bind-9.11.2-lp150.8.16.1<>,ĉ]6/=„wT&YWMզ9ْfwK4MvT!0[|a)dȬ$eCpW}\kUĻY<[\Vaped;Ȣjms@kn8e+ !#vIiehMe J) DD HN1Sy/Wx)7{ͷ IT?Dd  C\`lp  "$'"(|" (" )" )" /n" /"0h"1"11"2l253x575(8"88,@99,@:=@=>?@BF G "H"I0"XTYlZ[\"]L"^b cdDeIfLlNu`"v w"x"y7z@Cbind9.11.2lp150.8.16.1Domain Name System (DNS) Server (named)Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server.]6cloud122ZopenSUSE Leap 15.0openSUSEMPL-2.0http://bugs.opensuse.orgProductivity/Networking/DNS/Servershttp://isc.org/sw/bind/linuxx86_64# Are we updating from a package named bind9? if test -d usr/share/doc/packages/bind9 && sbin/chkconfig -c named; then NAMED_ACTIVE_FILE="var/adm/named.was.active" test -f ${NAMED_ACTIVE_FILE} && old ${NAMED_ACTIVE_FILE} ACTIVE_DIR=$( dirname ${NAMED_ACTIVE_FILE}) test -d ${ACTIVE_DIR} || mkdir -p ${ACTIVE_DIR} touch ${NAMED_ACTIVE_FILE} fi getent group named >/dev/null || /usr/sbin/groupadd -g 44 -o -r named getent passwd named >/dev/null || /usr/sbin/useradd -r -o -g named -u 44 -s /bin/false -c "Name server daemon" -d /var/lib/named named # Might be an update. getent passwd named >/dev/null || /usr/sbin/usermod -s /bin/false -d /var/lib/named named # var/run/named is now a sym link pointing to the chroot jail test -L var/run/named || rm -rf var/run/named test -f etc/sysconfig/named && \ . etc/sysconfig/named # Store NAMED_RUN_CHROOTED setting to a temp file. TEMP_SYSCONFIG_FILE="var/adm/named-chroot" TEMP_DIR=$( dirname ${TEMP_SYSCONFIG_FILE}) test -d ${TEMP_DIR} || \ mkdir -p ${TEMP_DIR} test -e ${TEMP_SYSCONFIG_FILE} && \ old ${TEMP_SYSCONFIG_FILE} echo "NAMED_RUN_CHROOTED=\"${NAMED_RUN_CHROOTED}\"" >${TEMP_SYSCONFIG_FILE} test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in named.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in named.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-bind-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-bind-update-$service-new-in-upgrade" fi done for service in named.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi PNAME=named SUBPNAME=-named SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi TEMP_SYSCONFIG_FILE="var/adm/named-chroot" # Are we in update mode? if [ ${FIRST_ARG:-0} -gt 1 ]; then # Is named.conf an old, /var/named configuration? if [ -f etc/named.conf ] && grep -qi '^[[:space:]]*directory[[:space:]]*"/var/named"[[:space:]]*;' etc/named.conf; then test -d var/log || \ mkdir -p var/log CONVLOG="/var/log/named-move-to-var-lib" # move zone files to new location echo "Moving zone files to new location /var/lib/named" | tee ${CONVLOG} IFS=" " for dir in var/named var/named/slave; do for source in $( find ${dir} -maxdepth 1 ); do case "${source#var/named/}" in localhost.zone|127.0.0.zone|root.hint|slave|var/named) continue ;; esac sourcedir=$( echo "${source%/*}") destdir=$( echo "${sourcedir#var/named}") if [ -e "var/lib/named/${destdir}/${source##*/}" ]; then echo "Warning: /var/lib/named${destdir}/${source##*/} already exists; skipped." | tee -a ${CONVLOG} else echo "${source#var/named/}" | tee -a ${CONVLOG} mv "${source}" "var/lib/named/${destdir}" fi done done # updating named.conf echo -n "Backup old /etc/named.conf to " | tee -a ${CONVLOG} oldconfig=$( old etc/named.conf) 2>/dev/null oldconfig=${oldconfig##*/} echo -n "/etc/${oldconfig}. Conversion " | tee -a ${CONVLOG} sed -e "s@\"/var/named\"@\"/var/lib/named\"@" "etc/${oldconfig}" > etc/named.conf 2>/dev/null conv_rc=$? if [ ${conv_rc} -eq 0 ]; then echo "succeded." | tee -a ${CONVLOG} chmod --reference="etc/${oldconfig}" etc/named.conf chown --reference="etc/${oldconfig}" etc/named.conf else echo "failed." | tee -a ${CONVLOG} fi if [ ${conv_rc} -eq 0 ]; then cat << EOF >>${CONVLOG} Result: named.conf conversion succeded. For details check the following diff of the the old and new configuration. EOF diff -u etc/${oldconfig} etc/named.conf >>${CONVLOG} else cat << EOF >>${CONVLOG} Result: Conversion failed. You must check your /etc/named.conf EOF fi else rm -f var/lib/update-messages/bind.1 fi # End of 'Is named.conf an old, /var/named configuration?'. # Add include files to NAMED_CONF_INCLUDE_FILES if we have already a include # file (SL Standard Server 8) and NAMED_RUN_CHROOTED from the # TEMP_SYSCONFIG_FILE is empty. if [ -f ${TEMP_SYSCONFIG_FILE} ]; then . ${TEMP_SYSCONFIG_FILE} fi if [ -s etc/named.conf.include -a -z "${NAMED_RUN_CHROOTED}" ]; then test -f etc/sysconfig/named && . etc/sysconfig/named if [ "${NAMED_INITIALIZE_SCRIPTS}" = "createNamedConfInclude" -a \ -z "${NAMED_CONF_INCLUDE_FILES}" ]; then # Get the included files from an existing meta include file. INCLUDE_LINES=$( grep -e '^[[:space:]]*include' etc/named.conf.include | cut -f 2 -d '"') if [ "${INCLUDE_LINES}" -a -z "${NAMED_CONF_INCLUDE_FILES}" ]; then for file in ${INCLUDE_LINES}; do # don't add a file a second time echo "${INCLUDE_FILES}" | grep -qe "\<${file#/etc/named.d/}\>" && continue # don't add the meta include file as the init script copy it anyway # to the chroot jail test "${file}" = "/etc/named.conf.include" && continue test "${INCLUDE_FILES}" && INCLUDE_FILES="${INCLUDE_FILES} " # strip off any leading /etc/named.d/ as the init script takes care # of relative file names INCLUDE_FILES="${INCLUDE_FILES}${file#/etc/named.d/}" done TMPFILE=$( mktemp /var/tmp/named.sysconfig.XXXXXX) if [ $? -ne 0 ]; then echo "Can't create temp file. Please add your included files from /etc/named.conf to" echo "NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named manually." return fi chmod --reference=etc/sysconfig/named ${TMPFILE} if sed "s+^NAMED_CONF_INCLUDE_FILES.*$+NAMED_CONF_INCLUDE_FILES=\"${INCLUDE_FILES}\"+" etc/sysconfig/named > "${TMPFILE}"; then mv "${TMPFILE}" etc/sysconfig/named else echo "Can't set NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named to \"${INCLUDE_FILES}\"." fi fi fi else rm -f touch var/lib/update-messages/bind.3 fi # End of 'Add include files to NAMED_CONF_INCLUDE_FILES' fi # End of 'Are we in update mode?' # Remove TEMP_SYSCONFIG_FILE in any case. rm -f ${TEMP_SYSCONFIG_FILE} test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset named.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in named.service ; do if [ ! -e "/run/rpm-bind-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-bind-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in named.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable named.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop named.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart named.service ) || : fi else # package uninstall for service in named.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fiEf 79* {(| `O(cX S A큤A큤A쁤A큤A큤A]5]6 ]6 B] /]6 ]6 ]6 ]6 ]5]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6 ]6]6 ]6 ]6 ]6KlO]5Kc?]5]6 ]6 ]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../var/lib/named/var/run/namednamed-checkzone/sbin/servicenamed-checkzone.8.gz@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootnamednamednamedrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootnamedbind-9.11.2-lp150.8.16.1.src.rpmbindbind(x86-64)bind8bind9config(bind)dns_daemon @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perlbind-chrootenvbind-utilsbind-utilsconfig(bind)coreutilsdiffutilsfillupgreplibGeoIP.so.1()(64bit)libbind9.so.160()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libdns.so.169()(64bit)libisc.so.166()(64bit)libisccc.so.160()(64bit)libisccfg.so.160()(64bit)libjson-c.so.3()(64bit)liblber-2.4.so.2()(64bit)libldap_r-2.4.so.2()(64bit)liblwres.so.160()(64bit)libmariadb.so.3()(64bit)libmariadb.so.3(libmysqlclient_18)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.3)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shadowsystemdsystemdsystemdsystemd9.11.2-lp150.8.16.13.0.4-14.6.0-14.0-15.2-14.14.1]y@]#0@\\f[[Z@Z@ZZZz@Zg#Z'Z[@Z@ZfZ@Z@Z@Z@Z@Z ,@Z Z @YzYm@Yh@YZ1YV=@Y /X@X7@XBXwoXW_@WbW@V@VV@VvVwVVBU@UUSNavin Kukreja Reinhard Max Samuel Cabrero navin.kukreja@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.comsweet_f_a@gmx.debwiedemann@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.comvcizek@suse.commeissner@suse.comrbrown@suse.comvcizek@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.commpluskal@suse.commeissner@suse.comjcnengel@gmail.commeissner@suse.comdimstar@opensuse.orgsflees@suse.dedimstar@opensuse.orgkukuk@suse.dekukuk@suse.comnavin.kukreja@suse.comsflees@suse.depsimons@suse.compsimons@suse.commax@suse.comlnussel@suse.demax@suse.combwiedemann@suse.comcrrodriguez@opensuse.orgmax@suse.commax@suse.comjengelh@inai.demeissner@suse.comlmuelle@suse.comlmuelle@suse.comhguo@suse.comlmuelle@suse.comlmuelle@suse.comhguo@suse.comdvaleev@suse.comjengelh@inai.dejengelh@inai.delmuelle@suse.comjengelh@inai.deLed lmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comdimstar@opensuse.org- CVE-2019-6471, bsc#1138687, bind-CVE-2019-6471.patch: reachable assert in dispatch.c- Don't rely on /etc/insserv.conf anymore for proper dependencies against nss-lookup.target in named.service and lwresd.service (bsc#1118367 bsc#1118368)- CVE-2018-5740, bsc#1104129, bind-CVE-2018-5740.patch: A flaw in the "deny-answer-aliases" feature can cause an INSIST assertion failure in named. - CVE-2018-5745, bsc#1126068, bind-CVE-2018-5745.patch: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. - CVE-2019-6465, bsc#1126069, bind-CVE-2019-6465.patch: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable. - CVE-2018-5743, bsc#1133185, bind-CVE-2018-5743.patch: Limiting simultaneous TCP clients is ineffective.- Add bug-4697-Restore-workaround-for-Microsoft-Windows-T.patch Fixes dynamic DNS updates against samba and Microsoft DNS servers (bsc#1094236).- Add SPF records in dnszone-schema file (bsc#901577)- Fix the hostname in ldapdump to be valid (bsc#965748) - Patch file - bind-ldapdump-use-valid-host.patch- Move chroot related files from bind to bind-chrootenv (bsc#1093338)- Remove rndc.key generation from bind.spec file because bind should create it on first boot (bsc#1092283) - Add misisng rndc.key check and generation code is lwresd.init script- build with --enable-filter-aaaa to make it possible to use config option "filter-aaaa-on-v4 yes". Useful to workaround broken websites like netflix which block traffic from certain IPv6 tunnel providers. (bsc#1069633)- Add /dev/urandom to chroot env- Implement systemd init scripts for bind and lwresd (fate#323155)- Apply bind-CVE-2017-3145.patch to fix CVE-2017-3145 (bsc#1076118)- Use getent when adding user/group - update changelog to mention removed options- license changed to MPL-2.0 according to legal.- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Add back init scripts, systemd units aren't ready yet- Add python3-bind subpackage to allow python bind interactions- Sync configure options with RH package and remove unused ones * Enable python3 * Enable gssapi * Enable dnssec scripts * Remove no longer recognized --enable-rrl- Drop idnkit from the build, the bind uses libidn since 2007 to run all the resolutions in dig/etc. bsc#1030306 - Add patch to make sure we build against system idn: * bind-99-libidn.patch - Refresh patch: * pie_compile.diff - Remove patches that are unused due to above: * idnkit-powerpc-ltconfig.patch * runidn.diff- drop bind-openssl11.patch (merged upstream)- Remove systemd conditionals as we are not building on sle11 anyway - Force the systemd to be base for the initscript deployment- Bump up version of most of the libraries - Rename the subpackages to match the version updates - Add macros for easier handling of the library package names - Drop more unneeded patches * dns_dynamic_db.patch (upstream)- Update to 9.11.2 release: * Many changes compared to 9.10 see the README file for in-depth listing * For detailed changes with issues see CHANGES file * Fixes for CVE-2017-3141 CVE-2017-3140 CVE-2017-3138 CVE-2017-3137 CVE-3136 CVE-2016-9778 * OpenSSL 1.1 support - Remove support for some old distributions and cleanup the spec file to require only what is really needed - Switch to systemd (bsc#1053808) - Remove german from the postinst messages - Remove patches merged upstream: * bind-CVE-2017-3135.patch * bind-CVE-2017-3142-and-3143.patch - Refresh named.root with another update- Use python3 by default (fate#323526)- bind-openssl11.patch: add a patch for enabling openssl 1.1 support (builds for 1.0 and 1.1 openssl). (bsc#1042635)- Enable JSON statistics- named.root: refreshed from internic to 2017060102 (bsc#1048729)- Run systemctl daemon-reload even when this is not build with systemd support: if installing bind on a systemd service and not reloading systemd daemon, then the service 'named' is not known right after package installation, causing confusion.- Added bind-CVE-2017-3142-and-3143.patch to fix a security issue where an attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]- Fix named init script to dynamically find the location of the openssl engines (boo#1040027).- Add with_systemd define with default off, since we still use init scripts and no systemd units.- Don't require and call insserv if we use systemd- Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ * CVE-2017-3135, bsc#1024130 * bind-CVE-2017-3135.patch- Update to latest release in the 9.10.X series * Security fixes in 9.10.4 * Duplicate EDNS COOKIE options in a response could trigger an assertion failure. CVE-2016-2088. [RT #41809] * The resolver could abort with an assertion failure due to improper DNAME handling when parsing fetch reply messages. CVE-2016-1286. [RT #41753] * Malformed control messages can trigger assertions in named and rndc. CVE-2016-1285. [RT #41666] * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure. CVE-2015-8705. [RT #41397] * Specific APL data could trigger an INSIST. CVE-2015-8704. [RT #41396] * Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing a lookup. CVE-2015-8461. [RT#40945] * Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. CVE-2015-8000. [RT #40987] * For Features and other fixes in 9.10.4 see https://kb.isc.org/article/AA-01380/0/BIND-9.10.4-Release-Notes.html * Description of patch changes * BIND 9.10.4-P5 addresses the security issues described in CVE-2016-9131, CVE-2016-9147 and CVE-2016-9444. [bsc#1018699] * BIND 9.10.4-P4 addresses the security issue described in CVE-2016-8864. * BIND 9.10.4-P3 addresses the security issue described in CVE-2016-2776 and addresses an interoperability issue with ECS clients. * BIND 9.10.4-P2 addresses the security issue described in CVE-2016-2775. * BIND 9.10.4-P1 addresses Windows installation issues, the %z modifier is not supported under Windows and a race condition in the rbt/rbtdb implementation resulting in named exiting due to assertion failures being detected. * Following patches removed, fixed upstream * cve-2016-2776.patch * cve-2016-8864.patch- Apply cve-2016-8864.patch to fix CVE-2016-8864 (bsc#1007829).- Apply cve-2016-2776.patch to fix CVE-2016-2776 (bsc#1000362).- Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483, bsc#963971). - Make /var/lib/named owned by the named user (bsc#908850, bsc#875691). - Call systemd service macros with the full service name.- remove BuildRequire libcap. That is only a legacy library, not actually used for building. libcap-devel pulls in the right one.- Security update 9.10.3-P4: * CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure.- drop a changing timestamp making build reproducible- Build with --with-randomdev=/dev/urandom otherwise libisc will use /dev/random to gather entropy and that might block, short read etc..- Security update 9.10.3-P3: * Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189). * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure (CVE-2015-8705, bsc#962190). * Authoritative servers that were marked as bogus (e.g. blackholed in configuration or with invalid addresses) were being queried anyway.- Update to version 9.10.3-P2 to fix a remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861).- Avoid double %setup, it confuses some versions of quilt. - Summary/description update- Update to version 9.10.2-P4 * An incorrect boundary boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure. (CVE-2015-5986) [RT #40286] (bsc#944107) * A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)- Update to version 9.10.2-P3 Security Fixes * A specially crafted query could trigger an assertion failure in message.c. This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795] * On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server. This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795] Bug Fixes * Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] * Several bugs have been fixed in the RPZ implementation: + Policy zones that did not specifically require recursion could be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. This has been corrected. In most configurations, behavioral changes due to this fix will not be noticeable. [RT #39229] + The server could crash if policy zones were updated (e.g. via rndc reload or an incoming zone transfer) while RPZ processing was still ongoing for an active query. [RT #39415] + On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] + The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] + The server could crash if a reload of an RPZ zone was initiated while another reload of the same zone was already in progress. [RT #39649]- Update to version 9.10.2-P2 - An uninitialized value in validator.c could result in an assertion failure. (CVE-2015-4620) [RT #39795] - Update to version 9.10.2-P1 - Include client-ip rules when logging the number of RPZ rules of each type. [RT #39670] - Addressed further problems with reloading RPZ zones. [RT #39649] - Addressed a regression introduced in change #4121. [RT #39611] - The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] - On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] - A bug in RPZ could cause the server to crash if policy zones were updated while recursion was pending for RPZ processing of an active query. [RT #39415] - Fix a bug in RPZ that could cause some policy zones that did not specifically require recursion to be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. [RT #39229] - Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] - Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn't result in a bug during operation. If the read failed, named could segfault. [RT #38559]- Fix inappropriate use of /var/lib/named for locating dynamic-DB plugins. Dynamic-DB plugins are now loaded from %{_libexecdir}/bind, consistent with openSUSE packaging guideline. - Install additional header files which are helpful to the development of dynamic-DB plugins.- Depend on systemd macros and sysvinit on post-12.3 only. - Create empty lwresd.conf at build time. - Reduce file list pre-13.1.- Update to version 9.10.2 - Handle timeout in legacy system test. [RT #38573] - dns_rdata_freestruct could be called on a uninitialised structure when handling a error. [RT #38568] - Addressed valgrind warnings. [RT #38549] - UDP dispatches could use the wrong pseudorandom number generator context. [RT #38578] - Fixed several small bugs in automatic trust anchor management, including a memory leak and a possible loss of key state information. [RT #38458] - 'dnssec-dsfromkey -T 0' failed to add ttl field. [RT #38565] - Revoking a managed trust anchor and supplying an untrusted replacement could cause named to crash with an assertion failure. (CVE-2015-1349) [RT #38344] - Fix a leak of query fetchlock. [RT #38454] - Fix a leak of pthread_mutexattr_t. [RT #38454] - RPZ could send spurious SERVFAILs in response to duplicate queries. [RT #38510] - CDS and CDNSKEY had the wrong attributes. [RT #38491] - adb hash table was not being grown. [RT #38470] - Update bind.keyring - Update baselibs.conf due to updates to libdns160 and libisc148- Enable export libraries to support plugin development. Install DNSSEC root key. Expose new interface for developing dynamic zone database. + dns_dynamic_db.patch- PowerPC can build shared libraries for sure. idnkit-powerpc-ltconfig.patch- Explicitly BuildRequire systemd-rpm-macros since it is used for lwresd %post etc. Then drop pre-12.x material. Remove configure.in.diff2.- Corrections to baselibs.conf- Update to version 9.10.1-P1 - A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500); (bnc#908994). The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. [RT #37580] - When geoip-directory was reconfigured during named run-time, the previously loaded GeoIP data could remain, potentially causing wrong ACLs to be used or wrong results to be served based on geolocation (CVE-2014-8680). [RT #37720]; (bnc#908995). - Lookups in GeoIP databases that were not loaded could cause an assertion failure (CVE-2014-8680). [RT #37679]; (bnc#908995). - The caching of GeoIP lookups did not always handle address families correctly, potentially resulting in an assertion failure (CVE-2014-8680). [RT #37672]; (bnc#908995).- Convert some hard PreReq to leaner Requires(pre). - Typographical and orthographic fixes to description texts.- Fix bashisms in the createNamedConfInclude script. - Post scripts: remove '-e' option of 'echo' that may be unsupported in some POSIX-compliant shells.- Add openssl engines to the lwresd chroot. - Add /etc/lwresd.conf with attribute ghost to the list of files. - Add /run/lwresd to the list of files of the lwresd package. - Shift /run/named from the chroot sub to the main bind package. - Drop /proc from the chroot as multi CPU systems work fine even without it.- Add a versioned dependency when obsoleting packages.- Remove superfluous obsoletes *-64bit in the ifarch ppc64 case; (bnc#437293).- Fix gssapi_krb configure time header detection.- Update root zone (dated Nov 5, 2014).- Update to version 9.10.1 - This release addresses the security flaws described in CVE-2014-3214 and CVE-2014-3859. - Update to version 9.10.0 - DNS Response-rate limiting (DNS RRL), which blunts the impact of reflection and amplification attacks, is always compiled in and no longer requires a compile-time option to enable it. - An experimental "Source Identity Token" (SIT) EDNS option is now available. - A new zone file format, "map", stores zone data in a format that can be mapped directly into memory, allowing significantly faster zone loading. - "delv" (domain entity lookup and validation) is a new tool with dig-like semantics for looking up DNS data and performing internal DNSSEC validation. - Improved EDNS(0) processing for better resolver performance and reliability over slow or lossy connections. - Substantial improvement in response-policy zone (RPZ) performance. Up to 32 response-policy zones can be configured with minimal performance loss. - To improve recursive resolver performance, cache records which are still being requested by clients can now be automatically refreshed from the authoritative server before they expire, reducing or eliminating the time window in which no answer is available in the cache. - New "rpz-client-ip" triggers and drop policies allowing response policies based on the IP address of the client. - ACLs can now be specified based on geographic location using the MaxMind GeoIP databases. Use "configure --with-geoip" to enable. - Zone data can now be shared between views, allowing multiple views to serve the same zones authoritatively without storing multiple copies in memory. - New XML schema (version 3) for the statistics channel includes many new statistics and uses a flattened XML tree for faster parsing. The older schema is now deprecated. - A new stylesheet, based on the Google Charts API, displays XML statistics in charts and graphs on javascript-enabled browsers. - The statistics channel can now provide data in JSON format as well as XML. - New stats counters track TCP and UDP queries received per zone, and EDNS options received in total. - The internal and export versions of the BIND libraries (libisc, libdns, etc) have been unified so that external library clients can use the same libraries as BIND itself. - A new compile-time option, "configure --enable-native-pkcs11", allows BIND 9 cryptography functions to use the PKCS#11 API natively, so that BIND can drive a cryptographic hardware service module (HSM) directly instead of using a modified OpenSSL as an intermediary. - The new "max-zone-ttl" option enforces maximum TTLs for zones. This can simplify the process of rolling DNSSEC keys by guaranteeing that cached signatures will have expired within the specified amount of time. - "dig +subnet" sends an EDNS CLIENT-SUBNET option when querying. - "dig +expire" sends an EDNS EXPIRE option when querying. - New "dnssec-coverage" tool to check DNSSEC key coverage for a zone and report if a lapse in signing coverage has been inadvertently scheduled. - Signing algorithm flexibility and other improvements for the "rndc" control channel. - "named-checkzone" and "named-compilezone" can now read journal files, allowing them to process dynamic zones. - Multiple DLZ databases can now be configured. Individual zones can be configured to be served from a specific DLZ database. DLZ databases now serve zones of type "master" and "redirect". - "rndc zonestatus" reports information about a specified zone. - "named" now listens on IPv6 as well as IPv4 interfaces by default. - "named" now preserves the capitalization of names when responding to queries. - new "dnssec-importkey" command allows the use of offline DNSSEC keys with automatic DNSKEY management. - New "named-rrchecker" tool to verify the syntactic correctness of individual resource records. - When re-signing a zone, the new "dnssec-signzone -Q" option drops signatures from keys that are still published but are no longer active. - "named-checkconf -px" will print the contents of configuration files with the shared secrets obscured, making it easier to share configuration (e.g. when submitting a bug report) without revealing private information. - "rndc scan" causes named to re-scan network interfaces for changes in local addresses. - On operating systems with support for routing sockets, network interfaces are re-scanned automatically whenever they change. - "tsig-keygen" is now available as an alternate command name to use for "ddns-confgen". - Update to version 9.9.6 New Features - Support for CAA record types, as described in RFC 6844 "DNS Certification Authority Authorization (CAA) Resource Record", was added. [RT#36625] [RT #36737] - Disallow "request-ixfr" from being specified in zone statements where it is not valid (it is only valid for slave and redirect zones) [RT #36608] - Support for CDS and CDNSKEY resource record types was added. For details see the proposed Informational Internet-Draft "Automating DNSSEC Delegation Trust Maintenance" at http://tools.ietf.org/html/draft-ietf-dnsop-delegation-trust-maintainance-14. [RT #36333] - Added version printing options to various BIND utilities. [RT #26057] [RT #10686] - Added a "no-case-compress" ACL, which causes named to use case-insensitive compression (disabling change #3645) for specified clients. (This is useful when dealing with broken client implementations that use case-sensitive name comparisons, rejecting responses that fail to match the capitalization of the query that was sent.) [RT #35300] Feature Changes - Adds RPZ SOA to the additional section of responses to clearly indicate the use of RPZ in a manner that is intended to avoid causing issues for downstream resolvers and forwarders [RT #36507] - rndc now gives distinct error messages when an unqualified zone name matches multiple views vs. matching no views [RT #36691] - Improves the accuracy of dig's reported round trip times. [RT #36611] - When an SPF record exists in a zone but no equivalent TXT record does, a warning will be issued. The warning for the reverse condition is no longer issued. See the check-spf option in the documentation for details. [RT #36210] - "named" will now log explicitly when using rndc.key to configure command channel. [RT #35316] - The default setting for the -U option (setting the number of UDP listeners per interface) has been adjusted to improve performance. [RT #35417] - Aging of smoothed round-trip time measurements is now limited to no more than once per second, to improve accuracy in selecting the best name server. [RT #32909] - DNSSEC keys that have been marked active but have no publication date are no longer presumed to be publishable. [RT #35063] Bug Fixes - The Makefile in bin/python was changed to work around a bmake bug in FreeBSD 10 and NetBSD 6. [RT #36993] (**) - Corrected bugs in the handling of wildcard records by the DNSSEC validator: invalid wildcard expansions could be treated as valid if signed, and valid wildcard expansions in NSEC3 opt-out ranges had the AD bit set incorrectly in responses. [RT #37093] [RT #37072] - When resigning, dnssec-signzone was removing all signatures from delegation nodes. It now retains DS and (if applicable) NSEC signatures. [RT #36946] - The AD flag was being set inappopriately on RPZ responses. [RT #36833] - Updates the URI record type to current draft standard, draft-faltstrom-uri-08, and allows the value field to be zero length [RT #36642] [RT #36737] - RRSIG sets that were not loaded in a single transaction at start up were not being correctly added to re-signing heaps. [RT #36302] - Setting '-t aaaa' in .digrc had unintended side-effects. [RT #36452] - A race condition could cause a crash in isc_event_free during shutdown. [RT #36720] - Addresses a race condition issue in dispatch. [RT #36731] - acl elements could be miscounted, causing a crash while loading a config [RT #36675] - Corrects a deadlock between view.c and adb.c. [RT #36341] - liblwres wasn't properly handling link-local addresses in nameserver clauses in resolv.conf. [RT #36039] - Buffers in isc_print_vsnprintf were not properly initialized leading to potential overflows when printing out quad values. [RT #36505] - Don't call qsort() with a null pointer, and disable the GCC 4.9 "delete null pointer check" optimizer option. This fixes problems when using GNU GCC 4.9.0 where its compiler code optimizations may cause crashes in BIND. For more information, see the operational advisory at https://kb.isc.org/article/AA-01167/. [RT #35968] - Fixed a bug that could cause repeated resigning of records in dynamically signed zones. [RT #35273] - Fixed a bug that could cause an assertion failure after forwarding was disabled. [RT #35979] - Fixed a bug that caused SERVFAILs when using RPZ on a system configured as a forwarder. [RT #36060] - Worked around a limitation in Solaris's /dev/poll implementation that could cause named to fail to start when configured to use more sockets than the system could accomodate. [RT #35878] - Remove merged rpz2+rl-9.9.5.patch and obsoleted rpz2+rl-9.9.5.patch - Removed pid-path.diff patch as /run/{named,lwresd}/ are used by default. - Update baselibs.conf (added libirs and library interface version updates).- No longer perform gpg validation; osc source_validator does it implicit: + Drop gpg-offline BuildRequires. + No longer execute gpg_verify./bin/sh/bin/sh/bin/sh/bin/shbind8bind9cloud122 1570190877  !"9.11.2-lp150.8.16.19.11.2-lp150.8.16.19.11.2-lp150.8.16.19.11.29.11.2 named.confnamed.conf.includeslp.reg.dbind.regbindnamedbind9-confignamed-rrcheckerbindnamed.servicenamednamed-checkconfnamed-checkzonenamed-compilezonenamed.initrcnamedbindcreateNamedConfIncludeldapdumpsysconfig.named-namedbind9-config.1.gznamed-rrchecker.1.gznamed.conf.5.gznamed-checkconf.8.gznamed-checkzone.8.gznamed-compilezone.8.gznamed.8.gz127.0.0.zonedynlocalhost.zonemasternamed.root.keyroot.hintslave/etc//etc/slp.reg.d//etc/sysconfig/SuSEfirewall2.d/services//run//usr/bin//usr/lib//usr/lib/systemd/system//usr/sbin//usr/share//usr/share/bind//usr/share/fillup-templates//usr/share/man/man1//usr/share/man/man5//usr/share/man/man8//var/lib/named/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11214/openSUSE_Leap_15.0_Update/0dcc443ada79b8c608e0a008aaa43076-bind.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linux  ASCII textemptydirectoryPOSIX shell script, ASCII text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=180d45b05e18e59e692ff4b3556257424e333736, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=0e4256c20eb99cb53fdb4edec411ae4b21eb651c, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=9440d78137ceb250950eafaf55ee0096feaf9846, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=2b35b9b1c1189b3e671ce1590021e86dc8cd024f, strippedPerl script text executabletroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)%-456RRRRRRRRRR$R(R*R)R&RRRRRR"RRRRRRR#R!R RRR%RR'R+RRRRRRRRRRRRRRRRRRRRtؑ^sVEutf-8f435759695239861880ea4fa6019fcec9cc85e2e7da0dd65ad1a476e51ee2582?p7zXZ !t/*-v]"k%a4L&GGy{5W㢤ޤwVK21>iKֹsSPF.YWDVI]HYB3W@sP򡫚@mbTğ[E`"`xm?e Z506Wަ G5ӹ…㽞k,W$V̯S,80EaU`DYϟ3Nd Xx@>f4ݪ(R;NJ#)Vs<{Pq绑)/L!>{٣\bwo5Eu0/@r AFLil"%yq|z5YzWF̷;Ȓ+m%I%HSvGI[i}ϥصM`Ԗ6Y N`0~T|1?Jm%>bUeotc=~Ӫ4Hԕwl!n5-֘4.G&`Rv3ߜRv! 3bUz1v:{9VB—4@M#MA%& Xi}?l%]Zc>߅&"TD`,me :)Rq`-V u"Dy !"b=cMi h$ܔWQe|6lc9 [ߓ 3xg& < 6)l[ ]TSgﶱ ہTȠJOp)%d6j? |S@Tșd^q B8kYnh| McWFB+ˠ" xDp'vJsMWdg)^]/8Gqt;fەU/3=O Ź$@yg<6g pKUcQPZ. HK%NdyO~ǂ&ěV&f?J/v4bs=Jp'H۷Xg:ILnHLk![{e-o㑟@Ԁ;zE/>|5Y!VNti?dxdIBv(0CLnUwcåPVF#0P(:^1E^FԥiݍvT{P_!B^/ `<!YOsUx;qn\:*1|+pOYzduF6\#$Ӕ΅Bޔqn4) )eT}zbmb^޼@E+Nس M&*Ed3eCOeh9}`]gsVȷ,z%4U䉏}ĩWw[U:VX[YgS/Yxgu>P@=[M1[f[kqkcFh!gZPv^':܆3\9K:Ѫ>޷Vh_.Óѕ)F0*mg3NNL/fM}ѧCZ(,_qټS#tGAa-f>IeUX5b#RHӎrT@ٽxd)`NH#w]OY.;,1;%C¬ո9 b;?41\?~'s: \UnJ B!8r[X{1G75oV}XU)cYC$8lj8pw45'!k DƩxWSbd/w{,8Iؙa#5^Zapm1;ie Zq7E1$h%h.hv 3V7ۇo.▄I#}$h$59Uɑmw)C4B62 BIſp$ws()鄬|/{I/%zFVPrJ2(x̭.bgc Vu5)"'yk`1`mEB*G+$j HM`T)"- ɤ`2߉+ e(?TGA aGC]Ļ?*\?Ao7y,(t*&GWDk5(ϯx_ZVʄbG ׼rQt5x3n>]m6(X%'0Ě p*s;~Ϸ0*[ 0H{&f¶4#z:ûc86j>%螛J!^11PZ) z]$9PmOGe˭I܋ѣ9&\Zq- `]2Q6e)|9 MYnW`| 2*%HCf5=c!O#!ޯ{b__vKv"D8C5JxIڎtÖV/ؘDoMxsHӰ^w3ʦX 4/ݑ&CVr"EgqM,`LZpWuѢS/zrث6b`W)ӊ-ZMmШѨx{}\5}vZm"`N{f}`1 EO1;~M,L ,tc,.DL?BYT> vL[ZjE9zym*deEǂd:zHG#pa3{.ϳyd|յx$K+ b0Pj:Oz]}PSS0-J2petuBXwQ ]&=pr+ϐTBf!jP50//8rh25"_nOxmI?3^)Mr(-e8nF=Q3 T_n;V-(vz4F+ػy }GQ]ӈ "Ӹ+/gp'0d-Q{I/E›8Ls>&-턣e'<]WnɗIZ`X_ xX4+rt{88Yll[^(Y tƜ5r')r +62X LJF~*K 5yVB8-%fȽ@BonP/΁w$a|T&\ZӖ;*):`mX% d,)&>XTyP;~v/yO E2 }d) P 6B8n<ԧ7_w6OI#՘.,NM&Hx0ƗQ=|{ZJo_IQ=̻o&Ơi^s<@f.'Yd /80%zBM(Rit_<9%ʎŠ|så%)L An4CM %%şT鷹S%䤀 fXRtDϨ5R]y^Wr:_tmbya'F&Dza#;ysjC))k=&m050jD!&-cA6FZ<;Gφ~ݞ g:VEWIz񈾛і.Xna& V)蔵"ԓ$LeB,OLrqRj"*q֓sTucy[V3-xFR.$Pt,[~m6WsDp ZPt l⸶x0Ԭ w4S<谊TW∳~aϪoTyL C4[̀KWRNiRnBnQ,83,Ctit2̌7YV?,Q<8[P%pާݞ 0*fwÁA,!B+wwR-T #qqQ=M"1[\RuEmY˳Sbgt.Ami 7;#5S Ҫ%7SfXWKttz Fv-_x?ay-^ȭ݈zW_dEKkxfbiFG=$ 9WV)ƍn"_Ug[Za#+龬XvGu ]& qb%>LzE$yńs snXϴv:`IW!u*3eOv'nE8AR*GѝNC /ٹ  &t`U.$G{tO955ߙxnONm/i4R%p82~rLI  ?U(=TP׬1'0 Fǡ=ۢi/Vۀ\ sטgR2!Ĉљk°u dZiA}RNQ:PI򔱌Ͼ'V+pDy(+r/=rb \ш>G05?Np] OsQKۣC9!gadp^r$!xTaRϮIMĻs|㠍[jջaxydNDn3b-l??2iyԆFێGsޜߏkUuv4 LZ HWy=&sel9PIm=ď.EtЮ j[YJUI W$a!UR YΡ)=&5D/5v˲> z[6WQ8(WWtѕ蚣ݞ3ӫyc[865i$rI*-j 0$"GdG87t dxݧ[]E4Ki0m5aЁC*b I'ZR8 5Pe V %U-䖈4RzxyO<ۃDP@ei;L})86~?em͈ؒ$S(lg+y 6vUN *Wn)=y SMќt 5D_T i Ja)4:T Hs\!eG\Evں61o/Q3hm^FڇS܋ɻ8 yv_KJCFb؅pO {^ܮh_bCks:;'B·v i:qłU{]z.{="l0^+tFǽɗͱ(8:ltsbkctP#; n>Q>qFA`F]p fuA,jGxG~*ohm-]NAf KS=4argr],$r 2f5S-(t˵-,Uw6x Gx{X˚֪$ YggnPc&d }&tc]fGAZSf@4_k5dNB^K~K@i-/SCϵ"ւ^:g,m,uPQfɝxr]x"e1B.An7R(Cj$r:iax;ڄ>sϑ\Ak}wP61t,K*蔋6g|79~Dg7m =Gv o%1\{[VL>0PS_Nl=rkb4X܏F}_FNiZmK݇NMI(r@c)Ed@2lGdܛ #f1u8}C w3fɹbw ZyyN;5ݴSPP*#J~&zzOٟi~K*+$dYcXaϖT^[^Y&ue0iHl7+ݧF(Fq[zw̞<)z`I)aRBά4?>A%=d%' cC%!o{zߣ~R"[5i(<:KQ-=e BΊY߁o)}ΰi{=%- 8IrR" n\~r0'kDjS[: Z܆c!TYrեI[xɲP0T6 fq]$$>cDWovW&بx3 WƵ,<˞Biy5iUaxPpA+6ժR&5H`Wq-f)SB> XUEl])G SU(< d{Hlpdžn~gJ~+E=Ae܃, M (9\B0xRIlM"|O ȽګH8Ff d:ȓĖٴ[b|7c"\ )ZN=IuXhƆJc$6cNFEl'̙`%'GQ7NfLѝ愈]r01_[٪d'1VhN%U$P~LUɢK!' +}e6Q~"גvO#C^OE\׍t<pe 7@c*I$.Rx Y>bopaW'cVʆq~G-%|̫Ua[`Q/W|z(oN7g {7>q\6Lt~0L Rq z1.G?S6xxBmAVB 6%Lƶj"E& W%>SS0{u|t2I:Ip &T+(3$:A h yz2' P!Kn?Ao?tژ9Szxv:8W'{`qxSB5@$o@T v`$rkm%/22}ȱ~n& cBb<3#:!l:nqsN!aʒĬX ьbP",2vHq-}?/JI<>3HbI@U!Im-^0^i_F3[O44n^4P}I{szG~ ]:!F bH$~2Awi#d=Ym^ɯΥc h7?^^ Q ᬋz?߂jlk@[/Ggf$N0._i$!fMGJFV2ȡ]>Ay@~R!$eP *JCԊS źUin$JTQVj)" |ʢ/G%qZn$\h1c Q:ZxmZ9mc2'0}Bथ)\.DVH UE< sg?*ǔfJ#؋~7S!y9[G,'m5TM'¼&Fz\iZۭ h>Fg9xT:0}/. ےsk)Z*8l9B>>!1 d'v+ J/.f;] &jzM?=Xh]T`>oB]0kBJ2ok3/+SA^Չ>3ة:CQ} Ԏ+ogIqŶ2 z Bp0ШuY"eEjקFt̸j!!Bş7Q:-Ȁ0P:4*1fF]"bz"]Ö(!!5S s7w2f6es܄$B ߚ)qc?"c':XZllJw~G7Q*U77EQ _Q & 7qF Q>4r~ǿ/*8a;BOV d3YZmW_{7 4qQ,ڶp2?rww%U~ 7.wAA nbJIήCw^xjw[aXGfʭߌui`V>C(SNb Y#c r 3weo!TⓁaKb:Dմ*Op?Zy=?߹w06!q^E]jy^?)cXq #Uc磞ĤMG¯3, l3j; ^g6|caXQwRe$DYטEQPIH@q9|Ec%Hx|)\Ǒ2rDx0bl_Mce'ZE/Zɑ&T'_!!]Jw6T-4FZHWTR~~ +Es5UaEHl a]sKix^qm-Zrtg3jHk2vzl&I&,D/]p7}$#;A>?U%xő`g DE_Μ=؀Xٞ58ӽiEGC!=3dZ)Tv[AQ\@'_:샎oFe;~H1()3LzXPa'=`s_s&ZmRwsFdti-?XY@t25Wz4$X K*g]D ZefpqvXHB>M$>G*ۏS,FF6I@)[UdM{<ATg̱>U4m>B5iycъmwt颕AI*izCM?_Ȝ כVͣa M`7D5wq_ ϲ'Ќ8eYATky=}qB n6._枌}6?S'R>?6oYn}), s]2Ic,"gr#9  gRX]9f+P蘠PinEm<2vTp}y+ Gvz'jθ9UMUst@+|8Y~)Wp$Z!ucT+TZ yZ%`&i]6xgF=u4) [{|: (x=kc)G۾qgLۇ/7_ 녶s-FyP.5w#؞l,HR:S:.c?Va<<^$/F*\Qe} ~l4]ZL jV&VSE7z ׈ G_vYigDB㫘&)@o#e|z!"]A#rܨwIWmigo8pUo>p4C"2[=gnns. }`N@yASI7"Q^'rq QGeX j$ƁPKUko9r99?uA^2LˋQau;yh"g2ZQ^Rkj"=6%J4&qA$}Sm 8 `Rđ.s?|gTv ',Ȃ EN-󩯭[1QqDXZtX\pҪYh[,AQ&x*qhON6dlBРaS~gj=+aԴgV .p̑^Yi( Ħy1|{wOkKꙛ?/)Щ+}0NCrV-I P}, Z7B /Vn/:JT˄ 7%,=ݵKۙ˝ǒG,U /yDPGs;h(RfP!fݎ'!QY@],0Y*D'_iB󡭅< sn~Mt&@|3WF=wdVBgqUĀ&8j|۰@h6e F2MM.|ަz_CcY َa~vOYd>+SP} fRΓxS/U̠.\E;>ʙu8첼??qL1V1"z+f#c8?Ąo1?‹ {\uUX#3y,-`=#=LNG,8Qrc'v}r um>wNOEN=p/a=_xDFIvaFsXHw"[v۠_6w*_bk$X?tİ.ĴnhXRa']Db|gMR)xGeM,[9/AH7SYz>@DJs]|JdU'&?#㜡 ^谭??O$Ft;;G& mudIс V@DӇj4U{R&cOj4^J 9я֌L\Zeǧ^[0H `@Θ1qQq@yݓ;Fv8+Fq2 `L0:e"٠Rݱ1@d| ?btpACD/8;ܵm_ƀ=;hk(^#ET"\^>Q?Yܹ{&@wy呧kǀD=X 2%5|&s; sŌgpm6qΞWqށ̿l\w7;-mȽдw7ȱ=p]i.E4 Pq.e U `xK[_Æb3Hž/fˣ$9zZP8QhY 2}&Gas&a1tS$ 6Ѓq/q\1XR%ίd 'H:Ed6ym[]av$MxXGrȌw$*;!7?uR쵬kly ThՆ@&\<yq0Xi{˶)G剋9MZ,kjy9/6xUUq/gmL** -ݿD_{}a<[`n"9K j,k0sj^;6ח\,'j(ڀh ʹ'v@| Fepx(Ž &ݯl%Z2-b;{vv~ǟ ] Ipz!b.CuiE \>]Vg_L w |F&\X Obxk(|эU~(%;c?JkϹfB9wrjd V1.]4ov/jvsm^3p}¥ p T#Z>Q~:b`WhIOdu18y1VLqAg W4x#ֻxJ͚k\tVOzsvKi cf"y1_cži25Q9l4_~ԧ)\bm5~fOE32N&N !Mm@m_ K ?jg~yme~q|+U>V= X @Y|)8,y'L@%^D?ֶ?!^4S>IgK*iwO"//i4P hiu42$១숎7X e)xTOD[XOU!&!ax!De |1%jӅ HALa=Cg*F%M/rl WR5]}Ԩ;N1[Că`J_VnzJ-`i42~6S`Q<y 2!0.|W >2̪ΑcB+ _SꂚőL%Lh 5?$.ot^#vU2|[!kbE6J? +ƇZc*$kRN`/:Yt!re;YYwyBxRix:^ *{ux(SH6K0kO:0QՇ=( Έte5l_+mNK]4/K󌏶׮q<̌;q]*FB17XB!3c !3FR"biE IvҎ`WcnSeVsy%N4w%2w9J؞99)CkJP2;T$)GKЁ{[U8HM2T׏S.f/'nׄ{=3 ĥ3݉(|q[k:YDh.d2& a}O+v'ERDD 36F%8/hn >6ĈٲhOtI[hGE7lJxWFL`jIsڲ0jbAY|/ qg,ϓ&vrPPjU*lN;vx%#R`k 7kM{u>5|%*i|oәj-<[^8(\sWe[V;3 $D r 4转Jh 3Hld/L">$29::aA2]CR/R|`i--BĢd853@<)7hZwz.a&DY [ہunJ|Z  ;':T`"RM [lbA3A,TW:/\BF֏ W qQp"9L"iJC±o%ԵhrOaMeFCP?+DV] rPd K㮝O"1O0UiƓz6~H5]6$D^ٖ? aё E$eyX˂+^E.ڛ[P@w(Ż"cK6f?QizЁ\̷~rLz. U.{0S: rԾi. QuL!`fE%*L꬧X໺yUe %#?lC z}W}.AM^'d= _+}%Dv+#4&ܮ8+6Nhu*t`J")?Cݑ#*Թ/c,l8 ^5lдmQO$FutU"s W]=o@j|8>nD>1A: ~8 P?~5O(&9 d0StıOo X'PـĴJp#z3 ]Ip@s릿'd%Ź:ONNx2Gx01a^K4IhhBk$*kR kXϷ ߸+{7}\HYpU:U=i&rDi5y=<[)iNT$ںdsj&5̶Rh*Ja5Uvp@u1k⻙/-SN6-=륚SEE HnۈB , @^:ӧ b?(D'6>1S2yR='bXv{&ξdsn攜ꓩh?NAGL䯯EAo}ʒh{cjM =Y5hA;t~i Iד4 -C:]Xv19,XhO֎0`2,"YH7Uj zTwnoAreJqFoI&]QLG5h0>h0߼C[-پu7v Pp}EZXMH/@j~qhyc %[ R/Oa%A;Ȏk@O7Q 7zs;&<ǒ %%CR0T-a#QrXx2sJ<C~Cٞ-­4sZ['Axlx t!SIZlC"7p,o[/5nbD$\`FȔ%nɵʓX7 "׺q>P']_":蟌,s E*+bU\VsGgi*QXWd?|.3[0l"%m[% dfl /Xcx\m;=€ tTvqM逜P*:1ě\=9R>]Dq `L DR,mT^.!G2A%d]}oS3od+O)(TX1׬gC*͂y$9zBi\.-6P0::Լԉb$ +$㟤Ƈ*!Z7ИW][1[;{ґ#CڭFڣp^"h1A䧒l~F=8Q)䘾{"@p@43H[kԓi%٩^NR~Tx7C5,Q1?*Gps泀WVmGijqYX݅klˆ8fԟf)={4=خJ;H8AwV |60565rhssXEih?a*[) Z[8#EƅM!]Š$cГw~r"?\NԄx*kJSpK53`ʈÎ=Sv6\)_c${ 4HcX`HX2(=EADdHD6)E'LY@`\ 8b/;#~;*LhH_s4 /EG~ J>]^^26]Ԭ`)fP($.Ip <[)/^"a$ BO([ A&C)cO%HEkfwEC:뮃ձH9/'OiX}08 1&ȼT1w{1gWZ(*Ŧ> 4;Վۡ|x⧌St=,RRZ9>䤝NHsv ; UGռޡa^M'}z(.s }pK9c.\9KS8ؗ giX?o@{::]C5 y؉o)@vj$f#]IÕ1*ctZJ5MHLU9S@UTyY坯.h3r&CZЅ 89rV|lI4׀k] mxS(X S@#wBhϫQݰ:M~Tu-7_/;qZ9e6ONu[ş_?($tN5L$sjkBY6[uu8xeU\_ɖ̰[Mf+xNvy͎f{O OD},E,H75sd(q٧4|1mR Yw~4_r+Ɠ Y3TԚ}ӒiZGs0(r ] fT?$✻҂g۾iFqQP_V GӑҮx4\|l:L_Mɠw1#<o p>w|,>ȲmHr\zgm撰i&%f&+b[x`IHF<|q|4NéI-?{Ge`1ǀ~_X^*4\kӄ' uplwaq.ƓDIlpkY.T:>QRw@tguȮ6kk8` uLG2/] AMV _ꌦ;/`aOǤJo  FLD[4u@R#Fwu? ˀ˿]fO4ZmMIMUIa"ao~JƑpf]D O9 Q_fq12B)`3y`ТķMTA~#9!"/ n,-].Q>7'T~3(l9$lkr'RYaEj8ϩ |I7zW_DمC.Ѕ.RnɾEmy~ǭt-}BFmT?2p6ϔ|4 epRvZP g5:L+X3 zѹX_8TJHRvXjaq4A8.]/WxOOvI=PE>J;s1mg.$5џ/9pOox3})$OVxE 1)Ժ ZKL߬Z%˱7?-xJ%o)AVqZ*E+~rc9:_#H#er&gZG#C8xOo_`4~,[!\Վ<pO[;b_o mWshjm'by94|k]m`{s|0I/ w:w8&lϬ~q(?Z7~?Ѣ+v d-fDq \?ҳ& zg>)|6?Z xrpz0tn:&3-E8n.*酈7rg0st7A?D^NY+?7dvdUk׈ǡ M dnҐO ~'"=ׁF,=]Ba#SD4U%wtY7C% M\#pLa-4  k8AՌ`FP٤0Q<]S<_ti\d*9j̴\ ?`rs}q܄R:VF|v%w &oM<祉|ӴwEe~΀ s|K;p$Bu#qlSGʳ;咔[dF]9?EVec*D"+Ya7zɊ!(G|ЃT("Z+[ ͸Rli aAG l ޢZxg\Dep(6T ׯZ6<,X2U}ʜS~k[hRTJH..ń!㳡]󖱒տv i-cѾ/CU-[Q˻o! "Q?]& hSx^lnj~ k q_]K# \//7R <{-R%ȧsb6QE(xȶ`GN23kZ/uTP?~F7#XnP&'ހ5:塩w;˫"fVV׏SpbDzϪ]l[  en>}K,?9!MSiGL?S% fH6wMyB8Jtٿ?@/icWn6D ?gZ)[ދ5~-'yL"U㓃i^ߏ/Zd pf_;hZSiY2,!'v#_p>t7eۇDt\& ӺЮ e-fJSԫ`dWCCa/QgH**FWJՕOp[9↓IFh۰(LT]dS4{;; K-Cɻ*|*Hߡx~DsaHP@暑qU{fDztBL!+;QC=ގ׍1U$r^;7jWh1WsŎ|8kk=<&#} w9("Z( mFi9nJ. mQ^sp{|e_2T3MqhxB"rrO}.f|boG6aSEš7qo:!I돣~.Iy<OU6ss6}f7\H":MT\ơ0/l)ʠh ؄0g<=>Q9(ة[7?LcGsS^<)qdшw7ՕE-S޹5"& }˧qH˯`͒~ ̈́n*=+-t?gS9ղQ A㨧Orc..r r\I/[9*$Gm eyOuqP]ZԮX]ת! fAg" JPiyTxe( ZR3wKnj0R a_D A.O^NZtrkcf 2U?u=x:Aέ. a m /0Sjԛ.are`DOcc$>Aǐ:?) BCv-tj̐l-ϬQ ~f:ؘ"ϊ4W4{jḯD由aN0D\JKuDgb>d ]6Xǒwd`F ڨyi\/(=LN9}3qA$8d)oқ@xk^Vd>,Vs.H `״up(+:$25Y\pU$^9??ơ3Mhb%1|A[K )jbz&]RIWyd$/WV/w颂ЄPDco{&4r65']8dMRRCsJ]`"&jnm7ID6 j|v}P-`$vؽrU];ˣŀه)riSfMmX \0e\<,qBܕ =6S4TwҨZ~fM+Z<_DގTXιVK7 m%[5CGFRbhs/@*4.eIFTJ5+ SϞPlb6!LSC&ajBas&؄70J.ڌLE׫^Mvf5\(I0->xDE_@x=%bp}7ZE>|L\rZ+h~ԇ!'P_噄)qe;L館x%Jeޟge]k[ '(HAcL=x KI>@88 u&m,t|g6$. tvR5eUrR܋LyJAP&?S^ɬt V{2 =09OuRʢuU* [7k1<,DjY.eT 6`&6̘zm:| Zr^2VWJ6֏QӗC/?M9̡iYHgx"Qߑ@q;i[*.}x.zhDNȘ5r7yuBZ0OκfA0ɛ+#S}2悈k՘xuMԲ#)Q񒔢;LV$gTjAY7Hnclɳ)QvnRjkYAD,$iL+sS{DMK.S yoW'=qh(],az|]_[fzR dBZ l˚vNĉ:\E94bnjJU8^ <68=Z{^Tie_zp s\TG!|xD@⪔~:em:.0c5CI >"ĞՉۊN-RQh+[9])LN OKġY>dq?t7C{Q7v‹1K[tgdzyVyC^QA0~QH8^ԢbĐ*P SmG $PDAӳC$P1L=ү&dG5D}o Ia$r6:S=I z:w?r'5wn*V'#B|5]U&uf[)L};Gunz94wb.ףΣdO@DԬ/QhR?EN8Çmg>ô{Ẅ́4 !:Dz5V{o;٨㥚ÏGH9lg{Z8 Ѱ\pkӀ_ȏp|=/yxS*]8Γ-Ee?{  XΙ܍LL \z(Pݐ|J#^3sz7gd9=XT,Z6 r6%t56Iܬ )yWpd7㺝bTt1f<MDR$#+y2PĎ|J&m ^_FUUO4KҶsy%nq7JU-v{9Ye$MC̖qB]]k2өZ2f/Q\wpGPz"z4n5nGS b>;Unݮ˴d}}'eZmo<)cc_!⋘hS()8`|۸mQ2pq!215Y +O J:`~f.DMqa>z mpcw- \jL2A[nJ1$}Ia|GfqepFhS\vVROѓHt_Ŏ~xb'(O j }c_Ijx puQ5Fy<y- .b=,eir5K kڅQPSc]Ȫ?H'2S|Yzw=LaDeљ"y)mkF?e8UjTAS'I2{W\o7F:Zx4c,15'J {Z}e[mg!>dOq|2 Kw5MءI= 0sax+]?͍ݢ[cY<*E6y=-ȪS@Jieͳa[0S"m"z1f޼c~&޿;r5dH 5u!2,7P Ұ\덜]ZwbR@TSό,A)훢vFHRLwӿpDcgF0ku:{6y60S8D4shP9<%{EEޠ_RKQl46.0_)~JoƏu$rI2'n})JW!iٮVR7H:7ݙ1Pc'ScJ#qb+b!m}je| f ƴ!A Hun7jfSHlj8 <ȌQQRiGDIRpfSn 5w/p"ffyq5 I<#zs]Ad^@MrR W#[\[ @R~Y.0γPw 2 72RmGBn1qF+ #!_>rԺijy88T-#79;dߕ+j E(q؉,7xxG|c ^p,4MA2Bˠ^5R:}BzT2} މՎK=m23v?LjII'p-Jp_㤁H|O%h\ R&KI!W:`vpyڽ >Vj!RՃ !Xی-a<TZ;"cGwS%+% N ?nR7ӽ7Q@,10RiU:Mgy5=e:7 _M-Ȉ}~]x#>O>#hg|ƂWsES5DvJҮ֝ˇkӳfM; A{!sv7WAJ˰ѾWV8.b@ تHq \{-ԥ,F=Blxn |[lYbdԉ %ϙ;+댬9{NFs!5f6+!= OU nI{IuAO8Y]F>1.R~n%VCylE0F6:n{ B:Ç 7|J.s0%gSN 珇Z$AdPt13SDGcK,ja*H(0 'D5.:ĴY>W~.Ӈj{zM9UFIvAP *rdؠj?oNt֖_InyƂQKfjl5試4P\xX hK,A_ k?9)}(n'w-qO!IzY6Ba-w@,x^6$2hE[z\r(i,E@"ע[/߲b. b[Dln?@V٩vM0nvI&"@ϪOy{$^rԍ:'_1\] &sp=(o=8W5C]4X[ST-@\BB3 -kYSh7L|>t(ϔ\_Jj{i$1_}>h{U=:ko lhpLޙ 9fLǔDxDnӧ#+W^%j̹~a!0gNԋS`8{5|jbU"5ho29e46.mP cW#!Ke `Q%#CNYjMb0h5<~ÆҴK梓w` H! zj͢ FyEIRS>KІ_짻vdDy)Qq wfWJmYGrsQ'ǀ=^)Epw4\,c?tp^,Sox t0_(3:bQ䑶MWF(yE-jM 0jlj|nUBD UR Ka+>i5Or,9a Ø}5-V%98>=N%.ɱM72O96Viց>'3B. +e",9o,Zf6,dԧ?fc-_jr-t忮 5t-#Q_{ c , >mo);)) /yx[ "Y;Dea:`kmg@nT$cИE~!AsOCA&d:II9\?NsVVa9ʈg.|@5kr냏PYnhA:6!΄U`!߷ʛBm[X0 N`1I%W=J \,:O|x^j%{Öyf g@a6,e@E sdZrGTSt@^vrQ,+RbĔЉ/9 7oѼxPb4Cl9\a̙kwYO:$3c@5j_y\f䍻Î,|M^t .g.X$K;yDFw4Gm .sKYphIL㋩!=ȝ@G3bcl=#Y=Pb%Fԥ 3 P%I!7lro+M]X 3|dOBH+h|Aͬu0'yzڬd,KbkH4(![΢$)4 |tc2\~(;X8{\.%eJy;T h2^.]}ȣ9O>@ d!Ù# yM!P0+(9@\ 4Ta0*MWE2_Δ& &-W!Nh%肢\odج x݋;1~4D%d[߫-l\t/w9J0lZes]>eJGP䟺kI d+)XW3o&cMvVf][:\~~GB1Ի_ՙGJ^_zI'HkPPNNm [.(íF.t?^|#:0R6Vr/5Gd K[ZXT4NWx;`E(Zԕ}bmCDp0Ѓ,l;ݒ3+V1\bn*>o)u?%lJLZNbVQl+U=._xvsQ|T֏ͦOPs]+I/R!.[o 4FHV6kP=GET=#P_VNgq/D}= r"W&X_բuouc/TWC|DWq\SPl+trkNʹ+/=xg$:[yK D, ThZ@k=8gژFp3|"ZZ[ID6Aru ||ѶRْBbN`r~ H_{0?5 \ 1rtu)w\fJЀ+X5GDehg2m0rφ )8OH.IaS"4@NpnrLq?~-]FADr"jQ &#nggJ/Z럶?.}VA >S%D]Vof!}y"m:/ls9O9ӭ-$@8''1^ҧYAZa52s.ZL'_\۪;W;5<$լ Q3XGL0ƾVRھmzEgynr'&$XZ:=h*V7, c|0C"ZTrh-vB-xf Lg^ $Io5~AJxL^0buD΅.EJxDKy+e #zce*҂+3RoՊ+b5:gbgi i9cV>ZF !p?jUvRbіץFkI5*htTrEZ$ Kdzɱۚ{݁},ljde8OB:DV@IwNe;iϘ#=ӿ z{N]jdօw~עgb/9?`ݦHKQE .'x :4kϐc-*ǤAg,E~ tNFFjJ?PiGGq%l㴶R -OB_RcfOxR2jAZ e# t'+?3HWj֋Rih|Hr4i*9V8~}$O:ݙ @dQfYB\ tz XZ߳W$ﻭ;\G&/y =m On&^Ӂax I5 P6H|zm,zǛhfm,!WrZGZh}h#;o~7C9fO!3-ٷ2 Qg30_ׇx`6<J+e$ EK 瞗;!7sg=eNEyƒ+$3j">ğ|T0!p*HZa-w^;'mni4FQaޞib054V8E;j HKe@D"^#LmQP^iٖtͮ@,ZbӸPhg<9{x7k$Jvb-]~?zd\B7U's3$XVhհWtq X;5)m4FpU/uqI*c=da9'o \ - ھVF8ECeU0lKm5y@(8s{ЈڸƸ_+w0#eѲI͈K ̺=_xo/6P>EѮNKʆ af9#) EAOvkmFU[DoTjq! *: $T΃?IkNO7ep~&P(ZV+U:jb,SfZqe0VZ6XyI2΄YMs+ԆidoyA82;׈AYJ.埛B?:JRv K63>`O-ذ* Dmu7R#T)[OA<b}1LP :O@ּu-3`vaPLz*$@w(),zSSa_I:>|N OJ=ҥi>({l5:w" [1hk;cҼ%vU6z/d ĆYNO=S:7_-B׊ftK0oCu'$VT,ڱB½?ޮ*l/88[|D>,? AǙ95 @UVlLڄ9;&!rY m& k:zY-jSInb5hpOZ=(Vvǔ|si▇^]q~RS#ۢVf5?m| Y $Pyӓ4|%AmCkG0܀z~[x73;rm u'hțg~XtzbBv Ix40_D<C(t>8-u0>"ڝdʰRG(G/|!B@d3;R+) WN,D==\'Wr.#n60RAJ[lubAu.)) _ IKNHW/bJbN`&#V9֏UY#hj"#88}%ݛF ڷPā[v^~0ÖN=Q]%YTLJ%NRK , hq꓅b[0l.KEIu5~?{tNZClܬbpto'G%q﯃+#A: Pu y0WRe|ŌqɀYyh2|_z`qz:xsrad2= tGj/,LPv[{pLrbiz+ 1>Fi~x)ҹo)r`9NirӦq'\u>ks(2B(K2OA$tk<3KWbkx" g]WCE0O Oyvo:K5q_4OK 66zvSTm%U"pآʩR-w%J~laeL=Ğ*0~@J-s\?#;BnRXɼ9d}kT1{Bo9+9g#s*TyfĶ OuKi h`ىtsr_({^kG&2VfCf[g͑5=[$g$S7|JkVh,A!ha{V↨[B9KxfVo9']\|w :x Dkt9nc0Lhq VD{"H)@Ζ LlvnAe$>DjnϗE b ]٘6I4.#V{$s [4OnȤ֠y?;L&R#t@L*r"j&hܶUi@ͨں jsU{7ˊv]"YJAmۍIfv~TYT.IMv B!q#=#lD_i@P%]JRORK:0.2c9ه5NF#@`)D{$)G;}ڊ h81w1z8]5 &dYz!.o: K*tSߜMN.WL6*U܄vZ$%ZuznMR sCV*C%<*<(GDžA>/ 9!$m ԩv}vNry1 CxZQ+dXcFo7>8-nCb8hPϬWYeu՗Z@ȫ&/ux5eS&$SkBXh!i|b wC9҅#{ŁQ礓 W3}^},}/ 9 pfp^Ip@Z<1a.կ }O8IH,:/}^Wɰ"fd)i&EZ1?QA3#Xr x(q_uCsK&߬gi-(Ht#!?L@,Ut?z^ x2Mz^{0ʫl`Ђ_22/fxS=Y{F׍`Hf:|u#>9([];'>,GH6Y,mWhE/㑡{Xm[߂nEISOs&nW l1iAX/L Y/ْưeO6Jۓ]1~:)0K<]M,2枠J&ly !@:!&uA8`:LV$5zQW5aN*>%HD#& `;:UC W=@FR 0)ҧFƉ] %~1O*ڪ#'~G7Ljczl*k {0nj'fWuLP#SW&J>qCg2 nxH#:BIP^tB6tl+ve )\FQ54 bVV9!$ŭ*Ywgd, F M}S?Mi2sq oxA`oxI=Bi f+,Bt F]f-gW__^x5TZ @/Ek\PIx29;(rnxk뎴5T.36(AWӅ^z]a\A pHy3TFSڡlCeti CyOA-h\ٛeNk-<ɼ6zN`2RRx(n+>uOP7s1K>S_TI180 V}S/0t45RHbK5tpb(,[7EČmZlH'‘60maGユ'ӫdPHLԱ6j/v1xkM08Z]_V;lSA w]jzM ޱz]exMk`A-p*dAgp{pXF87`zJ}iNf;+.l!u=iԮ?_UQ(FOTgS. oϘ*p1b @5 V`BKzmi2='E6?G&\%"0$H*'A룬&!RR )v(H0R?d[LY(q-YAO]NM96^vG3[wV?HX ݮfY},>v})4d4Y^ n9dkOxuZ%*RTo ۼBU;Qlu[9X 'NࠇB9V| IJL#`G* z,[Xl ~%jr^\UFp2xcVPY{x $žiKYj2+䫺 lSWpvCe os<*u6d`6y3 ݃.'.jä"{j9폜m*PF h^yRo :/VQ:jK`sdFEJ:H@-ie{/sVs;\ 6!ـc!Oiò؀Z⾊s[ WR%g SUBm.X݌[ڡb**E^*[&! Kpl[DZ*E (g Qz%8bO1o`.W.̐f}4ܡ;߾zi98_[+Lg@rh[U]^FjX-Q&+e6d="'iFv_l 1WeQkvAnә(_ԓҝ ~?ɧjļܨop .~U~IEhWQzxjEn&3U p YUUaQ`OíZ cuB)0ɢ؀هL띿9WK2w{>bN"TX{|M׃ EJG*]@6M:Iq .#eӌ>k(j; m)CdF7ε.=*/&\IT.?4 9)u6O$fI@!w>SCLX/Pt"ɒSq^;/-Dti5B}-elVfS~k09JgG7n]V"X Ji/0 |)ΘVZAGKGjː0H:BP8!r@'J33Qb>\a a~?.b/7-2+1\O#z/ #f!ٺڜwn_ԷHDX0m ={ PӢB]!AA_7/b ;#X9]]eJ 5|ozjt0j5dw oG='O$y8%nIy 'YD'Hq౰._Ec'\Kf O(1z}ja`:ϐۼUd~~H9?3: U s;#p<\KJ*tu+kE`cC:Ici Ϟu)ୋ$:UVj@ Y5J3,hY5#jt`_ '*C7㙳d`mi4MgqDg˗W`tNTs~jZxѨD)ms4EW\+ _#҆ݍU M69aRS$'Tq;ۇ|?In9O>rmC#k- baLq'|DN*k'l tiX((־+wt&"<mtqĒYB@v|5M".3^)َ‡}Sڀ|[TBf6l 7ۅ1rnq:nSЄkaO:D1n%2-K/ e+іE=?r -hGx#nJKbV=lк/Gʿwp SDazӋp GbڤtD0k߃Ѭއz1L6]Fe)R.M]1*`=Ly=~ d?HʒO\-Upf.ף/8d/.cqGKKm1 }qVums$=#E wp7 hب^0fcyF@%rFkWnl |>O' թ1<4ϫ>c`@ CiAFq5W1M}5T`찲!Ru/.ŕ/+'.f% xFH/䶒ucƎcrV *# 7`PļO|{U7Atg)/[coq%""_*yMrնszoD y)[n/OKǙ]<[3UB@,!{Z2y(i澰^4&WTLF}/V(,x"hdmm/Hn0=2C:v<wsτQfAGpLdL ̟4d&b#.J%x hEvH{+RgN1-ȴ4%WH\T!_X ?"a`ƒZS5 5c#}t{]%0IIfo[5ϽÝ^ /?8^<9bKP[Fwps4Lt6}`Ҭm_dNnO|`#)xϔeÛyH PEboW{ ,%>λD!9!#l@\v?00@*&DK9- "GDMqDK@}m?3Q[&(UΖ0]랷 Ŕ]-j[Nl2Bڝ.t=rZT]DuS5/5`7lίy%kOn$X !Y-MGk?Z3\3.9J QW?>ģ^9M4@8j>_ƈj-R%6=J o&Tu+qvL'KeG T:fnXQ%7֤g\^1:q:'D0 +ʄX P1(5BׇPoTܣ֔fm [uoS! 2[qHe{3* D(3WAq!DγgCr'IE7')z2aprnh|^j> 7Tj{9m #!Bkb.6ineYti8% AkV,{W$}8[qFKwu%E.Cn/M|3r%=Zt@NtM\D&hSTNe:3=ggd\Pp 絈!j3%blW#m: ocEGmNut:o}l\!!h|Dq|en*>wo"JzԼW{X{~p iwTұy5iU dQ[*l.|q!upiA~P/(Iruq[#0נzIK!c"ǔ~Cļ,e'xKVߛNL6U \a/W.bXdB9dCV9q!R#÷!gJD;BJ:,CӄptP(_7^jԨ pT0" q):P[=^㤖9垊Go]VZ$r'5˩P+ORB*­]Dke 6%Ax:OEXBh4$H=|sFȄP+vȊ{Z)ѣ:;E9I)60 Yk nMts̥jUxphot&ɒn8v)dF_RY-(醔k&[;9tn74YbH}< }z WUŚYS[PdKts:°กZsS<,ygt`m7ZZ?W*;fP1ػkHzcª T*%h,ls~EjrІm8zZnTmFR|T5gkLPNh?`Pz}2{'K}+zҬs-;,X t2 rB^5{'Tpl*qu)%B1к@< 􈯬!}^W1.bMT gmur.NX|bgl[ [R+}Oɚ vx3ɹ$.F1t 6)he7 v vVyq0K+%fgQUؗ1\ }^CpDRRjkˁXoV5-v8˃ZGBqYNv drȠP `_6f޸JOdטs!8 5,5!M@>NtY%(QVnx1<:`# njM5zr2|$JJ]}!8/^gBa*xAg# r$d7O|ɭQ}en!ٍ$e3b/(*\#ʺSaQA')YpN{w4EX TK&V:ICP9K7Cl_1^I-qI`sͭGNQ뿋"xJL95JcI6r>jm/1ie ?1n"v!+ŽA i.0i<…(HѻGh6kTP h؁gLvs@?#f3^+KBgG)IZ{C2Sw!ҧjI k sqGEpH.. JhzZDQbw<hj{zE C,9S+B(;J"em+vr#kPTT4 \$,Nbv ː4sUߑN XÅ[U*?^Mhul7@x"bףaӂA@i:~YtF(Xl|w֊\B/s7dE(7qkL'ciMѺcb/!4o;y~` ‹F # .xkDz uo"?&AS/B 7Y/'jmHQC*X|q{t񧊡z9\r],6Z03Bya)zIc1ƒ LS+LO#aK;dc`\JqЖ:x-ܖ:~KG/h̻1#piugLevHn]Oӗ `J &_ hn `[I__XqM;䫺EAiAcHɩsL_0DJҁ1ѿNjn| |mK`ef+]+چ9 q ׊{l ]#9=~xJR~^l9MK٪X]ϑɤ>_.Nd^Xi^ASR Ͷq&xcЇ}E;C`I %]M&hfrG; 49G.Q;pE25;`mԁp5H%<.6amJwŔAƸ<ύ?A) c93B wRR81\QW"8㊂O! %: ??_SP={*E> ޕN_HF?߯3u,`RoSPme%x]ؕ%Jd]acf;ZpL?-AJZnIJ#MȒdnm⥋J#HS4)d Ț.Ո T^7+`VwR5$cURi Rp+>Z!R|"N濒48F NǰZnId\r^׸J_i#ot7~FS2Vf?C^mJuTevj7IPzSLG3%yҸR U9q|F_/9" v^_zg Utvk~ϑ-=׃`'pFSç#UH5CgyE1ShCF >vH^F XխIQ>.wCy`cQ6J$~8t̨J%e0v> |: :6G&J526%_[Q$HEw/DP "Z{/MPĎ Pd 8 T^? %*k,;DMsJb0q(Qc(6Z!y`NF|=V@X5XkL 4?kPVa@5h<0-K/ Wu`;oW~Z]G6jg1js_26@AMG>w2db`?sdHsݱ$h Ih1=2rmu4+mG&`9usN<6'} =fp"οm}ʉPrZG'We)/ٗ߳,gDN~}Q\f\uq3@\Pm\c?*+AITu| $RŏK6-׌bHOcLDA,ȏc2J. N OJɢ@b%UDE=uBx5ny2EFkڿcR|Go & '$Gt-$'3 6u#T*yp21~5.F% 3Tn[dﰠ($W7gcLVCI_|qtmha-)9T_oE YZ