The Username of the user currently logged on. ■ The Domain, listing the domain directory the client belongs to. For local users the local computer name is displayed. Note: The entry Domain must be identical to the entry in System Preferences - Users & Groups Login Options - Network Account Server ■ The SafeGuard User GUID, displaying the GUID which has been generated for the user following their first logon. In the second window section you can check/uncheck the following option: ■ Show System Menu for Disk Encryption: when activated, the Sophos SafeGuard Disk Encryption icon appears in the menu bar. See also Sophos SafeGuard Disk Encryption system menu (section 4.8). The third window section displays information about the User Certificate (it is not necessary for disk encryption): ■ Valid from: the date the certificate has become valid ■ Valid to: the date the certificate validity expires ■ Issuer: the instance which has issued the certificate ■ Serial: the serial number of the certificate 4.7.4 Disk Encryption tab Click on Disk Encryption to display information about the current policies and the status of the Mac client. The first window section tells you whether the system disk should be encrypted according to the policy set by the security officer. The second window section displays the status of the Mac client. This can be one of the following: ■ The system disk is encrypted and a centrally stored recovery key is available. ■ The system disk is encrypted but there is no centrally stored recovery key available. ■ The system disk is not encrypted. At the bottom a button Decrypt System Disk is displayed. It will be enabled if FileVault 2 is enabled, the current user is active in FileVault 2 and the security officer has set a policy defining that no encryption is necessary for the client. 13 Sophos SafeGuard Disk Encryption for Mac Note: If there is no centrally stored recovery key available, the helpdesk cannot assist with password recovery. Therefore, the recovery key should be imported using the command line tool: sgdeadmin --import-recoverykey. If the recovery key is unknown by the user as well as by the security officer, decryption and subsequent encryption of the disk will be necessary in order to create a new recovery key. 4.8 Sophos SafeGuard Disk Encryption system menu The system menu provides the following information: ■ The icon (on the left) shows the encryption status: Figure 1: System menu Green icon: The system disk is encrypted. Red icon: The system disk is not encrypted. ■ The following menu item is available when you click on the icon: ■ Open Sophos Encryption Preferences... Opens the Sophos Encryption Preference Pane. Note: In order to enable or disable the system menu see User tab (section 4.7.3). 4.9 Command line options The Terminal application allows you to enter commands and command line options. The following command line options are available: Command name sgdeadmin 14 Definition lists available commands including short help hints Additional parameters/supplements (optional) possible supplement --help Administrator help Command name sgdeadmin --version sgdeadmin --status sgdeadmin --list-user-details Definition Additional parameters/supplements (optional) displays version and copyright information of the installed product returns system status information such as version, server and certificate information. returns information of the user currently logged on --all displays information for all users (sudo required) --xml returns output in xml format. sgdeadmin --list-policies sgdeadmin --synchronize sgdeadmin --import-recoverykey displays policy-specific information. Key GUIDs are resolved to key names if possible. Bold print indicates a personal key. --all displays information for all users (sudo required) --xml returns output in xml format forces an immediate server contact (needs working server connection). imports the FileVault 2 recovery key, overwrites existing recovery key --force existing recovery key will be overwritten without any additional confirmation "recoverykey" if it is not entered, user will be asked for it sgdeadmin --import-config "/path/to/target/file" imports the specified configuration zip file. See also Manual (attended) installation (section 2.2). The command needs administrative rights (sudo). Note: Use the drag and drop functionality to drag a complete path from, for example, the Finder into the Terminal application. 15 Sophos SafeGuard Disk Encryption for Mac Command name sgdeadmin --enable-server-verify sgdeadmin --disable-server-verify Definition Additional parameters/supplements (optional) turns on SSL server verification for communication with the SafeGuard Enterprise server. After installation, the SSL server verification is activated. The command needs administrative rights (sudo). turns off SSL server verification for communication with the SafeGuard Enterprise server. The command needs administrative rights (sudo). Note: We do not recommend this option as it may create a security vulnerability. The following commands are explained in detail in section Locally administered configuration options (section 3.2): 16 ■ sgdeadmin --enable-systemmenu ■ sgdeadmin --disable-systemmenu ■ sgdeadmin --contact-interval ■ sgdeadmin --synchronize Administrator help 5 Recovery Recovery provides a way of accessing an encrypted volume by means of a centrally stored recovery key. This is necessary because a user might forget the Mac OS X logon password and there might be no other credentials available. 5.1 Recovery key handling If all FileVault-enabled users on a particular system forget their passwords, credentials are not available and there is no recovery key available, then the encrypted volume cannot be unlocked and the data is unaccessible. Data may be lost permanently, so proper recovery planning is essential. A new recovery key is generated during each activation of disk encryption. Without Sophos SafeGuard Disk Encryption being installed at the time of the encryption, it is displayed to the user who consequently is responsible for its protection against loss. With Sophos SafeGuard Disk Encryption, it is securely sent to the SafeGuard Enterprise backend and stored centrally. The security officer can retrieve it whenever needed. See Forgotten Mac OS X logon password (section 5.2) for more information about the recovery process. But even if SafeGuard Disk Encryption was not installed when the disk was encrypted, the recovery key can be managed centrally. Therefore it is necessary to import it. The relevant command line option is sgdeadmin --import-recoverykey, see also Command line options (section 4.9). Any input within the recovery key will be sent in upper case. Note: ■ Mac OS X 10.8: the recovery key will not be checked, it is the responsibility of the user to enter it correctly. An error will be displayed only if the format is invalid. ■ Mac OS X 10.9: the recovery key will be checked if valid or not. In order to check whether a recovery key is present for a client, see Disk Encryption tab (section 4.7.4). If there is an institutional recovery key present, it can be used for recovery as well. For more information see OS X: How to create and deploy a recovery key for FileVault 2 at support.apple.com/kb/HT5077 5.2 Forgotten Mac OS X logon password If a user forgets the Mac OS X logon password and there are no other credentials available, proceed as follows: 1. The user switches on the Mac. 17 Sophos SafeGuard Disk Encryption for Mac 2. The user clicks on ? in the logon dialog. Alternatively, the user can enter a wrong logon password three times. The password hint is displayed and the user is asked if he or she wants to reset the password using the recovery key. 3. The user clicks on the triangle next to the message in order to get to the next step (to enter the recovery key): 4. In SafeGuard Management Center open the recovery wizard by selecting Tools > Recovery and display the recovery key for the specific machine. 5. Tell the user the recovery key to be entered at the Mac. The Mac starts and the user can enter a new password and a password hint. Mac OS X 10.9 only: The recovery key is replaced as soon as it has been used once to start the system. The new recovery key is generated automatically and sent to the SafeGuard Enterprise backend where it is stored to be available for the next recovery. Note: Be careful to whom you give a recovery key of an endpoint! As a recovery key is always machine specific and not user specific, it might also be necessary to check that the recovery key is not used to get unauthorized access to another user's sensitive data on the same machine. 18 Administrator help 6 Uninstallation from client If you need to uninstall the software from a client computer, proceed as follows: 1. 2. 3. 4. On the Mac client go to /Library. Select the folder /Sophos SafeGuard DE. Select and double-click the file Sophos SafeGuard DE Uninstaller.pkg A wizard guides you through uninstallation. Note: It is not necessary to decrypt the disk before uninstalling the software. Note: A user with administrative rights cannot be prevented from uninstalling the software. (A policy that prevents this on Windows clients has no effect on Mac clients.) Note: The uninstaller package is signed. In case of internet problems you may have a delay of up to 20 minutes during the uninstallation procedure. 19 Sophos SafeGuard Disk Encryption for Mac 7 Technical support You can find technical support for Sophos products in any of these ways: 20 ■ Visit the SophosTalk community at community.sophos.com/ and search for other users who are experiencing the same problem. ■ Visit the Sophos support knowledgebase at www.sophos.com/en-us/support.aspx. ■ Download the product documentation at www.sophos.com/en-us/support/documentation/. ■ Send an email to [email protected], including your Sophos software version number(s), operating system(s) and patch level(s), and the text of any error messages. Administrator help 8 Legal notices Copyright © 2014 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the documentation can be reproduced in accordance with the license terms or you otherwise have the prior permission in writing of the copyright owner. Sophos, Sophos Anti-Virus and SafeGuard are registered trademarks of Sophos Limited, Sophos Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. Disclaimer and Copyright for 3rd Party Software This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/) AES-NI This software uses code from the Intel_aes_lib. The following is applicable to Intel_aes_lib: /* intel_aes_lib source files come from Intel. * Modified by Patrick Fay * Copyright (c) 2010, Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: ■ Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. ■ Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. ■ Neither the name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21 Sophos SafeGuard Disk Encryption for Mac DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --------------------------------------------------------------------------Issue Date: Aug 6, 2010 */ DISCLAIMER [The AES-NI library] software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. Gladman AES Copyright (c) 1998-2007, Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software is allowed (with or without changes) provided that: 1. source code distributions include the above copyright notice, this list of conditions and the following disclaimer; 2. binary distributions include the above copyright notice, this list of conditions and the following disclaimer in their documentation; 3. the name of the copyright holder is not used to endorse products built using this software without specific written permission. DISCLAIMER This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. Zlib, Part of FreeType zlib.h -- interface of the 'zlib' general purpose compression library version 1.1.4, March 11th, 2002 Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.2. Altered source versions must be plainly 22 Administrator help marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly [email protected] Mark Adler [email protected] The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format). PCF, Part of FreeType Copyright (C) 2000 by Francesco Zappa Nardelli Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GptLib Copyright (c) 2002 Marcel Moolenaar All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 23 Sophos SafeGuard Disk Encryption for Mac PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. gSOAP Rationale This license agreement for commercial use of the gSOAP software standard edition in open source form shall replace the gSOAP public license and GPL license for Customer's use of the Software, thereby permanently replacing the terms and conditions imposed by the gSOAP public license and GPL license, as set forth in this Agreement. This license covers the entire gSOAP source distribution, including, but not limited to, the runtime library, compiler, WSDL importer, example applications, and documentation. THIS LICENSE AGREEMENT ("Agreement") is made and entered into as of the last date executed by the parties below (the "Effective Date") by and between GENIVIA, INC., a Florida corporation having a principal place of business at 3178 Shamrock East, Tallahassee, Florida 32309, USA, ("Genivia"), and Sophos Limited and its subsidiaries and affiliates, a company in accordance with the laws of England and Wales having a principal place of business at The Pentagon, Abingdon, OX14 3YP, United Kingdom ("Customer"). The parties agree as follows: 1. DEFINITIONS. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: (i) any addition to or deletion from the contents of a file containing Original Code or previous Modifications; (ii) any new file that contains any part of the Original Code, or previous Modifications. "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. "Software" means the Covered Code and accompanying documentation and support files referenced in section 1 of Exhibit A, including Updates (if any). "Updates" means any patches, bug fixes, upgrades, and new versions of the Software made generally available by Genivia during the term of this Agreement. "Source Code" means computer programming code in human readable form that is not suitable for machine execution without the intervening steps of interpretation or compilation, meaning the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable Object Code, or source code differential comparisons against the Original Code. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 24 Administrator help GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 2 of 8 "Executable Object Code" means the computer programming code in any other form than Source Code that is not readily perceivable by humans and suitable for machine execution without the intervening steps of interpretation or compilation. "Authorized Site" means the specific address of Customer’s facility consisting of a single building or multiple buildings on a contiguous campus as specified in Exhibit A. "Project" means a concerted undertaking by an identified Customer development team to design or produce a Target Application. "Run-Time Module" means the Software in Source Code form or as Executable Object Code to be incorporated into a Target Application as inseparably embedded code or statically linked to a Target Application. "Target Application" means an end-user item, such as a software product that is possibly replicated in identical form and offered for sale or licensed to third parties, or a device or system developed by Customer pursuant to a Project that contains a Run-Time Module, or any portion thereof, as specified in Exhibit A and any Updates made during the term of this Agreement. 2. SOURCE CODE LICENSE. Subject to Customer’s compliance with the terms and conditions of this Agreement and payment of any applicable fees, Genivia hereby grants to Customer a non-transferable, nonexclusive, worldwide, perpetual, royalty-free, paid-up license: (i) to reproduce and use the Software solely at the Authorized Sites in connection with the Project; (ii) to make backup copies at the Authorized Sites for the purpose of this Agreement; (iii) to store the Software in a source code repository; (iv) to create Modifications and other derivative works of the Software, solely to the extent necessary to support the development of the Target Application; (v) to compile the Software, including any Modifications and derivative works thereof, into Run-Time Modules; (vi) to reproduce an unlimited number of Run-Time Modules for physical incorporation into the Target Application; and (vii) to market, sell, offer to sell, and distribute the Target Application. 3. RESTRICTIONS. Customer shall reproduce and include any and all copyright notices and proprietary rights legends, as such notices and legends appear in the original Software, on any copy of the Software, or portion thereof, with the exception of the gSOAP public license and GPL license notices. The Software shall be handled, used and stored, solely at the Authorized Site identified in Exhibit A. The Software may be used from a single machine, a set of machines, or a network file server, but there shall be no access to the Software from any external network not located at the Authorized Sites. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 3 of 8 A function of the Software is to create Run-Time Modules for incorporation into Target Applications. Except as set forth in Section 2 above, no license is granted hereunder to reproduce or distribute the gSOAP soapcpp2 compiler and wsdl2h importer as part of such Target Application. 25 Sophos SafeGuard Disk Encryption for Mac 4. OWNERSHIP. Genivia represents and warrants to Customer that Genivia has all rights in the Software necessary to grant the rights and license granted to Customer in this Agreement. Without limiting the foregoing, Genivia represents and warrants that Genivia has acquired an assignment of all intellectual property rights in and to all portions of the Software delivered to Customer under this Agreement. Customer shall not have any obligation to provide, assign, or disclose to Genivia or any other party any Modifications. Notwithstanding the foregoing, Genivia and its licensors shall retain exclusive ownership of all worldwide Intellectual Property Rights in and to the Software. Customer acknowledges that this Agreement does not grant to Customer any Intellectual Property Rights in or to the Software other than the limited rights with respect to the Software as set forth in Section 2. 5. DELIVERY AND PAYMENT. Immediately following the Effective Date, Genivia grants Customer the right to download the Software from the Approved Software Download Site specified in Exhibit A, and install the Software at the Authorized Site and use the Software as set forth in Section 2 subject to the restrictions listed in Section 3. Notwithstanding any terms or other agreements posted on the Approved Software Download Site, this Agreement shall be the sole and exclusive agreement governing Customer's use of the Software. Customer shall pay to Genivia the Software license fee set forth in Exhibit A. License fees will be invoiced with shipment of this License Agreement. Payment of all amounts invoiced shall be due forty-five (45) days after receipt of the invoice. All payments and amounts shall be paid without deduction, set-off or counter claim, free and clear of any restrictions or conditions, and without deduction for any taxes, levies, imposts, duties, fees, deductions, withholdings or other governmental charges. If any deduction is required to be made by law, Customer shall pay in the manner and at the same time such additional amounts as will result in receipt by Genivia of such amount as would have been received by Genivia had no such amount been required to be deducted. If Customer is claiming sales or use tax exemption, a certified Tax Exempt Certificate must be attached to this Agreement or applicable purchase order submitted by Customer. 6. TERM AND TERMINATION. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 4 of 8 This Agreement shall commence upon the Effective Date and is granted in perpetuity, but may be terminated without notice in the following circumstances: if Customer breaches any term of this agreement, unless such breach is curable and is cured by Customer within thirty (30) days after notice of such breach is provided by Genivia; if Customer, being a firm or partnership, is dissolved; or, by Customer, if Customer destroys the Software for any reason. Upon termination, Customer shall destroy any remaining copies of the Software or otherwise return or dispose of 26 Administrator help such material. Termination pursuant to this clause shall not affect any rights or remedies, which Genivia may have otherwise under this license or at law. The following Sections shall survive any termination of this Agreement: Sections 1, 4, 6, 8, and 10. Termination of this Agreement, if any, shall not affect any licenses or other grants of any rights, titles, or interests of Customer in or to any Run-Time Modules or the Target Application. 7. LIMITED WARRANTY. Genivia warrants that the Software, installation scripts, and future Updates will be provided to Customer. Customer assumes full responsibility for: (i) the selection, download, and installation of the Software from the Approved Software Download Site specified in Exhibit A; (ii) the proper use of the Software; (iii) verifying the results obtained from the use of the Software; and (iv) taking appropriate measures to prevent loss of data. Genivia does not warrant that the operation of the Software will meet Customer’s requirements or that Customer will be able to achieve any particular results from use or modification of the Software or that the Software will operate free from error. EXCEPT AS EXPRESSLY SET FORTH IN SECTIONS 7 AND 8 OF THIS AGREEMENT, GENIVIA AND ITS LICENSORS DISCLAIM ALL WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING.WITHOUT LIMITING THE FOREGOING, CUSTOMER ACKNOWLEDGES THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT GENIVIA DOES NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY CUSTOMER. UNDER NO CIRCUMSTANCES WILL GENIVIA BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF GENIVIA HAS BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL GENIVIA BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 5 of 8 SERVICES. CUSTOMER ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFECRITICAL APPLICATIONS. GENIVIA EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN 27 Sophos SafeGuard Disk Encryption for Mac HAZARDOUS ENVIRONMENTS BY CUSTOMER. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8. INFRINGEMENT INDEMNITY. Genivia will defend at its expense any suit brought against Customer and will pay all damages finally awarded in such suit insofar as such suit is based on a claim that the Software as provided to Customer infringes a previously issued patent, trademark, trade secret or copyright, provided that Genivia is notified promptly of such claim and is given full and complete authority (including settlement authority consistent with the other terms and conditions of this Agreement), information and assistance by Customer for such defense. In the event that the Software is held in any such suit to infringe such a right and its use is enjoined, or if in the opinion of Genivia the Software is likely to become the subject of such a claim, Genivia at its own election and expense will either (i) procure for Customer the right to continue using the Software or (ii) modify or replace the Software so that it becomes noninfringing while giving substantially equivalent performance. In the event that (i) or (ii) above are not, in Genivia’s sole determination, obtainable using reasonable commercial efforts, then Genivia may terminate this Agreement and refund amount Customer paid Genivia under this Agreement for the Software which is the subject of such claim. The indemnification obligation shall not apply to infringement actions or claims to the extent that such actions or claims are caused solely by: (i) modifications made to the Software by a party other than Genivia; and (ii) the combination of the Software with items not supplied by Genivia or which Genivia has specifically not approved for combination with the Software. 9. GENERAL. Neither party shall be liable hereunder by reason of any failure or delay in the performance of its obligations hereunder (except for the payment of money) on account of strikes, shortages, riots, insurrection, fires, flood, storm, explosions, acts of God, war, governmental action, labor conditions, earthquakes, material shortages or any other cause which is beyond the reasonable control of such party. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 6 of 8 The Software is a "commercial item" as that term is defined at 48 C.F.R. 2.101, consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R. 12.212. Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, Customer will provide the Software to U.S. Government End Users only pursuant to the terms and conditions therein. Customer may not delegate, assign or transfer this Agreement, the license(s) granted or any of Customer’s rights or duties hereunder without Genivia's express prior written consent, except by 28 Administrator help way of merger or acquisition of the business of Customer, and any attempt to do so shall be void. Genivia may assign this Agreement, and its rights and obligations hereunder, in its sole discretion. All Software and technical information delivered under this Agreement are subject to U.S. export control laws and may be subject to export or import regulations in other countries. Customer agrees to strictly comply with all such laws and regulations. The ECCN for the Software is 5D002. This Agreement is governed by New York law, excluding any principle or provision that would call for the application of the law of any jurisdiction other than New York. Any action regarding this Agreement shall be brought in a court of competent jurisdiction, federal or state, in the County of New York, New York, and Genivia consents to venue and jurisdiction in and service of process from such court. 10. DISCLOSURE OF CUSTOMER IDENTITY. Genivia, Inc., will not disclose the identity of the Customer on its Web site, advertising, press releases, or other publicly released publicity without the Customers' prior written consent. OSXFUSE OSXFUSE is a software developed by the OSXFUSE project and is covered under the following BSD-style license: Copyright (c) 2011-2012 Benjamin Fleischer Copyright (c) 2011-2012 Erik Larsson All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of OSXFUSE nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29 Sophos SafeGuard Disk Encryption for Mac Note that the patches to the FUSE user space library and to the SSHFS user-space program are also released under the BSD license. OSXFUSE is a fork of MacFUSE. MacFUSE has been developed by Amit Singh/Google Inc.. Additional information and the original source of MacFUSE are available on http://code.google.com/p/macfuse/. MacFUSE is covered under the following BSD-style license: Copyright (c) 2007—2009 Google Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NOTE THAT THIS SOFTWARE ATTEMPTS TO INSTALL THE LATEST VERSION OF ITSELF BY CHECKING FOR UPDATES DURING INSTALLATION. THE INSTALLED VERSION MAY BE NEWER THAN THE VERSION EMBEDDED IN THIS PACKAGE. Note that Google's patches to the FUSE library (libfuse/*.patch in the MacFUSE source repository) and to the SSHFS user-space program (filesystems/sshfs/*.patch in the MacFUSE source repository) are also released under the BSD license. Portions of this package were derived from code developed by other authors. Please read further for specific details. ■ 30 kext/fuse_kernel.h is an unmodified copy of the interface header from the Linux FUSE distribution (http://fuse.sourceforge.net). fuse_kernel.h can be redistributed either under the GPL or under the BSD license. It is being redistributed here under the BSD license. Administrator help ■ Unless otherwise noted, parts of MacFUSE (multiple files in kext/) contain code derived from the FreeBSD version of FUSE (http://fuse4bsd.creo.hu), which is covered by the following BSD-style license: Copyright (C) 2005 Csaba Henk. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ■ kext/fuse_nodehash.c is a slightly modified version of HashNode.c from an Apple Developer Technical Support (DTS) sample code example. The original source, which is available on http://developer.apple.com/library/mac/#samplecode/MFSLives/, has the following disclaimer: Disclaimer: IMPORTANT: This Apple software is supplied to you by Apple Computer, Inc. Apple") in consideration of your agreement to the following terms, and your use, installation, modification or redistribution of this Apple software constitutes acceptance of these terms. If you do not agree with these terms, please do not use, install, modify or redistribute this Apple software. In consideration of your agreement to abide by the following terms, and subject to these terms, Apple grants you a personal, non-exclusive license, under Apple's copyrights in this original Apple software (the "Apple Software"), to use, reproduce, modify and redistribute the Apple Software, with or without modifications, in source and/or binary forms; provided that if you redistribute the Apple Software in its entirety and without modifications, you must retain this notice and the following text and disclaimers in all such redistributions of the Apple Software. Neither the name, trademarks, service marks or logos of Apple Computer, Inc. may be used to endorse or promote products derived from the Apple Software without specific prior written permission from Apple. Except as expressly stated in this notice, no other rights or licenses, express or implied, are granted by Apple herein, including but not limited to any patent rights that may be infringed by your derivative works or by other works in which the Apple Software may be incorporated. 31 Sophos SafeGuard Disk Encryption for Mac The Apple Software is provided by Apple on an "AS IS" basis. APPLE MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND OPERATION ALONE OR IN COMBINATION WITH YOUR PRODUCTS. IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION, MODIFICATION AND/OR DISTRIBUTION OF THE APPLE SOFTWARE, HOWEVER CAUSED AND WHETHER UNDER THEORY OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, EVEN IF APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ■ Parts of the mount_osxfusefs and the load_osxfusefs command-line programs (implemented in kext/mount/ and kext/load/, respectively) come from Apple's Darwin sources and are covered under the Apple Public Source License (APSL). You can read the APSL at: http://www.opensource.apple.com/license/apsl/ ■ Parts of the OSXFUSE kernel extension (locking mechanism for 64 bit kernel) come from Tuxera Inc.'s MacFUSE "rebel" branch. The original source of the "rebel" branch is available on https://github.com/tuxera. These modifications are covered under the following BSD-style license: Copyright (c) 2010 Tuxera Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Tuxera Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 Administrator help OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ■ Parts of OSXFUSE come from the Fuse4X project which itself is a MacFUSE fork. Additional information and the original source of Fuse4X are available on http://fuse4x.org. Fuse4X is covered under the following BSD-style license: Copyright (c) 2011 Anatol Pomozov. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS "AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This binary package contains the following open-source software that is available under the GNU Lesser General Public License. * FUSE user space library (http://fuse.sourceforge.net/) 33
© Copyright 2026 Paperzz