permissions-20180125-lp150.1.2 >  A Z*/=„JNZfe+BA]{&Oʣ 햭ji=.M^ʬjqisF"P̌xٝ!574}p(ɣ*_ JO7^rӄ4k,RszM(Y2lLs#2Oz0N$l:J.9y]'.~o;ZNXr2@2Y7 S%׃ 3B$7=2W-hc:UI924763f262e8ab69fb7c2b6550076b330978d9d5d2c40d806b030d70090df940226429da985b9820060c6cdee980f18099dfef90Z*/=„ 0{ϲ%#OlNzX97 ӆ ۹D|#)1&3B>]]lXz{| ]agu%:Lb3 >ɇ-1 1m0cg+d_̍˸34QqRMsZxzZ6^98,k-kHg:q#04]@P' nhՉ1QmrLce"DYq!i_ cȱ5J>p@:?:d ! @ (1 Ka, P  b  t        = j   H v( 8 e9 Le:e>5F5G5 H5 I5 X5Y6\6D ]6h ^6b7Oc7d8Ze8_f8bl8du8x v8w9 x9 y:z:,:<:@:F:Cpermissions20180125lp150.1.2SUSE Linux Default PermissionsPermission settings of files and directories depending on the local security settings. The local security setting (easy, secure, or paranoid) can be configured in /etc/sysconfig/security.Zilamb11FopenSUSE Leap 15.0openSUSEGPL-2.0+https://bugs.opensuse.orgProductivity/Securityhttp://github.com/openSUSE/permissionslinuxx86_64 PNAME=security SUBPNAME= SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi # apply all potentially changed permissions /usr/bin/chkstat --system0QKPVOj9;@큤Z!Z!Z!Z!Z!Z!Z!Z!Z!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-20180125-lp150.1.2.src.rpmaaa_base:/etc/permissionsconfig(permissions)permissionspermissions(x86-64)@@@@@    /bin/shconfig(permissions)coreutilsdiffutilsfillupgrepgroup(trusted)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)20180125-lp150.1.23.0.4-14.6.0-14.0-15.2-14.14.1ZiZ\Z%8ZZ@Z@Z@ZNY|Y@Y˒Y@YY@Y7Y2Y1S@W"W@W@WBWBVV@VV2 @V +V +UuT~@TZ@SvSہ@SϣSSS@S[SM@S0@RnQR@RR@R@QbQQ>@Q@QP@P@P{PaO@Ọ@OȮO]@OE@O2cO1@N@N|tNyNx@Nx@N @MAM@MMtMY@MRL@L@LLr@Lr@L7L7LLҠ@LNL6L@LL(KыKsK?ĴJu@J#JJ:J@JJ|@JzJn@I@meissner@suse.comkrahmer@suse.comkukuk@suse.commpluskal@suse.comastieger@suse.comrbrown@suse.comkrahmer@suse.comeeich@suse.comjsegitz@suse.comastieger@suse.compgajdos@suse.comastieger@suse.comastieger@suse.comopensuse-packaging@opensuse.orgdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.demeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.demeissner@suse.demeissner@suse.delnussel@suse.delnussel@suse.de- Update to version 20180125: * the eror should be reported for permfiles[i], not argv[i], as these are not the same files. (bsc#1047247) * make btmp root:utmp (bsc#1050467)- Update to version 20180115: * - polkit-default-privs: usbauth (bsc#1066877)- fillup is required for post, not pre installation- Cleanup spec file with spec-cleaner - Drop conditions/definitions related to old distros- Update to version 20171129: * permissions: adding gvfs (bsc#1065864) * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410 * Allow fping cap_net_raw (bsc#1047921)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to version 20171121: * - permissions: adding kwayland (bsc#1062182)- Update to version 20171106: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20171025: * Stricter permissions on cron directories (paranoid) and stricter permissions on sshd_config (secure/paranoid)- Update to version 20170928: * Fix invalid syntax bsc#1048645 bsc#1060738- Update to version 20170927: * fix typos in manpages- Update to version 20170922: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20170913: * Allow setuid for shadow newuidmap, newgidmap bsc#979282, bsc#1048645)- Update to version 20170906: * permissions - copy dbus-daemon-launch-helper from / to /usr - bsc#1056764 * permissions: Adding suid bit for VBoxNetNAT (bsc#1033425)- BuildIgnore group(trusted): we don't really care for this group in the buildroot and do not want to get system-users into the bootstrap cycle as we can avoid it.- Require: group(trusted), as we are handing it out to some unsuspecting binaries and it is no longer default. (bsc#1041159 for fuse, also cronie, etc)- Update to version 20170602: * make /etc/ppp owned by root:root. The group dialout usage is no longer used- Update to version 20160807: * suexec2 is a symlink, no need for permissions handling- Update to version 20160802: * list the newuidmap and newgidmap, currently 0755 until review is done (bsc#979282) * root:shadow 0755 for newuidmap/newgidmap- adding qemu-bridge-helper mode 04750 (bsc#988279)- Introduce _service to easier update the package. For simplicity, change the version from yyyy.mm.dd to yyyymmdd (which is eactly %cd in the _service defintion). Upgrading is no problem.- chage only needs read rights to /etc/shadow, so setgid shadow is sufficient (bsc#975352)- permissions: adding gstreamer ptp file caps (bsc#960173)- the apache folks renamed suexec2 to suexec with symlink. adjust both (bsc#962060)- pinger needs to be squid:root, not root:squid (there is no squid group) bsc#961363- add suexec with 0755 to all standard profiles. this can and should be overridden in permissions.local if you need it setuid root. bsc#951765 bsc#263789 - added missing / to the squid specific directories (bsc#950557)- adjusted radosgw to root:www mode 0750 (bsc#943471)- radosgw can get capability cap_bind_net_service (bsc#943471)- remove /usr/bin/get_printing_ticket; (bnc#906336)- Added iouyap capabilities (bnc#904060)- %{_bindir}/get_printing_ticket turned to mode 700, setuid root no longer needed (bnc#685093) - permissions: incorporating squid changes from bnc#891268 - hint that chkstat --system --set needs to be run after editing bnc#895647- Do not applies permissions from backup files (~ / .rpmsave / .rpmnew) (bnc#893370) - do not mention SuSEconfig anymore, long dead (bnc#843083)- append a / to /var/log/journal so the framework makes sure it is a directory bnc#888151- make innbind mode 4550 (bnc#876287) - permissions: Adding systemd-journal directory (bnc#888151)- permissions: Adding new kdesud path for KDE5 (bnc#872276)- vlock_main lost its permission checking, so remove from here.- opiesu,wodim,vlock-main have no setuid root. (bnc#882035)- tighten /etc/crontab to be always mode 600, even in easy (bnc#867799)- duplicate /var/run entries to /run (bnc#873708)- permissions: incorporating capability for mtr, removing +s from ping (bnc#865351)- GIT repo moved to GITHUB. - removed the setuid bit from "eject" (bnc#824406)- do not use magic constants for strlen (bnc#834790- Chrome sandbox also allowed to be setuid root in secure mode now (bnc#718016)- use PERMISSION_FSCAPS- it is PERMISSIONS_FSCAPS (bnc#834790) - qemu-bridge-helper has no special privileges currently (bnc#765948)- utempter helper binary moved in new version to /usr/lib/utempter/utempter (bnc#823302)- cdrtools: allow some filesystem capabilities for more stable CD/DVD burning in "easy" mode. (bnc#550021) (cap_sys_nice, cap_sys_rawio, cap_sys_resource, cap_ipc_lock)- leave out readcd,cdda2wav,cdrecord until it is ready for the distro (bnc#550021)- cdrecord currently has no special permissions approved (bnc#550021) - append a /- Allow pcp to have stickybit worldwriteable directories- add /usr/bin/dumpcap to watchlist - make fscaps=1 the default on "" - added PERMISSION_FSCAPS to the sysconfig/security fillup template. - /bin/ping(6) was moved to /usr/bin/ping(6) /bin/eject was moved to /usr/bin/eject- apply permissions settings in %post. During initial installation some packages might be installed before the permissions package due to dependency loops so we need to make sure their settings are applied too. Also, on update of the permissions package changed permission settings may need to be applied.- temporarily add su.core. workaround for the migration of su from coreutils to util-linux needs to be reverted as soon as util-linux is also in- no longer install SuSEconfig.permissions, SuSEconfig is gone.- enable ecryptfs-utils setuid root mount wrapper (bnc#740110) in .easy- remove /var/run/vi.recover (bnc#765288)- remove /var/cache/fonts (bnc#764885) - remove /var/lib/xemacs/lock/ (bnc#764887)- Revert "Use credentials from within the root file system" breaks use of --root option in brp-05-permissions- print warning when requested to check not listed files - Use credentials from within the root file system- add duplicate entries for / and /usr (bnc#745622)- add scripts for automatic package sumission - drop zypp-refresh-wrapper (bnc#738677)- disable run time fscaps detection (bnc#728312)- set permission by default in SuSEconfig mode as permissions are only set when called explicitly anyways (bnc#720010).- fix typo in path- remove world writable /var/crash again (bnc#438041) - remove world writable permissions from /usr/src/packages (bnc#719217)- add chromium browser sandbox helper (bnc#718016) - don't offer PERMISSION_SECURITY in config anymore - remove setgid games bits (bnc#429882)- remove setuid bit from opiesu (bnc#698772)- disable fscaps by default as factory kernel still doesn't have the required patch for auto detection- read /sys/kernel/fscaps for fscaps settings- change path to gnome-pty-helper (bnc#690202)- setuid bit on VBoxNetDHCP (bnc#669055)- fix hawk permissions (bnc#665045)- add hawk (bnc#665045)- remove Xorg setuid bit (bnc#632737)- update permissions of lastlog, faillog, wtmp, utmp and btmp- remove permissions handling for /etc/inittab, /etc/inetd.conf and /etc/mtab - revert previous commit, done in coreutils instead- change fillup deps to requires to avoid coreutils loop- change utempter from group tty to group utmp (bnc#652877)- add permissions man page - update docu - add --level option - set perms for setuid files always if owner changes - strip root dir when printing file names- add option to explicitly warn only- reimplement the core features in chkstat itself instead of SuSEconfig.permissions- don't make changes if not called explicitly- add support for file system capabilities- remove vlock (bnc#629236#c13)- update path to gnome-pty-helper (bnc#634199)- vlock -> vlock-main (bnc#629236)- use %_smp_mflags- add lockdev (bnc#588325)- update for innd update (bnc#594393) - remove lppasswd (bnc#574336)- enable parallel building- add /usr/lib/virtualbox/VBoxNetAdpCtl (bnc#533550)- add /usr/src/packages/BUILDROOT/ for rpm 4.7- add more arm directories to /usr/src/packages/RPMS/- remove permissions handling for traceroute6 and cdrecord which are symlinks nowadays- fix weird sendfax permissions (bnc#525954)- permissions now maintained at gitorious so use tarball instead of individual files- added polkit setuid root helpers after review (bnc#523377)- also added KDE4 start_kdeinit (same source as kde3 start_kdeinit), bnc#523833- open-vm-tools gets setuid root:root in mode easy (bnc#474285)- hylafax directory permissions are handled by the package - change group of amanda binaries (bnc#523006)- add some missing slashes to directories and remove entries for at and cron (bnc#480855)/bin/shlamb11 1516881600 20180125-lp150.1.220180125-lp150.1.220180125-lp150.1.2permissionspermissions.easypermissions.localpermissions.paranoidpermissions.securechkstatsysconfig.securitypermissions.5.gzchkstat.8.gz/etc//usr/bin//usr/share/fillup-templates//usr/share/man/man5//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Leap:15.0/standard/73fe798ff1e81063471acfd3d4b3c0de-permissionscpioxz5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=c32c1cec7724f7cf5721c6846b97719b2c366035, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R R RR R}d[zߥV\Sutf-8f08e26bf9f14dbe205d34d86ad21e6ff41f23208d2afe72a8029a4608d6dc5ec?7zXZ !t/ᡷP] crv(vX0zdݷ^! Od#hB .^wN.T6}hs F++lhqZڰT'*w8|U=A){Ml\&~+1rH Bϳx7]vd#k)-Y;ueA)ۆ# Oqy\?\1cv7wI'GGkj@o3>U-!×)Bhd_~IF]>T`Z.Mp&;ɛ3'ʺdQ>R&`gdNh&]IbMi@ijs6(,|xEw딈ljķ\ƆAʞ[0]A"PsG\w#Ari}OWސc/2g\ 1ީ:ٹPb0mp1؛u XphA1CH0Q,WQOuT+- >AJ7hT@KZи7p>pl O}ʘ^A7pG jXY*Bͷ .Ќ"\no6\yIM$aPZ9^ܙJ}$g-/ u#@w"[XCHU{De Or&E Qr@@#ؚYо{ECijCtxfn *U$Q|$x^HF 0NNF/J_^10HcO5Q!xfA כO!"^|vt <9NX}xKJ:2Oe$bcA㚩#Uh(=自"j=Sp&Wvbr , 9Yz9K;aT 3# LZ q'SQ_8,b+t ."=HпӗH4Cw)D:CK]tMj4#{)L-iAp V1yz}lҌbr!Ht 6yoKȜ9c*sHYg44MU #TGZ@/^E[=37 \mcBPrO>+ \۵ ľ`sDD@=q^2Bɺ‰G.)A#aTm6xy,bU@ꇏNL;0_>2yAؘj@٬xjBFrp@U/Jw;]yb1D[j.8w@xIcyAPMKJ؋DŽ\ T'r^`eN8.jS82 *B [磖翵7*wL}W5]휰 mﷂ-f(nyhx,7 *艧-Y^Q3 ۄ`_r4vW~w H`MⱙaA;_ۭy%? S҇zB_ c&455JI6dHs0Ĉ`AfPjv8jMp8l0vVTVfsiDPGW>}}IaJMؑZBKq L\Mw!mmRQ GO:q>Ob*:4õ6aٺRCM6,--]ƪ"Rc D,~d{UR !J [:[i `g3d^F;TRpp݊L[tm^!WXB#/a0?tACulⶇp8CGwe TW0kJxlmx#gQ J/e[G"{؟y)b Z 3Y}aǯ Vg>Bl2> ̚8RHamĚǵ͊R#}('brgdYq5f-G uͣll -'GT1VaB^?d;DtXdk0R+Jj9'@[ʼn+&N!7^SRm<OH9DQ9@'qg&l_X|QShhCѨݑTn_ELzX4CF&7D#L&o#F# )y3A$l|^qr~ 6zEQs9C'.نz0n+1"ܨҍ+I⚺B"碢ZRNʛ ;|=eE (geĦQAP4A!~\MyC{zY 8IpS}:}e><6>;iq/ ^EA2L˅ P'el-LKG1i4ڡ!#C_Eޱ1uxlk cACoPjlXm$[#rŏqCc<bc6*=~nʤ NyjBMWb}՟ĉ;~tEO-O2?4T֔Ί$oMCH_Z, '?f*r ~;@.w:)/! fnlRKc&axS d;y"x* fC9ZPW)urZ ど-\[JUdL8:4N|Ґ^DNS sBx\/(b~jټ ~Њ>4L*U2" 93$Cm1~\>fC@(POSh+,][X&It Rf`mw`)HD4#{U^!6$>* ,>&&EK+F k.؅ a[ ~iZ0uB.WFg Egjƫ0iq)j\-H SVLM,: s3Mk1e(G4\,_g?:ҭ^SRJ1*au>v7kj '(+zAk=:,1I8YGJ1pJU:/?jGCZn;s QAŋ T7Dz8Ē߹&cM+zfDVS\E``TLk.: 7Ұs ;[#uc5STM"k' (AN@dE&|Yr "28gJ̞jK9!6׵Y wrYW0HE+B?6p'?|d8G*L#*B&7a -֔ʽ^6q#֛,`kgྫྷG=TI-D~6,*XGBva(7x*_κ9~85`W8aw89wL?`LJw EM}89Vr韃"/Tم>\-#?ba E{pO_& >UL)6; fo3jk#bvRQT,+l2rdON*'l%fPSyr#vRI2*;FJ'0}Xdz^SlT 5RZWmFT)ovsUKW 3p0m+E?M =}"\9zkۣQ -O=?tN$oXuq{,l+)Oe8N zT(ɿxznX;Z?jA31sA/?Bsנ2OJF *9u-!{;"kjԴHW(+mc!MMFTE yfB~|d&-/Yg=1ܠ> ]@?U~3 +c3,:t1 x֖ !D,. %|4䑇EJfjASgTjy!'d+Yp6rIIxL=| ʋ7p!"5J t*\qpQ"hhI<3Pgp3igVe222|D0| 9CHGe:8:l.E6 _fKa7y!j'3TCq*R`lRS]|3OBE?uE?8515UP\#0:zRwFnmh 66KC 3#h\~m26zB9"SF3/≐:6no[3jJzCCwUgiu5vZ$djCHu/O!o"1fEqpaN5ʬ@?賴C6Y3'S,QFͣR% Po%1: >7CvYf>;!fN@Q^rEZPԯ=?Mʦ[3e;K5!:XЧtdxI޹Wu47髵agb NY/|D qڡ EؓA;9(T$  b@ith?[#IwJ*_ei;Y*Se@$bavٝp&r;ׂT `HMĠH{vCO(eeXA ,4( WJxq6#&x$yʭB];Ňb2n6=l2ڽΣxͿkS*W$7A GAAWK{qiIڞ3LJ(yS^uIWA7')Gd}QAq#-1qOrBu\i ZbsqWAȰPk4?#jvb8ߧсdwOueVHZp[sxj}ė)ҀO:h F̼ռqY2r^ +R, G}҇d_ڇ9oZa$+F elƤfkElf2'%륓ybFR=N 6 z-(0G3kid F^?OR"vJni!^ Z"ّ_ W 8 U%߻!n}zWn˳?{A%}8idW@qlcΉP$#T觃5+]Hݪ}OgC04EcZN(l vf|,xAJls M$hɔ/舷 )h!{{[ۯRbKHOTΑP2Nyɷ$xZE|Kk*VX3:6MZk.O} /kd9wUxuڳ(y6vl^#h=t:NZ ࢽ鋬e<ݩ09]4wI~+1,)gN3d[UFQ6 $KNۋybJo45B4BUV]iJ5%-ͭAybG"Mc) i-`$%$9;9sn0$ҥ4kiO:Au[dBh}r!fE-&2߶m.kۓ  )((T0ĮЮld 08lDc"o0 Wgk<$`f4;{Zf_=g$+c&(9vWɸbVM0:*{rsDh;28yq:e+82uEIwi"$ĖiKvpbZcŹE}`Ĺq܂rԹ)*[Є EyZXVǨ!3\mW[Mc<,"Āh3Ke O-E1wmD2k"6ueɃoIϣ>{ v;iT,aKb9R$AMv.6$'WƧSIF(˿2I&Q`tIYVf)Ta<Og)p˼t6r?^z2愙3e&% GUB޽=>ɈsR+7F t@Cnr9IðP7qxjhFE:@e6'y@ OnkqčܹDT{l2{{H:IZ)%cBjcR[j"eϷk>%5QHìʶ ! Mc[ӣ4MA옸z҄dO!0餾Bk0bDc%,1}!R.gS~(mkƔTid˖N˼@1桴>(3]%x/yEIX>dKb3FHӎ#`0[h7 BѿW"WZ[4s z:NX[Ӧz@"Udo43iEfUȀ~Ί#gOP[\K>z i,u/AFVʠQHOF 7z(Qw\Y[>D\"\Zl Y[-NT~zytO(9ݐ̧J/ZB q5eV7TIf}#ewർs BMXo}+&7\;O_uc;^0NNXDDDΒ%ebГ:n sksPڬ:́soѓz]赆I P3{v@m;wj3m۟_%EQ(xJJ{ p nv&N3Z*k`ч2Vo.#>қiĮ)q*pa,8kEc$q0:(g5[y/kboEX2i6/X9ga0.4·L:B?u<mKTGQ=O4ܔ)F8]}o-jo{vl/ "cqE}ٷ* 90pIUf]}3%WtbQ5VX#<-親ꋣ qA+ҩV'<)6f1Ic.#O |UerA7">-i$hkfu1J'^oXJ?YYU11OI/F8 2K zo9 BaHT]wcFh0K^rVLɺNٞQ'RxÀHYOS<~@d6=| LrE[|T#H+s ٍ̰w߳|']Y2AonX[{BdxeSw%qXPC8XeD"GZ.PecR ϝ8rHLbhL3SH,|+4Kf֎Lab1$ug5"uk 'CGEHk=n'!)/]^*Q x>L :ћHϦN,]WbclyPL5EOpPFk.?R=xQF]ǖG+;qIK M! 4򹟥Gp_"ÑdY0yae(pEBLz[ĵFr|=HqӓpQPcrdvXf=Ph\SV'dH fvwom۶;8VNS{感{M'kA j@񛝸$Po#DR[Rm!aBER`KM0';ޥ|KfS,zaJҷo {.3R!>B=&&`37Rh4O$G@'L~O'+E_CAHtYe<2Jv:[sRdl|%ǘVԬ[an${lzuj }hw/8P}aXQ9HtY$p"wУahֱӕTЪ_NS z(#Si-G[h;nG<S *(xP~:Oa]:nM|zْ>%oPkybX2 `G[~t5}]W>L2d{;T)3b/<1:hw]švX9Mhqƀ}j͘혶 /U sƫF qVqhCƽh^1 2O­]ʑdB< ڢw$AZd;EW*~X9N6^+W~01ñkv)N 59eWu҃v'D5." <+\\mH%>/S7d+DO_hIC14`ӻyZVh5 `V{X8wgWp*+̓Kz(wç+qѓA!)rӷr`)=zhu6aMCj|>%ͦyG=+{b$|"<Խ>%L)0z;,b+]ϸ5|yhDrE 2 ?XJe]b2Pō$t3QMʛ؈ʲIV8c[n9VVAƆIr9۟&}a6X=`2i%\}p O@ptXrbcwljnyZ[nm=QҨ9!rXMƏDɍ`뻦%eX4vBE sr|L>MD|䗪^AGW#9]9 [;2Ո*s[Ә#Ms;g; Zc1z7]iʑ,v|*u:zy:N:X`C=ݭ5u,8;iTd͉w&j23”_8E[rQCp7*=m$C\75 "Q+>)ѢRʕAW}PipWJTHS.ݐ@E }D;wo|{&;oUd~eu7A]Nlض(f:5'(eq RͿ~VFF^uF;JUHp J7zw-^"Ey〜iKƆqRU!<qˤsk᝱C FNXgk֚&lѸC]HsbkT&o_/&h WDB9p[뮝3g}@,(_4,F$&Q>қNi@R%VYϮ!.uV*G|~Z! ^I)4 w][fs /R.AӿOyocDІJ"J>&cg2opTWĮ+46ꅗs3"QTx4\MM1@;qRPE)\7u@G2L{ͨ&}=|vuGXSDE ;Iז48T);w"̋5ی&U).oAH81ۮ(^^Yzdl[@3?-hNLuMT DkH}-RR}QN9`i@ @8^R$zEEfE~eQ Q2hnPK¥"[=(!/X2>kRh؞r 1:ٴT"GaOș4.q1P P g߹g;z=~1xoY&3])}[G"Hmc#{5mf)a`U7bQ 7"7@-6c?O5IsDO~nq] dz퟈rݭ*%BT.[Wk%ZTbmrQ:*2|c*׮+/E&|(l2u:xK1L aѰ :`?xj{h*́:K/a{ji<7dH>kB)3bؕϼ'lĖ6Q.Upd#R`尛ʐ]z;O& 7Hfr9"ȰVʮYJ0 byT3c"y"3qcQpjĬp(TNy@ESvgx2Cvq9.G]jqTZevCaJ=BYN_l}඘9aF!Q'iIh@x̰"Sҁ`~=GD b$Z'N-WOMCvkx nkS06b)(v)՝D%C cƆ( AB\@3MT~'!"w-ְp0 dƏ7$lz`˚j-i :mo囐YAvF{k4+8/bb=#˨A;@NvIҴ o=7i|EYUS١` `&w/ڐaJ&=c)z2IӥWIp"[{*h%_ 6Eic#g@ D9GCCKfeE1zpF`WNUŀ@US(bH/ g]<: jgq;7M ?S{n0t@qyΙZ /tlJYا]I2SN,IlMf. 4\0J7tzrqn!igc' sLm 8&SgnVx\i*n7S9ܪ}Jch0~s{gT)E+*4cGnбٿ! -dW`>4gNL?LU"Wp)kv@TuJr3h9d~:|iEVWkD!ԭ[z/o`~P|(nV;g4iu.{S\ʓ:wW0>%)%%>4D[RD{i'!Pu`E/@ߞ^ Ou&YA)GdxDѪC K*Բk3Bi"{j!1'yya˚v0 KMr ) "n{&ƂYPj t%w{bx+RE)2.P(s-&1,N2;3%0F>p"ǖ`{H<Ì=ݒjE*KMe;*(F6 U°B**WwRjI{gDz`/#NH 1ieRQ+|7+hAO Xؓ gNwDu`PND)I@PX-<γnIH hpY=HM&+5yӥ~$>AL5sWJĘc7Eہ&7~y򍟼wh=`?Hoذz3+c[ȈLЎMmP}#+׋Hi6X<E ثֻ}:#k/r 90CG|TFQ]g_VʅIy?CACAzfyY@<aHjpBRWʳsb bYEâ*{ܑ4UTMuҭ>8 KßKx *SzZ9 1w7(2[jك_#S Zscx2*)[Q, Έ,)P{|woޟ8)Y2n_D\+j}*0 BknX'Q@D`&F1L%T-Av#=McǣHH vz?r &-+Ey,-͡A[]0HE-j`/L!keRF?| ~Uj)gGރ*аў2 xPagZֺ? +JȽ"'*Z zA?_),ٵ0W7W~6SF+rOK^;DAV1ٌ hw My&{pq~Oaum[ v2p$x$Aįy֪͛|: h7Vo loMg) dZ@!WɎAd9VlE_c(Og\&K;,Tl%pQT(]Ee7tal66D4,-nDͶ+9plkgM|KCK5*揊N!=0 #՛)eEST*hNC,X*QGwXr=LGEqm}-j.5 a@"L%*`R"s$wwׇbni.8 8~U\IiRq πRZS/(o&n=|_lB62F x ו֥kn;a;8zx qMVqEnrCsOtSQC xkC2] <),3Eû>gpuoP0 _j78v+"R޺ny•1(`bCwToӅ^9' 92&Jk-?`5pqnu ([Eڍ|t1dd0.n~%F8 tۍ2sn–Í_|T]R)w|_`TY#o`n3*$PQ~5ə($iWǍxƣ4Ub "S?2TluޓyL8g{qt; ? [ WmWT} L1zHΠ(:W%`$RfxM 2>_^Ls=Lv'נV=۹&sҵ!ЉbE 8 cAc΀~-&N`>vĀY2fdtb.zHzUFӳ`[F;=7<;7)6elgU~< #ZA>q.eZ UځΞ` xЩ3El0هyYU*w mV#;7S.K"]`Oŝy9M^U6/0 Zc>v"}:( ۰̆FQ =4+)mSH8Q{Şz+ņ]D#cv)ܦWq )\e\CQ)6A|,xS7GR=dvW3suwc ot"fH [GGacDj.G KnJ3S \0F:P[%LҬ tDkhHVQR+h:TMrVCa.. vG;fe4(Z70CS 9Gϛ\ 'v/r$G0$4K"J6}Ltdgrl}G gLL7|.c΍δ^^x0+\0߇veEy%:ə< :MqtB=U1ثS6xqwjE8cD=$*Q|lA>4H9sQ VXY?? WT4@Z/'t%!hZ=9|,33ljF Bz=Ԭ<Б}e5Z.۷;O'r0PCxA&B&RJalk~r6CM Ώ !k0Zƃ x߯)@v~gzA8H \蟍Wʬ2.P蛴ds𣬋B8b[qbϕ`VހD{mfoÁ=7&a+lZGh5׿9~8b&[ Tɒsp{GtВb aUևhX~q3{!Æs_HX*Afɲ;ȅ2xsuN>.#Zʼn_4KDHʵfɬNϴpy"Bc~ [#WzNLkS%1V<\K[KB(ր,It@ytfm Uo4xۻ4 [e*9ӀQI7l2)~4o̕}d9l8OASEΠ ! ZJ1 H- ֽըG.2fTf#)Yr&~nJiV1$ޞ 5T3 UW؜t~jℕ)nnzdY}͏n08et ]NLX ]P Rr 8-ie'r”$Ԯl6ۃC#r)L1وݿo<ŕuyl"!QX:QQ 1I= XǨB"h⾖P>=i4@>,?dz!0DPv:OR̊(`KEOPX/3J~{~A5NN(_\SW|@VX3aPR޵=iVrmQ}>li㙒O׭44>B+dاo(ˆ7}ϜI|R> s|67\٠i=$Q>#ӑb+o Gcc(Խ,hw!e