Relevant text from FSF's "GPLv3 Third Discussion Draft Rationale",
as released on 2007-03-28. I (Bradley M. Kuhn) went through FSF's "Third Discussion Draft Rationale", and pasted in any sections that seemed useful to this tutorial. There is a lot of interesting material in that particular rationale document, although much of it is probably too verbose for inclusion. I expect much of this will need to be cut out. The raw material used for this commit can be found here: http://gplv3.fsf.org/gpl3-dd3-guide Specifically, a copy of the LaTeX sources are here: http://gplv3.fsf.org/gpl3-dd3-rationale.tex As I pasted in this text, I added FIXME's sometimes where it seemed the text might need work. However, I was much more extensive in just pasting here, so there's a big editing job now. The whole GPLv3 chapter is now completely disjoint with all this pasting. Finally, note that this material was originally copyrighted and licensed as follows: Copyright © 2007, Free Software Foundation, Inc. Verbatim copying and distribution of this entire article are permitted worldwide, without royalty, in any medium, provided this notice is preserved. However, I am hereby relicensing this material to CC-By-SA-4.0, with the verbal permission from John Sullivan, Executive Director of the FSF, which was given to me during a conference call on Wednesday 12 February 2014. I also confirmed that relicensing permission on IRC with johnsu01 today.
This commit is contained in:
parent
ebe7610b2b
commit
f4b4b9f85e
1 changed files with 834 additions and 1 deletions
835
gpl-lgpl.tex
835
gpl-lgpl.tex
|
@ -2109,6 +2109,9 @@ geographical distribution limitation since GPLv2 was released in 1991. We
|
|||
have concluded that this provision is not needed and is not expected to be
|
||||
needed in the future, and that it therefore should be removed.
|
||||
|
||||
Although a principal reason for removing the provision is the fact that it
|
||||
has rarely been used, we have also encountered one current example of its use
|
||||
that we find troubling.
|
||||
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
\chapter{Odds, Ends, and Absolutely No Warranty}
|
||||
|
@ -2148,6 +2151,15 @@ There is apparently general acceptance that \textsc{all caps} is the
|
|||
preferred way to make something conspicuous, and that has over decades worked
|
||||
its way into the voodoo tradition of warranty disclaimer writing.
|
||||
|
||||
% FIXME: Admittedly, goes here ?
|
||||
|
||||
There is authority under United States law suggesting that effective warranty
|
||||
disclaimers must be ``conspicuous,'' and that conspicuousness can be
|
||||
established by capitalization and is absent when a disclaimer has the same
|
||||
typeface as the terms surrounding it (see \textit{Stevenson v.~TRW, Inc.},
|
||||
987 F.2d 288, 296 (5th Cir.~1993)). We have reason to doubt that such
|
||||
authority would apply to copyright licenses like the GPL.
|
||||
|
||||
Some have argued the GPL is unenforceable in some jurisdictions because
|
||||
its disclaimer of warranties is impermissibly broad. However, GPLv2~\S11
|
||||
contains a jurisdictional savings provision, which states that it is to be
|
||||
|
@ -2254,6 +2266,13 @@ GPLv3~\S0 includes definitions of four new terms not found in any form in
|
|||
GPLv2: ``covered work'', ``propagate'', ``convey'', and ``Appropriate Legal
|
||||
Notices''.
|
||||
|
||||
% FIXME: modify needs more discussion
|
||||
|
||||
We have made further improvements to the important definitions of ``modify''
|
||||
and ``based on,'' providing a complete definition of ``modify'' that refers
|
||||
to basic copyright rights, and using this definition of ``modify'' to define
|
||||
``modified version of'' and ``work based on,'' now presented as synonyms.
|
||||
|
||||
% FIXME: Transition, GPLv2 ref needed.
|
||||
|
||||
Although the definition of ``work based on the Program'' made use of a legal
|
||||
|
@ -2470,6 +2489,29 @@ other existing implementations.
|
|||
s long as users are truly in a position to install and run
|
||||
their modified versions of the program
|
||||
|
||||
In our earlier drafts we devoted much care to devising a detailed technical
|
||||
definition of the cryptographic information that would enable GPL licensees
|
||||
to install functioning modified versions, without affecting legitimate uses
|
||||
of encryption. The result was a provision that some found too complex and
|
||||
difficult to understand, while others continued to raise concerns about
|
||||
overinclusion. In fact, the complexity and its resultant problems were never
|
||||
necessary, since our underlying goal was quite simple.
|
||||
|
||||
In Draft 3 we instead use a definition of ``Installation Information'' in
|
||||
section 6 that is as simple and clear as that goal. Installation Information
|
||||
is information that is ``required to install and execute modified versions of
|
||||
a covered work \dots from a modified version of its Corresponding Source,''
|
||||
in the same User Product for which the covered work is conveyed. We provide
|
||||
guidance concerning how much information must be provided: it ``must suffice
|
||||
to ensure that the continued functioning of the modified object code is in no
|
||||
case prevented or interfered with solely because modification has been
|
||||
made.'' For example, the information provided would be insufficient if it
|
||||
enabled a modified version to run only in a disabled fashion, solely because
|
||||
of the fact of modification (regardless of the actual nature of the
|
||||
modification). The information need not consist of cryptographic keys;
|
||||
Installation Information may be ``any methods, procedures, authorization
|
||||
keys, or other information.''
|
||||
|
||||
% FIXME: Standard Interface
|
||||
|
||||
% FIXME: System Libraries: it's in a different place and changed in later drafts
|
||||
|
@ -2495,6 +2537,20 @@ the requirement to distribute source code. The more low-level the
|
|||
functionality provided by the library, the more likely it is to be
|
||||
qualified for this exception.
|
||||
|
||||
Because GPLv3 now has requirements referring to Corresponding Source outside
|
||||
of the object code conveying requirements of section 6 (see section 10,
|
||||
second paragraph, and section 11, third paragraph), it has become necessary
|
||||
to define what ``Corresponding Source'' means for a work in source code form.
|
||||
Our definition states that it is nothing more than that work itself. It is
|
||||
important to note that section 11, paragraph 3 refers to a work that is
|
||||
conveyed, and section 10, paragraph 2 refers to a kind of automatic
|
||||
counterpart to conveying achieved as the result of a transaction. The
|
||||
permissions of section 5 imply that if one distributes source code, one can
|
||||
never be required to provide more than what is distributed. One always has
|
||||
the right to modify a source code work by deleting any part of it, and there
|
||||
can be no requirement that free software source code be a whole functioning
|
||||
program.
|
||||
|
||||
\section{GPLv3~\S2: Basic Permissions}
|
||||
|
||||
% FIXME: phrase ``unmodified Program'' appears due to User Products exception
|
||||
|
@ -2531,6 +2587,13 @@ provision.
|
|||
|
||||
% FIXME: new section here, just to talk DRM before the other section.
|
||||
|
||||
GPLv3 introduces provisions that respond to the growing practice of
|
||||
distributing GPL-covered programs in devices that employ technical means
|
||||
to restrict users from installing and running modified versions. This
|
||||
practice thwarts the expectations of developers and users alike, because
|
||||
the right to modify is one of the core freedoms the GPL is designed to
|
||||
secure.
|
||||
|
||||
Technological measures to defeat users' rights --- often described by such
|
||||
Orwellian phrases as ``digital rights management,'' which actually means
|
||||
limitation or outright destruction of users' legal rights, or ``trusted
|
||||
|
@ -2599,6 +2662,22 @@ invasive para-copyright.
|
|||
|
||||
% FIXME: Wrong paragraph now.
|
||||
|
||||
What was the second paragraph of section 3 in Draft 2, concerning so-called
|
||||
anticircumvention law, has been broken up into two paragraphs. In the first
|
||||
paragraph we have replaced the reference to the Digital Millennium Copyright
|
||||
Act, a United States statute, with a corresponding international legal
|
||||
reference to anticircumvention laws enacted pursuant to the 1996 WIPO treaty
|
||||
and any similar laws. Lawyers outside the United States have worried that a
|
||||
United States statutory reference could be read as indicating a choice for
|
||||
application of United States law to the license as a whole, which of course
|
||||
was not our intention. Further research has caused us to doubt the view that
|
||||
only one or the other paragraph of section 3 will typically be effective in a
|
||||
country that has enacted an anticircumvention law. Moreover, we believe that
|
||||
several national anticircumvention laws have been or will be structured more
|
||||
similarly to the anticircumvention provisions of the Digital Millennium
|
||||
Copyright Act than to the counterpart provisions of the European Union
|
||||
Copyright Directive.
|
||||
|
||||
The second paragraph of section 3 declares that no GPL'd program is part of
|
||||
an effective technological protection measure, regardless of what the program
|
||||
does. Ill-advised legislation in the United States and other countries has
|
||||
|
@ -2607,6 +2686,17 @@ distributed as part of a system for generating or accessing certain data, the
|
|||
effect of this paragraph is to prevent someone from claiming that some other
|
||||
GPL'd program that accesses the same data is an illegal circumvention.
|
||||
|
||||
we now state more precisely that a conveying party waives the power to forbid
|
||||
circumvention of technological measures only to the extent that such
|
||||
circumvention is accomplished through the exercise of GPL rights in the
|
||||
conveyed work. We have made two changes in the disclaimer of intention
|
||||
regarding limitations on the design and use of the work. First, we make clear
|
||||
that the referenced ``legal rights'' are specifically rights arising under
|
||||
anticircumvention law. Second, we now refer to the conveying party's rights
|
||||
in addition to third party rights, as in some cases the conveying party will
|
||||
also be the party legally empowered to enforce or invoke rights arising under
|
||||
anticircumvention law.
|
||||
|
||||
% FIXME: this needs rewritten
|
||||
|
||||
In section 3, which has been retitled as well as redrafted, we have
|
||||
|
@ -2771,8 +2861,22 @@ source code available for copying for as long as the downstream distributor
|
|||
enables access to the object code. This codifies what has been our
|
||||
interpretation of GPLv2.
|
||||
|
||||
% FIXME: where should this go?
|
||||
|
||||
We improved the wording of this sentence to provide a clearer expression of
|
||||
the intended policy. Under the 6d option, you may charge for the conveyed
|
||||
object code. Those who pay to obtain the object code must be given equivalent
|
||||
and gratis access to obtain the Corresponding Source. (If you convey the
|
||||
object code to them gratis, you must likewise make the Corresponding Source
|
||||
available to them without charge.) Those who do not obtain the object code
|
||||
from you, perhaps because they choose not to pay the fee you charge, are
|
||||
outside the scope of the provision; you need not give them any kind of access
|
||||
to the Corresponding Source.
|
||||
|
||||
%FIXME: 6e, peer-to-peer
|
||||
|
||||
Informing the peers is clearly enough; what seemed to be an additional
|
||||
knowledge requirement was superfluous wording.
|
||||
|
||||
% FIXME: Not final paragraph anymore.
|
||||
|
||||
|
@ -2835,6 +2939,112 @@ number of existing business models that don't seem to be dangerous. We
|
|||
believe that this compromise will achieve the greatest success in
|
||||
preventing tivoization.
|
||||
|
||||
In brief, we condition the right to convey object code in a defined class of
|
||||
``User Products,'' under certain circumstances, on providing whatever
|
||||
information is required to enable a recipient to replace the object code with
|
||||
a functioning modified version.
|
||||
|
||||
%FIXME: this really big section on user product stuff may be too much for the
|
||||
% tutorial
|
||||
|
||||
In our earlier drafts, the requirement to provide encryption keys
|
||||
applied to all acts of conveying object code, as this requirement was
|
||||
part of the general definition of Corresponding Source. Section 6 of
|
||||
Draft 3 now limits the applicability of the technical restrictions
|
||||
provisions to object code conveyed in, with, or specifically for use in
|
||||
a defined class of ``User Products.''
|
||||
|
||||
In our discussions with companies and governments that use specialized
|
||||
or enterprise-level computer facilities, we found that sometimes these
|
||||
organizations actually want their systems not to be under their own
|
||||
control. Rather than agreeing to this as a concession, or bowing to
|
||||
pressure, they ask for this as a preference. It is not clear that we
|
||||
need to interfere, and the main problem lies elsewhere.
|
||||
|
||||
While imposing technical barriers to modification is wrong regardless of
|
||||
circumstances, the areas where restricted devices are of the greatest
|
||||
practical concern today fall within the User Product definition. Most,
|
||||
if not all, technically-restricted devices running GPL-covered programs
|
||||
are consumer electronics devices, and we expect that to remain true in
|
||||
the near future. Moreover, the disparity in clout between the
|
||||
manufacturers and these users makes it difficult for the users to reject
|
||||
technical restrictions through their weak and unorganized market
|
||||
power. Even if limited to User Products, as defined in Draft 3, the
|
||||
provision still does the job that needs to be done. Therefore we have
|
||||
decided to limit the technical restrictions provisions to User Products
|
||||
in this draft.
|
||||
|
||||
The core of the User Product definition is a subdefinition of ``consumer
|
||||
product'' taken verbatim from the Magnuson-Moss Warranty Act, a federal
|
||||
consumer protection law in the United States: ``any tangible personal
|
||||
property which is normally used for personal, family, or household
|
||||
purposes.''\footnote{15 U.S.C.~\S\ 2301.} The United States has had
|
||||
three decades of experience of liberal judicial and administrative
|
||||
interpretation of this definition in a manner favorable to consumer
|
||||
rights.\footnote{The Magnuson-Moss consumer product definition itself
|
||||
has been influential in the United States and Canada, having been
|
||||
adopted in several state and provincial consumer protection laws.} We
|
||||
mean for this body of interpretation to guide interpretation of the
|
||||
consumer product subdefinition in section 6, which will provide a degree
|
||||
of legal certainty advantageous to device manufacturers and downstream
|
||||
licensees alike. Our incorporation of such legal interpretation is in
|
||||
no way intended to work a general choice of United States law for GPLv3
|
||||
as a whole. The paragraph in section 6 defining ``User Product'' and
|
||||
``consumer product'' contains an explicit statement to this effect,
|
||||
bracketed for discussion. We will decide whether to retain this
|
||||
statement in the license text after gathering comment on it.
|
||||
|
||||
One well-established interpretive principle under Magnuson-Moss is that
|
||||
ambiguities are resolved in favor of coverage. That is, in cases where
|
||||
it is not clear whether a product falls under the definition of consumer
|
||||
product, the product will be treated as a consumer product.\footnote{16
|
||||
C.F.R.~\S\ 700.1(a); \textit{McFadden v.~Dryvit Systems, Inc.}, 54
|
||||
U.C.C.~Rep.~Serv.2d 934 (D.~Ore.~2004).} Moreover, for a given product,
|
||||
``normally used'' is understood to refer to the typical use of that type
|
||||
of product, rather than a particular use by a particular buyer.
|
||||
Products that are commonly used for personal as well as commercial
|
||||
purposes are consumer products, even if the person invoking rights is a
|
||||
commercial entity intending to use the product for commercial
|
||||
purposes.\footnote{16 C.F.R. \S \ 700.1(a). Numerous court decisions
|
||||
interpreting Magnuson-Moss are in accord; see, e.g., \textit{Stroebner
|
||||
Motors, Inc.~v.~Automobili Lamborghini S.p.A.}, 459 F.~Supp.2d 1028,
|
||||
1033 (D.~Hawaii 2006).} Even a small amount of ``normal'' personal use
|
||||
is enough to cause an entire product line to be treated as a consumer
|
||||
product under Magnuson-Moss.\footnote{\textit{Tandy Corp.~v.~Marymac
|
||||
Industries, Inc.}, 213 U.S.P.Q.~702 (S.D.~Tex.~1981). In this case, the
|
||||
court concluded that TRS-80 microcomputers were consumer products, where
|
||||
such computers were designed and advertised for a variety of users,
|
||||
including small businesses and schools, and had only recently been
|
||||
promoted for use in the home.}
|
||||
|
||||
We do not rely solely on the definition of consumer product, however,
|
||||
because in the area of components of dwellings we consider the settled
|
||||
interpretation under Magnuson-Moss underinclusive. Depending on how
|
||||
such components are manufactured or sold, they may or may not be
|
||||
considered Magnuson-Moss consumer products.\footnote{Building materials
|
||||
that are purchased directly by a consumer from a retailer, for improving
|
||||
or modifying an existing dwelling, are consumer products under
|
||||
Magnuson-Moss, but building materials that are integral component parts
|
||||
of the structure of a dwelling at the time that the consumer buys the
|
||||
dwelling are not consumer products. 16 C.F.R.~\S\S~700.1(c)--(f);
|
||||
Federal Trade Commission, Final Action Concerning Review of
|
||||
Interpretations of Magnuson-Moss Warranty Act, 64 Fed.~Reg.~19,700
|
||||
(April 22, 1999); see also, e.g., \textit{McFadden}, 54
|
||||
U.C.C.~Rep.~Serv.2d at 934.} Therefore, we define User Products as a
|
||||
superset of consumer products that also includes ``anything designed or
|
||||
sold for incorporation into a dwelling.''
|
||||
|
||||
Although the User Products rule of Draft 3 reflects a special concern
|
||||
for individual purchasers of devices, we wrote the rule to cover a
|
||||
category of products, rather than categorizing users. Discrimination
|
||||
against organizational users has no place in a free software license.
|
||||
Moreover, a rule that applied to individual use, rather than to use of
|
||||
products normally used by individuals, would have too narrow an
|
||||
effect. Because of its incorporation of the liberal Magnuson-Moss
|
||||
interpretation of ``consumer product,'' the User Products rule benefits
|
||||
not only individual purchasers of User Products but also all
|
||||
organizational purchasers of those same kinds of products, regardless of
|
||||
their intended use of the products.
|
||||
|
||||
%FIXME: This probably needs work to be brought into clarity with tutorial,
|
||||
%next three paragarphs.
|
||||
|
@ -2868,6 +3078,30 @@ all the hardware you own; the preamble explains, ``If such problems [as
|
|||
to extend this provision to those domains in future versions of the GPL, as
|
||||
needed to protect the freedom of users.''
|
||||
|
||||
The definition of Installation Information states that the information
|
||||
provided ``must suffice to ensure that the continued functioning of the
|
||||
modified object code is in no case prevented or interfered with solely
|
||||
because modification has been made.'' We did not consider it necessary to
|
||||
define ``continued functioning'' further. However, we believed it would be
|
||||
appropriate to provide some additional guidance concerning the scope of
|
||||
GPLv3-compliant action or inaction that distributors of
|
||||
technically-restricted User Products can take with respect to a downstream
|
||||
recipient who replaces the conveyed object code with a modified version. We
|
||||
make clear that GPLv3 implies no obligation ``to continue to provide support
|
||||
service, warranty, or updates'' for such a work.
|
||||
|
||||
Most technically-restricted User Products are designed to communicate across
|
||||
networks. It is important for both users and network providers to know when
|
||||
denial of network access to devices running modified versions becomes a GPL
|
||||
violation. We settled on a rule that permits denial of access in two cases:
|
||||
``when the modification itself materially and adversely affects the operation
|
||||
of the network,'' and when the modification itself ``violates the rules and
|
||||
protocols for communication across the network.'' The second case is
|
||||
deliberately drawn in general terms. We intend it to serve as a foundation
|
||||
for development of reasonable enforcement policies that respect recipients'
|
||||
right to modify while recognizing the legitimate interests of network
|
||||
providers.
|
||||
|
||||
% FIXME: This needs merged in somewhere in here
|
||||
|
||||
The mere fact that use of the work implies that the user \textit{has} the key
|
||||
|
@ -2903,6 +3137,19 @@ put.\footnote{There is a clear distinction between this situation and the
|
|||
authentication key would also not qualify as part of the Corresponding
|
||||
Source under the language we have adopted for Draft 2.}
|
||||
|
||||
% FIXME: this needs the right place.
|
||||
|
||||
We do not object to the practice of conveying object code in a mode not
|
||||
practically susceptible to modification by any party, such as code burned in
|
||||
ROM or embedded in silicon. What we find ethically objectionable is the
|
||||
refusal to pass on to the downstream licensee the real right to modify,
|
||||
coupled with the retention of that right in the device manufacturer or some
|
||||
other party. Our text has never prohibited distribution in ROM, but we have
|
||||
decided to make the point explicitly, for clarity's sake. Accordingly, our
|
||||
text states that the requirement to provide Installation Information ``does
|
||||
not apply if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product.''
|
||||
|
||||
%FIXME: publicly documented format. This might work as a start on that:
|
||||
|
||||
Our primary objective here was to ensure that the
|
||||
|
@ -3193,6 +3440,36 @@ enter into compliance, and the licensee receives no notice of the past
|
|||
violation within 60 days, then the licensee need not worry about termination
|
||||
of rights under the license.
|
||||
|
||||
In Draft 3 the termination provision of section 8 has been revised to
|
||||
indicate that, if a licensee violates the GPL, a contributor may terminate
|
||||
any patent licenses that it granted under the first paragraph of section 11
|
||||
to that licensee, in addition to any copyright permissions the contributor
|
||||
granted to the licensee. Therefore, a contributor may terminate the patent
|
||||
licenses it granted to a downstream licensee who brings patent infringement
|
||||
litigation in violation of section 10.
|
||||
|
||||
We have made two substantive changes to section 8. First, we have clarified
|
||||
that patent rights granted under the GPL are among the rights that a
|
||||
copyright holder may terminate under section 8. Therefore, a contributor who
|
||||
grants a patent license under the first paragraph of section 11 may terminate
|
||||
that patent license, just as that contributor may terminate copyright rights,
|
||||
to a downstream recipient who has violated the license. We think that this
|
||||
is a reasonable result, and was already implicit in the wording of the
|
||||
termination provision in our earlier drafts. Moreover, this clarification
|
||||
should encourage patent holders to make contributions to GPL-covered
|
||||
programs.
|
||||
|
||||
Second, we have modified the termination procedure by providing a limited
|
||||
opportunity to cure license violations, an improvement that was requested by
|
||||
many different members of our community. If a licensee has committed a
|
||||
first-time violation of the GPL with respect to a given copyright holder, but
|
||||
the licensee cures the violation within 30 days following receipt of notice
|
||||
of the violation, then any of the licensee's GPL rights that have been
|
||||
terminated by the copyright holder are ``automatically reinstated.'' The
|
||||
addition of the cure opportunity achieves a better balance than our earlier
|
||||
section 8 drafts between facilitating enforcement of the license and
|
||||
protecting inadvertent violators against unfair results.
|
||||
|
||||
\section{GPLv3~\S9: Acceptance}
|
||||
|
||||
% FIXME: needs some work here
|
||||
|
@ -3224,6 +3501,24 @@ such a clause, since it is a specific consequence of the general requirement
|
|||
that no further restrictions be imposed on downstream recipients of
|
||||
GPL-covered code.
|
||||
|
||||
Careful readers of the GPL have suggested that its explicit prohibition
|
||||
against imposition of further restrictions\footnote{GPLv2, section 6; Draft
|
||||
3, section 10, third paragraph.} has, or ought to have, implications for
|
||||
those who assert patents against other licensees. Draft 2 took some steps to
|
||||
clarify this point in a manner not specific to patents, by describing the
|
||||
imposition of ``a license fee, royalty, or other charge'' for exercising GPL
|
||||
rights as one example of an impermissible further restriction. In Draft 3 we
|
||||
have clarified further that the requirement of non-imposition of further
|
||||
restrictions has specific consequences for litigation accusing GPL-covered
|
||||
programs of infringement. Section 10 now states that ``you may not initiate
|
||||
litigation (including a cross-claim or counterclaim in a lawsuit) alleging
|
||||
that any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program (or the contribution of any contributor).''
|
||||
That is to say, a patent holder's licensed permissions to use a work under
|
||||
GPLv3 may be terminated under section 8 if the patent holder files a lawsuit
|
||||
alleging that use of the work, or of any upstream GPLv3-licensed work on
|
||||
which the work is based, infringes a patent.
|
||||
|
||||
\section{GPLv3~\S11: Explicit Patent Licensing}
|
||||
\label{GPLv3s11}
|
||||
|
||||
|
@ -3233,6 +3528,255 @@ software patents threaten to make free programs non-free and to prevent users
|
|||
from exercising their rights under the GPL. GPLv3 takes a more comprehensive
|
||||
approach to combatting the danger of patents.
|
||||
|
||||
Software patenting is a harmful and unjust policy, and should be abolished;
|
||||
recent experience makes this all the more evident. Since many countries grant
|
||||
patents that can apply to and prohibit software packages, in various guises
|
||||
and to varying degrees, we seek to protect the users of GPL-covered programs
|
||||
from those patents, while at the same time making it feasible for patent
|
||||
holders to contribute to and distribute GPL-covered programs as long as they
|
||||
do not attack the users of those programs.
|
||||
|
||||
It is generally understood that GPLv2 implies some limits on a licensee's
|
||||
power to assert patent claims against the use of GPL-covered works.
|
||||
|
||||
Therefore, we have designed GPLv3 to reduce the patent risks that distort and
|
||||
threaten the activities of users who make, run, modify and share free
|
||||
software. At the same time, we have given due consideration to practical
|
||||
goals such as certainty and administrability for patent holders that
|
||||
participate in distribution and development of GPL-covered software. Our
|
||||
policy requires each such patent holder to provide appropriate levels of
|
||||
patent assurance to users, according to the nature of the patent holder's
|
||||
relationship to the program.
|
||||
|
||||
Draft 3 features several significant changes concerning patents. We have
|
||||
made improvements to earlier wording, clarified when patent assertion becomes
|
||||
a prohibited restriction on GPL rights, and replaced a distribution-triggered
|
||||
non-assertion covenant with a contribution-based patent license grant. We
|
||||
have also added provisions to block collusion by patent holders with software
|
||||
distributors that would extend patent licenses in a discriminatory way.
|
||||
|
||||
|
||||
Draft 3 introduces the terms ``contributor'' and ``contribution,'' which are
|
||||
used in the third paragraph of section 10 and the first paragraph of section
|
||||
11, discussed successively in the following two subsections. Section 0
|
||||
defines a contributor as ``a party who licenses under this License a work on
|
||||
which the Program is based.'' That work is the ``contribution'' of that
|
||||
contributor. In other words, each received GPLv3-covered work is associated
|
||||
with one or more contributors, making up the finite set of upstream GPLv3
|
||||
licensors for that work. Viewed from the perspective of a recipient of the
|
||||
Program, contributors include all the copyright holders for the Program,
|
||||
other than copyright holders of material originally licensed under non-GPL
|
||||
terms and later incorporated into a GPL-covered work. The contributors are
|
||||
therefore the initial GPLv3 licensors of the Program and all subsequent
|
||||
upstream licensors who convey, under the terms of section 5, modified works
|
||||
on which the Program is based.
|
||||
|
||||
For a contributor whose contribution is a modified work conveyed under
|
||||
section 5, the contribution is ``the entire work, as a whole'' which the
|
||||
contributor is required to license under GPLv3. The contribution therefore
|
||||
includes not just the material added or altered by the contributor, but also
|
||||
the pre-existing material the contributor copied from the upstream version
|
||||
and retained in the modified version. Our usage of ``contributor'' and
|
||||
``contribution'' should not be confused with the various other ways in which
|
||||
those terms are used in certain other free software licenses.\footnote{Cf.,
|
||||
e.g., Apache License, version 2.0, section 1; Eclipse Public License,
|
||||
version 1.0, section 1; Mozilla Public License, version 1.1, section 1.1.}
|
||||
|
||||
The term ``patent license,'' as used in the third through fifth
|
||||
paragraphs of section 11, is not meant to be confined to agreements
|
||||
formally identified or classified as patent licenses. The new second
|
||||
paragraph of section 11 makes this clear by defining ``patent license,''
|
||||
for purposes of the subsequent three paragraphs, as ``a patent license,
|
||||
a covenant not to bring suit for patent infringement, or any other
|
||||
express agreement or commitment, however denominated, not to enforce a
|
||||
patent.'' The definition does not include patent licenses that arise by
|
||||
implication or operation of law, because the third through fifth
|
||||
paragraphs of section 11 are specifically concerned with explicit
|
||||
promises that purport to be legally enforceable.
|
||||
|
||||
Our previous drafts featured a patent license grant triggered by all
|
||||
acts of distribution of GPLv3-covered works.\footnote{In Draft 2 we
|
||||
rewrote the patent license as a covenant not to assert patent claims. We
|
||||
explain why we reverted to the form of a patent license grant in \S\
|
||||
\ref{cov}.} Many patent-holding companies objected to this policy. They
|
||||
have made two objections: (1) the far-reaching impact of the patent
|
||||
license grant on the patent holder is disproportionate to the act of
|
||||
merely distributing code without modification or transformation, and (2)
|
||||
it is unreasonable to expect an owner of vast patent assets to exercise
|
||||
requisite diligence in reviewing all the GPL-covered software that it
|
||||
provides to others. Some expressed particular concern about the
|
||||
consequences of ``inadvertent'' distribution.
|
||||
|
||||
The argument that the impact of the patent license grant would be
|
||||
``disproportionate,'' that is to say unfair, is not valid. Since
|
||||
software patents are weapons that no one should have, and using them for
|
||||
aggression against free software developers is an egregious act,
|
||||
preventing that act cannot be unfair.
|
||||
|
||||
However, the second argument seems valid in a practical sense. A
|
||||
typical GNU/Linux distribution includes thousands of programs. It would
|
||||
be quite difficult for a redistributor with a large patent portfolio to
|
||||
review all those programs against that portfolio every time it receives
|
||||
and passes on a new version of the distribution. Moreover, this question
|
||||
raises a strategic issue. If the GPLv3 patent license requirements
|
||||
convince patent-holding companies to remain outside the distribution
|
||||
path of all GPL-covered software, then these requirements, no matter how
|
||||
strong, will cover few patents.
|
||||
|
||||
We concluded it would be more effective to make a partial concession
|
||||
which would lead these companies to feel secure in doing the
|
||||
distribution themselves, so that the conditions of section 10 would
|
||||
apply to assertion of their patents. We therefore made the stricter
|
||||
section 11 patent license apply only to those distributors that have
|
||||
modified the program. The other changes we have made in sections 10 and
|
||||
11 provide strengthened defenses against patent assertion and compensate
|
||||
partly for this concession.
|
||||
|
||||
Therefore, in Draft 3, the first paragraph of section 11 states that a
|
||||
contributor's patent license covers all the essential patent claims
|
||||
implemented by the whole program as that contributor distributes it.
|
||||
Contributors of modified works grant a patent license to claims that
|
||||
read on ``the entire work, as a whole.'' This is the work that the
|
||||
copyleft clause in section 5 requires the contributor to license under
|
||||
GPLv3; it includes the material the contributor has copied from the
|
||||
upstream version that the contributor has modified. The first paragraph
|
||||
of section 11 does not apply to those that redistribute the program
|
||||
without change.\footnote{An implied patent license from the distributor,
|
||||
however, may arise by operation of law. See the final paragraph of
|
||||
section 11. Moreover, distributors are subject to the limits on patent
|
||||
assertion contained in the third paragraph of section 10.}
|
||||
|
||||
We hope that this decision will result in fairly frequent licensing of
|
||||
patent claims by contributors. A contributor is charged with awareness
|
||||
of the fact that it has modified a work and provided it to others; no
|
||||
act of contribution should be treated as inadvertent. Our rule also
|
||||
requires no more work, for a contributor, than the weaker rule proposed
|
||||
by the patent holders. Under their rule, the contributor must always
|
||||
compare the entire work against its patent portfolio to determine
|
||||
whether the combination of the modifications with the remainder of the
|
||||
work cause it to read on any of the contributor's patent claims.
|
||||
|
||||
|
||||
|
||||
We have made three changes to the definition of ``essential patent
|
||||
claims'' in section 0. This definition now serves exclusively to
|
||||
identify the set of patent claims licensed by a contributor under the
|
||||
first paragraph of section 11.
|
||||
|
||||
First, we have clarified when essential patent claims include
|
||||
sublicensable claims that have been licensed to the contributor by a
|
||||
third party.\footnote{This issue is typically handled in other free
|
||||
software licenses having patent licensing provisions by use of the
|
||||
unhelpful term ``licensable,'' which is either left undefined or is
|
||||
given an ambiguous definition.} Most commercial patent license
|
||||
agreements that permit sublicensing do so under restrictive terms that
|
||||
are inconsistent with the requirements of the GPL. For example, some
|
||||
patent licenses allow the patent licensee to sublicense but require
|
||||
collection of royalties from any sublicensees. The patent licensee
|
||||
could not distribute a GPL-covered program and grant the recipient a
|
||||
patent sublicense for the program without violating section 12 of
|
||||
GPLv3.\footnote{Draft 3 provides a new example in section 12 that makes
|
||||
this point clear.} In rare cases, however, a conveying party can freely
|
||||
grant patent sublicenses to downstream recipients without violating the
|
||||
GPL.
|
||||
|
||||
Draft 3 now defines essential patent claims, for a given party, as a
|
||||
subset of the claims ``owned or controlled'' by the party. The
|
||||
definition states that ``control includes the right to grant sublicenses
|
||||
in a manner consistent with the requirements of this License.''
|
||||
Therefore, in the case of a patent license that requires collection of
|
||||
royalties from sublicensees, essential patent claims would not include
|
||||
any claims sublicensable under that patent license, because sublicenses
|
||||
to those claims could not be granted consistent with section 12.
|
||||
|
||||
Second, we now state that essential patent claims are those ``that would
|
||||
be infringed by some manner, permitted by this License, of making,
|
||||
using, or selling the work.'' This modified wording is intended to make
|
||||
clear that a patent claim is ``essential'' if some mode of usage would
|
||||
infringe that claim, even if there are other modes of usage that would
|
||||
not infringe.
|
||||
|
||||
Third, we have clarified that essential patent claims ``do not include
|
||||
claims that would be infringed only as a consequence of further
|
||||
modification of the work.'' That is to say, the set of essential patent
|
||||
claims licensed under the first paragraph of section 11 is fixed by the
|
||||
the particular version of the work that was contributed. The claim set
|
||||
cannot expand as a work is further modified downstream. (If it could,
|
||||
then any software patent claim would be included, since any software
|
||||
patent claim can be infringed by some further modification of the
|
||||
work.)\footnote{However, ``the work'' should not be understood to be
|
||||
restricted to a particular mechanical affixation of, or medium for
|
||||
distributing, a program, where the same program might be provided in
|
||||
other forms or in other ways that may be captured by other patent claims
|
||||
held by the contributor.}
|
||||
|
||||
|
||||
The downstream shielding provision of section 11 responds particularly
|
||||
to the problem of exclusive deals between patent holders and
|
||||
distributors, which threaten to distort the free software distribution
|
||||
system in a manner adverse to developers and users. Draft 2 added a
|
||||
source code availability option to this provision, as a specific
|
||||
alternative to the general requirement to shield downstream users from
|
||||
patent claims licensed to the distributor. A distributor conveying a
|
||||
covered work knowingly relying on a patent license may comply with the
|
||||
provision by ensuring that the Corresponding Source of the work is
|
||||
publicly available, free of charge. We retained the shielding option in
|
||||
Draft 2 because we did not wish to impose a general requirement to make
|
||||
source code available to all, which has never been a GPL condition.
|
||||
|
||||
The addition of the source code availability option was supported by the
|
||||
free software vendors most likely to be affected by the downstream
|
||||
shielding provision. Enterprises that primarily use and occasionally
|
||||
distribute free software, however, raised concerns regarding the
|
||||
continued inclusion of a broadly-worded requirement to ``shield,'' which
|
||||
appears to have been mistakenly read by those parties as creating an
|
||||
obligation to indemnify. To satisfy these concerns, in Draft 3 we have
|
||||
replaced the option to shield with two specific alternatives to the
|
||||
source code availability option. The distributor may comply by
|
||||
disclaiming the patent license it has been granted for the conveyed
|
||||
work, or by arranging to extend the patent license to downstream
|
||||
recipients.\footnote{The latter option, if chosen, must be done ``in a
|
||||
manner consistent with the requirements of this License''; for example,
|
||||
it is unavailable if extension of the patent license would result in a
|
||||
violation of section 12. Cf.~the discussion of sublicensable patent
|
||||
claims in \S\ \ref{epc}.} The GPL is intended to permit private
|
||||
distribution as well as public distribution, and the addition of these
|
||||
options ensures that this remains the case, even though we expect that
|
||||
distributors in this situation will usually choose the source code
|
||||
availability option.
|
||||
|
||||
Without altering its underlying logic, we have modified the phrasing of
|
||||
the requirement to make clear that it is activated only if the
|
||||
Corresponding Source is not already otherwise publicly available. (Most
|
||||
often it will, in fact, already be available on some network server
|
||||
operated by a third party.) Even if it is not already available, the
|
||||
option to ``cause the Corresponding Source to be so available'' can then
|
||||
be satisfied by verifying that a third party has acted to make it
|
||||
available. That is to say, the affected distributor need not itself
|
||||
host the Corresponding Source to take advantage of the source code
|
||||
availability option. This subtlety may help the distributor avoid
|
||||
certain peculiar assumptions of liability.
|
||||
|
||||
We have made two other changes to the downstream shielding provision.
|
||||
The phrase ``knowingly rely'' was left undefined in our earlier drafts;
|
||||
in Draft 3 we have provided a detailed definition. We have also deleted
|
||||
the condition precedent, added in Draft 2, that the relied-upon patent
|
||||
license be one that is non-sublicensable and ``not generally available
|
||||
to all''; this was imprecise in Draft 2 and is unnecessary in Draft
|
||||
3. In nearly all cases in which the ``knowingly relying'' test is met,
|
||||
the patent license will indeed not be sublicensable or generally
|
||||
available to all on free terms. If, on the other hand, the patent
|
||||
license is generally available under terms consistent with the
|
||||
requirements of the GPL, the distributor is automatically in compliance,
|
||||
because the patent license has already been extended to all downstream
|
||||
recipients. If the patent license is sublicensable on GPL-consistent
|
||||
terms, the distributor may choose to grant sublicenses to downstream
|
||||
recipients instead of causing source code to be publicly available. In
|
||||
such a case, if the distributor is also a contributor, it will already
|
||||
have granted a patent sublicense by operation of the first paragraph of
|
||||
section 11,\footnote{See \S\ \ref{epc}.} and so it need not do anything
|
||||
further to comply with the third paragraph.
|
||||
|
||||
% FIXME: This probably needs editing
|
||||
|
||||
One major goal for GPLv3 is to provide developers with additional protection
|
||||
|
@ -3255,6 +3799,16 @@ distributing software released under GPLv3. We are still considering
|
|||
whether or not this ban should apply when a deal was made before these
|
||||
terms were written, and we look forward to community input on this issue.
|
||||
|
||||
The patent license grant of the first paragraph of section 11 no longer
|
||||
applies to those who merely distribute works without modification. (We
|
||||
explain why we made this change in the next subsection.) Such parties are
|
||||
nonetheless subject to the conditions stated in section 10. Unlike the
|
||||
patent license, which establishes a defense for downstream users lasting for
|
||||
as long as they remain in compliance with the GPL, the commitment not to sue
|
||||
that arises under section 10 is one that the distributor can end, so long as
|
||||
the distributor also ceases to distribute. This is because a party who
|
||||
initiates patent litigation in violation of section 10 risks termination of
|
||||
its licensed permissions by the copyright holders of the work.
|
||||
|
||||
% FIXME: just brought in words here, needs rewriting.
|
||||
|
||||
|
@ -3342,6 +3896,20 @@ kinds of patent retaliation provisions that are broader than those of section
|
|||
|
||||
% FIXME: should we mention Microsoft-Novell at all?
|
||||
|
||||
Section 7 of GPLv2 (now section 12 of GPLv3) has seen some success in
|
||||
deterring conduct that would otherwise result in denial of full downstream
|
||||
enjoyment of GPL rights. Experience has shown us that more is necessary,
|
||||
however, to ensure adequate community safety where companies act in concert
|
||||
to heighten the anticompetitive use of patents that they hold or license.
|
||||
Previous drafts of GPLv3 included a ``downstream shielding'' provision in
|
||||
section 11, which we have further refined in Draft 3; it is now found in the
|
||||
third paragraph of section 11. In addition, Draft 3 introduces two new
|
||||
provisions in section 11, located in the fourth and fifth paragraphs, that
|
||||
address the problem of collusive extension of patent forbearance promises
|
||||
that discriminate against particular classes of users and against the
|
||||
exercise of particular freedoms. This problem has been made more acute by the
|
||||
recent Microsoft/Novell deal.
|
||||
|
||||
We attack the Microsoft-Novell deal from two angles. First, in the sixth
|
||||
paragraph of section 11, the draft says that if you arrange to provide patent
|
||||
protection to some of the people who get the software from you, that
|
||||
|
@ -3355,6 +3923,183 @@ distributing software under GPLv3 if you make an agreement like the
|
|||
Microsoft-Novell deal in the future. This will prevent other distributors
|
||||
from trying to make other deals like it.
|
||||
|
||||
A software patent forbids the use of a technique or algorithm, and its
|
||||
existence is a threat to all software developers and users. A patent
|
||||
holder can use a patent to suppress any program which implements the
|
||||
patented technique, even if thousands of other techniques are
|
||||
implemented together with it. Both free software and proprietary
|
||||
software are threatened with death in this way.
|
||||
|
||||
However, patents threaten free software with a fate worse than death: a
|
||||
patent holder might also try to use the patent to impose restrictions on
|
||||
use or distribution of a free program, such as to make users feel they
|
||||
must pay for permission to use it. This would effectively make it
|
||||
proprietary software, exactly what the GPL is intended to prevent.
|
||||
|
||||
Novell and Microsoft have recently attempted a new way of using patents
|
||||
against our community, which involves a narrow and discriminatory
|
||||
promise by a patent holder not to sue customers of one particular
|
||||
distributor of a GPL-covered program. Such deals threaten our community
|
||||
in several ways, each of which may be regarded as de facto
|
||||
proprietization of the software. If users are frightened into paying
|
||||
that one distributor just to be safe from lawsuits, in effect they are
|
||||
paying for permission to use the program. They effectively deny even
|
||||
these customers the full and safe exercise of some of the freedoms
|
||||
granted by the GPL. And they make disfavored free software developers
|
||||
and distributors more vulnerable to attacks of patent aggression, by
|
||||
dividing them from another part of our community, the commercial users
|
||||
that might otherwise come to their defense.
|
||||
|
||||
We have added the fourth and fifth paragraphs of section 11 to combat
|
||||
this threat. This subsection briefly describes the operation of the new
|
||||
provisions. We follow it with a more detailed separate note on the
|
||||
Microsoft/Novell patent deal, in which we provide an extensive rationale
|
||||
for these measures.
|
||||
|
||||
As noted, one effect of the discriminatory patent promise is to divide
|
||||
and isolate those who make free software from the commercial users to
|
||||
whom the promise is extended. This deprives the noncommercial
|
||||
developers of the communal defensive measures against patents made
|
||||
possible by the support of those commercial users. The fourth paragraph
|
||||
of section 11 operates to restore effective defenses to the targets of
|
||||
patent aggression.
|
||||
|
||||
A patent holder becomes subject to the fourth paragraph of section 11
|
||||
when it enters into a transaction or arrangement that involves two acts:
|
||||
(1) conveying a GPLv3-covered work, and (2) offering to some, but not
|
||||
all, of the work's eventual users a patent license for particular
|
||||
activities using specific copies of the covered work. This paragraph
|
||||
only operates when the two triggering acts are part of a single
|
||||
arrangement, because the patent license is part of the arrangement for
|
||||
conveying, which requires copyright permission. Under those conditions,
|
||||
the discriminatory patent license is ``automatically extended to all
|
||||
recipients of the covered work and works based on it.''
|
||||
|
||||
This provision establishes a defense to infringement allegations brought
|
||||
by the patent holder against any users of the program who are not
|
||||
covered by the discriminatory patent license. That is to say, it gives
|
||||
all recipients the benefit of the patent promise that the patent holder
|
||||
extended only to some. The effect is to make contributing discriminatory
|
||||
promises of patent safety to a GPL distribution essentially like
|
||||
contributing code. In both cases, the operation of the GPL extends
|
||||
license permission to everyone that receives a copy of the program.
|
||||
|
||||
|
||||
The fourth paragraph of section 11 gives users a defense against patent
|
||||
aggression brought by the party who made the discriminatory patent
|
||||
promise that excluded them. By contrast, the fifth paragraph stops free
|
||||
software vendors from contracting with patent holders to make
|
||||
discriminatory patent promises. In effect, the fifth paragraph extends
|
||||
the principle of section 12 to situations involving collusion between a
|
||||
patent holder and a distributor.
|
||||
|
||||
Under this provision, a distributor conveying a GPL-covered program may
|
||||
not make an arrangement to get a discriminatory patent promise from a
|
||||
third party for its customers, covering copies of the program (or
|
||||
products that contain the program), if the arrangement requires the
|
||||
distributor to make payment to the third party based on the extent of
|
||||
its activity in conveying the program, and if the third party is itself
|
||||
in the business of distributing software. Unlike the fourth paragraph,
|
||||
which creates a legal defense for targets of patent aggression, the
|
||||
consequence for violation of the fifth paragraph is termination of GPL
|
||||
permissions for the distributor.
|
||||
|
||||
The business, technical, and patent cooperation agreement between
|
||||
Microsoft and Novell announced in November 2006 has significantly
|
||||
affected the development of Draft 3. The fourth and fifth paragraphs of
|
||||
section 11 embody our response to the sort of threat represented by the
|
||||
Microsoft/Novell deal, and are designed to protect users from such
|
||||
deals, and prevent or deter the making of such deals.
|
||||
|
||||
The details of the agreements entered into between Microsoft and Novell,
|
||||
though subject to eventual public disclosure through the securities
|
||||
regulation system, have not been fully disclosed to this
|
||||
point.\footnote{Lawyers employed by the Software Freedom Law Center,
|
||||
which is counsel to the Free Software Foundation and other relevant free
|
||||
software clients, were accorded limited access to the terms of the deal
|
||||
under a non-disclosure agreement between SFLC and Novell. The reasons
|
||||
for delay in the application of securities regulations requiring
|
||||
publication of the relevant contracts are unrelated to the deal between
|
||||
Microsoft and Novell.} It is a matter of public knowledge, however,
|
||||
that the arrangement calls for Novell to pay a portion of the future
|
||||
gross revenue of one of its divisions to Microsoft, and that (as one
|
||||
other feature of a complex arrangement) Microsoft has promised Novell's
|
||||
customers not to bring patent infringement actions against certain
|
||||
specific copies of Novell's SUSE ``Linux''\footnote{This is a GNU/Linux
|
||||
distribution, and is properly called SUSE GNU/Linux Enterprise Server.}
|
||||
Enterprise Server product for which Novell receives revenue from the
|
||||
user, so long as the user does not make or distribute additional copies
|
||||
of SLES.
|
||||
|
||||
The basic harm that such an agreement can do is to make the free
|
||||
software subject to it effectively proprietary. This result occurs to
|
||||
the extent that users feel compelled, by the threat of the patent, to
|
||||
get their copies in this way. So far, the Microsoft/Novell deal does
|
||||
not seem to have had this result, or at least not very much: users do
|
||||
not seem to be choosing Novell for this reason. But we cannot take for
|
||||
granted that such threats will always fail to harm the community. We
|
||||
take the threat seriously, and we have decided to act to block such
|
||||
threats, and to reduce their potential to do harm. Such deals also
|
||||
offer patent holders a crack through which to split the community.
|
||||
Offering commercial users the chance to buy limited promises of patent
|
||||
safety in effect invites each of them to make a separate peace with
|
||||
patent aggressors, and abandon the rest of our community to its fate.
|
||||
|
||||
Microsoft has been restrained from patent aggression in the past by the
|
||||
vocal opposition of its own enterprise customers, who now also use free
|
||||
software systems to run critical applications. Public statements by
|
||||
Microsoft concerning supposed imminent patent infringement actions have
|
||||
spurred resistance from users Microsoft cannot afford to alienate. But
|
||||
if Microsoft can gain royalties from commercial customers by assuring
|
||||
them that \textit{their} copies of free software have patent licenses
|
||||
through a deal between Microsoft and specific GNU/Linux vendors,
|
||||
Microsoft would then be able to pressure each user individually, and
|
||||
each distributor individually, to treat the software as proprietary. If
|
||||
enough users succumb, it might eventually gain a position to terrify
|
||||
noncommercial developers into abandoning the software entirely.
|
||||
|
||||
Preventing these harms is the goal of the new provisions of section 11.
|
||||
The fourth paragraph deals with the most acute danger posed by
|
||||
discrimination among customers, by ensuring that any party who
|
||||
distributes others' GPL-covered programs, and makes promises of patent
|
||||
safety limited to some but not all recipients of copies of those
|
||||
specific programs, automatically extends its promises of patent safety
|
||||
to cover all recipients of all copies of the covered works. This will
|
||||
negate part of the harm of the Microsoft/Novell deal, for GPLv3-covered
|
||||
software.
|
||||
|
||||
In addition to the present deal, however, GPLv3 must act to deter
|
||||
similar future arrangements, and it cannot be assumed that all future
|
||||
arrangements by Microsoft or other potential patent aggressors will
|
||||
involve procuring the conveyance of the program by the party that grants
|
||||
the discriminatory promises of patent safety. Therefore, we need the
|
||||
fifth paragraph as well, which is aimed at parties that play the Novell
|
||||
role in a different range of possible deals.
|
||||
|
||||
Drafting this paragraph was difficult because it is necessary to
|
||||
distinguish between pernicious agreements and other kinds of agreements
|
||||
which do not have an acutely harmful effect, such as patent
|
||||
contributions, insurances, customary cross-license promises to
|
||||
customers, promises incident to ordinary asset transfers, and standard
|
||||
settlement practices. We believe that we have achieved this, but it is
|
||||
hard to be sure, so we are considering making this paragraph apply only
|
||||
to agreements signed in the future. If we do that, companies would only
|
||||
need to structure future agreements in accord with the fifth paragraph,
|
||||
and would not face problems from past agreements that cannot be changed
|
||||
now. We are not yet convinced that this is necessary, and we plan to
|
||||
ask for more comment on the question. This is why the date-based cutoff
|
||||
is included in brackets.
|
||||
|
||||
One drawback of this cutoff date is that it would ``let Novell off''
|
||||
from part of the response to its deal with Microsoft. However, this may
|
||||
not be a great drawback, because the fourth paragraph will apply to that
|
||||
deal. We believe it is sufficient to ensure either the deal's voluntary
|
||||
modification by Microsoft or its reduction to comparative harmlessness.
|
||||
Novell expected to gain commercial advantage from its patent deal with
|
||||
Microsoft; the effects of the fourth paragraph in undoing the harm of
|
||||
that deal will necessarily be visited upon Novell.
|
||||
|
||||
|
||||
\section{GPLv3~\S12: Familiar as GPLv2 \S~7}
|
||||
|
||||
% FIXME: probably mostly still right, needs some updates, though.
|
||||
|
@ -3376,7 +4121,95 @@ the final sentence of GPLv2 section 7, which we consider to be unnecessary.
|
|||
|
||||
\section{GPLv3~\S13: The Great Affero Compromise}
|
||||
|
||||
% FIXME
|
||||
The main purpose of clause 7b4 was to attain GPLv3 compatibility for the
|
||||
additional condition of version 1 of the Affero GPL, with a view to
|
||||
achieving compatibility for a future version, since version 1 was
|
||||
incompatible with GPLv3.\footnote{Version 1 of the Affero GPL contains
|
||||
its own copyleft clause, worded identically to that in GPLv2, which
|
||||
conflicts with the copyleft clause in GPLv3. The Affero GPL permits
|
||||
relicensing under versions of the GPL later than version 2, but only if
|
||||
the later version ``includes terms and conditions substantially
|
||||
equivalent to those of this license'' (Affero GPL, version 1, section
|
||||
9). The Affero license was written with the expectation that its
|
||||
additional requirement would be incorporated into the terms of GPLv3
|
||||
itself, rather than being placeable on parts added to a covered work
|
||||
through the mechanism of section 7 of GPLv3.} However, we wrote the
|
||||
clause broadly enough to cover a range of other possible terms that
|
||||
would differ from the Affero condition in their details. Draft 3 no
|
||||
longer pursues the more ambitious goal of allowing compatibility for a
|
||||
whole category of Affero-like terms. In place of 7b4, we have added a
|
||||
new section 13 that simply permits GPLv3-covered code to be linked with
|
||||
code covered by the forthcoming version 2 of the Affero GPL.
|
||||
|
||||
We have made this decision in the face of irreconcilable views from
|
||||
different parts of our community. While we had known that many
|
||||
commercial users of free software were opposed to the inclusion of a
|
||||
mandatory Affero-like requirement in the body of GPLv3 itself, we were
|
||||
surprised at their opposition to its availability through section 7.
|
||||
Free software vendors allied to these users joined in their objections,
|
||||
as did a number of free software developers arguing on ethical as well
|
||||
as practical grounds.
|
||||
|
||||
Some of this hostility seemed to be based on a misapprehension that
|
||||
Affero-like terms placed on part of a covered work would somehow extend
|
||||
to the whole of the work.\footnote{It is possible that the presence of
|
||||
the GPLv2-derived copyleft clause in the existing Affero GPL contributed
|
||||
to this misunderstanding.} Our explanations to the contrary did little
|
||||
to satisfy these critics; their objections to 7b4 instead evolved into a
|
||||
broader indictment of the additional requirements scheme of section 7.
|
||||
It was clear, however, that much of the concern about 7b4 stemmed from
|
||||
its general formulation. Many were alarmed at the prospect of GPLv3
|
||||
compatibility for numerous Affero-like licensing conditions,
|
||||
unpredictable in their details but potentially having significant
|
||||
commercial consequences.
|
||||
|
||||
On the other hand, many developers, otherwise sympathetic to the policy
|
||||
goals of the Affero GPL, have objected to the form of the additional
|
||||
requirement in that license. These developers were generally
|
||||
disappointed with our decision to allow Affero-like terms through
|
||||
section 7, rather than adopt a condition for GPLv3. Echoing their
|
||||
concerns about the Affero GPL itself, they found fault with the wording
|
||||
of the section 7 clause in both of the earlier drafts. We drafted 7b4
|
||||
at a higher level than its Draft 1 counterpart based in part on comments
|
||||
from these developers. They considered the Draft 1 clause too closely
|
||||
tied to the Affero mechanism of preserving functioning facilities for
|
||||
downloading source, which they found too restrictive of the right of
|
||||
modification. The 7b4 rewording did not satisfy them, however. They
|
||||
objected to its limitation to terms requiring compliance by network
|
||||
transmission of source, and to the technically imprecise or inaccurate
|
||||
use of the phrase ``same network session.''
|
||||
|
||||
We have concluded that any redrafting of the 7b4 clause would fail to
|
||||
satisfy the concerns of both sets of its critics. The first group
|
||||
maintains that GPLv3 should do nothing about the problem of public
|
||||
use. The second group would prefer for GPLv3 itself to have an
|
||||
Affero-like condition, but that seems to us too drastic. By permitting
|
||||
GPLv3-covered code to be linked with code covered by version 2 of the
|
||||
Affero GPL, the new section 13 honors our original commitment to
|
||||
achieving GPL compatibility for the Affero license.
|
||||
|
||||
Version 2 of the Affero GPL is not yet published. We will work with
|
||||
Affero, Inc., and with all other interested members of our community, to
|
||||
complete the drafting of this license following the release of Draft 3,
|
||||
with a goal of having a final version available by the time of our
|
||||
adoption of the final version of GPLv3. We hope the new Affero license
|
||||
will satisfy those developers who are concerned about the issue of
|
||||
public use of unconveyed versions but who have concerns about the
|
||||
narrowness of the condition in the existing Affero license.
|
||||
|
||||
As the second sentence in section 13 indicates, when a combined work is
|
||||
made by linking GPLv3-covered code with Affero-covered code, the
|
||||
copyleft on one part will not extend to the other part.\footnote{The
|
||||
plan is that the additional requirement of the new Affero license will
|
||||
state a reciprocal limitation.} That is to say, in such combinations,
|
||||
the Affero requirement will apply only to the part that was brought into
|
||||
the combination under the Affero license. Those who receive such a
|
||||
combination and do not wish to use code under the Affero requirement may
|
||||
remove the Affero-covered portion of the combination.
|
||||
|
||||
Those who criticize the permission to link with code under the Affero
|
||||
GPL should recognize that most other free software licenses also permit
|
||||
such linking.
|
||||
|
||||
\section{GPLv3~\S14: So, When's GPLv4?}
|
||||
\label{GPlv2s14}
|
||||
|
|
Loading…
Reference in a new issue