openssh-5.8p1-11.1e>UA/šZFM=?Vc$jxHVГ"*!sqK>@M?Md   K  )AGN B  x5 L5  5  5 5 5 555 5///'((80"9":!"=F>F?F@FFF GF45HG5IG5XHYH \H85]I 5^KEbLvcLdM~eMfMlMzMCopenssh5.8p111.1Secure Shell Client and Server (Remote Login Program)SSH (Secure Shell) is a program for logging into and executing commands on a remote machine. It is intended to replace rsh (rlogin and rsh) and provides openssl (secure encrypted communication) between two untrusted hosts over an insecure network. xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can also be forwarded over the secure channel.Vcmorla1+SopenSUSE 11.4openSUSEBSD-3-Clause and MIThttp://bugs.opensuse.orgProductivity/Networking/SSHhttp://www.openssh.com/linuxx86_64getent group sshd >/dev/null || /usr/sbin/groupadd -o -r sshd getent passwd sshd >/dev/null || /usr/sbin/useradd -r -g sshd -d /var/lib/sshd -s /bin/false -c "SSH daemon" sshd test -n "$FIRST_ARG" || FIRST_ARG=$1 FORCE_YES=0 set -- ssh sshd PNAME=$1 ; shift INSSRV_ARRAY="" while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 shift SV_B='^### BEGIN INIT INFO' SV_E='^### END INIT INFO' SV_KW=Default-Enabled SV_VALUE=`sed -n -e "/$SV_B/,/$SV_E/{/^# [^[:space:]]*$SV_KW:[[:space:]]*\([^[:space:]]*\).*/s//\1/p;}" < /etc/init.d/$SCRIPTNAME` test "$FORCE_YES" = "1" && SV_VALUE="yes" test -n "$SV_VALUE" || SV_VALUE="no" INSSRV_ARRAY="$INSSRV_ARRAY $SCRIPTNAME $SV_VALUE" done TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi set -- $INSSRV_ARRAY while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 SV_VALUE=$2 shift 2 test -n "$SCRIPTNAME" -a -n "$SV_VALUE" || { echo "SCRIPTNAME or SV_VALUE unknown"; exit 1;} if test "$FIRST_ARG" = "1" -a "$SV_VALUE" = "no" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} -r /etc/init.d/$SCRIPTNAME elif test "$FIRST_ARG" = "1" -o "$FORCE_YES" = "1" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} /etc/init.d/$SCRIPTNAME fi done test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" = "0" ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_STOP_ON_REMOVAL" != yes ; then for service in sshd ; do /etc/init.d/$service stop > /dev/null done fi fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" -ge 1 ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_RESTART_ON_UPDATE" != yes ; then for service in sshd ; do /etc/init.d/$service try-restart > /dev/null || : done fi fi /sbin/insserv /etc/init.dPs  0ʰce3%xpQV>>  a 5u+*s4"+큤A큤A큀AA큤$$$$$$$$$$$$$$$$$AM>V[V[V[V[V[V[V[V[V[V\V`V\V\V\V[V\V\V\V]V\V\V\V`V]VaDMKO M4DMKOVVAEV[V[V`V[V[V[V[V[V[V[V[V[V[V[V[V[V[?W?V[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.d/sshdssh.1.gzrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-5.8p1-11.1.src.rpmsysvinit(sshd)opensshopenssh(x86-64)    @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ /bin/netstatpwdutilsinsservsedfillupcoreutilsgrepdiffutils/bin/sh/bin/sh/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/bin/shlibaudit.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.8)(64bit)libcom_err.so.2()(64bit)libcrypt.so.1()(64bit)libcrypt.so.1(GLIBC_2.2.5)(64bit)libcrypto.so.1.0.0()(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libk5crypto.so.3()(64bit)libkeyutils.so.1()(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)libnsl.so.1()(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)libselinux.so.1()(64bit)libssl.so.1.0.0()(64bit)libutil.so.1()(64bit)libutil.so.1(GLIBC_2.2.5)(64bit)libwrap.so.0()(64bit)libz.so.1()(64bit)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-1nonfreessh4.8.0V@MK@MJM=iM-L@Lr@L@LZ@LL@Ls@Lnn@LH2LEL+1K/K;@KыKP@K@KK @K@KqK'z@JjJ:JY@JS8JPJ;}JIX@mkubecek@suse.czlchiquitto@novell.compcerny@novell.comlchiquitto@novell.comsbrabec@suse.czlnussel@suse.decristian.rodriguez@opensuse.orgcoolo@novell.comjengelh@medozas.decrrodriguez@opensuse.organicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czmeissner@suse.decristian.rodriguez@opensuse.organicka@suse.czanicka@suse.czmeissner@suse.deanicka@suse.czcoolo@novell.comaj@suse.deanicka@suse.czanicka@suse.czjengelh@medozas.deanicka@suse.czanicka@suse.czcoolo@novell.comllunak@novell.com dmueller@novell.comcoolo@novell.comanicka@suse.czlnussel@suse.de- CVE-2016-077-7_8.patch: disable roaming code to prevent information leak and buffer overflow (CVE-2016-0777 bsc#961642 CVE-2016-0778 bsc#961645)- Update to 5.8p1 * Fix vulnerability in legacy certificate signing introduced in OpenSSH-5.6 and found by Mateusz Kocielski. * Fix compilation failure when enableing SELinux support. * Do not attempt to call SELinux functions when SELinux is disabled. - Remove patch that is now upstream: * openssh-5.7p1-selinux.diff- specfile/patches cleanup- Update to 5.7p1 * Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. * sftp(1)/sftp-server(8): add a protocol extension to support a hard link operation. * scp(1): Add a new -3 option to scp: Copies between two remote hosts are transferred through the local host. * ssh(1): automatically order the hostkeys requested by the client based on which hostkeys are already recorded in known_hosts. * ssh(1)/sshd(8): add a new IPQoS option to specify arbitrary TOS/DSCP/QoS values instead of hardcoding lowdelay/throughput. * sftp(1): the sftp client is now significantly faster at performing directory listings, using OpenBSD glob(3) extensions to preserve the results of stat(3) operations performed in the course of its execution rather than performing expensive round trips to fetch them again afterwards. * ssh(1): "atomically" create the listening mux socket by binding it on a temporary name and then linking it into position after listen() has succeeded. * ssh(1)/sshd(8): add a KexAlgorithms knob to the client and server configuration to allow selection of which key exchange methods are used by ssh(1) and sshd(8) and their order of preference. * sftp(1)/scp(1): factor out bandwidth limiting code from scp(1) into a generic bandwidth limiter that can be attached using the atomicio callback mechanism and use it to add a bandwidth limit option to sftp(1). * Support building against openssl-1.0.0a. * Bug fixes. - Remove patches that are now upstream: * openssh-5.6p1-tmpdir.diff * openssh-linux-new-oomkill.patch - Add upstream patch to fix build with SELinux enabled.- Removed relics of no more implemented opensc support.- add pam_lastlog to show failed login attempts - remove permissions handling, no special handling needed- Use upstream oom_adj is deprecated patch- remove the code trying to patch X11 paths - which was broken for a very long time and was useless anyway as the Makefiles do this correctly themselves- Use %_smp_mflags- Fix warning "oom_adj is deprecated use oom_score_adj instead"- actualize README.SuSE (bnc#638893)- update to 5.6p1 * Added a ControlPersist option to ssh_config(5) that automatically starts a background ssh(1) multiplex master when connecting. * Hostbased authentication may now use certificate host keys. * ssh-keygen(1) now supports signing certificate using a CA key that has been stored in a PKCS#11 token. * ssh(1) will now log the hostname and address that we connected to at LogLevel=verbose after authentication is successful to mitigate "phishing" attacks by servers with trusted keys that accept authentication silently and automatically before presenting fake password/passphrase prompts. * Expand %h to the hostname in ssh_config Hostname options. * Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8 keys in addition to RFC4716 (SSH.COM) encodings via a new -m option * sshd(8) will now queue debug messages for bad ownership or permissions on the user's keyfiles encountered during authentication and will send them after authentication has successfully completed. * ssh(1) connection multiplexing now supports remote forwarding with dynamic port allocation and can report the allocated port back to the user * sshd(8) now supports indirection in matching of principal names listed in certificates. * sshd(8) now has a new AuthorizedPrincipalsFile option to specify a file containing a list of names that may be accepted in place of the username when authorizing a certificate trusted via the sshd_config(5) TrustedCAKeys option. * Additional sshd_config(5) options are now valid inside Match blocks * Revised the format of certificate keys. * bugfixes - removed -forward patch (SSH_MAX_FORWARDS_PER_DIRECTION not hard-coded any more), removed memory leak fix (fixed in upstream)- hint user how to remove offending keys (bnc#625552)- update to 5.5p1- update to 5.5p1 * Allow ChrootDirectory to work in SELinux platforms. * bugfixes- Disable visual hostkey support again, after discussion on its usefulness.- Hardware crypto is supported and patched but never enabled, need to use --with-ssl-engine explicitely- fixed memory leak in sftp (bnc#604274)- honour /etc/nologin (bnc#530885)- Enable VisualHostKey (ascii art of the hostkey fingerprint) and HashHostKeys (hardening measure to make them unusable for worms/malicious users for further host hopping).- update to 5.4p1 * After a transition period of about 10 years, this release disables SSH protocol 1 by default. Clients and servers that need to use the legacy protocol must explicitly enable it in ssh_config / sshd_config or on the command-line. * Remove the libsectok/OpenSC-based smartcard code and add support for PKCS#11 tokens. This support is automatically enabled on all platforms that support dlopen(3) and was inspired by patches written by Alon Bar-Lev. Details in the ssh(1) and ssh-add(1) manpages. * Add support for certificate authentication of users and hosts using a new, minimal OpenSSH certificate format (not X.509). Certificates contain a public key, identity information and some validity constraints and are signed with a standard SSH public key using ssh-keygen(1). CA keys may be marked as trusted in authorized_keys or via a TrustedUserCAKeys option in sshd_config(5) (for user authentication), or in known_hosts (for host authentication). Documentation for certificate support may be found in ssh-keygen(1), sshd(8) and ssh(1) and a description of the protocol extensions in PROTOCOL.certkeys. * Added a 'netcat mode' to ssh(1): "ssh -W host:port ..." This connects stdio on the client to a single port forward on the server. This allows, for example, using ssh as a ProxyCommand to route connections via intermediate servers. bz#1618 * Add the ability to revoke keys in sshd(8) and ssh(1). User keys may be revoked using a new sshd_config(5) option "RevokedKeys". Host keys are revoked through known_hosts (details in the sshd(8) man page). Revoked keys cannot be used for user or host authentication and will trigger a warning if used. * Rewrite the ssh(1) multiplexing support to support non-blocking operation of the mux master, improve the resilience of the master to malformed messages sent to it by the slave and add support for requesting port- forwardings via the multiplex protocol. The new stdio-to-local forward mode ("ssh -W host:port ...") is also supported. The revised multiplexing protocol is documented in the file PROTOCOL.mux in the source distribution. * Add a 'read-only' mode to sftp-server(8) that disables open in write mode and all other fs-modifying protocol methods. bz#430 * Allow setting an explicit umask on the sftp-server(8) commandline to override whatever default the user has. bz#1229 * Many improvements to the sftp(1) client, many of which were implemented by Carlos Silva through the Google Summer of Code program: - Support the "-h" (human-readable units) flag for ls - Implement tab-completion of commands, local and remote filenames - Support most of scp(1)'s commandline arguments in sftp(1), as a first step towards making sftp(1) a drop-in replacement for scp(1). Note that the rarely-used "-P sftp_server_path" option has been moved to "-D sftp_server_path" to make way for "-P port" to match scp(1). - Add recursive transfer support for get/put and on the commandline * New RSA keys will be generated with a public exponent of RSA_F4 == (2**16)+1 == 65537 instead of the previous value 35. * Passphrase-protected SSH protocol 2 private keys are now protected with AES-128 instead of 3DES. This applied to newly-generated keys as well as keys that are reencrypted (e.g. by changing their passphrase). - cleanup in patches- do not use paths at all, but prereq packages- Use complete path for groupadd and useradd in pre section.- audit patch: add fix for bnc#545271- do not fix uid/gid anymore (bnc#536564)- select large PIE for SPARC, it is required to avoid "relocation truncated to fit: R_SPARC_GOT13 against symbol xyz defined in COMMON section in sshd.o"- add new version of homechroot patch (added documentation, added check for nodev and nosuid) - remove Provides and Obsoletes ssh- make sftp in chroot users life easier (ie. bnc#518238), many thanks jchadima@redhat.com for a patch- readd $SSHD_BIN so that sshd starts at all- Added a hook for ksshaskpass- readd -f to startproc and remove -p instead to ensure that sshd is started even though old instances are still running (e.e. being logged in from remote)- disable as-needed for this package as it fails to build with it- disable -f in startproc to calm the warning (bnc#506831)- do not enable sshd by default/bin/sh/bin/sh/bin/sh/bin/shmorla1 1452862563 hC h? h@ hA h9 h< h: hS hV h_ hd h6 hh hl hp hH ht hx h| h h h h h4 h ' / * . + , ( ) - h, h- h( hQ h* h+ h) i1 hK hI h0 h/ hR h5 h1 h. h3 hG h>5.8p1-11.15.8p1-11.1 sshdsshdslp.reg.dssh.regsshmodulissh_configsshd_configsshdscpsftpsloginsshssh-addssh-agentssh-copy-idssh-keyconverterssh-keygenssh-keyscansshsftp-serverssh-keysignssh-pkcs11-helperrcsshdsshdopensshCREDITSChangeLogLICENCEOVERVIEWREADMEREADME.SuSEREADME.kerberosTODOscp.1.gzsftp.1.gzslogin.1.gzssh-add.1.gzssh-agent.1.gzssh-copy-id.1.gzssh-keyconverter.1.gzssh-keygen.1.gzssh-keyscan.1.gzssh.1.gzmoduli.5.gzssh_config.5.gzsshd_config.5.gzsftp-server.8.gzssh-keysign.8.gzssh-pkcs11-helper.8.gzsshd.8.gzsysconfig.sshsshd/etc/init.d//etc/pam.d//etc//etc/slp.reg.d//etc/ssh//etc/sysconfig/SuSEfirewall2.d/services//usr/bin//usr/lib64//usr/lib64/ssh//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/openssh//usr/share/man/man1//usr/share/man/man5//usr/share/man/man8//var/adm/fillup-templates//var/lib/-fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Evergreen:Maintenance:363/openSUSE_Evergreen_11.4/dbc6fea37a4e5d98d3bc1c7339d1cd5d-openssh.openSUSE_Evergreen_11.4drpmlzma5x86_64-suse-linuxpFpEBd]?]"k%Q.5oj{6oqӌ= M}W[vg:uhQ=%h*~SgmfPyP]"YH\To1I(nTXn_?]~? d9|%:eg'$=D,yAmKtGyA2*=mz6y1RFټ Ke,e#m~Nܥa&N̂*<ڀjavʑQ]Эdt XbNm#B xz,NV 鎽FPmfIthX g>zLc,em`v8\Wy2T\R NCa;*C;fa_}Ea?kw VyL0ZcE sLla.\QćumT4G;y,vZcWbbؕ&<9ix;*^ktZ?{iXxwζ^U7GYVL{u4`<|yp=6IPloNlѤ05łs|k^FR@ ~ 글搗r1fkfd}` T<Ӆ ƣg b* aob~涏hn4G' (A2-/Ep<)8E}wK--M#\Rd_Nk^+E߄A$\`r ;rY[} wE{d>zK.̽}$ oDRp 4 4W0ӾT 0rxikBXO퉇ai2<+ZdmTM6 .0D5򭼚y`"^<@ gw3vP{T#L 6>4 {hGjpt/٩o#gKo%Ǿ$ٛ]D/CD8^6X Dih)X&u4KQm*v#Lse3NZÐ4 xviͼG\6Suh-wl_K?)/~}JyVڕH=2b`).f?`9^6J[dyy}d~ʼX2K{;+FǞ"c)gib3c Wr;Cϋ:ֱsĿJ뼛/ZAvlQ:m~V%Gg|rFBGCWSE G Tbl3bm}]'f᠚&EVZ&4qr 4}c尐,ՈW% ;+8sF+n8P=Hq;IIq H i우};B=<"QFj{\ӡGD!}6ΔzO&caw>}"bKR$hJ3< hN Ϳ2(-h&WrߐR}˝x\E6Bj+1X*`ImnAje(lxX\ (MT*;aȐ{,=(-9\v7Y_ ;"~6d=T'C A̠}FYލbJ^D0 å_{^P ov&>bP{wOŁu9=)?w+g֟ .!dlQRɔM7@zAzg"a%Т⡔аqvg%i c/y$MͺͦHNfojǪ #I@Qֈu}J];'nf^4ɵ0d1G7MPT1 UqX+}dU@=,UY[w*d>8z@ WW: (J Q{T0a$v _\]9u$OE2 ,} g+7e l2c`˛~R?/'`ZR{G풡?d;nۻNşmdxBcf/oyE5hZ Q)F')VlkAkSϹ5uida`Fw&fC*ZLxڑ+$0MwY.>,l7 2X-jC$kw  jn {tGk;C>39dA.'O5jPlÝ%Τ2?\U؅,5>6(?/DIT=^@vv9uOOqAc֍a]vRenE}%N Op O~3`_Zdu_YVl߅џ(kyľPjZ:uBzKP! y"!\#XX@P3A;]unS U:;0qt@NLQ!4m9Ehei;1uovA҃c P-Jϟl]'xobs^ WtUɪL$A%ޅĵ1Ko sv5pz^Nn>zRl!8ښy‰Ъq»Սog1hWN=== IqNQJuɕ+a3Rm>$Uo0C,&pW+^"_YCSJ(-X>tBTPК++mynf"n6?zt_}aKٹr"L\=tн22 Jd17}w CCü9 HqߖY5Ybwp+e goDK$بNzn|_(-! ܫJۺk+_f>6Bu+5}ʊl_:)~nhaTX VSl;.qZZhF̳Y"]dӚ9YN|}$eUZ4 "(\~?lD2eO[k]7l^w"\ B>5 5ۧ†C{dmGV UR[T\wNL,i;$RRqqwYT^e0=xӕ A_~s8b}n#MGQv i+ŨY>CEjiVe4s(pG‘+p-JmcE/h%5s?7奠+ FRp~RP}?E[ sUaC\G͎XKqQ3XJ˜S~5/ka(ImaCLU;@d{^W(iM݋u:zSgqŔ]Ut~Cqf6KxD&6 dHmyLJ aN6[4cN:"Rյ(C0qqg1I&ƺ42/O}ٞY()]y} k:X |+ּZ' 3 [b:C0(HnMw^" sG >6Wy0)JJؒX˳ͅ?HU ;CkAmM(#,s# ?)ߪ_5̒yC4$gPLyuV`oUwJ0xl5K1ו+[ ;KtT7j8s |Ej 7YnAX7X])!c,pfP[gʻPpCK1S'"5 ~(i֔{;jA\sޏ`(p7 E+AA_c/Zcl`y1Ivu1@Օ"T,=.O0A//oAFE5KH g7PyM3T;_>X.fiqXu%Vx%BI~cU "P9; ijZ 2s íO(j nB `` {ߺ=i$Gr ~@%4Ws&^@TR1<(!ix(k(n4Z[޻j&vgԙɕOрfJz8jW+ފ-`W b'z#7W5@>Qj;+(N NFUŘfEek,BA 񑿱hK1bD3UIY2#=#%f^~}AgH;mRg<8,洚GNUvFkb"|SQCERA㪭oj+[mYP\BoJ [qg~0c*̠YҶ3)O\.Bdj+).5ˡg%Z=$sv1Zv3E+8G1S%hWKoQ~&5t*2i@!S*0&e \he+;'.x04"Qu`>emd,7/DF 䄻2gh&h-H*m`l&Os8Z"+a!_4Pϝ@Dk%`7Ur\}ʂPjœ2GP;^! z"a܄s/J|~qt-^ ym3q\M]#g;'I82:4 Fpyv\4<+=c[nv~i%UdsOȾ%ܘ3 | A1O0LU 0># xE>Zjq5R@zA={Xĝwj }"﬷ˉ&L:Qriq.+OA) A)~Q ḣYjZKv-K!-6z$l+gšI&\Q"mfXZrjfG$aT'PR$ǦQJf8fEߧev'TBHIxtr[ŽaVFCk9,X?iVM1Dw 2nC$2*pI}="rh-1]<=ph *<'.ed![KɘvI.OJokm܇%HZ,BJx>` O eCO|D6Oz Lb®=mLKo1C )0foExZ嗽Xy~|VrAjœ3\r?{FT֗H_2><9{#BE){$'D$ve  @Bq\~7?-yoi\n+gNLՈ6 䝢Z81)2֫N8|`e5vêIVQ>4}a>!NSDRꕿ=3r;kכi20&%H Z m?mndMO+vjևWzʴX%4w:tBt\ 0ݺ$"bPҬ҄M;#T>劁ԥg2;ty"vM]ӎ](PNa[I|lތ7TJvF3vɦ7Jp +dۦWk^-X\X %%G$FҲi'E Ywhk?mA sACLnkݝxEudFL`.u;½;f3/x M'-B%mQI٩'_ԩNz~;'6g[ ݄H*ز)c1QHsR )hSuO5ҚHd.DT\Z/)'1pt6rVÈcj dز[TrE[ƿ&Z<ໞ LMѲjv6vG#DZC ɮ օ,UTP2h\]q9Etck-A0Wӕ(s]ÈPg#oEgttpJ ߤFYV%k1Y}h$t&<)Vc}Fbر"{:Ca/'H:0jqRq/eO"w"#W&hzmi&@uqZ¦g+d!EVDM1Ay=wy`;bm2DE~\{;kHhмLrÀE&(XQ+rzS}cxjQSC4:CğP.5G~)4;b D0!30{Pp)a^?Cl}/e9E{1/ͿP= ~/LlN 'Rub}(-E'PdBI`@v D}/פ ~qū] TH122Qm9vjmaROyvHz4t0*) ob~ے]kn=ծ7 (W.X V L}#C1~`D Aiɣ.PFh. '.cR݁E \7 #6@1T/4a^{ uVGAV =r/>TPC(ՄK͸+QVT.e9>VAga :sͩ8mt1Ħ Zk h hi!7۹^Q1X!̎n1lϝC$r!J$⁉kAèrƛ8Q8[z;;#g+ Hma~Jī m7{fQaʯbQ'Q^2 *?e˔00|OPUOM(XbZ/|pџyb&J4ؙ5g"FI:qt?1]5ۭNvrKiץ3qT]s{(?\@,?.T1K<у(ULss;VY8t2]!~zpf£Kehop*e<`Ϝ_^`SCO"&攇m$!BZo[%y.z\[43u>͉8ٵ.Ё^q?dϴ$FhĀZxS L1wLzy~ ̚Fo16myrlg8$kC2to<"u֜X'>5߮h >&ӑETUvسƽ1S sV@ T`bkFI`I]1ȗCY4s&>XY^pbbԍOe7T/`$tD^D[k V:D\u<]mvp1`{ ^~7 5t]eP9W+GvZ`tEjZ>\m$&*>Kjƪ3ޜ^7a۰y'OP>[3E!52yj%};EB?;'e/@LU]c̛[s膮ˏ/-zK^aUb9s;I|<&LOk4$ 6~bawUr )wU;*c\[$r2:2訐)yW~4G<.1-#uR\qHc?,/0p>/V?_#, arf$ E-Y3U)}IJ9U0x.|=a)@HvXFoC}K#1[.VJ9%|Yޅe5=oRˌa쎯1uֲ׸6Nu ZBDNH<rٗdi ĶݲAVDh0U*K$A|]զLJ}ʡ1r9=# }MZi ~kK,wt/n*:a+RSީɤ[C[6Ug**Ә+~操 !%HhIy[vUJb̤}0f3YVKbZDN8%VOܣ @H?vТKt{\׉Y|ңx%?3w*J|ևZEnhqt=9^{x^/s8# -]6q /0kVUZL5lZV}Q-1 87J&ɐl#;H*8N`A:u#"vg=L(#:%wĠYU`l"6ر|]C.;L);5\Wٛ꺮ǜh)ug+R-ELuxY qo410Ciy/p ڴf'%X^Z.C.O{!dh' ;(mcTgYpc {`^5(їWZ8&a0PYSAR8n+3[[/Aߠ'WH%ȤJe!Ee;Ov57>wjd^`IsnF)hWtpw^3Wz2f9P^{ ;sJ@,FFD⻎Qz@,x[Eoܦ`(>FAV&DgC֨?13.& p-0 2 meBi=S9zOM _ؼֹEe i s)UHSTCy .,VIaFij؛&3>o?k*G9d$}!fNoA ]fVc#ewBۄb-? 愰`} l{CCmԂhM0ɀ[: edzoA-di)?6RTsĤ:f'jfedia[ՕSXݗA0YX?HxTt ?>2A0cɼi&rt 邇9&6or?McŽm{zLڀ_Fb00Ner':ǣL[!$W2KǼc|[V,4\@$ (͊͊l%Bm]XD,<mSbz(wLElNvn6X/2YZW1`pZJ`2/!7t[$RS\x}>U^\cI17*ӆS FWss]LFSyf2z>Dg=tq;-o^]ψr)ckVJ_t4Id4KK(AٳR8~"RPKgQV(WeK\B,=7ېFMz`7~DooM!Ή~׋y _go A}F|t6fX7J9J 2' މ2SL;}o<`=!uHMcomȦ7ebFM@Ζ*`[\AJ݇ r$5:V:, yLau;#|4 4,Fr>ڹCw^a=U/}-5蚝sfư!*ɠ}OMgW1Niвű VȘ) T3G GЉu,Y Ao@gî(-G6Z=N[ѷ~l~QI:(^S\$bDy uJ+kkOklx6ްwJa̹Q*;vW) -|lr:lVɖ2/̙Qve7wgJ!=lBg I˯Me\+3JZSf'a&xRAьV/B= ;6& &YUoΉ^wv: 7jpʡZkNY/:y[1il,sS&f4-IUfQ_:']Iy%%Tdd:VI,-^`뮩ٽ*mxtn #񑨄?` ~ {h$!L*x,seŒ<4##`N|1j#qLSqk5}k`btܙs5lo7m!FLWɝb+W ,G347eMϛ]h eʸ5Qn.=e9 6F^ f͆<|9ѐhك l@aʛ z As FBZ}JճG_& ܫiuy+viR}so7`ICb脏CDK9tYշxJ 0Du669Z+6 UXy̌003%n,YE hSY$NZ߉V-)𗕳· 0&@# ~Jϖ5d"/qţ~YW_ʪ÷둜FΣ,ѺQ7O4/$ن6ޙ+|@D3[.^6*:BoiQue1 flRq&)>#:@LKi[* <٤!+A8C3|ԚdHeΞDU'֯I|ij7%u^50nkLdOE Rx}U Q ]U^40<ʶ@%Q#>vª[?/F ֔["m5oc=܉a( zK{مJ^5B382(Fmi>ygr{< H;ܟ~?ѶX0%~FLw큣fF&>l :^(#]g>F=eUiEn)ZZ 03 YALC]/߽Z 4k3?OM whF#5'j'4 \ BY!luhSpLrT;mQX?:7F\Z_SpNBLeX:?a9rԽgLHnwW +'»|4nVx97Jx:> ζSSܵ~f M@fYkMr,&8)QQ[!,6_q\`,K6i,tN/F: 3/ě= m_vpa^v^WgWBY~`tDNrP)T[Q- ) ZkO XiGႇĪsvtaWQRiOL pCq ٱbB$&%sʾD4œU%oG8]wjawL_&t^ǟ~`-̡l=x72Np "#+;7hZ4rf +H9[t%x]ȲQf hKA!#lyp6,!zryx—U&8bbG[mVYg2*6kt܁z"֑<ÉTcʗ?ӯh%-57sjcz66^:|2oi}Nd}!ŴCZ:6+/!eG7Q^2@@eWHBR.>X5 Ȼ#8Gdۣ_TjkjYF|$DgbR CVb#$oQE.'Uy (!ЕyWAꌉ+U搓x=WظOo;s0$z#FZQ0Yz#jϟXV\2좊#^-uFRQ#X!:RO)qnФM;G>P?6}eڬsɆL79q*Rg ֎Gwaԩľkx$OOSf*҂Ou)ԛK֢cPxE>{*Z@,l6je'HrUXH?ݯHj$䇩~`PiBB+'`$ 6P@8_[ۣs>(g񝀊}7h/'U5O΋6%;)5[ ew9ڶV{ׁeH_ˁܛt 4zd- C"N\}b쪝 >gn4X`6~Sgh&pω edfTŜ}q˴a|A+f(CP( YXO)uTi01} [K_G#/a3g II\aa-*XzyDe w.N_Q$XzU"+a;h8ҕ vu2,Eg%mE_ ]AtMG җ9b_!ˡE2(ѳޘ<3!W` \_0&Y-r>ݍO! =}RTLpwQt SZYNt.+gppjG_Q\4.F;ys cOs`c-m!uFFGlgg=`G(&ᤏ!GHJqO3YfI&k6l7-N4W,W Le?+V!s_(_ A3„=?NМrɊN`Ľ5IXp+ hp9Ij9դ1FK;;~NHoue饣2V_z8Ss&[/٢:m2x!p=eDž{f_K@3noE'r" yL ' QaBc3AEcLxml(qg UћaO&ןf !i -l μb+X,o^%e/Xu)Jɗ#gp&$g7#)UW?Leб; w㐑ށ:zwsMXfyO`-LoSpl3ᅁY9Qbsɋ NQwh0s='* Šxe8 0JQUzvA&.rmMܙk@d<888! *CkJ&DDk窯͹NC(* 3{ TtV0qڥS7[M3"^c˝\Zm~& M8~>n7NQ+z ^{%; _K4WɅ>B;j +(σ!B0̽ؗaL'7rFGW39A"}pFخhk FMJp /NpTg1f:Ex`BU1ЋUi9HG yeVKW2A-@E8Ԧt(:$ U&xRK!QW Jخ6or N3TRލ~zTe;4qSu Nkt+1ÿQI4[>qHE6>ҪL#f{x6ѐ 9:q]vyB:B-gy'6  $9D+42WofFw̼'/_f$df[Rk}>'v`.u,`я [.l[#Z76vzrvj\9C͕:_m#SLjvrɢ݊6l:绾אD0ڂt<y8#8,Z`^ NJ7ڠl@"Y8U# :_^#%}#Z:V]"EA2PCũâbK= ɊŤ ~2as?) ޸-.Qļx>,ц:7dFN74cŊ,ie>ʼ.⥴𼋖EX,BAZPm2,`8 Xy9YYޢH#;y)FOעe[Or$K weFJ_ ϐG7=m0Qb/E KM5}cG ERi-<=}Kg[*j8S YV0Պ$2GKC3$ 4Mj-?y ϰZRhj}!d=xapGBe#[C]$)!{J}N2eB l7:vo 8^+;l 蚻lFP%z!7d| m(P5-l/F4;c ɐ.LC烉B3O ŪoD(-SXE*_31sm5\F*\jDy ~,%)wa=P`WqO kOg%H7%!)Wbs6` k;cg2t"j}%z{)3=9LK'(0w` y@)>M H`HZK@ ^T'g4{}ceC;8/HR9k(L^5ZM^ Mx#n3:f%L5(⏽h3+O=MuShVYT;Z(1a;xѥ{yV7KUKw֌jg#Eez<c.c(O.ZRb[sD4Ƣ9+\*@G[] yw02j`&],T;LJ{`p7+Bݮ}e6Rbe3yOVJ@=铁 "hMN0aSW2K`S_jlb(F1F 7HhpBWx3뭧P~K=$) GG\ ?Č:"vڨSǔkWNŬ-z¬vyBŠۿwk,m[#f8=Sv?DsD<:bNCd x? t3a2$A]dys~:(|'m)F. 2q]lQ6x8)xWGNmO6r?ng? .T+/j4VuEsEQU}0a\g1m,æֈ[5ꪴ_a"g$N]Ӊ#PPo=<=>[ ; 8]J0C.W`5'Y}\.bQ@xL GqHZf猨 %^v,T_cD+p k @[۞jT/u~*{neOΙHʈlcR F~vOj_U |@5y2.,si4S7y@O[1YN@2 -$Q+yѝn&o O&lUncIHV[ L|bk&Ad뢦6ϾZ~AfweIu<.+6seB!r+ ` i~RX1uM?/O{d65Qr}My Ccݑ_NvJ.[ 4-"Ӈ^UAQ[>~'k, S]F½mKda鴈Tdτ;tm@E!zaA1PНͽLBF9Qmb)4yᶨ^> T6*}^ɁaBp(,|6[22rtDJo ԂUӒO``yF1]E?yYQ(>ϛ(۰_3L(32~0;)fⷡސAZUC>u3IfNb@W0B3h7Zj{.Q󤅓2(Q"u 1>G'S}!Zq}]HvwͲGHZ[ufS 3]m)8LU X8˫xQ8Ɣ6ϼG(K7D]3D(=L~ɡ0PR}&'/LNw,̮zQ\`vnʮ@ ۾]yӗ^K+C{W\p|q+tr#CpAo3/4H `y_֢͌x>> X,Ct^^`-Ѣ4k&\\8Q=TYSY {;a_!&ʖ*|C{ZE瞗3ߜ7+փ;%UZo7ڜd3!inqQ}VD塸cy8*?qJ%7a5A=9w Y݃o5 {#`k GIeD,@4EOiRq [)HQ;ԓ44Θ)KīOvUgxINy^ǖ$ܷgv)qӌ +]EC|Gͯ# eSq+q7 uh%h&Ь 1AmݫS1ZNU'""Ug]DOCNu3WfoT,g4Iw,£ؗN<]Jy$1V?6wf!b6 "ĒF,q{~3">_BA̡w#{&[2J${ 0A*md `n$.4]څ ?#1O>JGU ,M)MJqi74 3krX-"Z9pe=%f!Thi&h%F0 D(x8%2&lF`<6{6s,"%tԀq 3|7Xjo068r7V>k$=HU5how'!_- 'E|M~+<\BEx%sp!lNzk¦ &+N4)m汘WQ@$_sܔ;GԺg|Sl8jHpy5oAMNƐ >vV=jx2wSbX]/,TdpN:ʤX@sn<5 }s hX1;,`%,:Ybz=|[PiNR;ψ^S8Rb3FUDW-Aw[(td,-RĒe'Ͱ(5.MlaH8FЬP-#ؼոCf> 8h/Qf_+1ec#kdD݀AhBFquRcX/Ğ2/ol6\4@EvcZH; *_lst2 ^6+]f헁 'ް6|kV;5 BNO/nЅ nRvfK<!D* 켉WnE)] {H1&}-Lc`oK#f{8ε8pʥ3rzTV?vElN'fCF;ʩbHx&: 9 Cf(B#Q{x쨵a3Gk2dዽs AHN&:g\"'O?}g2ZJR/k DK~] NˤcZ5l*) 7e/CS[W@Mg7Id"*HTfjyD̓_$zyL#+J@> ZvcB!J!F-j d(D)Do:up¿S8RQMb;cba(]}2C.$OS LL&ZQҋas%lZaCe9oS`zE쵈&2Хn])*QnlrQԷ܅|Nvo3HA~ sNWc!6 fDoγ!j(~$[wͣE,tG1]1TK$3jdaNYZUUU#IA D#?cς͒0<A8y(G;Ru7J>LRn䏫H@Zdɱz37N @lxxhMϘb#`x'0zNBa6%ٔ–sF)bP*䣤Bw8]k<=XfNȦ̜yd_ZQNRrvtǣT{*Jm?oQ(4/k< WVkM躾P+}Uon1Рzg-(&gclw9Vh~60 %l]*:Ǽb_)Rt -9./vӏՄo__y0k< ݹ׹*]Vo mK/n>R,گCA+X$ mrVCf9vY7Ӑ_P0}v !R @zL>YHWfS4Ckuݕ/'#-Zn3}3 )L_4"̛jJ+s,.av@#ΟJK׳xʁ`T8 0d'\.M{T-^T]pGssu`pi,EjIp9!g077ݤ9U5:Z,.8vϏC*$Tn>/ ocn+,@ThCHAxR5:,75 L'o(qp/31C2M-Rɯ܍W"{,T^ƖfQ҂mO] Cg177eV/aT1NM kŬkZsW8c$ 3H 0 RKm,}sfH8ocjq׵w`K.b휜FkBff]# |ԌKy̽^@Yhpo4Ɲx>-Q/T䳁rLK9aCL̄=i 4EkxgSN-3} 7)[ 9t3=f 랥!g"GGŲ}PѹPڷD" (\g3FY²levpة,>xrXФʘ+1Y˨Cx<`o~vP7&PnUlgQ#k3p)|Nњ?u숄~#Ե!^WvntǺ^#HꊇoOc;yU K 9IK+[ H0Ǵ]EyX.lif |Ujku%Ӌ?\Do; FA TŭJ!.D{aѡ'૚Ki_zLAЁI˓\Jme&. Yӣ/_:"-獠m#Ŀ|O{J,N?T`@T=Zb;v0Z1`ڤ_AU 5r )Դ\ɛ16۶?C}B܁i(&_ym6tŸAQ jbHz+] 94^^,5n-`2bʴENM=f.@M5/zB)=Np:\Ty݅D=e: x{*(IUˏo&;J|`Ŀ`OЩ`L:3\;֘Fҁ.6^^4ly20>V-Qz*Ya_0nk#`Fv$POWhXA-VJ7:@|&5v=1<ˉid3iA-ZtB_B vN:.M]|xֽJxrfGI#@3gplGg$ L ƽy$z‚V@R5tE_N+[nKe: yNNP =bSwE>$:Hb70-gPNCoVrhQѝyTys*z.q$~M{1{)WŲ@l7ҨF/%*tE68rb1^** ՓݞOvF ET XAt Evh >NcϘll|!@{Zj\@?"1o̢L͙,?M$]"i=z T1[Ρ/ܴ,Q֝X(\H t[Um$Ú^|t}`Q֭!B=p7H$mxd{אA ܎aR7B}p'*1rޠKq2BFHwjaKf='w˪8':':'17Q*;ysM-\=DU⊢=a$ԎŝJ xvEѳ&G1yc_A Za>)STtcVNL7 o Zfr SaJ8+ue'onBd}r\zΡ\̹՘Y6ι?[Kn7~Eբ~Kha'35έkjj2H6`gPq@r5I 0M ZzXaieh.<: [:xұc5.;#[ŏ)[33(_38!/%+m