python3-bind-9.16.38-150400.5.20.2 >  A dbp9|~v 8U86ST":g,(tt4Q3QVoe6"YII^:;O~;Y|avWN4P_T+ۦ/IaZMo2v,ӏ gd3:P}ųsF˝ix2p w99 K2n^ZTrC{5NHHƮ ru)^+F^cт:Zh;9ecfb7422f4459fcd63236191e7d75fd9709ae47ea374e45311106688ea8ca9083e917b378d7160bf60e22eeb46cbf71a08aecc9tdbp9|f&Za7᫤#q"̒MsZFf#l;!zM4ytTMUn7- CH !t&ȱwp)7ԂQ26k⾞.T,]eʷ)k Ju^?'FʢKQKADp/ |#^ݮTd\ 8T|v4o7~̽пM6LETIs18P&)y1& 4H'x.hCY%C Esbr>p>?d % e 4Qkqx## J# # #  ?#  d# # # N t#,(8p9p:^pFG#H@#I#XY\ #]#^bc/deflu#vXw#x\#yzXhlrCpython3-bind9.16.38150400.5.20.2A module allowing rndc commands to be sent from Python programsThis package provides a module which allows commands to be sent to rndc directly from Python programs.d(sheep15GSUSE Linux Enterprise 15SUSE LLC MPL-2.0https://www.suse.com/Development/Languages/Pythonhttps://www.isc.org/bind/linuxnoarch Fj ]5 U!H%A !:&`AA큤A큤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-9.16.38-150400.5.20.2.src.rpmpython3-bind@    python(abi)python3python3-plyrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.63.0.4-14.6.0-14.0-15.2-14.14.3cc@cFc\cn9@c*c*c*c@b@ba@b~H@b3"b1@a@aZ@ayan@` @`N@``_#_:_ _d@_`_R,@_H_;_+_^)@^W@^@^I^v^t@^t@^Q^Nt^@]@]X](v@\\U@[#@[?Y[,[[{@[{@[ZnZ@ZZZz@Zg#Z'Z[@Z@ZfZ@Z@Z@Z@Z@Z ,@Z Z @YzYm@Yh@YZ1YV=@Y /X@X7@XBXwoXW_@WbW@V@VV@VvVwVVBU@UUS/: final reference detached log message was moved from the INFO log level to the DEBUG(1) log level to prevent the named-checkzone tool from superfluously logging this message in non-debug mode. [jsc#SLE-24600]- Update to release 9.16.35 Bug Fixes: * A crash was fixed that happened when a dnssec-policy zone that used NSEC3 was reconfigured to enable inline-signing. * In certain resolution scenarios, quotas could be erroneously reached for servers, including any configured forwarders, resulting in SERVFAIL answers being sent to clients. * rpz-ip rules in response-policy zones could be ineffective in some cases if a query had the CD (Checking Disabled) bit set to 1. * Previously, if Internet connectivity issues were experienced during the initial startup of named, a BIND resolver with dnssec-validation set to auto could enter into a state where it would not recover without stopping named, manually deleting the managed-keys.bind and managed-keys.bind.jnl files, and starting named again. * The statistics counter representing the current number of clients awaiting recursive resolution results (RecursClients) could overflow in certain resolution scenarios. * Previously, BIND failed to start on Solaris-based systems with hundreds of CPUs. * When a DNS resource record’s TTL value was equal to the resolver’s configured prefetch “eligibility” value, the record was erroneously not treated as eligible for prefetching. [jsc#SLE-24600]- Update to release 9.16.34 New Features: * Support for parsing and validating the dohpath service parameter in SVCB records was added. * named now logs the supported cryptographic algorithms during startup and in the output of named -V. Bug Fixes: * Changing just the TSIG key names for primaries in catalog zones’ member zones was not effective. This has been fixed. Known Issues: * Upgrading from BIND 9.16.32 or any older version may require a manual configuration change. The following configurations are affected: - type primary zones configured with dnssec-policy but without either allow-update or update-policy, - type secondary zones configured with dnssec-policy. In these cases please add inline-signing yes; to the individual zone configuration(s). Without applying this change, named will fail to start. For more details, see https://kb.isc.org/docs/dnssec-policy-requires-dynamic-dns-or-inline-signing [jsc#SLE-24600]- Update to release 9.16.33 Security Fixes: * Previously, there was no limit to the number of database lookups performed while processing large delegations, which could be abused to severely impact the performance of named running as a recursive resolver. This has been fixed. (CVE-2022-2795) * named running as a resolver with the stale-answer-client-timeout option set to 0 could crash with an assertion failure, when there was a stale CNAME in the cache for the incoming query. This has been fixed. (CVE-2022-3080) * A memory leak was fixed that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm. (CVE-2022-38177) * Memory leaks were fixed that could be externally triggered in the DNSSEC verification code for the EdDSA algorithm. (CVE-2022-38178) Feature Changes: * Response Rate Limiting (RRL) code now treats all QNAMEs that are subject to wildcard processing within a given zone as the same name, to prevent circumventing the limits enforced by RRL. * Zones using dnssec-policy now require dynamic DNS or inline-signing to be configured explicitly. * A backward-compatible approach was implemented for encoding internationalized domain names (IDN) in dig and converting the domain to IDNA2008 form; if that fails, BIND tries an IDNA2003 conversion. Bug Fixes: * A serve-stale bug was fixed, where BIND would try to return stale data from cache for lookups that received duplicate queries or queries that would be dropped. This bug resulted in premature SERVFAIL responses, and has now been resolved. [bsc#1203614, bsc#1203618, bsc#1203619, bsc#1203620, jsc#SLE-24600]- Add systemd drop-in directory for named service [bsc#1201689, bind.spec]- Include a modified createNamedConfInclude script again, as this broke compatability with existing configurations. A symlink for named.conf.include to /var/lib/named is created to allow for a read-only /etc directory. However it is still advised to change the existing configuration. See README-bind.chrootenv for a guide how to do this. [bsc#1203250, vendor-files/tools/createNamedConfInclude, vendor-files/docu/README-bind.chrootenv, bind.spec]- Update to release 9.16.32 Feature Changes: * The DNSSEC algorithms RSASHA1 and NSEC3RSASHA1 are now automatically disabled on systems where they are disallowed by the security policy (e.g. Red Hat Enterprise Linux 9). Primary zones using those algorithms need to be migrated to new algorithms prior to running on these systems, as graceful migration to different DNSSEC algorithms is not possible when RSASHA1 is disallowed by the operating system. * Log messages related to fetch limiting have been improved to provide more complete information. Specifically, the final counts of allowed and spilled fetches are now logged before the counter object is destroyed. Bug Fixes: * Non-dynamic zones that inherit dnssec-policy from the view or options blocks were not marked as inline-signed and therefore never scheduled to be re-signed. This has been fixed. * The old max-zone-ttl zone option was meant to be superseded by the max-zone-ttl option in dnssec-policy; however, the latter option was not fully effective. This has been corrected: zones no longer load if they contain TTLs greater than the limit configured in dnssec-policy. For zones with both the old max-zone-ttl option and dnssec-policy configured, the old option is ignored, and a warning is generated. * rndc dumpdb -expired was fixed to include expired RRsets, even if stale-cache-enable is set to no and the cache-cleaning time window has passed. [bind-9.16.32.tar.xz, bind-9.16.32.tar.xz.sha512.asc, bind-9.16.31.tar.xz, bind-9.16.31.tar.xz.sha512.asc, bind.spec, jsc#SLE-24600]- Update to release 9.16.31 This is the first of monthly updates of "bind". It is planned to update bind when a new upstream maintennace release becomes available, which is usually towards the end of a month, see https://www.isc.org/blogs/2021-bind-release-model/ Compared to the previous SUSE release, in this release, 53 (minor) bugs were fixed 13 (minor) functional enhancements were made 3 security issues are now fixed upstream: CVE-2022-0396, CVE-2021-25220, CVE-2021-25219 plus a few minor changes. For a full list of changes, please refer to the CHANGES file in the source rpm. This update obsoletes the following patches: * bind-fix-build-with-older-sphinx.patch * bind-CVE-2021-25219.patch * bind-9.16.27-0001-CVE-2021-25220.patch * bind-9.16.27-0002-CVE-2022-0396.patch [bind-9.16.31.tar.xz, bind-9.16.31.tar.xz.sha512.asc, bind-9.16.20.tar.xz, bind-9.16.20.tar.xz.sha512.asc, bind-fix-build-with-older-sphinx.patch, bind-CVE-2021-25219.patch, bind-9.16.27-0001-CVE-2021-25220.patch, bind-9.16.27-0002-CVE-2022-0396.patch, jsc#SLE-24600]- When enabling query_logging by un-commenting an example in bind.conf, named attempts to create a file in /var/log which fails due to missing credentials. This also applies to the "dump-file" and the "statistics-file". This is solved by having systemd-tmpfiles create a subdirectory "/var/log/named" owned by named:named and changing the file paths accordingly: /var/log/named_querylog -> /var/log/named/querylog /var/log/named_dump.db -> /var/log/named/dump.db /var/log/named.stats -> /var/log/named/stats Also, in "named.service", the ReadWritePath was changed to include "/var/log/named" rather than just "var/log". [bsc#1200685, bind.spec, vendor-files/config/named.conf, vendor-files/system/named.service]- A non-existent initialization script (eg a leftorver "createNamedConfInclude" in /etc/sysconfig/named) may cause named not to start. A warning message is printed in named.prep and the fact is ignored. Also, the return value of a failed script was not handled properly causing a failed script to not prevent named to start. This is now fixed properly. [bsc#1199044, vendor-files.tar.bz2]- Obsolete bind-chrootenv as it is no longer needed. [bsc#1196990, bind.spec]- * When using forwarders, bogus NS records supplied by, or via, those forwarders may be cached and used by named if it needs to recurse for any reason, causing it to obtain and pass on potentially incorrect answers. [CVE-2021-25220] * TCP connection slots may be consumed for an indefinite time frame via a specifically crafted TCP stream sent from a client. This issue can only be triggered on BIND servers which have keep-response-order enabled, which is not the default configuration. The keep-response-order option is an ACL block, and as such, any hosts specified within it will be able to trigger this issue on affected versions. [CVE-2022-0396] [CVE-2021-25220, bsc#1197135, bind-9.16.27-0001-CVE-2021-25220.patch CVE-2022-0396, bsc#1197136, bind-9.16.27-0002-CVE-2022-0396.patch]- Added /var/log to the ReadWritePaths as some log files are written there: * dump-file "/var/log/named_dump.db" * statistics-file "/var/log/named.stats" [bsc#1194721, vendor-files.tar.bz2]- Added "BuildRequires: python-rpm-macros". This was pulled in by python3 by mistake in the past and had been removed via Maintenance Update. [bind.spec, bsc#1194746]- Fixed CVE-2021-25219: The lame-ttl option controls how long named caches certain types of broken responses from authoritative servers (see the security advisory for details). This caching mechanism could be abused by an attacker to significantly degrade resolver performance. The vulnerability has been mitigated by changing the default value of lame-ttl to 0 and overriding any explicitly set value with 0, effectively disabling this mechanism altogether. ISC's testing has determined that doing that has a negligible impact on resolver performance while also preventing abuse. Administrators may observe more traffic towards servers issuing certain types of broken responses than in previous BIND 9 releases. [bsc#1192146, CVE-2021-25219, bind-CVE-2021-25219.patch]- Upgrade of bind to 9.16.20. This upgrade has the following MAJOR changes: * it combines the various libraries into bind-utils as they are used only for bind itself. * the daemon is started using a systemd unit rather than a sysV init script * the system is protected against a misbehaving daemon not by putting the daemon into a chroot jail but by relying on systemd protection. * it includes fixes for the following CVEs: + Fix off-by-one bug in ISC SPNEGO implementation. (CVE-2020-8625) + Insufficient IXFR checks could result in named serving a zone without an SOA record at the apex, leading to a RUNTIME_CHECK assertion failure when the zone was subsequently refreshed. This has been fixed by adding an owner name check for all SOA records which are included in a zone transfer. (CVE-2021-25214) + named crashed when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query. (CVE-2021-25215) + A specially crafted GSS-TSIG query could cause a buffer overflow in the ISC implementation of SPNEGO. (CVE-2021-25216) + An assertion failure occurred when named attempted to send a UDP packet that exceeded the MTU size, if Response Rate Limiting (RRL) was enabled. (CVE-2021-25218) * it obsoletes the following patches: + bind-Print-diagnostics-on-dns_name_issubdomain-failure-in.patch + bind-replace-varrun-with-run.patch + bind-CVE-2021-25214.patch + bind-CVE-2021-25215.patch * it brings with it this new patch: + bind-fix-build-with-older-sphinx.patch For more changes, see the CHANGES file in the src RPM. [jsc#SLE-21678,CVE-2021-25214,CVE-2021-25215, bind-Print-diagnostics-on-dns_name_issubdomain-failure-in.patch, bind-replace-varrun-with-run.patch, bind-CVE-2021-25214.patch, bind-CVE-2021-25215.patch, bind-fix-build-with-older-sphinx.patch]- Since BIND 9.9, it has been easier to use tsig-keygen and ddns-confgen to generare TSIG keys. In 9.13, TSIG support was removed from dnssec-keygen, so now it is just for DNSKEY (and KEY for obscure cases). tsig-keygen is now used to generate DDNS keys. [bsc#1187921, vendor-files.tar.bz2]- * A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly [CVE-2021-25214, bind-CVE-2021-25214.patch] * An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself [CVE-2021-25215, bind-CVE-2021-25215.patch] * A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack This does not affect this package as the affected code is disabled. [CVE-2021-25216] [bsc#1185345]- pass PIE compiler and linker flags via environment variables to make /usr/bin/delv in bind-tools also position independent (bsc#1183453). - drop pie_compile.diff: no longer needed, this patch is difficult to maintain, the environment variable approach is less error prone. [bsc#1183453, bind.spec, pie_compile.diff]- /var/run is deprecated, replaced by /run [bsc#1185073, bind-replace-varrun-with-run.patch, bind-chrootenv.conf, vendor-files.tar.bz2]- Removed baselibs.conf as SLE does not distribute 32 bit libraries. [baselibs.conf]- Added special make instruction for the "Administrator Reference Manual" which is built using python3-Sphinx [bsc#1177983, bind.spec] - Removed "Before=nss-lookup.target" from named.service as that leads to a systemd ordering cycle [bsc#1177491, bsc#1178626, bsc#1177991, vendor-files.tar.bz2]- Add /usr/lib64/named to the files and directories in bind-chrootenv.conf. This directory contains plugins loaded after the chroot(). - Replaced named's dependency on time-sync with a dependency on time-set in named.service. The former leads to a dependency-loop. - Removed "dnssec-enable" from named.conf as it has been obsoleted. Added a comment for reference which should be removed in the future. - Added a comment to the "dnssec-validation" in named.conf with a reference to forwarders which do not return signed responses. - Replaced an INSIST macro which calls abort with a test and a diagnostic output. [bsc#1177913,bsc#1178078,bsc#1177790,bsc#1177603,bsc#1175894, bsc#1177915, bind-Print-diagnostics-on-dns_name_issubdomain-failure-in.patch, bind-chrootenv.conf,vendor-files.tar.bz2]- Removed "-r /dev/urandom" from all invocations of rndc-confgen (init/named system/lwresd.init system/named.init in vendor-files) as this option is deprecated and causes rndc-confgen to fail. [bsc#1173311, bsc#1176674, bsc#1170713, vendor-files.tar.bz2]- /usr/bin/genDDNSkey: Removing the use of the -r option in the call of /usr/sbin/dnssec-keygen as BIND now uses the random number functions provided by the crypto library (i.e., OpenSSL or a PKCS#11 provider) as a source of randomness rather than /dev/random. Therefore the -r command line option no longer has any effect on dnssec-keygen. Leaving the option in genDDNSkey as to not break compatibility. Patch provided by Stefan Eisenwiener. [bsc#1171313, vendor-files.tar.bz2]- Put libns into a separate subpackage to avoid file conflicts in the libisc subpackage due to different sonums (bsc#1176092).- Require /sbin/start_daemon: both init scripts, the one used in systemd context as well as legacy sysv, make use of start_daemon.- Upgrade to version 9.16.6 Fixes five vilnerabilities: 5481. [security] "update-policy" rules of type "subdomain" were incorrectly treated as "zonesub" rules, which allowed keys used in "subdomain" rules to update names outside of the specified subdomains. The problem was fixed by making sure "subdomain" rules are again processed as described in the ARM. (CVE-2020-8624) [GL #2055] 5480. [security] When BIND 9 was compiled with native PKCS#11 support, it was possible to trigger an assertion failure in code determining the number of bits in the PKCS#11 RSA public key with a specially crafted packet. (CVE-2020-8623) [GL #2037] 5479. [security] named could crash in certain query resolution scenarios where QNAME minimization and forwarding were both enabled. (CVE-2020-8621) [GL #1997] 5478. [security] It was possible to trigger an assertion failure by sending a specially crafted large TCP DNS message. (CVE-2020-8620) [GL #1996] 5476. [security] It was possible to trigger an assertion failure when verifying the response to a TSIG-signed request. (CVE-2020-8622) [GL #2028] For the less severe bugs fixed, see the CHANGES file. [bsc#1175443, CVE-2020-8624, CVE-2020-8623, CVE-2020-8621, CVE-2020-8620, CVE-2020-8622]- Added "/etc/bind.keys" to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file. [vendor-files.tar.bz2, bsc#1173983]- Upgrade to version bind-9.16.5 * The "primary" and "secondary" keywords, when used as parameters for "check-names", were not processed correctly and were being ignored. * 'rndc dnstap -roll ' did not limit the number of saved files to . * Add 'rndc dnssec -status' command. * Addressed a couple of situations where named could crash For the full list, see the CHANGES file in the source RPM.- Changed /var/lib/named to owner root:named and perms rwxrwxr-t so that named, being a/the only member of the "named" group has full r/w access yet cannot change directories owned by root in the case of a compromized named. [bsc#1173307, bind-chrootenv.conf]- Upgrade to version bind-9.16.4 Fixing two security problems: * It was possible to trigger an INSIST when determining whether a record would fit into a TCP message buffer. (CVE-2020-8618) * It was possible to trigger an INSIST in lib/dns/rbtdb.c:new_reference() with a particular zone content and query patterns. (CVE-2020-8619) Also the following functional changes: * Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE. * The default value of "max-stale-ttl" has been changed from 1 week to 12 hours. * Zone timers are now exported via statistics channel. Thanks to Paul Frieden, Verizon Media. Added support for idn2 to spec file (Thanks to Holger Bruenjes ). More internal changes see the CHANGES file in the source RPM This update obsoletes Makefile.in.diff [bsc#1172958, CVE-2020-8618, CVE-2020-8619, Makefile.in.diff bind.spec]- Upgrade to version bind-9.16.3 Fixing two security problems: * Further limit the number of queries that can be triggered from a request. Root and TLD servers are no longer exempt from max-recursion-queries. Fetches for missing name server address records are limited to 4 for any domain. (CVE-2020-8616) * Replaying a TSIG BADTIME response as a request could trigger an assertion failure. (CVE-2020-8617) Also * Add engine support to OpenSSL EdDSA implementation. * Add engine support to OpenSSL ECDSA implementation. * Update PKCS#11 EdDSA implementation to PKCS#11 v3.0. * Warn about AXFR streams with inconsistent message IDs. * Make ISC rwlock implementation the default again. For more see CHANGS file in source RPM. [CVE-2020-8616, CVE-2020-8617, bsc#1171740, bind-9.16.3.tar.xz]- bind needs an accurate clock, so wait for the time-sync.target to be reached before starting bind. [bsc#1170667, bsc#1170713, vendor-files.tar.bz2]- Use sysusers.d to create named user - Have only one package creating the user- coreutils are not used in %post, remove Requires. - Use systemd_ordering instead of hard requiring systemd- Upgrade to version 9.16.1 * UDP network ports used for listening can no longer simultaneously be used for sending traffic. * The system-provided POSIX Threads read-write lock implementation is now used by default instead of the native BIND 9 implementation. * Fixed re-signing issues with inline zones which resulted in records being re-signed late or not at all. [bind-9.16.1.tar.xz]- Update download urls - Do not enable geoip on old distros, the geoip db was shut down so we need to use geoip2 everywhere- Upgrade to version 9.16.0 Major upgrade, see https://downloads.isc.org/isc/bind9/9.16.0/RELEASE-NOTES-bind-9.16.0.html and CHANGES file in the source tree. Major functional change: * What was set with --with-tuning=large option in older BIND9 versions is now a default, and a --with-tuning=small option was added for small (e.g. OpenWRT) systems. * A new "dnssec-policy" option has been added to named.conf to implement a key and signing policy (KASP) for zones. * The command (and manpage) bind9-config have been dropped as the BIND 9 libraries are now purely internal. No patches became obsolete through the upgrade. [bind-9.16.0.tar.xz]- Upgrade to bind-9.14.9 bug fixes and feature improvements- Upgrade to version 9.14.8: * Set a limit on the number of concurrently served pipelined TCP queries. * Some other bug fixing, see CHANGES file. [CVE-2019-6477, bsc#1157051]- Upgrade to version 9.14.7 * removed dnsperf, idn, nslint, perftcpdns, query-loc-0.4.0, queryperf, sdb, zkt from contrib as they are not supported any more * Added support for the GeoIP2 API from MaxMind * See CHANGES file in the source RPM. * obsoletes bind-CVE-2018-5745.patch (bsc#1126068) * obsoletes bind-CVE-2019-6465.patch (bsc#1126069) * obsoletes bind-CVE-2018-5743.patch (bsc#1133185) * obsoletes bind-CVE-2019-6471.patch (bsc#1138687) [bsc#1111722, bsc#1156205, bsc#1126068, bsc#1126069, bsc#1133185, bsc#1138687, CVE-2019-6476, CVE-2019-6475, CVE-2019-6471, CVE-2018-5743, CVE-2019-6467, CVE-2019-6465, CVE-2018-5745, CVE-2018-5744, CVE-2018-5740, CVE-2018-5738, CVE-2018-5737, CVE-2018-5736, CVE-2017-3145, CVE-2017-3136, configure.in.diff, bind-99-libidn.patch, perl-path.diff, bind-sdb-ldap.patch, bind-CVE-2017-3145.patch, bug-4697-Restore-workaro]und-for-Microsoft-Windows-T.patch, bind-fix-fips.patch, bind-CVE-2018-5745.patch, bind-CVE-2019-6465.patch, bind-CVE-2018-5743.patch, bind-CVE-2019-6471.patch, CVE-2016-6170, bsc#1018700, bsc#1018701, bsc#1018702, bsc#1033466, bsc#1033467, bsc#1033468, bsc#1040039, bsc#1047184, bsc#1104129, bsc#906079, bsc#918330, bsc#936476, bsc#937028, bsc#939567, bsc#977657, bsc#983505, bsc#987866, bsc#989528, fate#320694, fate#324357, bnc#1127583, bnc#1127583, bnc#1109160]- removal of SuSEfirewall2 service from Factory, since SuSEfirewall2 has been replaced by firewalld, see [1]. [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html- Add FIPS patch back into bind (bsc#1128220) - File: bind-fix-fips.patch- Don't rely on /etc/insserv.conf anymore for proper dependencies against nss-lookup.target in named.service and lwresd.service (bsc#1118367 bsc#1118368)- Update named.root. One of the root servers IP has changed. - Install the LICENSE file.- Add bind.conf and bind-chrootenv.conf to install the default files in /var/lib/named and create chroot environment on systems using transactional-updates [bsc#1100369] [FATE#325524].- Cleanup pre/post install: remove all old code which was needed to update to SLES8.- Fix a patch error in dnszone-schema file (bsc#901577)- Add SPF records in dnszone-schema file (bsc#901577)- Fix the hostname in ldapdump to be valid (bsc#965748) - Patch file - bind-ldapdump-use-valid-host.patch- Add bug-4697-Restore-workaround-for-Microsoft-Windows-T.patch Fixes dynamic DNS updates against samba and Microsoft DNS servers (bsc#1094236).- Move chroot related files from bind to bind-chrootenv (bsc#1093338)- Remove rndc.key generation from bind.spec file because bind should create it on first boot (bsc#1092283) - Add misisng rndc.key check and generation code is lwresd.init script- build with --enable-filter-aaaa to make it possible to use config option "filter-aaaa-on-v4 yes". Useful to workaround broken websites like netflix which block traffic from certain IPv6 tunnel providers. (bsc#1069633)- Add /dev/urandom to chroot env- Implement systemd init scripts for bind and lwresd (fate#323155)- Apply bind-CVE-2017-3145.patch to fix CVE-2017-3145 (bsc#1076118)- Use getent when adding user/group - update changelog to mention removed options- license changed to MPL-2.0 according to legal.- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Add back init scripts, systemd units aren't ready yet- Add python3-bind subpackage to allow python bind interactions- Sync configure options with RH package and remove unused ones * Enable python3 * Enable gssapi * Enable dnssec scripts * Remove no longer recognized --enable-rrl- Drop idnkit from the build, the bind uses libidn since 2007 to run all the resolutions in dig/etc. bsc#1030306 - Add patch to make sure we build against system idn: * bind-99-libidn.patch - Refresh patch: * pie_compile.diff - Remove patches that are unused due to above: * idnkit-powerpc-ltconfig.patch * runidn.diff- drop bind-openssl11.patch (merged upstream)- Remove systemd conditionals as we are not building on sle11 anyway - Force the systemd to be base for the initscript deployment- Bump up version of most of the libraries - Rename the subpackages to match the version updates - Add macros for easier handling of the library package names - Drop more unneeded patches * dns_dynamic_db.patch (upstream)- Update to 9.11.2 release: * Many changes compared to 9.10 see the README file for in-depth listing * For detailed changes with issues see CHANGES file * Fixes for CVE-2017-3141 CVE-2017-3140 CVE-2017-3138 CVE-2017-3137 CVE-3136 CVE-2016-9778 * OpenSSL 1.1 support - Remove support for some old distributions and cleanup the spec file to require only what is really needed - Switch to systemd (bsc#1053808) - Remove german from the postinst messages - Remove patches merged upstream: * bind-CVE-2017-3135.patch * bind-CVE-2017-3142-and-3143.patch - Refresh named.root with another update- Use python3 by default (fate#323526)- bind-openssl11.patch: add a patch for enabling openssl 1.1 support (builds for 1.0 and 1.1 openssl). (bsc#1042635)- Enable JSON statistics- named.root: refreshed from internic to 2017060102 (bsc#1048729)- Run systemctl daemon-reload even when this is not build with systemd support: if installing bind on a systemd service and not reloading systemd daemon, then the service 'named' is not known right after package installation, causing confusion.- Added bind-CVE-2017-3142-and-3143.patch to fix a security issue where an attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]- Fix named init script to dynamically find the location of the openssl engines (boo#1040027).- Add with_systemd define with default off, since we still use init scripts and no systemd units.- Don't require and call insserv if we use systemd- Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ * CVE-2017-3135, bsc#1024130 * bind-CVE-2017-3135.patch- Update to latest release in the 9.10.X series * Security fixes in 9.10.4 * Duplicate EDNS COOKIE options in a response could trigger an assertion failure. CVE-2016-2088. [RT #41809] * The resolver could abort with an assertion failure due to improper DNAME handling when parsing fetch reply messages. CVE-2016-1286. [RT #41753] * Malformed control messages can trigger assertions in named and rndc. CVE-2016-1285. [RT #41666] * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure. CVE-2015-8705. [RT #41397] * Specific APL data could trigger an INSIST. CVE-2015-8704. [RT #41396] * Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing a lookup. CVE-2015-8461. [RT#40945] * Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. CVE-2015-8000. [RT #40987] * For Features and other fixes in 9.10.4 see https://kb.isc.org/article/AA-01380/0/BIND-9.10.4-Release-Notes.html * Description of patch changes * BIND 9.10.4-P5 addresses the security issues described in CVE-2016-9131, CVE-2016-9147 and CVE-2016-9444. [bsc#1018699] * BIND 9.10.4-P4 addresses the security issue described in CVE-2016-8864. * BIND 9.10.4-P3 addresses the security issue described in CVE-2016-2776 and addresses an interoperability issue with ECS clients. * BIND 9.10.4-P2 addresses the security issue described in CVE-2016-2775. * BIND 9.10.4-P1 addresses Windows installation issues, the %z modifier is not supported under Windows and a race condition in the rbt/rbtdb implementation resulting in named exiting due to assertion failures being detected. * Following patches removed, fixed upstream * cve-2016-2776.patch * cve-2016-8864.patch- Apply cve-2016-8864.patch to fix CVE-2016-8864 (bsc#1007829).- Apply cve-2016-2776.patch to fix CVE-2016-2776 (bsc#1000362).- Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483, bsc#963971). - Make /var/lib/named owned by the named user (bsc#908850, bsc#875691). - Call systemd service macros with the full service name.- remove BuildRequire libcap. That is only a legacy library, not actually used for building. libcap-devel pulls in the right one.- Security update 9.10.3-P4: * CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure.- drop a changing timestamp making build reproducible- Build with --with-randomdev=/dev/urandom otherwise libisc will use /dev/random to gather entropy and that might block, short read etc..- Security update 9.10.3-P3: * Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189). * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure (CVE-2015-8705, bsc#962190). * Authoritative servers that were marked as bogus (e.g. blackholed in configuration or with invalid addresses) were being queried anyway.- Update to version 9.10.3-P2 to fix a remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861).- Avoid double %setup, it confuses some versions of quilt. - Summary/description update- Update to version 9.10.2-P4 * An incorrect boundary boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure. (CVE-2015-5986) [RT #40286] (bsc#944107) * A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)- Update to version 9.10.2-P3 Security Fixes * A specially crafted query could trigger an assertion failure in message.c. This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795] * On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server. This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795] Bug Fixes * Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] * Several bugs have been fixed in the RPZ implementation: + Policy zones that did not specifically require recursion could be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. This has been corrected. In most configurations, behavioral changes due to this fix will not be noticeable. [RT #39229] + The server could crash if policy zones were updated (e.g. via rndc reload or an incoming zone transfer) while RPZ processing was still ongoing for an active query. [RT #39415] + On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] + The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] + The server could crash if a reload of an RPZ zone was initiated while another reload of the same zone was already in progress. [RT #39649]- Update to version 9.10.2-P2 - An uninitialized value in validator.c could result in an assertion failure. (CVE-2015-4620) [RT #39795] - Update to version 9.10.2-P1 - Include client-ip rules when logging the number of RPZ rules of each type. [RT #39670] - Addressed further problems with reloading RPZ zones. [RT #39649] - Addressed a regression introduced in change #4121. [RT #39611] - The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] - On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] - A bug in RPZ could cause the server to crash if policy zones were updated while recursion was pending for RPZ processing of an active query. [RT #39415] - Fix a bug in RPZ that could cause some policy zones that did not specifically require recursion to be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. [RT #39229] - Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] - Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn't result in a bug during operation. If the read failed, named could segfault. [RT #38559]- Fix inappropriate use of /var/lib/named for locating dynamic-DB plugins. Dynamic-DB plugins are now loaded from %{_libexecdir}/bind, consistent with openSUSE packaging guideline. - Install additional header files which are helpful to the development of dynamic-DB plugins.- Depend on systemd macros and sysvinit on post-12.3 only. - Create empty lwresd.conf at build time. - Reduce file list pre-13.1.- Update to version 9.10.2 - Handle timeout in legacy system test. [RT #38573] - dns_rdata_freestruct could be called on a uninitialised structure when handling a error. [RT #38568] - Addressed valgrind warnings. [RT #38549] - UDP dispatches could use the wrong pseudorandom number generator context. [RT #38578] - Fixed several small bugs in automatic trust anchor management, including a memory leak and a possible loss of key state information. [RT #38458] - 'dnssec-dsfromkey -T 0' failed to add ttl field. [RT #38565] - Revoking a managed trust anchor and supplying an untrusted replacement could cause named to crash with an assertion failure. (CVE-2015-1349) [RT #38344] - Fix a leak of query fetchlock. [RT #38454] - Fix a leak of pthread_mutexattr_t. [RT #38454] - RPZ could send spurious SERVFAILs in response to duplicate queries. [RT #38510] - CDS and CDNSKEY had the wrong attributes. [RT #38491] - adb hash table was not being grown. [RT #38470] - Update bind.keyring - Update baselibs.conf due to updates to libdns160 and libisc148- Enable export libraries to support plugin development. Install DNSSEC root key. Expose new interface for developing dynamic zone database. + dns_dynamic_db.patch- PowerPC can build shared libraries for sure. idnkit-powerpc-ltconfig.patch- Explicitly BuildRequire systemd-rpm-macros since it is used for lwresd %post etc. Then drop pre-12.x material. Remove configure.in.diff2.- Corrections to baselibs.conf- Update to version 9.10.1-P1 - A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500); (bnc#908994). The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. [RT #37580] - When geoip-directory was reconfigured during named run-time, the previously loaded GeoIP data could remain, potentially causing wrong ACLs to be used or wrong results to be served based on geolocation (CVE-2014-8680). [RT #37720]; (bnc#908995). - Lookups in GeoIP databases that were not loaded could cause an assertion failure (CVE-2014-8680). [RT #37679]; (bnc#908995). - The caching of GeoIP lookups did not always handle address families correctly, potentially resulting in an assertion failure (CVE-2014-8680). [RT #37672]; (bnc#908995).- Convert some hard PreReq to leaner Requires(pre). - Typographical and orthographic fixes to description texts.- Fix bashisms in the createNamedConfInclude script. - Post scripts: remove '-e' option of 'echo' that may be unsupported in some POSIX-compliant shells.- Add openssl engines to the lwresd chroot. - Add /etc/lwresd.conf with attribute ghost to the list of files. - Add /run/lwresd to the list of files of the lwresd package. - Shift /run/named from the chroot sub to the main bind package. - Drop /proc from the chroot as multi CPU systems work fine even without it.- Add a versioned dependency when obsoleting packages.- Remove superfluous obsoletes *-64bit in the ifarch ppc64 case; (bnc#437293).- Fix gssapi_krb configure time header detection.- Update root zone (dated Nov 5, 2014).- Update to version 9.10.1 - This release addresses the security flaws described in CVE-2014-3214 and CVE-2014-3859. - Update to version 9.10.0 - DNS Response-rate limiting (DNS RRL), which blunts the impact of reflection and amplification attacks, is always compiled in and no longer requires a compile-time option to enable it. - An experimental "Source Identity Token" (SIT) EDNS option is now available. - A new zone file format, "map", stores zone data in a format that can be mapped directly into memory, allowing significantly faster zone loading. - "delv" (domain entity lookup and validation) is a new tool with dig-like semantics for looking up DNS data and performing internal DNSSEC validation. - Improved EDNS(0) processing for better resolver performance and reliability over slow or lossy connections. - Substantial improvement in response-policy zone (RPZ) performance. Up to 32 response-policy zones can be configured with minimal performance loss. - To improve recursive resolver performance, cache records which are still being requested by clients can now be automatically refreshed from the authoritative server before they expire, reducing or eliminating the time window in which no answer is available in the cache. - New "rpz-client-ip" triggers and drop policies allowing response policies based on the IP address of the client. - ACLs can now be specified based on geographic location using the MaxMind GeoIP databases. Use "configure --with-geoip" to enable. - Zone data can now be shared between views, allowing multiple views to serve the same zones authoritatively without storing multiple copies in memory. - New XML schema (version 3) for the statistics channel includes many new statistics and uses a flattened XML tree for faster parsing. The older schema is now deprecated. - A new stylesheet, based on the Google Charts API, displays XML statistics in charts and graphs on javascript-enabled browsers. - The statistics channel can now provide data in JSON format as well as XML. - New stats counters track TCP and UDP queries received per zone, and EDNS options received in total. - The internal and export versions of the BIND libraries (libisc, libdns, etc) have been unified so that external library clients can use the same libraries as BIND itself. - A new compile-time option, "configure --enable-native-pkcs11", allows BIND 9 cryptography functions to use the PKCS#11 API natively, so that BIND can drive a cryptographic hardware service module (HSM) directly instead of using a modified OpenSSL as an intermediary. - The new "max-zone-ttl" option enforces maximum TTLs for zones. This can simplify the process of rolling DNSSEC keys by guaranteeing that cached signatures will have expired within the specified amount of time. - "dig +subnet" sends an EDNS CLIENT-SUBNET option when querying. - "dig +expire" sends an EDNS EXPIRE option when querying. - New "dnssec-coverage" tool to check DNSSEC key coverage for a zone and report if a lapse in signing coverage has been inadvertently scheduled. - Signing algorithm flexibility and other improvements for the "rndc" control channel. - "named-checkzone" and "named-compilezone" can now read journal files, allowing them to process dynamic zones. - Multiple DLZ databases can now be configured. Individual zones can be configured to be served from a specific DLZ database. DLZ databases now serve zones of type "master" and "redirect". - "rndc zonestatus" reports information about a specified zone. - "named" now listens on IPv6 as well as IPv4 interfaces by default. - "named" now preserves the capitalization of names when responding to queries. - new "dnssec-importkey" command allows the use of offline DNSSEC keys with automatic DNSKEY management. - New "named-rrchecker" tool to verify the syntactic correctness of individual resource records. - When re-signing a zone, the new "dnssec-signzone -Q" option drops signatures from keys that are still published but are no longer active. - "named-checkconf -px" will print the contents of configuration files with the shared secrets obscured, making it easier to share configuration (e.g. when submitting a bug report) without revealing private information. - "rndc scan" causes named to re-scan network interfaces for changes in local addresses. - On operating systems with support for routing sockets, network interfaces are re-scanned automatically whenever they change. - "tsig-keygen" is now available as an alternate command name to use for "ddns-confgen". - Update to version 9.9.6 New Features - Support for CAA record types, as described in RFC 6844 "DNS Certification Authority Authorization (CAA) Resource Record", was added. [RT#36625] [RT #36737] - Disallow "request-ixfr" from being specified in zone statements where it is not valid (it is only valid for slave and redirect zones) [RT #36608] - Support for CDS and CDNSKEY resource record types was added. For details see the proposed Informational Internet-Draft "Automating DNSSEC Delegation Trust Maintenance" at http://tools.ietf.org/html/draft-ietf-dnsop-delegation-trust-maintainance-14. [RT #36333] - Added version printing options to various BIND utilities. [RT #26057] [RT #10686] - Added a "no-case-compress" ACL, which causes named to use case-insensitive compression (disabling change #3645) for specified clients. (This is useful when dealing with broken client implementations that use case-sensitive name comparisons, rejecting responses that fail to match the capitalization of the query that was sent.) [RT #35300] Feature Changes - Adds RPZ SOA to the additional section of responses to clearly indicate the use of RPZ in a manner that is intended to avoid causing issues for downstream resolvers and forwarders [RT #36507] - rndc now gives distinct error messages when an unqualified zone name matches multiple views vs. matching no views [RT #36691] - Improves the accuracy of dig's reported round trip times. [RT #36611] - When an SPF record exists in a zone but no equivalent TXT record does, a warning will be issued. The warning for the reverse condition is no longer issued. See the check-spf option in the documentation for details. [RT #36210] - "named" will now log explicitly when using rndc.key to configure command channel. [RT #35316] - The default setting for the -U option (setting the number of UDP listeners per interface) has been adjusted to improve performance. [RT #35417] - Aging of smoothed round-trip time measurements is now limited to no more than once per second, to improve accuracy in selecting the best name server. [RT #32909] - DNSSEC keys that have been marked active but have no publication date are no longer presumed to be publishable. [RT #35063] Bug Fixes - The Makefile in bin/python was changed to work around a bmake bug in FreeBSD 10 and NetBSD 6. [RT #36993] (**) - Corrected bugs in the handling of wildcard records by the DNSSEC validator: invalid wildcard expansions could be treated as valid if signed, and valid wildcard expansions in NSEC3 opt-out ranges had the AD bit set incorrectly in responses. [RT #37093] [RT #37072] - When resigning, dnssec-signzone was removing all signatures from delegation nodes. It now retains DS and (if applicable) NSEC signatures. [RT #36946] - The AD flag was being set inappopriately on RPZ responses. [RT #36833] - Updates the URI record type to current draft standard, draft-faltstrom-uri-08, and allows the value field to be zero length [RT #36642] [RT #36737] - RRSIG sets that were not loaded in a single transaction at start up were not being correctly added to re-signing heaps. [RT #36302] - Setting '-t aaaa' in .digrc had unintended side-effects. [RT #36452] - A race condition could cause a crash in isc_event_free during shutdown. [RT #36720] - Addresses a race condition issue in dispatch. [RT #36731] - acl elements could be miscounted, causing a crash while loading a config [RT #36675] - Corrects a deadlock between view.c and adb.c. [RT #36341] - liblwres wasn't properly handling link-local addresses in nameserver clauses in resolv.conf. [RT #36039] - Buffers in isc_print_vsnprintf were not properly initialized leading to potential overflows when printing out quad values. [RT #36505] - Don't call qsort() with a null pointer, and disable the GCC 4.9 "delete null pointer check" optimizer option. This fixes problems when using GNU GCC 4.9.0 where its compiler code optimizations may cause crashes in BIND. For more information, see the operational advisory at https://kb.isc.org/article/AA-01167/. [RT #35968] - Fixed a bug that could cause repeated resigning of records in dynamically signed zones. [RT #35273] - Fixed a bug that could cause an assertion failure after forwarding was disabled. [RT #35979] - Fixed a bug that caused SERVFAILs when using RPZ on a system configured as a forwarder. [RT #36060] - Worked around a limitation in Solaris's /dev/poll implementation that could cause named to fail to start when configured to use more sockets than the system could accomodate. [RT #35878] - Remove merged rpz2+rl-9.9.5.patch and obsoleted rpz2+rl-9.9.5.patch - Removed pid-path.diff patch as /run/{named,lwresd}/ are used by default. - Update baselibs.conf (added libirs and library interface version updates).- No longer perform gpg validation; osc source_validator does it implicit: + Drop gpg-offline BuildRequires. + No longer execute gpg_verify.sheep15 1677771560  !"#9.16.38-150400.5.20.2iscisc-2.0-py3.6.egg-infoPKG-INFOSOURCES.txtdependency_links.txttop_level.txt__init__.py__pycache____init__.cpython-36.pyccheckds.cpython-36.pyccoverage.cpython-36.pycdnskey.cpython-36.pyceventlist.cpython-36.pyckeydict.cpython-36.pyckeyevent.cpython-36.pyckeymgr.cpython-36.pyckeyseries.cpython-36.pyckeyzone.cpython-36.pycparsetab.cpython-36.pycpolicy.cpython-36.pycrndc.cpython-36.pycutils.cpython-36.pyccheckds.pycoverage.pydnskey.pyeventlist.pykeydict.pykeyevent.pykeymgr.pykeyseries.pykeyzone.pyparsetab.pypolicy.pyrndc.pyutils.py/usr/lib/python3.6/site-packages//usr/lib/python3.6/site-packages/isc-2.0-py3.6.egg-info//usr/lib/python3.6/site-packages/isc//usr/lib/python3.6/site-packages/isc/__pycache__/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:28037/SUSE_SLE-15-SP4_Update/f0920376907c6a503dfee60922a345fe-bind.SUSE_SLE-15-SP4_Updatecpioxz5x86_64-suse-linuxdirectoryASCII textPython script, ASCII text executablepython 3.6 byte-compiledASCII text, with very long lines RRRRRRRRRRRRRRRRRRRRRRRRRRRRȰ 4utf-81f6d7681cd74cabf4e0200634046f16604d13d396d247b3e8e021de609f8488a? 7zXZ !t/ᇨb] crt:bLL o3;lk]g_ʙ~mt2 -™<OOop%ýFhQ;Ϥ)21LՋcEl^Ah-,no1wDu8XW*Ufi&e+qorVX[t+@tJlQhZLI)VDt;Yj&l1]ުrpeZD5q, oj*V&|q ?~x>)9nɊ]́,fw05\t)$k?xax N[mɹ$p # rBSo7ֹDV|rwYVhռhƓIEq+Y+akXwc9௖b^O>a{ֱܡK} &; /qd[n'|#4[) ޾.=g4|m;C_?<ՏL&wPEc9st`8Y^?Ƅ9pCffWs#&ĵ&crWETMl^WP<6JL{c,c'z FAȧu,Zyfo-psD6}s%,/toaō8US ֓0Ͷ)r%*\a#16C([HݺX3ImEګm FLC2j,ⳮxJ91_,͟Ւ[^`S$c~%m V ?#"}lnT<0NSS &"G=^BԡJ˱ ?ҟn]]E5ZCqUWǝ^%}, 0%n_)lSk;&3xܑO d4UuXEtW;jфw v8; +Q<ƹz4ZnT˅C @A76{,G/x*ORpa~KkKBOmV= (sl9 Jkl &]l\{R'k&`RVyeAu>U{gȴt1}H-O-G(̀Y9c b)2KRg w 95w$Mp=&iM/Wy.l2LIOKzf$!Cɝ9,o⽴9*wp>Sa3l>Ry37NUD'icK^=P?3M\0Z_Z1tt/&Il Æxm W-Pš[Z{ї?F" Z1wM*5&~8Y.^b,[b[Soh(.UlJ0G <0fG1p*傼6>yAFY.7[7b0VpAԾUu]"1zDx"!+;[SVcsȯX`j|.uT+ EK)Ӗ4(JMte(ӵb?s1,Z'LWqh3pwX,w|Bn[u86# Y8@AkqfkWzUMcƉp] 76H@C1cF݆FMzPNn\5*321ܒ>A)$;d?\հbg P,!Yq;)1[< < RVEF@VF-w iuǥ L8 àm2hƍOE 4Np6Euk(_9#ud .q᮰.!ǚS /}onnce 'E[xP?OԯbbJRUB1q%Bi"lswʎ 0h=R,'}TA !DSsU7-qQ ™s,i}4ݺE^<,YjsA,LE;TuBvD?W&1_N7Ȑma<K (m+EC> &kHaN)+Ku$݊4p*Qs]5~'y/2@3'|`lu䅎u2 0�fHyj@7\`ʜoͩJ|aʜw&I|-&`. jqU<1b\ϫ-7TE%.=Ӵp0"ebsrnq|p[TłJCPF(+vX@J<҂셡j&ȝ'q۠e:$ELfW'K:-~=\TQJ3`n6s(H+oX].ozӈ5R -ݜ-pMሏUXB_ua~>뢜v4mk{NAul΄9 F V`1ygKݴh⁰38ESC]j80k~n )2C!v;U |&[igcޕrUQT5ʻ8?2}?R,D W?)ۄJ]ge[R̻$܊l}<}f=t0#ΥƝ.9X[กl]q/ˑ!'6Ǿde>p/e#J4&YQQ0LbmGolUd_G m& %jo҄zSDnqt9umQ-Re)r'FW̦-$xh>2:9Hn?PfTӛdn&LK=A&@n7oÒΠjlZ=h3'6B}&nyYiq,TǺ>E)JUǫPࠊ#e+x 0 hlK(cas+$OIF&(NNp+:D>O.5sNaTtd٪-V *U ;SR\! ,L] }8Z؁(j&V~\oF^s=[Q2y`PͺJW02eUu™sytT{Qop= SN ~3[h (uzQ[3em-LT" K &'B:7 r(fq6#;ߪDfQNW8fOť8If-V4RX uhp2Σh~kh1~m43!R#Rw([ ˟huW΀W>SvNs}N=e zM/*0`VUԩ],uY3G f-PRTH"6YLfӒlOR1 I4;7 J>@ٌ{Tg 2C_(a4egEjx~bೇu^P!"@(Y **o6Y ehVؚ;8+5=u.L_tI(GMd~ 1-9z8_I"ѶV..Uds?y逿ʖ 'WHކØ7+mAAjY[A<6q)Obt8zy?Ӿ$Fs3,a,/Մef/֟cj`}s ToRzs)Ӭ?vPn7cI:@S!@RBLW!c)/SyDN*|f@f:½HdGwhvO4UC{+,@A1?gf#UtQ4m/Q5hQ3Ha~HRNJv:zj?JבyE)P^b=4},54'݂B02$ Pht'S 4AMYૠë,UR 7oVU \oD<@5,(?'SHC,ҭv[1$+SXt`55BȪ}R `wFSd/Ῐcdm6szѧff{ks=)X)&kobRF=BQ*sY\)ڳ #V@jl9WEVEW9-$1=m]zc.ScPC qV `rb\0ZczcR>շ:Y55VmҀj0@EJPKhU|2hM+CuRkx_^\K 1SNdDo7g>Q¶SoM) ê.ѩ!|h6J1dmσe\>_jpѪy(ӂQdP uXz3?ɿdl|4`ғf._>@`KaL0w>{YyRC*[;aD^ppF"*Vfw KG`랚AVtdU ]" ݪ#MQU`R^~^һz$I[SN.cNYRj/]Jj "5IP Q]D:^$\Z{Ѭ3']/J2G8YU1VSD&'4,֕j5\uS Vk{8Fv6%x3h_GYd bߠXh lUKXJw.dBLAY4GbI>N{bE\uKtW `9њv|p<9@G 0a_@>Xn K/a SZ"xe9Ա(SOKί-P&ūJ ڱc(Pu3aH׵&ۖloHDf7ݓ<^)AF q* i.גd AQ3wIEݖsG%Xs}>^¡C3a gEƱLvyXϕ2sU(<_M[q=a|Qw-{j(>+lNgQ !y@|bf־j`Sp2Zkg)@NsY*\b;UB||yc9U1GMKz?=}܇zB,ݭkh-TwσX^ٶ*VDX { SG7܄]tZ*ijbוսn"E␤\߄;?h\49;n^ /=uYѽ3D+V.Ȧ<k7&\ ֧k׿ q\|MGȐ;yv^}7L|5j=`-A9%2 Uޟ |yKdy9zzfoNsa)cYO6J4hd]yRJk`S@q*k3HhA)O L~h#4H;Xe]FDqR]d"͕*M~e;B9}ǦL"L!U[l)bԎTA"ںzj=ܒFUscn8N>R>{/4[CsxQ0ƃ%r8Uk7W >kWI0h=O4m~&q{!*0ȑp>[{wYWߚ,͸  !\CD \w%Ov#*~-D7 _:[n!3zJo"?Z`W*Zn>ߊ٢yv^Ш"5OKZ8P|H=mJ [mތMO,4pZ[ p.|KT9hpaMHI)@׵U#nDE4sԵF,!{E#H'@bEcsOA?3ABC-*NaÈG{ u]0cu GjB~*Tyz\o •9Z1mfWL=0#۞!NT֢Dpisã"ޣ,itY^;-T؞Ƴ{Sq kԎZz凑f-(hW}|K~I7$z TjOŸ1J}| .0.tA?2Ew! ]@{ cp^8Bfz:*(鐬Gbt^ImodױQ#P8wUyL+$sC JX( \L%-o,W f )b  1~!ɴߗ{{ih~J[lKw݊uR4¯ uMpIN?2|D5%{ )a5%V.ϛ̣ bx%ѪJ~S.^d$4 Yf0=A~Ea (W{YpYd5 dPK;,X"`Uxn;*:?Rc# AZ f莵[N-55W7Q%ٻ1 Va8)Dwxbr_ֳ%8ez_0vU\T/v\WBV.=;5h,톲)g;J8U^fBJ-qxE2L֔ m.1 2lxRk&$}= @Hƥ )6;~qKY_fNdOq[]N"v P~~/ ,O.A!EhkG]tnp_Zec)hɝB@K ViqɉrKylMN9 K0VTdMK7J$8Т6ȷ/eYim ^N:k]>e p7jMK]3+2sD~,'9AMVA!$Wpl5j4ƹlq \$vp1)\^~04iS #(E**C%Ty˃'0*y|#4>$%ap8|,OmW5u{C)'>JDClNh! )]C* ^63rX_W%PN6>ISaX U.-FL$f8Ў@$ƞ+m?@Rm c/ q#kA+ɬ}_^̅Gk!U*B)0Cpɕ<%k %$אٵhI)- d|ާ/(.aߤ0C怵rc0n'mlѺXqD]p8@9chʩs{ڰyw$$UrçlO+g6̲ s&7oRi|nuшu~'4oi#b[h9Z8f݃27-DZ ytSt*.?~i~L"Y UG5,l4 }(ên:db{PkR @CNmgڇcdj&ZD*b~8m5'KtbVʼij%[y1WHBDX!)A[ƕ0tRŠHo0sGtUʬ*+PZ.IXxZ8>Q=En@_tNcm{J<6qf% n 3.Qޙ!oRƘCN,pPx1ZGV6þ&+a) d'I /k_HծQ̒L]d=bZPA'&J|,;C TOٹ C_41gc4#uF"CyeK֡7a'G_;PNkm_R聿7/;k]3lm dĀ' 2(Mǰducf=; 3<Pho4͚Fo%6kYfU I6)u֖"`VaC:rMLE7d^y@~`?$)گ$' /gFB eK`4'$d#p!=G5Exd g)L7OM˚jcQ=߄"C&5!ԲFUF P7@ qx6 O'HtJгEvmՊ/~5Aa.=kTn B~Af·S= rKȴ Z&IxP@KqPXPY͛K5RKquN?!w/Y{>?d<5:xeܾ<LeKjS %P&H*SF}Gr(XSaߕ"3lW2/ng>Nrn=2 * Q~lFeHIYn͸te[2[>*ͶvcCkI,ZŷH g5 =Al+P)vߐmTM~7*oPAX_Ȃ= LnZEI!bYh7ExP|RearG2փk )y̕T|wY,.uKY^⨓cq(Z\l|enGl" jB~,m1vzBf9\l kލIJwܡpDH@7Cqr)<.àNEW O?x;2p˶2nP~!T7?"~~gTsL":0,Ԡqv.y9!<ϡl-?)b]fڥ;X)٦\2%F6z)3IW##0fŠ&6-F@.imI7Th:ߝX ëRLi!ecV`k _J-{u޲ųZ@rWd4ƽq(Jr~PI9Ĥ Kߖ]͏W5ӱQ@&äN,vKyLᯬ0+*ޔo[>W=|@V^ݟCcƠ#zTA- \{UTXaEEe!ǖ-$gX_FHѶo!ϰ!qy10/{f1+eό1lCJ,EU YHٱ1n'K@_GvMtyY+ YbV K\>Y1X$ң?voxrF^)3[I1yFcjtt A[]J%:L5f>J G׻;&m2x\@΁dy' \eu$}D _b\o[2 E#;mcvȯK!9FdzN'릺?}6WT V*DoffsqErem~]Hi`wkh8(8.0;M0|]=IoA0*!^6gd2Sm=JRYdjjlW#x"ٞs )0L"+  6fRSv,x-i5@l @Ƶ8qnRJM{k@PqEִHu)5RvCvk[OH/2xό3ڧ@}cGR'(š:|y))yPkULf+D, Q"4&v;K`?u7r]P֮GWE \Hשs;04y՞%lc )R?b ӂ̍Ut6HU ޙ7:ވ\_߀&$w9eU>W[3ș hdj"J4m{0b7M$nKj1ueyT<@$5 #ի'IRע8ط!vjՅ;]1GlD2v##eV8/s[+D@'?,Cߨkb~iܮuEr^+fWXLa / f)q8?F>Y'Ѝ Fw l@,p7 ]K!p.*N^0_ŅIS_}1&MȜ[imZ&Ԋnjy/kX،S~֡"C;P׸ՐӮ+lh~,& Ͻ7w?̂UsPx')V֑ue`P;hH&F0+uX=d@ΌPƊ1Irp2ܭ+vh։L+I8gLdRe5y7YŌYW0fC$tFM˜gGsjji _+ֿo88ic<@ YZbuj{c[dC2KU(H)ǧ0wM~%>t)`[c$1gVΩ%ɴj])\ }aIϭ7`$hP^4=Vgty46!pk5?ӐpOoĝJ~ҧs͛Zu*K>}Gxvgk( gŨKqױr =ה_]]R${vQqNRcys:]pN-[=E?naf+شGl ةh0ڻ[L|mڇ}ik7K8y,NbjvJ^|:Vh:82  t:Z{o-L!čK y3`+m<6?^\sGa^v~6"gz gF~#ns --1[e|ًogυS 1 dsstE8Hn>JD؂OJb>(7}׈C=q0|x `G MfLy}-C˓q߈YVo 8"5gS_X?㻷^ sWySa"¢΍/DTPk6ytx3 U؈a6,T'b! P7PV?O{v*6ie(Y$_6 *e?k'm=q{/ )Ɓ0qi#J (/6\p( MRsHC5=U~СRh R0}G5aRxʰy-dw&.6ėV;tXO})WqE?x+Oq5~OvǸ5\3.:s]}3I'Yd!i!>uj1獽x'',/JdA|<{682"dRfC[oE>ֱWG0o} BâUtTM,q0dYV龬W)/@رvyȞ$&ewpesWacrH_n"`o`<4FrO Ssmv%t:,: O5޵cѿ3WwnL^H`wV3.Q=aVq|S+KbƐ_M3jZ4&B ĨMEo*^$iӠr?d{*؀Rdz/L7Cn7 s"2 _dcP}>r~[ᥠrAI3*E.D\EAGm}.7V6bkQznI*2 lj2:YԞḓ4ҳ:Q=F>;6_?nCmux$?2.ėP@YtfTj5?ㅿZ[f=V)%jUK9Xu[!_@v6=;9QD'=OJ4*i(QǨBТtLoGAM;$^7`i^cX0{?=RcSE_Ej^[e |chi%xfR–}N^̘gho }1n+`70niʹ P3ʟk: riR9XVuR}DX%ghӴVכ@%CE-OIz#,ph}KWLg ]$#zw"]~<:m e=SNCoCev^J6ډеUrBRoݨ'3=Gwg&{ٴ?`:GsFѥ(+}.6 :,XlJs{rP:1@A4<I1 v=?3_;/l3{lW:Lڛ`P~}bqu|; Y.n/ +Ry6_J;|Rq濦)Oі4pm^B(4o25h X|q'Y:I R76WSE%-6kl2?@=MyH$į5E=My=WO rnYTň(N~f継fz!ݢpau 6t]_}W<`J9,TJ$%G|co8h  g,u 8a>$Dg'AfK2;@5H$pm1a fwxWT= ifxş,9bFgEç#pÒ~h<%SD (r3{> ?fJ+OmMr Fd8Dvdve݂ۮxΕeϝ1tOUEX"vt&@ytwRmz}A0#+׸X!07%\*}.(,ggHRDWEGL4 xw7- 97zӧ9{ue 70d 8Rjv8'] VTYKQȷC0'B]㡅)Dq8)39yx@PpK)4P[͊nG7~ ܻPo s**QlRns"t0TTeх FgMG>ȱeݒ[fieS'o#9Q˳c;{qĚ~Dž$y}%+T<k,wf zGQڰQK^c/[H >raOPUX0ʞC3k~: qL.Cr/1lf_BE3'-YEKj ʄ`)Pn6Pʲ iWM`]X*_ ޛj4z6)NzD׊вt.F,qJ{jr16y+ $U Ӷ]9bQ7uB Ki#@Fs; 2>XΊXI,,5őͲRWgrFaFպ < f~<+#bRx#VJ@xM̍kT"M{Zȝ]FD8NHqGr ts5<ƳgOЫ,FQek~{@B=ՆX~K ڋꡕ:C SLjSku3yak"̊PkY;J-uyH- dwV=71Ab0(QXT6I暽2MUsO6aJ3i7 &50O%8 Mj"$ #i31kpL8@4ӝ`FZ?Jkfd/a s7|ЋBMcͩg2v$ e0O=F&9Z!ڡfK[4=.]5jde^\~?}L^7}t'!#w –tPBEa lXuMQؼ̚%ϓ+E[L\EY[O|=S_f{v~^}cL`\)ϏM}LIy&JZuٮѮBW 1-:qRT\!c%5OT/ɄD Ŀl,5CfZd: )| .3Ḋ>*FF2^!5nLsm6 LFIc([WVX2FW=1.!6Zr1 I\+1GmBO4<}5y]1>mXD U1@A?@ӡBd ;KS_^:,{'fZ2c?!F-vŪVZrڭkoZ7 05Q9 ,"f<+ԚOӵyS|U&'GBpA:* H&zX.f wM (Msyy4[FzYY&kq Rp*{DܡbcN"tߤH#E'|GIW k+(76buS}Qf$};9 /L|v$t(`3ne-~*6saè/4-hquIU&ts^@WaWű٫^͢8R݅ǡ 7w(aw&e##N-)7ށ;߁Mǧfߕvg '.7:E F8<$Vvq~ $:+[S_ B~vwSNJ`x+ɘ[.40XxR\WCqwD4笪Eyrw|wDK%Q-ǧ7֯!uRV;r%i|py\ SY\aöf] !_JVVƍOLۭ": #R5BU)VJ7.*~x;!B5Xua'G|{؅Sx1fS"1?),g */@4_AAtW MOzKYZc :Do}"Į3HH^imkz1;|Jzu)y^1qGv=p!0R=4+uުh r3M0bo#\1#CxGokg}nMxD U5ISkfX}nO8vxb`Z`Ih)d[unJjlMO:I(+!9X]}'T'jEzVrn&.:1 Wpd{L޿t.RncoɅ\F0T-&}.e]k) za󲚳 7IUER XI:-A8UpVI@Vo4u+4fv&k;dz֩u/0 H!m̖| z"{s!ҬnwJB5wx=QD{K>5Ȕ;p|f5eB9K[~bߎnpm'#f"$ҿnfUr ҨNx֌XnW+f(daK$r\o~z+K_6WCQwm.8 U E딉w&Xȭܞ|͏ZϷQf:[psrU44eCîvSLfa }Yi?E +SOybבL7CPʰTo3eNKǢHpj9 _KYA鏧dpCqI@N,ԛtwSM~즼` {Z:sY]6%X2Rqe]|sFLy1sZ޳oQMI6(o/=N ok^fBmL&MSi(hңaCޱ9,qK5{RQP:Lde{:ݮ:Q c|ka!wɍy7ИwENZRe+/JrPU@HY@t;*v7CI*|@/苖ga*|};W{:{ޔ{:lV/uT 2M?O(e $ÝGUS@ 1_~hj%!Cks"Kw~>y!$]%Smj"$)7dg]ڞtMe6b KVG>I7mU ٘Դ\?.|K|8C&y\I+.THߤUA$!⧟q5wI4gj$5Gt1;<0U,0`OJ@iL~7K/a3:p8"sٴ2~I0^?>XNA0So;)ᱛ $|ud 9t?տpNQך6``@3Huh@E_DG62I;>J͘1jц,d GL(7D1IũTtf8 ؞?ƨ{~jȥ6K5GK`i; p`ީB揥DZ3Uձ4c")cyR`¾]N3Ŵ(1֦7>-DP3P_fSJ: c]cl뻫IN`hK*Xz+ň6 )EŽ@Aqxvsv~SJkzo bdů9{Ǵ RP۞DN !/WAr`־9*)8FuG^UZ̲L<5oKguЁW7c2a‰0p/6;2c?_#_ KT ڥ;" _IF[B(-~a^1PGfE3ԐP1_1Ur&pisC; TALʒvwg#o(S},j:Л 55Wq"Q=t'(2`^@>2 5B:'!`JN GKF;4~![a\#odF(3`BԆZqm8}# VO GyɄ8!^bt|P{9]P7Gfa6T8dǑwxq򽸘[ysk &N| gr?Y%γbU*o_),/&@l`dJ> (dI jȽ[ASJэ_" 1&9596~ͼg#O×uj[ɩ03 qH:MUY_ g,wQ"(bsʴnU );uGK3gHa4uھnT(0Dg>[ƪ$&bz 0830f@,J`C!ЭԖnj٪5&Y@3UuTy̹<߬rE>T ,px Y44t.[kW"c'p32;! q&FWŴ YW^ ><A+_g/Bغq 'K9.[8W1*?p}Mv:Jsna^ Tov^}S]'.fElWy_D^Ë٢20UwP)x/ö=sЪjuahA(ġe ~$$N2E$;@VxO@h? @=JnIYN yTy6l6QVgH *d{t@1fh+l9Ƅ33WD.]7Dc\aosgdvŃob87H@!qЫ[6oJwH$c=R^’1 I3TǸl-pVW aH6D{:7~XZ]3 Ҍ4'O7$W/u7?ؒ#¦7,/_ mىx@YT96;o&^HOلq) gÄ%eI)#Odla]1gZ]K4f0a֥SS# =Ua.J~A)}rI1e@xeݸHgHJ W(Rb*>=#wN4\x1Ő6H _ME +~yaʡO/=D\fyuQ0B@OLMpM1HQ( 2AR+!Ynw&H E1;_g5ț1hb07=mnޱEoh0Y6$7uZDXLf$H+k_ڐbE+VׯVdecLJnu#AX'A4Q b1Lp5nT"JK{&lTBF<sRij? EY%߰?m<Զ }VcF90!AFz9Tv3\K~7av()ogmW9z' ,EA $gvQw5d\ֱ/na1IDom~)U~28 l17s GӰ7+e]]٘ksGZ)1 c!ʍ~ M\0E=ޘ9= ^jK͘OcƑ3 "u."0GxJf[r$-/|Ŝ9#!fqf4"dK>Q߮2K5߂"5yyP8ƺH~峴z8 A9FDBj <H M}>y| 4{C/| `z!g?5-;ui=m,)R}j 6ٝ@GwGX-`W;a iEPwɓR ʸDjM.6B=w˒ǚ7Ύz軔=}e+ݒHaakxL)$u-@kB%xҩ{J%i̵Hظ %C(fb5~zN)ڽ}rT)5#M%uWĔk|. E`VkV+ +>Ājs5o^)EaB )OVpHs!?6KXO))fR=@ⵦ bT\L!s4MsTu_xG?g;|K70rl)sr D4 xv֪MAʶӻ׻4Mtitf {P'龮`T!P ``!wĝ2H> <)ɻߦ H!5wzC@ɺg7[ZZr4YexIZSGQv/.(&p%.R޶]Lm7!}QM8,oe2#[ɤ T\V7:v Ͼ#S1.*|pooM;]6dB8JNm‹ꇬ"z5ڙ#8H0͐f``JŨ9r 'Y=N|C3{lq-פx%VΰH9@mnCjX;K\VƖ"47Œ8}9AŐ'+v/ߨJf|idWXЫ;'D'{楣Ŀ8>[|1|y|y%co+ЎOͭ]?Ip8t Ԧ`6Y1<[6etL*dg:||SNM%,hk˛YZFd>6 /_փ50ɣC*,x\HX/X| bk~<G΂f+Z3r5UGyKRsDj>a Xqö˫enD>{m>Qƽ%` MA~q5o@XhԏpK~#ZZĂE Q$Q8!dAҲQI$͵ ̓٥#/5cI&79 Llh6ںpzK[7RnՀi(q-~`e)d;z( J"R%nZ?d3>Žw| pk&zqrKU%h[ ܦ'; nBo>kMJO9 cfy֞{5O"D[{$4|g +ݑZ~!6y}ݜx;+g8}#4)}-HtМ7)YA3iՐ2Hz2inW7Tr$:Myy(z`A)T!1YyWϤkf*|XP??`Y^;A̸bb,hCqL]8 8Fdh9}}k?"I3g3"P#z qx2xy&E];@e3n Oΐ,HuPJ_xXQG2W9{s~ \:`8]$ )aUoȕ uHʯFpd/]7!pu,-ećOi&PokTƥ=f) 5qQ׆v$je<q8{&"+.oSz& vlE_L*KM4BH3&h*iC\#{qῡe{XshkE,]SIZPyÌY|GR#~+Q'Q_}JȻ"2WՑ=Bo twe;zmw4aR^ nD4tb^ʿNXw0O7.hVC/ ?Eem//9 XӶrU|0{cwI$=9/y)G`"A>Ck7G Vi:HXYi]C3vxlUj(QcCNJWH`zU4XO<=^|]Ԍڵ=^_N/ l 䬣b#.dWK /P7g@ |GMUiDZWIG$j>bpSDݙ܉oPyz6:W$u@KϞ^"Mdb 6%6Kuh*Fdk4L{+]Gz%dZ3M 'Wύ];Q4|W˔k׏ˊ-Uo p'{a~i’'2s ⅟\b"#['cjc v8?Wmsoȋ$r@(1,`؅~qAHod aRSJUE+twa 3K;AC /r# eqygr`5j^K}+FP^Ξ~\Tt$k. _ZB/ "5r_:}1INh-Rw<,Ҟ8Ju@WH1) J|cW;V$Q%;_O ަKN?>4Gx 4ғU戲/ g.&x){ Lϊa/‚H%QzpDHᎶ'}_˺7IVTd] *kqhhZ~NT'{SGԷkhuy*(L#0+ ۅT,ߤ@o V/#sVE4pVUWߧAMyR'^?(Ȱy;Kx kk)H͹!pWWdƕzҫt <*5,ZVh$0c&~C9E׺{Ul~,3<SUn{o7@C!BaLS:oHs&;_'6=~3swqY(i{[n :2 Gp*-<~$p[wCf? $Of0vJqyQwP=[  .y3VcشũĎD>S.DZ4?d,,EhR>ɣ^moH|#F17ydJ_y%MgVFLN]A MyWzyc ~؅Y qi!9C][^jg.T^5N1 \Tէ#Lg^C@4&H{HMX`|c:c U)"UWv&n</wD0h0Q.R]݈:m.++y5A .Gm:cTѕDjrf.3A&d59Y?>ަLuDau?5lWq,/:Z8n+xF]SYwŏteF9!sb8$y >MVx1-@Ǡ֙1g QgqHymWCӀB8ΉhHǦ7BW\JlRbx·Y7SY^Jb wZ\tv^K^#`U4n__"M#>x*R8(-+(}B/T6㬘Lҩue]˖2ET-l ϱU1ޢWB[xHwj̢}uS$ ;>9^&:yRݙwD1ddI]ޱ4dLWdo$9+uG(f+* s6t=r )ThN8a09᳃)-f=wsd+Lѯ`,7LKw9KitK tZ=Dd"66ny}k zm5*XiD.F,V=ۀ`DӨ9e mf ô`N"pH2PqY巳?ɼG #p"̿Ͼ\jd?^WB)wfrTNz} d{_NbW+Zp#=m ΂|Ds<]e{3!(Q6g$`;fl )!2j삘Q/ڤ"F-];KK-SA)Sl8C9s.-`dR'T0pZJU Z$Ok8x>Ҍi[L{MT'SKwplO[R6a2򋛏A!sl37j 49bHosOfů>1"^?%q$5m99YpՌ~u1k2xLGo/QInFVI*L2Ⱥ<̂5Az4y2$f2 t[/=,sea( ҟK$4.zTe ݏ_S<,6RVmJ\#ԝkii*u#\pnV9.&bČ sZ椆i4,ӛax#Anu9Oaol)ֳ;zHE^&b;?\.p_[Cۈ}sbĸ;A8ֳLznvdܗ'ԳV$֣X$8Ymvm\&߷P4a?J'?Ҁ ?]4fgS 4C,*0(W0wg*l:n=ĤJoNث&f^XZf&턽fh&JaՒ|Hd7S1uо]H %O&>yi#fkděQ9{2W۾wynUR'tԍj!>#Mvp&3y|ċ9Vla B\yXwb*f<]ݞy CJxO4v>VQ-[#䮏)t8-ת4ao&w:id)fOHKL[ۚr' hL*dW!z=G%D\4P"aX|QMڀV"=zľUSBS_$sj\ 3/od.Ԡ|8sƳAp6g-ڙH2s>)C;rK<w~ Jl{;]ՔymʍqpyBs:+c0: da#A/FmVᆱB\vj6ys!zЇ,+0(N*5{Nٮ锐LЗ_gTDW5DEݣzex]bV1p&MDni *l<8EF02WXOiV7mn@%X-'d[wS*aˆw4{}zޓS=ute@z*¼ëx.sMxd-ʇ ksSpwi& ӥ16>@.ATddNqrP1JN 1ܵ<C>5N[#D=9мLQxtodHwm/9lV X;r >9_۶~?0gf/ VC%o%^\DCF®ڊ*8 ^AdFr!~L*%MMiz00bLn m{iPšZlFhvۮjMh=fܕ=~$3+a l^I4Kzrolx!^-TCJm!9]Y`3'ڌ{TN]})@Q2p*dmi-P=7˶ Cr%vԉZ=w}l@J^(p(4xx<#'TbJ7^.3*S$8?ŽwHR{6-;P_\.}y~Ғ~TjD 0677*(:o^'*'/gr?&4}t:}]2V,F<Тm:~wy`E4|aھq =n$,h N6lǕ-g*jp!ϯR3M:bA-CRQMIn~ Kl1Bǩ5{KI=_ ˳ q.VU=yC`AyթCNrdd2;G KeB`5ևEPp OqoS=٨%҅ïMOv@P5;s Є@2Z믔T2ZgrtlM ϙi1bm5:*߆wT/o?4Yw gTs"sj̳( HS_߀jBqqʦwR*m5EZnY_0)fE&JXQGEᓮ/4 }~lsg(K! ;"`4`^j[%{68aK]󮓳7qT`X"z ;| _cp﹭h֭#Ml _pDn_nQӒZ?m{#ܭ2rx&UE<'oQ6M99 S"γL:]eR+.R'1Ɉ֞Z0Exz]ޟ3qwlEcimXlXTH 0vUKu4*'*2T70"-20vRWHGg%eBljSӂMXf- qZ)>w vӠCZ//O }+ :ae>_E&*;3 PV&}Y/S͍Wb-\2%d fUN"wdUVA$# C֍:|\UÆ+1t`^YO{m/ז3Y 6^LIX;pyP.:67 &JrnY F`f'LPvz[T&>q;z51et7)'Y:[KȢRPS_+5 |etcuȜV.21lEv/uf?i3֔պajF%wc)ݐ=+Wы `Bli܅" `Jc&ZֈmY[@t^sPMVP/Bپ*Z!4CAׁl <~Xxc3/`y$% xEZ63da|#f3|*ZU W(LDS"$,ml=*(5r# dccFAiRaNO9 %[>نk}LI6F+~+$WC["1 m:SjsYP 27q}1嗚Pȍl?vLCC,u?uF|9Ct<#7^kUY-n\l\`QMύ'TXߛ{/^CEm[~e #' k`-alcJǴc-S;{:f f80BMx5E!T((@WVV¸cƢ3ɴΩ7^ح!&$(յ8~W. I?GnW֎vxծAqQh/PAu@ޘ#>< nVg[v0Ha۶-!h12XP$Lau;w$LXBy pC F2cotr]"ɔ^۞|^)2DRd<muXM4)=Agm zmK8$c"ԧG7* ^} i,XQ,ɏoHY˦$߻|af7T5m^HqRǢi L}<\bp8ZSЂy.]UZzB߻pLTZ Hd|+K5mtVZ EL2717BEQ0k<_6)EHR1Ocka)l7ɭ߂:¥36 ]M 14-U:!$B~~RֈH~k.iO9Pb2ϡBg(Y{AT25:\͛`>)̀}A*Y^nhݯF_ǂvѭO=%z1YF;!|El'|{daӂ'#)g;57-c~?yI-0U%N>‚EGUh:AyJ^М:?A~* t4|ij\uxuvnMߏjdPU&:\#bS7fjez)K=t]|i)[҈50+[5#X Xr<m0w$ۗs𞎕r *?Vj mTftGFw)1)Iw;nu=I`1"`FLE L( FUT:iY}%/>$s>H]xouѩ8ģq.&/|EJMK F&hBEi'jjݨwsX kGšh~(#4^pX6Z\rЏNz̒Y♅3/׃E#j<1 gK5l,mI}4!'αp=v9fmޣn9.;6 Q=c HRꭍir^qQ">l&-dehp)@9a:_[\)әS~1]UH:`ְ`9 Ι %#%9T>5{#)n!;|ooY[_c\P/e%XZB/kmurTbj>J}D6Iq9٦VRE`r?YpqF:kM{o"鐌aY.‚ZIwȕlT7[EEf ,jI`iwK`9<8 Ja{wz*?`C᳄6ݑ~KU2U1 bsn=oI T 1oa`Mջ@zUi\Ԉ:Pg'&SssR%â fFA"vf]usY4u2~55r[nK8 DH9=MSO i<~GEɓuIֳVEj:[OgZ\5F"!? pAnWEYҬ6dYc=QROP\R'!̰~aS-lqIC| g?q(xV$h6cg ǧkVhw| B x^C ލT4l#ϟ5s^y03TcMMݦsy%^mҤHuIl]HSV1]!wRg xs ѱާ`(Liր.j"v7)1$4z?!9fP4t!z4pfÞں~ CH?zL^S-Z_A[_"zY)FNJ{),z6jv>H|CT\f*bOh 7MvLIs0GM;7.4Q m5kɑ9> ~4E1EQ/@/Mg} 1Ң?x Mi)Mij:i_4H qkj]F4B9`G1ys/$)iv.²6b~j\qt?(TM6BL8 5t6`Z/9΍Fbk1S>f,mQK)2 ~j5^6)bI$ި6s(ŴIi1Eվ}W(b[Ku{Ox*݀`F`a_4=a$~΍TގNP$! %SʼC.`G Z+v’JK;3bT^džI\{x *ʶht3EhzS^v}"#(p Y䷚Xa+]1xKTKW@0)1;5/F3/FܯQ3R֢*ONʒ˭ѿr+F,Yt#lOZ.΄NFP/quo apmY9:c!Wzwl5i\Vwպ颸* Ah2f<-i!HdԬҡ%57Xm]>ڬϦRܦ*fz*B J?3m(SM*׸*tl֕dK nI⹾t/_j?\bz0%7ʹOn˜4(Z(WV<&^9?G #H36e(3 }NF_r>vEB%O|^?HDY*@g(4&|@zgYDE 7:PyG-׏f;u9zv?oxgԷYb?j9DFh{IX5[2)0Dq9`BeyC1 Q`~%7qgvRpaM>Q7#9;}0$xE,}[#|i . v4k-{$ "ocOTd3L"gMx/7^{,/AN,?$ÄG9 QYe죏|W: ]>rPԹ([2TWM\-s)6{Z50^Zڽba{|y2`;,Ss{#zOwLۇ1F!SК qtް 3QI~:it55A%V5PJŦ\O[G&uf^A.셰k|ܷI*Գo|̷"pO]su<5'6`SvuR-D`2S`Yw\RsuE3=ᕫYuMf, _΄k1[vAP 7 ^"3B1Tb3k2sg$.8\ӇGO>юaFp/+Ƭ.̌zݜ(RN2 f 4}!b$)cÓ18˱爃F7M&SQML^CP[UKżP {V۲޳f;7\*T^Ɍ,~"MhjSp{˕^Ӛjt2Xs(tʇ9Gw&"-74@z.Ɛ(=(;t{P ߆9dE6[z PdO=C8Mx3bmr;]Dl9'VhBL},d I=b ?H`ebRG|'-زGxr!2c%6Sڴ+eD `5fQs9c|UkMDb?h~u,qH~ `ݍ xI Xa)=q*7TU 4O@EI(цϿ;8y(sJLH3₊ 0J%%#:dK ">.v+t]T)*/k!6'܂=u4ĜAI"^@X66׋f0=D43d3\ 2H庥AxO{d+~$#9.3.YX8IJ $/":Gʕ{iE|`LpPj1tiõw G9ֺ9]sfI)Sd?b ú|~-x ~ ݄>QKraZZrŜ1$/n sNxLď \.XTnbR30EqGփ/!MUg/p~D5.;~ |XoJ^0aB?M+T`:6 ERv-; t ~hZcH036Υ;HJunLE{ۦEHO] G=Rj\HE] ߣPv0b(Q$egp;&~d6GA}&$ C#ě*8 †e?;6tAzsiQe=Qq{̃?H>XahƄ??H ;-[5u 4! gK DIo"il(G_4I;,*%f 6BQHGppS@tYj"gHnd `@!&ILҴ k1L9hV4ĝVKӧI~W^Ge_w'q.wMK'.h ܨՎ YZ