=========================================================================
                   F-Secure SSH 1.0.6 Beta (Windows)
==========================================================================

F-Secure SSH 1.0.6 Beta is subject to the terms detailed in the Internet
Beta license agreement accompanying it. 

Version 1.0.6 is feature complete and contains several new features: RSA 
user authentication, Strict Host Key Checking against a known_hosts 
database, an RSA key generation Wizard, On-Line Help, TCP/IP forwardings, 
and 3DES, Blowfish, and DES ciphers. 

Data Fellows has just made a major breakthrough in optimizing the Blowfish 
encryption algorithm. We have achieved 12-18Mbits per second encryption 
speeds in laboratory conditions. 

The release version of F-Secure SSH will use an optimized version of 
Blowfish, that will beta about 3-4 times faster that the non-optimized 
version in the Internet beta.

For more information see section "Release Notes".

F-Secure SSH Support Team has updated the Frequently Asked Questions
(FAQ) database and the list of known bugs and issues.

 o http://www.Europe.DataFellows.com/f-secure/support/

You can also e-mail bugs and other feedback to:

 o F-Secure-Beta-Feedback@DataFellows.com

==========================================================================
                       Installation Instructions 
==========================================================================

* Installation

  Before starting the F-Secure SSH installation process, close all running
  applications.

  1. Insert the F-Secure SSH setup disk into the floppy disk drive.

  2.If you're running Windows 95 or Windows NT 4.0, choose Run from the 
  Start menu. Otherwise, choose Run from the File menu.

  3.Type "a:setup" and press Enter. If your floppy disk drive is associated 
  to another drive letter, use that instead of "a:".

  4.Follow the instructions of the setup program to install F-Secure SSH on
  your computer.

  The F-Secure SSH Wizard will be launched automatically after the setup to 
  help you generate an RSA Identity. 
                
  See section "Running F-Secure SSH" for more information on how to use
  F-Secure SSH.

==========================================================================
          Instructions for Users of Previous Alpha Versions 
==========================================================================

* Upgrading

  This version is not compatible with the previous F-Secure SSH file 
  formats. Please delete all .SSH and SSH.INI files.
  
  We recommend using version 1.2.16 of the Non-commercial F-Secure SSH 
  UNIX server during your testing and evaluation period on the remote UNIX 
  machine.

* Client-Server Issues

  The TCP/IP forwarding code works properly only with version 1.2.16.

  IDENTITY files are encrypted with 3DES, old servers that have been
  compiled to used IDEA have an incompatible IDENTITY file format. We
  recommend using version 1.2.16 ssh-keygen utility to update the
  IDEA encrypted IDENTITY file to 3DES encrypted format. This format is 
  also compatible with the Windows version.

  We strongly recommend you to upgrade the UNIX server to version 1.2.16
  for best performance and compatibility between the UNIX and Windows 
  programs.

==========================================================================
                           Running F-Secure SSH
==========================================================================

* What do I need to run F-Secure SSH? 

  You must have WINSOCK.DLL (version 1.1 or higher) installed on your 
  Windows system, a Local Area Network or an Internet connection before
  you can use F-Secure SSH. 

  To connect to a remote server the server must be running an F-Secure SSH 
  Server for UNIX. This version is compatible with the version 1.2.14 and 
  above. Blowfish block cipher only works with 1.2.16 and above.

* Connecting to a Remote Host

  To connect to a remote computer using password authentication:

  1. From the Edit menu, choose Properties.

  2. In the Connection tab, type the name of the remote host you
  want to connect to, and the user name for your account.

  3. From the options group select Password as your authentication type.

  4. Choose the OK button.

  5. Press Enter or from the File menu, choose connect.

  6. Type in the password for you account to the Connect Using Password 
  Authentication dialog box.

  7. Choose the OK button to connect.

  If this is the first time you're connecting to the host, SSH may ask you 
  to accept the host's previously unknown host key.

  NOTE: The quickest way to make the connection if your setting are 
  correct is to press the Enter key on the empty terminal windows. This 
  will bring up the connection dialog box immediately.

* Getting Help

  See the SSH.HLP file for information on all F-Secure SSH Features by 
  pressing the Help button on one of the F-Secure SSH dialog boxes. The 
  SSH.HLP file contains installation instructions and a preliminary 
  User's Guide.

==========================================================================
                           Known Issues & Bugs
==========================================================================

Known Issues
 - Line-draw characters are still missing.
 - On-Line help is not context sensitive.
 - Dialog layouts will be finalized after the beta release.

Known Bugs
 - Scroll bar on the terminal window is not correctly initialized on some
   systems. After login the user is required to press the down arrow to 
   once to initialize the Scroll bar. 
 - Fast typing while waiting for a connect can cause F-Secure SSH to 
   disconnect. 
 - When resizing the terminal screen downwards then upwards, and cutting 
   text, the cut point is off screen or misplaced. 
 - Odd "underline type of" lines sometimes appear on the bottom of the 
   screen and on the right hand side of the terminal window. 

==========================================================================
                       For More Information Contact
==========================================================================

* For more information on the commercial version of F-Secure SSH
  contact one of the addresses below:

  Sales:    F-Secure-SSH-Sales@DataFellows.com
  WWW:      http://www.DataFellows.com/
            http://www.Europe.DataFellows.com/

==========================================================================
                               Copyrights
==========================================================================

* F-Secure SSH 

 Copyright (c) 1996 Data Fellows Ltd.
 Copyright (c) 1995-96 SSH Communications Security Ltd.

* GMP.DLL

 Copyright (c) 1991-1996 Free Software Foundation, Inc.
 See COPYING.GPL on setup DISK1 for details. GMP.DLL source code is 
 available upon request from <F-Secure-SSH-Support@DataFellows.com>.

==========================================================================
                      Internet Beta License Agreement
==========================================================================

F-SECURE SSH FOR WINDOWS INTERNET BETA LICENSE AGREEMENT (Version 1.2, 
October 3rd, 1996)

BY EXERCISING YOUR RIGHTS TO MAKE AND USE COPIES OF THIS SOFTWARE YOU
AGREE TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE
TERMS OF THIS AGREEMENT, DO NOT COPY OR USE THE SOFTWARE. 

GRANT. Data Fellows Ltd. and SSH Communication Security Ltd. grant you a
non-exclusive license to use this version of the F-Secure SSH software
(the "Software") free of charge for evaluation and trial purposes only.
THIS SOFTWARE CONTAINS CODE THAT WILL MAKE THE SOFTWARE EXPIRE ON 31ST OF
OCTOBER, 1996. 

This License does not entitle you to hard-copy documentation, support or
telephone assistance. While Data Fellows intends to distribute a
commercial release of the Software, Data Fellows reserves the right at any
time not to release a commercial release of the Software or, if released,
to alter prices, features, specifications, capabilities, functions,
licensing terms or other characteristics of the commercial release. You
may not publish or provide any results of benchmark tests run on the
Software to a third party without Data Fellows' prior written consent. You
may make a single copy of the Software for archival purposes, provided
such copy must contain all of the original Software's proprietary notices. 

ENCRYPTION. As the Software contains cryptographic features, you are
responsible for ensuring that your use of the Software does not contradict
any local legislation or other requirements and rules. In no situation
does Data Fellows assume any responsibility for your use of the Software. 

DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED ON AN "AS IS" BASIS,
WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-
INFRINGEMENT. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
SOFTWARE IS BORNE BY YOU.  SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU AND
NOT DATA FELLOWS ASSUME THE ENTIRE COST OF ANY SERVICE AND REPAIR. THIS
DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THE AGREEMENT.
SOME JURISDICTIONS DO NOT ALLOW EXCLUSIONS OF AN IMPLIED WARRANTY, SO THIS
DISCLAIMER MAY NOT APPLY TO YOU AND YOU MAY HAVE OTHER LEGAL RIGHTS THAT
VARY BY JURISDICTION. 

LIMITATIONS. You may not: - permit other individuals to use the Software
except under the terms listed above; modify, translate, reverse engineer,
decompile, disassemble (except to the extent applicable laws specifically
allow such restriction), or create derivative works based on the Software;
- copy the Software other than as specified above; rent, lease, grant a
security interest in, or otherwise transfer rights to the Software; or -
remove any proprietary notices or labels on the Software. 

TITLE. Title, ownership rights, and intellectual property rights in the
Software shall remain in Data Fellows, and/or its suppliers. The Software
is protected by the copyright laws of the United States and international
copyright treaties. This license does not grant you any right to any
enhancement or update to the Software. 

TERMINATION. The license will terminate automatically if you fail to
comply with the limitations described herein. Upon termination of this
License, or in any event within thirty (30) days following Data Fellows's
release of a commercial version of the Software, you agree to destroy all
copies of the Software. 

LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY,
TORT, CONTRACT, OR OTHERWISE, SHALL DATA FELLOWS OR ITS SUPPLIERS OR
RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE
OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES. IN NO
EVENT WILL DATA FELLOWS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES, EVEN
IF DATA FELLOWS AND/OR ITS SUPPLIERS SHALL HAVE BEEN INFORMED OF THE
POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY OTHER PARTY. THIS
LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
FURTHERMORE, SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION
OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION AND EXCLUSION
MAY NOT APPLY TO YOU. 

HIGH RISK ACTIVITIES. The Software is not fault-tolerant and is not
designed, manufactured or intended for use or resale as on-line control
equipment in hazardous environments requiring fail-safe performance, such
as in the operation of nuclear facilities, aircraft navigation or
communication systems, air traffic control, direct life support machines,
or weapons systems, in which the failure of the Software could lead
directly to death, personal injury, or severe physical or environmental
damage ("High Risk Activities"). Data Fellows and its suppliers
specifically disclaim any express or implied warranty of fitness for High
Risk Activities. 

U.S. GOVERNMENT RIGHTS. If you are acquiring the Software (including the
related documentation) on behalf of any part of the United States
Government, the following provisions apply.  The Software is deemed to be
"commercial software" and "commercial computer software documentation,"
respectively, pursuant to DFAR Section 227.7202 and FAR 12.212, as
applicable. Any use, modification, reproduction, release, performance,
display or disclosure of the Software (including the related documentation)
by the U.S. Government or any of its agencies shall be governed solely by
the terms of this Agreement and shall be prohibited except to the extent
expressly permitted by the terms of this Agreement.

MISCELLANEOUS. This Agreement represents the complete agreement concerning
this license and may amended only by a writing executed by both parties.
This license is personal to you and you agree not to assign your rights in
herein, and any attempted assignment by you shall be null and void.  If
any provision of this Agreement is held to be unenforceable, such
provision shall be reformed only to the extent necessary to make it
enforceable. 

This Agreement shall be governed by the laws of Finland. 
