scap-security-guide-debian-0.1.70-150000.1.72.1<>,erp9|*dyq0鼪R].[d F8}~@yO<zj? L˖tzox/Nj’UBq qpB&zquݮ1Dvrr4!v(q+loxGܞP$RT{]a͐ElIg%oϼ)tDQ v zRr4s}/аҎ)p'.xmh`JzkDg ص[*hڪ qkWa!(>;B?Bd$ 2 I *7 Mc:: : l: T: N: :p:::_({8'9 ':'F3G3:H4:I5:X5Y5\5:]6:^= b?5c?d@de@if@ll@nu@:vAhzBfBxB|BBCscap-security-guide-debian0.1.70150000.1.72.1XCCDF files for DebianSecurity Content Automation Protocol (SCAP) Security Guide for Debian. This package contains XCCDF (Extensible Configuration Checklist Description Format), OVAL (Open Vulnerability and Assessment Language), CPE (Common Platform Enumeration) and DS (Data Stream) files to run a compliance test on Debian. Note that the included profiles are community supplied and not officially supported by SUSE..erh03-ch2cNSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Productivity/Securityhttps://github.com/ComplianceAsCode/contentlinuxnoarch  e>c W{B /  e>c W{B /@ڱH@ڱHx7LPx7LPW>[]/K]/K2B:W>[]/]/2O:tAA큤AA큤AA큤A큤AAAA큤eroerqerererererererXerXerXerXerXerXerqere%F erperqer er er er er erRerRerRerRerRerqer er er er er erXerXerXerXerXerperoeroerqererererererererPerPerQerRerNerPerP3810fd089040cffea79bfa4d9975506155fa5d94c5b0e99e4bd7d5facfea3fc936c9e946c67d5a9c406f1ed83ffabae85a6cfec254bf42da6f6b845a0221d44342d66c153907a95c63f6de574039795b7afb0a2623cad56b0508eaaac269f1d39d04f5884deddaa83158309d319d126aecc5cdb7b1031506ead009cf21ad21ff4c70fb844d3eb9dfa68aa23fe7434bdc1afbc721c881fa867a2ebb1b727f868d128c63982010e8bf5b75a25faafe71541d0b32e0e8c5915bec36f901cc52297a15e374a83adf40f2d561fc5b420fe77079967033901960fc2fd9516b7412f90e38e3877d0354eb8b3942ed95c029f0738a436a8b44eb518ee08396570fe10d5b2b6bafc528cd6996db873b1f9314357bd5720846d7bfbaee57b19dc14bd814f37680074e43a768513ffd35af46d5ec8e68435badcf55efdda31e8d6a024f7a4a526b0320e62ca31b4985a3c2e0c0030ce2793c88feeb98a45d5f3ab36965e8ea8e298ca5c1748740527f508f8b40bdd9a1720d51ea15be871eb6d10352fb17cbade633d5db670a58ff5f735c3602caafc72657a516416969fff79ff8a0c10298dec966840fdf40b8f14769f4d8a1eca611c0de67e83dce5cc0cedd59bd8dbf90bf2d89b7992e6bef756045c8c91cd264d931d3c526904f71ad654602f1efb86ef038ef0a2953bdbbaa5fac6bfff20af2d74c390e00d9ad3ddb64de03b5c14ed644d7ec9124570580253de013e7d64524473d0adcc1b0a4884e786ba00c535c010ac8bbbbc73436b338f4666eb095868c54f7b709e470d3799d86f500640e05b313c46ad003e5e369001647500d48d8a5b9af76ad5ec8016cb2338c5693d62e5e7acc0b2b71d660e02b23e42ec4bcffc0edba2b3f575f514b3c72b5a70282a16593686cf1248ba28d1bbdc207d76c9063d84d5a38a76db50f64a68650de6a90aaacdd7da3d7cb871c2646f192c55febee7c07035418eb3e920ce9a85ae0323da323555771f807fbfda1790c3aa2f85c345fec46fcf6eaca13c5af473b422b2d6b887aa0e0c9f8b7376e6420e45a6ee1ef2ee318e42e55f6cf4357d9f6ba4a9c7aa2eb35ed7ad67cf9ff7bd5e37090295ed3e92aa24accf8b533530efb2605691b118a36ddb28510b64caa33a503badf8fc633c01ccb8651d2347bd1e3ed826df221996ee9a78a98de1c75b1a0673e4b32ef04332f4c6c33aefff20e2cbcb8c04637fa522d47e762b3b6b71469dc07c647b66c239ba1807da708cda232a071d627158f0f3957c09ca412d48c6e9c22504578e604a9ca1da07d4a72cadded2b3fcefcd6b1f2a3ccbc4b03bc2f275ec56ba886d08c1da8f2927f2da8f43eeffcb22fac74568a8649489696c0d456a28068618f7a959a047f77582b7d6217dffa7aad2511d1834d213e10b686b9f13e1482520ffcd6db9c31e7a0da80999c0fe0a4aa3a056297d498167d4f44fb0666a29f14362c754aa85f6f37cb31bfc9080f4646057fd92d7fe4adc3bb44a7a19e724f79d197e8bec59ad8989d308f4f2311f3aa7d68dc0c20c971b9634f528f445d691093f7111baa2ed0ad204691eedd666a414fceb340b1eebeb4f9c2b79806e1e847f6e3da1c9e135ae9d8b10853f48daf9616e69fc8261c4a5871fd77cfed21c7b1da1ff3e244768b181489ea609b10f085d58292cf96ff31fb9822cd3feb73a55c5ad41c6acbd1b47d167639da5988b933518da62735dbf481ccd2b9906d46009dc09e1805ee40baa8b28f7cbe775447778850cdc4d90e764f33d2d68dd1457201a6984e1e4e646a0902e374651938dfa91794c9be868dd2eb6050d079022c336af1d50693843bafc9e748502447ef854a2e73e75c1f6f75121d6f05046f5e229ee708259b4a651caac079ec815409790f07b98de803e6f137962cc388e27cd46f975a4df2d0c2fd8413d9b791039f36d7aebc43e95475359b46e88ce560107eb562db7ef0be45a61d906616c5962e312a3880646039448e8bb9e85786276925fcb1af4118dd290e27b795d79310c4cbb40d1a2d06117ff9f0fa0c6391f752ca910a6bd5f62cc5bd11116f54f840df0f86cccf7ca6e59ee056738c315030d09a94e657912db814fdde9b28e5b11d9c5fe6rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootscap-security-guide-0.1.70-150000.1.72.1.src.rpmscap-security-guide-debian    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1epb@e.w@dE@d\@d@cc@c@c=qc8+c*b@bVby@bbbbJb@a@aa]aM`@`r`8@`[)`T@`KW`8`@`@`@`@\ڭ\ڭZZ_:ZN@meissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comjgonzalez@suse.comjgonzalez@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comabergmann@suse.commeissner@suse.commeissner@suse.comjgonzalez@suse.commeissner@suse.commeissner@suse.commeissner@suse.comjgonzalez@suse.commeissner@suse.commeissner@suse.comjengelh@inai.demeissner@suse.commeissner@suse.combrice.dekany@suse.combrice.dekany@suse.combrice.dekany@suse.combrice.dekany@suse.combrice.dekany@suse.com- ssg-fix-journald.patch: switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832)- updated to 0.1.70 (jsc#ECO-3319) - Add openembedded distro support (#10793) - Remove DRAFT wording for OpenShift STIG (#11100) - Remove test-function-check_playbook_file_removed_and_added test (#10982) - scap-security-guide: Add Poky support (#11046)- updated to 0.1.69 (jsc#ECO-3319) - Introduce a JSON build manifest (#10761) - Introduce a script to compare ComplianceAsCode versions (#10768) - Introduce CCN profiles for RHEL9 (#10860) - Map rules to components (#10609) - products/anolis23: supports Anolis OS 23 (#10548) - Render components to HTML (#10709) - Store rendered control files (#10656) - Test and use rules to components mapping (#10693) - Use distributed product properties (#10554) - 0001-Revert-fix-aide-remediations-add-crontabs.patch: removed, upstream- 0001-Revert-fix-aide-remediations-add-crontabs.patch: revert patch that breaks the SLE hardening (bsc#1213691)- updated to 0.1.68 (jsc#ECO-3319) - Bump OL8 STIG version to V1R6 - Introduce a Product class, make the project work with it - Introduce Fedora and Firefox CaC profiles for common workstation users - OL7 DISA STIG v2r11 update - Publish rendered policy artifacts - Update ANSSI BP-028 to version 2.0 - updated to 0.1.67 (jsc#ECO-3319) - Add utils/controlrefcheck.py - RHEL 9 STIG Update Q1 2023 - Include warning for NetworkManager keyfiles in RHEL9 - OL7 stig v2r10 update - Bump version of OL8 STIG to V1R5 - various enhancements to SLE profiles - scap-security-guide-UnicodeEncodeError-character-fix.patch: fixed upstream- updated to 0.1.66 (jsc#ECO-3319)  - Ubuntu 22.04 CIS  - OL7 stig v2r9 update  - Bump OL8 STIG version to V1R4  - Update RHEL7 STIG to V3R10  - Update RHEL8 STIG to V1R9  - Introduce CIS RHEL9 profiles - also various SUSE profile fixes were done- updated to 0.1.65 (jsc#ECO-3319) - Introduce cui profile for OL9 - Remove Support for OVAL 5.10 - Rename account_passwords_pam_faillock_audit - CI ansible hardening and rename of existing Bash hardening - Update contributors list for v0.1.65 release - various SUSE profile specific fixes- require sudo, as remediations touch sudo config or use sudo.- enable ubuntu 2204 build- updated to 0.1.64 (jsc#ECO-3319) - Introduce ol9 stig profile - Introduce Ol9 anssi profiles - Update RHEL8 STIG to V1R7 - Introduce e8 profile for OL9 - Update RHEL7 STIG to V3R8 - some SUSE profile fixes- Added several RPM requires that are needed by the SUSE remediation scripts. (e.g. awk is not necessary installed)- updated to 0.1.63 (jsc#ECO-3319) - multiple bugfixes in SUSE profiles - Expand project guidelines - Add Draft OCP4 STIG profile - Add anssi_bp28_intermediary profile - add products/uos20 to support UnionTech OS Server 20 - products/alinux3: Add CIS Alibaba Cloud Linux 3 profiles - Remove WRLinux Products - Update CIS RHEL8 Benchmark for v2.0.0 - removed fix-bash-template.patch: fixed upstream - Fixed: stig: /etc/shadow group owner should not be root but shadow (bsc#1200149) - Fixed: sles15_script-stig.sh: remediation_functions: No such file or directory (bsc#1200163) - Fixed: SLES-15-010130 - The SUSE operating system must initiate a session lock after a 15-minute period of inactivity (bsc#1200122)- Fix the build for RHEL 7 and clones (python-setuptools is used)- Fix the build for RHEL 9 and clones- fix-bash-template.patch: convert one bash emitter to new jinja method. (bsc#1200163)- add python3-setuptools for all builds (so it is also used on debian and centos flavors)- updated to 0.1.62 (jsc#ECO-3319) - Update rhel8 stig to v1r6 - OL7 STIG v2r7 update - Initial definition of ANSSI BP28 minmal profile for SLE- updated to 0.1.61 (jsc#ECO-3319) - Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 - Introduce OL9 product - Implement handling of logical expressions in platform definitions- bump disk size constraints to 7gb to avoid occasional disk fulls failures.- updated to 0.1.60 (jsc#ECO-3319) - New draft stig profile v1r1 for OL8 - New product Amazon EKS platform and initial CIS profiles - New product CentOS Stream 9, as a derivative from RHEL9 product- updated to 0.1.59 release (jsc#ECO-3319) - Support for Debian 11 - NERC CIP profiles for OCP4 and RHCOS - HIPAA profile for SLE15 - Delta Tailoring Files for STIG profiles- Fix SLE-12 build issue caused by '\xb0' character (bsc#1191431). - Add scap-security-guide-UnicodeEncodeError-character-fix.patch- updated to 0.1.58 release (jsc#ECO-3319) - Support for Script Checking Engine (SCE) - Split RHEL 8 CIS profile using new controls file format - CIS Profiles for SLE12 - Initial Ubuntu 20.04 STIG Profiles - Addition of an automated CCE adder- updated to 0.1.57 release (jsc#ECO-3319) - CIS profile for RHEL 7 is updated - initial CIS profiles for Ubuntu 20.04 - Major improvement of RHEL 9 content - new release process implemented using Github actions- Specify the maintainer, for deb packages.- updated to 0.1.56 release (jsc#ECO-3319) - Align ism_o profile with latest ISM SSP (#6878) - Align RHEL 7 STIG profile with DISA STIG V3R3 - Creating new RHEL 7 STIG GUI profile (#6863) - Creating new RHEL 8 STIG GUI profile (#6862) - Add the RHEL9 product (#6801) - Initial support for SUSE SLE-15 (#6666) - add support for osbuild blueprint remediations (#6970)- updated to a intermediate GIT snapshot of 20210323 (jsc#ECO-3319) - initial SLES15 STIG added - more SLES 12 STIG work - correct tables and cross references for SLES 12 and 15 STIG- updated to 0.1.55 release (jsc#ECO-3319) - big update of rules used in SLES-12 STIG profile - Render policy to HTML (#6532) - Add variable support to yamlfile_value template (#6563) - Introduce new template for dconf configuration files (#6118) - avoid some non sles12 sp2 available macros.- Add the redhat conflict for packages built on redhat clones or Fedora- remove redhat conflict.- added Redhat, Debian, Ubuntu products, split off into seperate packages for size.- Update descriptions, modernize specfile constructs.- updated to 0.1.54 version- updated to 0.1.53 version, adjusted some things.- New specfile - build for openSUSE + Backport- Switch to new formating from ComplianceAsCode - Project is now hosted by github.com/openSUSE- Add a first batch of SEVERITY CAT II Rules- Add fixes for SEVERITY CAT I- Initial version of xccdf for Severty CAT Ih03-ch2c 1701973635  !"#$%&'()*+,-./0123456789:0.1.70-150000.1.72.1 scap-security-guideguidesssg-debian10-guide-anssi_np_nt28_average.htmlssg-debian10-guide-anssi_np_nt28_high.htmlssg-debian10-guide-anssi_np_nt28_minimal.htmlssg-debian10-guide-anssi_np_nt28_restrictive.htmlssg-debian10-guide-index.htmlssg-debian10-guide-standard.htmlssg-debian11-guide-anssi_np_nt28_average.htmlssg-debian11-guide-anssi_np_nt28_high.htmlssg-debian11-guide-anssi_np_nt28_minimal.htmlssg-debian11-guide-anssi_np_nt28_restrictive.htmlssg-debian11-guide-index.htmlssg-debian11-guide-standard.htmltablesscap-security-guide-debianLICENSEscap-security-guideansibledebian10-playbook-anssi_np_nt28_average.ymldebian10-playbook-anssi_np_nt28_high.ymldebian10-playbook-anssi_np_nt28_minimal.ymldebian10-playbook-anssi_np_nt28_restrictive.ymldebian10-playbook-standard.ymldebian11-playbook-anssi_np_nt28_average.ymldebian11-playbook-anssi_np_nt28_high.ymldebian11-playbook-anssi_np_nt28_minimal.ymldebian11-playbook-anssi_np_nt28_restrictive.ymldebian11-playbook-standard.ymlbashdebian10-script-anssi_np_nt28_average.shdebian10-script-anssi_np_nt28_high.shdebian10-script-anssi_np_nt28_minimal.shdebian10-script-anssi_np_nt28_restrictive.shdebian10-script-standard.shdebian11-script-anssi_np_nt28_average.shdebian11-script-anssi_np_nt28_high.shdebian11-script-anssi_np_nt28_minimal.shdebian11-script-anssi_np_nt28_restrictive.shdebian11-script-standard.shkickstartscapssgcontentssg-debian10-cpe-dictionary.xmlssg-debian10-cpe-oval.xmlssg-debian10-ds-1.2.xmlssg-debian10-ds.xmlssg-debian10-ocil.xmlssg-debian10-oval.xmlssg-debian10-xccdf.xmlssg-debian11-cpe-dictionary.xmlssg-debian11-cpe-oval.xmlssg-debian11-ds-1.2.xmlssg-debian11-ds.xmlssg-debian11-ocil.xmlssg-debian11-oval.xmlssg-debian11-xccdf.xml/usr/share/doc//usr/share/doc/scap-security-guide//usr/share/doc/scap-security-guide/guides//usr/share/licenses//usr/share/licenses/scap-security-guide-debian//usr/share//usr/share/scap-security-guide//usr/share/scap-security-guide/ansible//usr/share/scap-security-guide/bash//usr/share/xml//usr/share/xml/scap//usr/share/xml/scap/ssg//usr/share/xml/scap/ssg/content/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31761/SUSE_SLE-15_Update/9dd515c6fa4100308f7f1c6a4e7ea1c9-scap-security-guide.SUSE_SLE-15_Updatedrpmxz5noarch-suse-linuxdirectoryHTML document, UTF-8 Unicode text, with very long linesHTML document, ASCII text, with very long linesASCII textBourne-Again shell script, ASCII text executableXML 1.0 document, ASCII textXML 1.0 document, ASCII text, with very long lines~5aʀ_7(utf-83060ec9e6d5541e83a077d18eb7e26679251ef59280ea6c641c63cbc5c60374c?P7zXZ !t/9]"k%GdCnEZ= r-^\&3/m̚e0VУ#XUf"D得'9,6>E v'\gū`4麜 Kɂ jݹQsqZfG9OKZ&z aFvqAΦ~1*aIـKB49p2 ,ĒǑ ZD|/d{h J _R]M 5_ *QuPG` 8Sc3s.]Yl68݆41u𻪙Scj=@hzⅈ Ko"҇)NPv5gԙ]Ѳ -8,n#hO"\]z Ԝ}9 !&*H6g|j׳}ǧ}u~7DqI鍔N "a|Ns{eeƅVO hg{YAmDNU=u4@\YoMH $/E}}]B9'Zb &nT !%e ] 6ۄfq<)B."(2+PB ymq8AYRhGc%yݖ=y1wYMDᔟJ)| T4X42\0:4(07DfS  hƷU93D͆->f&!*D 7%ܶbaصhhb5$`x bﲐK F:pz\dD#f!kr6~qnx/FOlcEj 7(6Uep3w|r$ vy >!: (T4ܩO4 \̲03sej<%6`&k# τ/{&}7\P&G='V^3ս#3("ioׂo "5(K ()/|QkR@[Rn5uϛY'Td.w.,xVt Ec:?/ BAΈ7|5}y*tKkpeJ%eK Ɔm!HavW=`7'z‹q YNM;ikdtlM]DWwM\&l<@ )7bV[?d8kɟ;#" s]l]͉yy|f^#cƒ8Rh[0D6#,efK=^]#(рϕ,gE0ox!KQIߣS ḆV:ܙrеm#4+c#R(t]$<:Ъ6k^4Ch^&`:i0>vdžoՊ0qI@iQIB+LFexA®9Ɵ[UB%tv6n&b_nuXHNfY 3_k$mkj}XcգܡA:C] P>c &-YuC_ee[YAooȁ5YqO쳁On)N: qJMA$%O3< =S2313XD2BZav!h״Iy_[@o,H{c9$ݹ:dv+4e-:7ڼiE0z~#=YL}0(ˀ~!DV0e5O\z\ FsEנCV _bH")Cs=9 [[Zz;T|-{wcB ʂmIP+j>ص[sey 8%CIV Y%iFcNJ50=}w:=R_(߱0>;lN/v E2#A(`eCUѿX&"V?%wyMzJӺ y*qSi≺/C}blG4[}hvUe+kDOosJ7G8%sj=$em[O=8\g c,4k/#Qv}>4.S>'ʏw\ pTP~^փ ,(.7W?i<'.M \) ~ fc (1F]FvE@nٜi KS qcRcEEDe4 Ps>Qr\O3Pz͵zF0,W}Mb :^r '6rS3Vyʖ4~&N)D&j+~?U0CxwZtvk?lukCon}12`It'x%Hmz$]ҲO`xb@X4;]^ٽT`9XEhg.Ig}Y3R'. t}7n)JRݢa}s/4&) e܀&VRY&`FAzq߿4KESeQ-"6X?fvb?& Jccv{3uI ēO'ryZ7iT ~ɀn5(?Z9팉1ŝw&'1'NK4?ya+~dMx?o{#aUJ);72!P~VQ 70>i~Q_78&ff,K,&}dWXwR{ss߁>Zwy % WMi?șNCLtN[!x=T"HhOƀseK)s"wƾvv/m5Ξ47)F92EtFxAfH }]0,RJNnUBl/C=l#.{)H!<5?=l/{=Fh {!K~a/u{a+{_dE0cGم8 (9KH\2ap j:Nhw.'}?!寖%A׌tb:NsKDx"atp1!eШ=|HB%`3|.0a %Qn4'7?6h(L[7 PjFHTS,xxξ?Z未ikZX9H qc=(ыWQ];;%^j cY() D täJ zET(ZwqW<᜛擦3a*I4Ji*baN]J淅yn5@UY.gY=PQFώ)_T[ZA1_>g)9w'>e+9MXu8b?RW;ʕ^gD3Ƒ~'SO'Da-IKgPSY!Dm4ɐ`RuN 0p,e;>zsjAаH$_Gv!:ty.k1.tk̎o_y9.`JoqK6TVm4CIٸPZj\xLYsD?}s f8/YZ2߀  M5X]wl.j5<w yR'S ջ8; AZ&ovxddpS)pZJEFY-7=q7~tV#׫hCm;` BwYo+N` gD<\ F[|{U G(<\+u-P|4aS"J8P-)~Hzzְ禺wwP,99t+q&ݞe OZcCk3س=kۄ4~:ȡva ?Mv^Nnҟ;ErB;_0Bkj ւ(ԗ1:-r.i.cOAz Qt^,ttWLh̀{kY\-@O>:Wp*/Q91lr̥&C -M$W7|j{"F0748~g:啪Z=).R=Xj NxB9ݛ\Pa!`D-8>XnޯC*V΀(\$ccjQO*8/f,cf.Lj{)i^HwқAR1 uOŸ0͏NSf#<7"А8 5D|iN[f=<)q==*!/ kc>;ba>crl\?N O Rh( ?_{7Ý97ڇVY=gozC%Rt.4o!p5>;Bg G4k+P%gCITi:I&Grï".SC/{]y |;/49sn`PmKgkKm5"@anPo}b˰j'DBTImd6йB/yAP~mY:M׎קH3ShYE+D$R=+nX97qu|9,n*4m?l@"3_qO5ev+%YJqhZ$XY3 SӗRg\)ơWZj !]]5%c%TVQπ !N^@f`(@I|?Ʈeʐ6V߮wϊO^+‚ǰ0* ͟)F9+赗`;{SF(g*5fË_Gmi8d%}#d3)vdMZ3=ܙ"CQSȅ̾GxRNB4\dV*ѽ23܉/8uAHԿ=|/^rh2ҫ౬_p0a*Y~v u[>?쥧 =,k\m7vgL?W,6(HEDCt[ y2X ^UpۇNѿU wWwuű>}~Ɉx|(/c]<‰{o?&5# 2d83]\9Xegy!WPOœ I X+W9" }6.X.NqVV!Ek"v4xΚ$[|ZG4'R!0?)1^T[T=ԫ 9Y3M\5XߵCujqС@\6 @plVkcPkAĎ"1i;,DTT(-pYA`U `"zDtJ1}2\[bW#I[-I#8v)mM-Zi|nG# 'ydgGxOoyk\ 23엀U? F5_䍴Y7߇n3Lx)ې՝ZC2ƅm&u: gF:R?vZޜBYf)xR=Q?в5 + 1Rlһʆ)OU ư/9׆ zw`h,EH;,˹#u^F?7ԽG)S F}f{݃3mu* W>bP@172F9N1i48%4 52pa*I^y7{a|~0 | ^ .] i.AYswW!B人kQ(`( +X;;Xl=xNXz*ۡ,d3ybS &Π`sR_R8+ a)6e]y|̞bz%It |ØϩW!N.ièqV)x`fƀ,72;9sy*1̿ώ֗mE!N$LOf,ԕ~go'Z < IB4b}lV[ҳ6{ kG{$ZrͣY qCDN- Iu*J-'J[_1;lža\;)o^tFDrG4yBI2#~_i#p5/7߅ >2 &Mʄ/*Vhُ_HJR ɗwY=V*%ʵosF5  xy]Q{ヘ-Yc'DA~DN ̃anc Cix )lk=IlցC6Q.}m]|1*aV,)znrc;p.?\(oU`ޒkMŌؚE6/ƢI6vE$Lzøo2[4>Cr8xVF?t\s3iVLh\jT3HZ><Omr9r6o_NN ӸI~Τ/CnRehYel$qS!%2@՘NxmIBѝ/D/"!kLg*Y 7UObH' :WD|TIQ`d*~f!iuۃN bX-?{߳G3to[^?|zWpȟXθD@ٯh)y($XFv֡*?,G^_Fx! sD>04bOi0atËƓJU1Dܺ:QԘ}I*DrfWܠ6lJ;ЙH!.;c@Sbºl,z;$fNO|=PV* juh&XWxt@b\Z_ڋU"_zFnRZhCvq |&yKˑ Bp}]erlQ?âI ۡN\Vw[Xei$g 7wS +`=d/uc4"C~IS_Jhw o#US۬dކn0%iM:3ʡ&72r#aGiXtM:kk,if*b]>39$ޣKi&/( ⱰY~"fs ?U K, *,Fls9>IWľjr7MXvD뭗t䄜vg Bh늓I<8ޭt;iЭvQZm R>v! '`dFqzHJR\VKcPI)@ƳP[OY/=<-Zbi&-|kF=,^ ө4CZ5zX ͗z^-3}jJZkbb~o҄ՙ)4elt Eh]SށPy^}}aĮ4QBΘrG:/PE1;zrva3Ih& U:T黥s_,rpn +xlUET^Qݗ〱^21FPXUI ~L[9FԱGO^AM/2WYp$l$rg XD +%;嘾Nʩ(`9 n^#q P0@opQ gi= ~e+z2s+Na6YJlW`a}3 xTs|ÊJݮe4D&\z*٢smRL"=dt]'@)Nd_ЩRaJSca< oS) ,:< RnIsKٰ18zzˁwG [L/ kn8FY|Օ1*L/`T*I`ig ?;Ǧ/6K=Mlߎr$KET-at鮛9Cf~W:%L1*GU“~Ic&wӜy@Ь87dydJ/ =*+ƐuhG( YoW 1bEjBVA[<!$9ofY>VX"PSAb- Ƹ爄 bA7?8S|B~+K5u}aI}Q PD+02T,quO_is%ql.}ety,JFʤڍ);lH_Y؃| fcEҴo;y/j^oiOQ 4iɠQNz GW]?[Uy{pl3Tm]F .&/.#cKE6!}#8?KG2>+BN@H|D[h)͋[NL N k08ö~vǔc+0TfYU& l@EW( cԬ{k:C f_[S/OESϥ|E6gt:{RR67"\/magN7+qtA0["\)Dq'Ȅl+ݑh\ĸI`նBEKN[eҍCvm f|'Zg=9s$ .i+Z~CU! ZYJ&d\ :=Ɂh'Y)?oO vpMiiڡ]LhPVK&ǧ LDr >'"/ئ (wmȁCQI@N\Z_a_ႋSroIgQjC&fqCHJ ,՜u倏U ΆGϞЫWzG^funۃş-^b&5>`Uc8ܐ?Ë6|! O8N%ɜ}qQ.PՆ/5ds @: JfU'Mܝ]K,"0"alU.kM`vNX(cס`]APD;f#xM` Qqځ8dMk;O.t;"[VoO1Zqk Г;A|*&t"ÿ ~b ^b$D |rrB *vBhlACzʶP)o+z i-KIK=׮RЩ+2_&̇|J1On7*%`8k%=wO*՚/ژ*A$9H0<ZRb#?/7ZeGە絏3,rY/f-ЀL1ij9ݫ U'+az^EܪOL?7O0Jz>C25Ï4 .sTadE \o [ %wDMy^vl66z%j7JV 㲕P/IxƉ='!Ղ:k0w Ij:CS*c~W0KSMU+H`(LP[>y掊gowNpuBEH8S՗0 5>xVb #UE&79E<} H EOou :.}=NJPH'P"f,Rc'Z[{4ѵ,lTK.R̹pNٿM,' d䥢6LPC@a8ukqAT_8U*g"g:|pYV: 9av_&bYUÌ4`UItӳQ)%Ƚ!HNBA,ILқoHiK_ˮH)1߃.* n?%gtGr( [:)H $+ s ih8~j7'VFQw61 ] yYH<՟B3Y~L]GϤCfN5$$w':j4! VEC?QpfӵI |d魭3pցW<eoe J 4Nz:73i!z2eg7^2#('7~>1\vIWh|R=4-^ 4 m;< Q;'aΈܤݖ{^15/ xK@ /z(Bd訟W[*f2#ymP%:5Pp줡3x,374\O4n~4ʀlZ}hTb 78"_kcN9036HBZ˻.!Qtn'xpLtEM\m.hĂ8QO~"QȖ7e6V#g#,HzփYJ?ϝK d'ޠbkr^WkOYv4F?12Gl0v C?@ؐK! |"Pެ?yZWn-gJ Ml&B{#ՃTtG^ttDB R7"!v3j븈 Zܱ!0v+_ghe2I^yO0xsƀ/xB=sF YZ