shorewall6-lite-5.2.8-bp155.4.6 >  A dkPϊI%z #VyCc׵y'4q4)?[l:P%bMTlהGary*%zaSCz- 3`4Gϳ~7&q{ڟ[Wf|cL5$d`SΏԹ0@M4mil$$8vy"_ 5yLЛ +| q9Bk2/jM:o7 eMG-Xե>nj[H#̨/shCtjE8KIs~=jQ_a`4D>LH^N7:6Tߖ<4ƎN!kCSg"Dބ(YA1B\b8|) 05oƍWa o^Q1#|l<7 ۃ2 6T&j'!6h'd1.I4YF60 0 -RĹ?RsfiY=;=7b2b0560cb875ee36d7e9fb8d76057878d4890e9c9c716e473a368d44bd0b0acb7b08dc5245ba334eaa48f5055b4aec0536dc8eabP؉dkPϊI%z ;,Q<,uH[$dR*UY` =.: 8v3 yϧ~\f?,FIu^'PP,0Pѝ=:0CZ G| 1t9S?\g" ͍a#z6L0/~S[Z ;]<+t|hꞓ)cH7 |bnEh댧No3A0̹z7f} k(R `}qNhm|n+n/uyh.KD3=u(Wݗd͕)2fm lVfW尊.P‰x_j/<5[Qk~|p`R8pWOtӓeoo[@RTe{~R\ݼ6Nb=9"A]IwfҌQXT;i†nb}ߖj)6>q>xKH4KК{IHa`k W?"lvv~hOM% P$M/v D0>pF?ɰd " m"/ Ij  @ * \   0*LLo(8999:9=P>X?`@hFpGHILXhYt\¤]^ĊbcxdefluvdwȄxyLzP`djɬCshorewall6-lite5.2.8bp155.4.6Shoreline Firewall 6 Lite is an ip6tables-based firewall for Linux systemsThe Shoreline Firewall 6, more commonly known as "Shorewall6", is a Netfilter (ip6tables) based firewall that can be used on a dedicated firewall system, a multi-function gateway/ router/server or on a standalone GNU/Linux system. Shorewall6 Lite is a companion product to Shorewall6 that allows network administrators to centralize the configuration of Shorewall6-based firewalls.dkPbuild77SUSE Linux Enterprise 15 SP5openSUSEGPL-2.0-onlyhttps://bugs.opensuse.orgProductivity/Networking/Securityhttp://www.shorewall.net/linuxnoarch if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in shorewall6-lite.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in shorewall6-lite.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done firm -f /etc/shorewall/startup_disabled test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable shorewall6-lite.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop shorewall6-lite.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in shorewall6-lite.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart shorewall6-lite.service ) || : fi fiW  F]# 6gA큤AA큤AdA큤A큤AdkPdkPdkPdkPdkPdkPdkPdkPdkPdkPdkP_m_mh_mhdkPdkPdkPdkPdkPdkPdkPdkPdkPdkPdkPb672c708f1bf6d786923fbce6b4a9e09e6923f4b1ad91e548925d050e16cf4ef67350c211600ceace475d3f7b516ec9839050528e707bab429eb7ac2715a422c7dc6a93f21d141b4fb77554962846e6edd8b9d44703bc3d91aea8d0e232145aa9b64fd4dd8c052be6bc0fc9ab652fdab26a24d48d34412b3aec35693dba6e65252a3e0fa854435ff6d3e41be2ab42bac07c7c97976c41ad9e0ac82446a8ebadb207d981292ca395ceaa05af027f04ec85ad0e9d6f0ccada9f378a3660de9c20c746c24eefd1ec97693f21420104f06a18ff8f2dbfc441005163178c54c1e2fb465d42b6eadf5f85ca64d8f4530e6e3cd4228e16439b901c478a3a6e6ebe72825ff59caa54b10685cc63faed41678dccd42d371a478b7ab624e253c26d84a01b47ff6054b8eefc257f9b05de0c2bc1356faeab86337002dcd4af8a5da633aed7e7118e7669236b60b6426894fa9c44ecd7cf66198d0cdf40795199a72c0f5e4babbddcc21ad20370a39ad7cabca0bf0aae31516f591bd4f4c23553c5da729d8dc118e28dac7ef38139817fb8d2416852860036a70c215c099535058e7c3bab93a30a110733dbe4eacf3a25371ae2704d18bbcc68a12d37072f7ed6cbe77e5d07296cbba0b6bc9a09d588b1a2de0a078ffcb35a31827e7ff1aaa9817df42caac88serviceshorewalllib.baserootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootshorewall-5.2.8-bp155.4.6.src.rpmconfig(shorewall6-lite)shoreline_firewallshorewall6-lite @     /bin/sh/bin/sh/bin/sh/bin/sh/bin/sh/usr/sbin/servicebcconfig(shorewall6-lite)coreutilsdiffutilsfillupgrepiproute2iptableslogrotaterpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)shorewall-coresystemdsystemdsystemdsystemd5.2.8-bp155.4.63.0.4-14.6.0-14.0-15.2-15.2.8-bp155.4.64.14.3ccAc_/@__o-@_A_c^@^^^1^^v^0^n^h^J@^8 @^)]o@\r@\v{\q5\V\/JZ>Z1@Z7Y@YYf@YTYJ_YA%@X[XrX,XN@XGVU@UUa@UKSU-@U@U@T@TÉ@TNT@T@TT@Tq@TZ@Thorsten Kukuk Bruno Friedmann Bruno Friedmann Bruno Friedmann Togan Muftuoglu Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Dominique Leuenberger Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann Bruno Friedmann bruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.cholaf@aepfle.debruno@ioda-net.chalarrosa@suse.combruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chbruno@ioda-net.chtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.orgdimstar@opensuse.orgtoganm@opensuse.orgtoganm@opensuse.org- Add /etc/sysconfig/network hierachy, as this don't exist by default anymore- Add %dir %{_distconfdir} stop build failing on Leap- **Warning** this is the last patch revision to shorewall. No migration to manage nft will happen upstream. Be prepared to package removal, and migrate to firewalld. - Add shorewall-fix-install-manpages.patch fix boo#1203006 - Update spec copyright and macros - Move /etc to /usr for Networkmanager and logrotate - Update rpmlint check list- Rework xt_geo_ip fixes by using dynamic patching with find which is less burden and confusing than manual patches series. - Add dynamic patching for *.service with removing like upstream the obsolete StandardOutput=syslog until new release- Correct the xt_geo_ip locations - Correct output to journal- Update to version 5.2.8 (Upgrade your configuration) https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.8/releasenotes.txt + Certain restrictions that apply to wildcard interfaces (interface name ends in '+') were previously not enforced when the logical interface name did not end in '+' but the physical interface name did end in '+'. That has been corrected. + To ensure that error messages appear in the correct place in the output stream, stderr is now redirected to stdout when the configured PAGER is used by a command. + Since Shorewall 5.1.0, the Shorewall uninstall.sh script has incorrectly removed ${SBINDIR}/shorewall, while the Shorewall-core uninstall.sh script has failed to remove that file. Both scripts have been corrected. + Previously, the Shorewall CLI included a spurious hyphen ('-') between the product name (e.g., 'Shorewall6') and the version when printing a command output banner. + The shorewall-snat(5) manpage previously stated that a comma-separated list of IP address could be specified for SNAT. That statement was in error and has been removed. As part of this change, IPv4 Example 6 has been updated to use the PROBABILITY column. - New features + 'show tc' command now shows the classifiers associated with each interface (as displayed by the 'show classifiers' command). This integrated qdisc/filter information is also included in the output of the 'dump' command. This change deprecates the 'show classifiers' ('show filters') command, as that command's output is now included in the 'show tc' output. + Shorewall6 has traditionally generated rules for IPv6 anycast addresses. These rules include: a) Packets with these destination IP addresses are dropped by REJECT rules. b) Packets with these source IP addresses are dropped by the 'nosmurfs' interface option and by the 'dropSmurfs' action. c) Packets with these destination IP addresses are not logged during policy enforcement. d) Packets with these destination IP addresses are processes by the 'Broadcast' action. Beginning with this release, individual network interfaces can be excluded from this treatment through use of the 'omitanycast' option in /etc/shorewall6/interfaces. Note: This option was named 'noanycast' in earlier Beta releases. + Duplicate function names have been eliminated between the Shorewall-core lib.cli shell library and the Shorewall lib.cli-std library. + The 'status' command in Shorewall[6]-lite now precedes the configuration directory name with the administrative host name separated with a colon (":"). + Tuomo Soini has contributed a macro that handles NFS v1.4 (no dynamic ports). - Packaging: + Add buildrequires for pkgconfig (missing) + Use macro for sbindir- Update to version 5.2.7 + **Upgrade your configuration** https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.7/releasenotes.txt + Previously, it was not possible to classify traffic by destination IP address when using an Intermediate Functional Block (IFB) for traffic shaping. This is because such classification takes place before the traffic passes through the mangle PREROUTING chain. Such filtering is now possible by setting the 'connmark' option in the tcdevices file. This option causes the current connection mark to be copied to the packet mark prior to filtering, thus allowing the packet mark to be used for classification. This change adds a new CONNMARK_ACTION capability which is required to be able to specify the 'connmark' option. + The tcpri file now supports ?FORMAT 2 which inserts an SPORT column directly to the right of the PORT column. As part of this change, the PORT column is renamed to DPORT while allowing both 'port' and 'dport' to be used in the alternate input format. See shorewall-tcpri(5) and http://shorewall.org/simple_traffic_shaping.html for additional information. + The Simple TC document is now linked to FAQs 97 and 97a.- Update to version 5.2.6 + **Upgrade your configuration** https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.6/releasenotes.txt + When compiling for export, the compiler generates a firewall.conf file which is later installed on the remote firewall system as ${VARDIR}/firewall.conf. Previously, the CLI on that firewall was not processing the file, resulting in some features not being available: - Default values for VERBOSITY, LOGFILE, LOGFORMAT, PATH, SHOREWALL_SHELL, SUBSYSLOCK, RESTOREFILE, RESTART, DYNAMIC_BLACKLIST and PAGER are not supplied. - scfilter file supplied at compile time. - dumpfilter file supplied at compile time. That has been corrected. + A bug in iptables (see https://git.netfilter.org/iptables/commit/?id=d1555a0906e35ba8d170613d5a43da64e527dbe1) prevents the '--queue-cpu-fanout' option from being applied unless that option is the last one specified. Unfortunately, Shorewall places the '--queue-bypass' option last if that option is also specified. This release works around this issue by ensuring that the '--queue-cpu-fanout' option appears last. + The -D 'compile', 'check', 'reload' and 'Restart' option was previously omitted from the output of 'shorewall help'. It is now included. As part of this change, an incorrect and conflicting description of the -D option was removed from the 'remote-restart' section of shorewall(8). + Previously, when EXPAND_POLICIES=No, chains that enforced ACCEPT policies were not completely optimized by optimize level 2 (ACCEPT rules preceding the final unconditional ACCEPT were not deleted). That has been corrected such that these rules are now optimized.- Update to version 5.2.5.2 https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.5/releasenotes.txt + 5.2.5.2 Previously, ";;+" was mishandled in the snat file; the generated rule incorrectly included the leading "+". That has been corrected so that the generated rule is now correct. Example (SNAT OpenVPN server traffic leaving on eth0): SNAT(192.2.0.4) - eth0 ;;+ -p udp --sport 1194 + 5.2.5.1 - The change in 5.2.5 base which changed the 'user' facility to the 'daemon' facility in Shorewall syslog messages did not change the messages with severity 'err'. That has been corrected such that all syslog messages now use the 'daemon' facility. - The actions.std file contains "?IF...?ELSE...?ENDIF" sequences that provide different action options depending on the availabilty of certain capabilities. This has resulted in the Broadcast and Multicast options being listed twice in the output of "shorewall[6] show actions". Beginning with this release, this duplication is eliminated. Note, however, that the options shown will be incomplete if they were continued onto another line, and may be incorrect for Broadcast and Multicast. - A typo in shorewall-providers(5) has been corrected. + 5.2.5 Base - Previously, Shorewall-init installed a 'shorewall' script in /etc/network/if-down.d on Debian and derivatives. This script was unnecessary and required Debian-specific code in the generated firewall script. The Shorewall-init script is no longer installed and the generated firewall script is now free of distribution-specific code. - Also on Debian and derivatives, Shorewall-init installed /etc//NetworkManager/dispatcher.d/01-shorewall which was also unnecessary. Beginning with this release, that file is no longer installed. - Previously, if the dynamic-blacklisting default timeout was set in a variable in the params file and the variable was used in setting DYNAMIC_BLACKLIST, then the 'allow' command would fail with the message: ERROR: Invalid value (ipset-only,disconnect,timeout=) for DYNAMIC_BLACKLIST That has been corrected. - When EXPAND_POLICIES=No in shorewall[6].conf, policies in complex rulesets are enforced in chains such as 'net-all' and 'all-all'. Previously, these chains included redundant state-oriented rules. In addition to being redundant. these rules could actually break complex IPv6 configurations. The extra rules are now omitted.- Update to bugfix version 5.2.4.5 + The description of the 'optional' option has been expanded in shorewall-interfaces(5). + Previously, the AUTOMAKE option did not work properly when /etc/shorewall[6] was a symbolic link. That has been corrected. - Packaging + Remove broken %pretrans, move content to %pre + Remove use of %release in rpm scriptlet + This will avoid constant rebuild.- Update to bugfix version 5.2.4.4 + When DYNAMIC_BLACKLIST=ipset... or when SAVE_IPSETS=Yes in shorewall[6].conf, 'shorewall[6] start' could hang. Fixed. + 'shorewall[6] start' would not automatically create dynamic blacklisting ipsets. That has been corrected. - This version will served also as maintenance upgrade for Leap- Update to version 5.2.4.2 https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.4/releasenotes.txt + Fixes for debian - Update to version 5.2.4.1 + Fixes for openSUSE shorewall-init will now ignore 'start' and 'stop' commands, for running firewalls + Spurious messages have been removed - Packaging + Move /usr/sbin/shorewall to shorewall-core so -lite version doesn't need main shorewall package + To make shorewall remote-* command working we patch lib.cli-std to use /usr/sbin instead of /sbin + commented spec + Desactivate for the moment the upgrade warning. we need to find a 100% working solution. + use %{var} form everywhere- Add perl-base as buildrequirement to force choice of SHA-DIGEST new problem in TW - To fix boo#1166114 never restart shorewall-init.service macro service_del_postun is replaced by simplier systemd_postun - Remove conflict between main and lite package. A managing station need main to build configuration and can use - lite to execute it. Users are in charge of choosing which service has to be started and used. ❤ Freedom- Remove shorewall require from shorewall-init (was a forgoten action)- Update to version 5.2.4 https://shorewall.org/pub/shorewall/5.2/shorewall-5.2.4/releasenotes.txt + Previously, when a Shorewall6 firewall was placed into the 'stopped' state, ICMP6 packets required by RFC 4890 were not automatically accepted by the generated ruleset. Beginning with this release, those packets are automatically accepted. + Previously, the output of 'shorewall[6] help' displayed the superseded 'load' command. That text has been deleted. + The QOSExample.html file in the documentation and on the web site previously showed tcrules content for the /etc/shorewall/mangle file (recall that 'mangle' superseded 'tcrules'). That page has been corrected. + The 'Starting and Stopping' and 'Configuration file basics' documents have been updated to align them with the current product behavior. + The 'ipsets' document has been updated to clarify the use of ipsets in the stoppedrules file. - Packaging + shorewall-init package has a removed %service_del_postun macro to close bug boo#1166114 Restarting this service can lock down admin out of the system. + shorewall(6) and shorewall(6)-lite conflict has they shouldn't be installed together on the same system. + conf_update flag is set to 1 to activate update reminder + Adjust and cleanup requires- Add version to requires in -lite version- Update to minor bugfix version 5.2.3.7 + When DOCKER=Yes, if both the DOCKER-ISOLATE and DOCKER-ISOLATE-STAGE-1 existed then the DOCKER-ISOLATE-STAGE-* chains were not preserved through shorewall state changes. That has been corrected so that both chains are preserved if present. + Previously, the compiler always detected the OLD_CONNTRACK_MATCH capability as being available in IPv6. When OLD_CONNTRACK_MATCH was available, the compiler also mishandled inversion ('!') in the ORIGDEST columns, leading to an assertion failure. Both the incorrect capability detection and the mishandled inversion have been corrected. + During 'enable' processing, if address variables associated with the interface have values different than those when the firewall was last started/restarted/reloaded, then a 'reload' is performed rather than a simple 'enable'. The logic that checks for those changes was incorrect in some configurations, leading to unneeded reload operations. That has been corrected. + When MANGLE_ENABLED=No in shorewall[6].conf, some features requiring use of the mangle table can be allowed, even though the mangle table is not updated. That has been corrected such that use of such features will raise an error. + When the IfEvent(...,reset) action was invoked, the compiler previously emitted a spurious "Resetting..." message. That message has been suppressed. - Packaging + Do not provide anymore unsused notrack file + Introduce define conf_need_update to track when we activate the post update warning for users when there's minor or major version update of shorewall bnc#1166114- Update to bugfix minor 5.2.3.6 + Fix for possible start failure when both Docker containers and Libvirt VMs were in use.- BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to shortcut through the -mini flavors.- Update to bugfix minor 5.2.3.5 + A typo in the FTP documentation has been corrected. + The recommended mss setting when using IPSec with ipcomp has been corrected. + A number of incorrect links in the manpages have been corrected. + The 'bypass' option is now allowed when specifying an NFQUEUE policy. Previously, specifying that option resulted in an error. + Corrected IPv6 Address Range parsing. + Previously, such ranges were required to be of the form [-] rather than the more standard form []-[]. In the snat file (and in nat actions), the latter form was actually flagged as an error while in other contexts, it resulted in a less obvious error being raised. + The manpages have been updated to refer to https://shorewall.org rather than http://www.shorewall.org. - Refresh spec file- Update to bugfix minor 5.2.3.4 + Update release documents. + Correct handling of multi-queue NFQUEUE as a policy. + Correct handling of multi-queue NFQUEUE as a macro parameter. + Make 'AUTOMAKE=No' the update default. + Correct the description of the 'bypass' NFQUEUE option in shorewall-rules(5).- Update to bugfix minor 5.2.3.3 Previously, if an ipset was specified in an SPORT column, the compiler would raise an error similar to: ERROR: Invalid ipset name () /etc/shorewall/rules (line 44) - Update to bugfix minor 5.2.3.2 Shorewall 5.2 automatically converts an existing 'masq' file to an equivalent 'snat' file. Regrettably, Shorewall 5.2.3 broke that automatic update, such that the following error message was issued: Use of uninitialized value $Shorewall::Nat::raw::currentline in pattern match (m//) at /usr/share/shorewall/Shorewall/Nat.pm line 511, <$currentfile> line nnn. and the generated 'masq' file contains only initial comments. That has been corrected.- Update to bugfix minor 5.2.3.1 release + An issue in the implementation of policy file zone exclusion, released in 5.2.3 has been resolved. In the original release, if more than one zone was excluded then the following error was raised: ERROR: 'all' is not allowed in a source zone list etc/shorewall/policy (line ...)- Update to new 5.2.3 bugfix release http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.3/releasenotes.txt This is the retirement of Tom Eastep see. https://sourceforge.net/p/shorewall/mailman/message/36589782/ - Removed module* in file section - Clean-up changes and spec (trailing slashes)- Update to new 5.2.2 bugfix release http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.2/releasenotes.txt - Packaging: + As seen with upstream recommend running shorewall update on all version update + to be done: run update automatically- Update to major version 5.2.1.4 A lot of changes occurs since last package please consult http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.1/releasenotes.txt and the know problem list at http://www.shorewall.net/pub/shorewall/5.2/shorewall-5.2.1/known_problems.txt - Update your configuration shorewall update - Packaging: renew spec file with spec-cleaner- Changes in 5.1.12.3 Problems Corrected: When 'reset' and 'dst' were specified to the IfEvent action, the action would incorrectly attempt to reset the event for the SOURCE IP address rather than the DEST address. That has been corrected.- spec : + Minimal changes with spec-cleaner + Stop conflicting with other firewall (SuSEFirewall2, firewalld) User can have several management tools, and it help preparing a migration - Run shorewall(6) update -A to update your configurations Check and adapt them before restarting. - Changes in 5.1.12.3 + Update release documents. + Ensure that mutex gets released at exit. - Changes in 5.1.12.2 + Alter documentation to prefer ';;' over ';' in INLINE and IP[6]TABLES rules. + Make 'update' convert ';' to ';;' in INLINE, IPTABLES and IP6TABLES rules. + Correct typo that resulted in an "unknown function" Perl diagnostic. + Correct "Invalid policy" message. + Fix omitted SYN limiting. - Changes in 5.1.12.1 + Replace macro.SSDPServer with corrected macro.SSDPserver. - Changes in 5.1.12 Final + Update release documents. + Add INLINE_MATCHES=Yes to the deprecated list. - Changes in 5.1.12 RC 1 + Update release documents. + Minor performance enhancements to Optimize Category 8. + Always report IPSET_MATCH. - Changes in 5.1.12 Beta 2 + Delete undocumented OPTIMIZE_USE_FIRST option. + Merge 5.1.11. + Suppress trailing whitespace. + Avoid awkward blank lines. - Changes in 5.1.12 Beta 1 + Code and manpage cleanup. + Allow SNAT in the INPUT chain. - Changes in 5.1.11 Final + Update release documents. - Changes in 5.1.11 RC 1 + Update versions and copyrights. + Clear the connection mark on forwarded IPSEC tunneled connections + Make TRACK_PROVIDERS=Yes the default. - Changes in 5.1.11 Beta 2 + Be selective about verification of the conntrack utility when + DYNAMIC_BLACKLIST=ipset,disconnect... + Don't require shorewall to be started for 'allow' with ipset-based DBL. + Make address variables play nice with the 'clear' command. + Don't unconditionally enable forwarding during 'clear'. - Changes in 5.1.11 Beta 1 + Allow non-root to run some 'show' commands. + Use synchain name in log messages rather than base chain name. + Assume :syn for TCP CT entries in the conntrack file and HELPER. + Limit depth of 'find' search when AUTOMAKE=Yes. - Changes in 5.1.10.2 + Limit 'find' to depth 1. + Don't run find in an empty entry in $CONFIG_PATH - Changes in 5.1.10.1 + Fix Shorewall-core installer for sandbox case. + Make /etc and /configfiles the same. - Changes in 5.1.10 Final + Add warning re wildcard and OPTIONS. + Correct IPv6 Universal interfaces file. - Changes in 5.1.10 RC 1 + Correct ingress policing. + Fix Shorewall-init recompilation problem. - Changes in 5.1.10 Beta 2 + Allow a protocol to be associated with a regular action. + Remove the PSH flag from the FIN action. - Changes in 5.1.10 Beta 1 + Allow CONFIG_PATH setting to begin with ':' to allow dropping the first directory by non-root. + Correct several typos in the manpages (Roberto Sánchez). + Correct typo in 'dump' processing. + Reset all table counters during 'reset'. - Changes in 5.1.9 Final + Use logical interface names in the Sample configs. - Changes in 5.1.9 RC 1 + Apply W Van den Akker's OpenWRT/Lede patches. + Don't verify IP and SHOREWALL_SHELL paths when compiling for export. + Support for Redfish remote console in macro.IPMI - Changes in 5.1.9 Beta 2 + Merge content from 5.1.8. - Changes in 5.1.9 Beta 1 + Update release documents. + Add TCPMSS action in the mangle file. + Inline the Broadcast action when ADDRTYPE match is available. + Support logging in the snat file. + Add shorewall-logging(5). - Changes in 5.1.8 Final + Correct 'delete_default_routes()'. + Delete default routes from 'main' when a fallback provider is successfully enabled. + Don't restore default route when a fallback provider is enabled. + Issue a warning when 'persistent' is used with RESTORE_DEFAULT_ROUTE=Yes. + Don't dump SPD entries for the other address family. + Fix 'persistent' provider issues. + Treat LOG_TARGET the same as all other capabilities. + Allow merging of rules with IPSEC policies- spec : + use new %_fillupdir macro with env DIRFILLUP in build * Redone patches *-fillup-install.patch to use ${DIRFILLUP} * use new %_fillupdir macro in files + change require perl to perl-base + Added conflict with firewalld + Refresh list of files and modules - Run shorewall(6) update -A to update your configurations Check and adapt them before restarting. - 5.1.8.1 release - Recommended action : + Update release documents + Make persistent routes and rules independent of 'autosrc' + Correct 'delete_default_routes()' + Delete default routes from 'main' when a fallback provider is successfully enabled + Don't restore default route when a fallback provider is enabled + Issue a warning when 'persistent' is used with RESTORE_DEFAULT_ROUTE=Yes + Don't dump SPD entries for the other address family + Fix 'persistent' provider issues + Treat LOG_TARGET the same as all other capabilities + Allow merging of rules with IPSEC policies - 5.1.7.2 release Please refer to releasenote.txt for a detailled description. As always use shorewall [-6] update and revise your configuration + Features summary * Module loading streamlined, shorewall [-6] update will remove MODULE_SUFFIX configuration * Check route if detect is used in gateway column (dhcpd5 has now binary encoded .lease) * DNAT and REDIRECT support in ShorewallActions * Docker configuration support: DOCKER-INGRESS chain. + Fixes summary * Fix shorewall-snat(5) man page example, DEST column has to be read eth0:+myset[dst] * Fix invalid vlsm to ipcalc message * ADD_IP_ALIASES is set to NO for ipv6 while yes for ipv4 * Cleanup .tmp in save ipset operations. * Command reenable fix for persistent and non-persistent interfaces * Warn if getattr failed (SeLinux) - 5.1.6 release + Fixes summary * $SHAREDIR $CONFIGDIR available again * Fix compilation with optimize level 8 * Be consistant with Netfilter interpretation of 'eth'='eth+' * RESTORE_WAIT_OPTION serialize start of ipv4/ipv6 with -w option * RDP macros handle also UDP part + Features summary * Sparse option (not implemented in our spec) * Add enable / disable runtime extension script * Check zone and subzone to share at least one interface * Runtime address and port variables * Iptables --wait option used for serialization- Update to bugfix release 5.1.5.2 + Make build reproducible boo#1047218 + Fix upgrade from 4x version : dropBcast and dropBcasts are now supported boo#1053650 + Perl 5.26 support + Fix for BASIC_FILTERS=Yes and tcfilters + Fix USER/GROUP messages + MAC address in OUTPUT col in accounting file error is raised at compile time + Fix port number 0 or > 65535 perl execption- Update filename in /var/adm/update-messages to match documentation, and build-compare pattern- bugfix release 5.1.4.4 A defect in 5.1.4.3 caused a startup failure when two or more 'fallback' providers were configured. That has been corrected.- Fix a typo in %posttrans that would remove the wrong file and could cause a problem depending on the execution order of the %pretrans and %posttrans scripts for the shorewall and shorewall6 packages.- This stable branch 5.1x will be the new default for Leap 42.3. Remember that each time you have an upgrade with changes in Major or Major,Minor it is mandatory you upgrade your configuration with shorewall(6) update -a /etc/shorewall(6) command. - Packaging : use pretrans and posttrans to inform user about configuration upgrade. - Bugfix release 5.1.4.3. Problem Corrected: When running on prior-generation distributions such as RHEL6, IPv6 multi-ISP configurations failed to start due to an error such as the following: ERROR: Command "ip -6 -6 route replace default scope global table 250 nexthop via ::192.88.99.1 dev tun6to4 weight 1" Failed Such configurations now start successfully.- Bugfix and enhancement release 5.1.4.2 complete changelog is available http://shorewall.net/pub/shorewall/5.1/shorewall-5.1.4/releasenotes.txt - Main changes All IPv6 standard actions have been deleted and their logic has been added to their IPv4 counterparts who can now handle both address families. Previously, ?error and ?require messages as well as verbose ?info and ?warning messages (those that report the file and line numbers) generated from an action file would report the action file name and line number rather than the file and line number where the action was invoked. The file and line number where the action was invoked were listed second. Beginning with this release, the invoking file and line number are listed first and the action file and line number are not reported. This allows for creation of clearer messages. IPv6 UPnP support (including MINIUPNPD) is now available. A PERL_HASH_SEED option has been added to allow the Perl hash seed to be specified. See shorewall.conf(5) and perlsec(1) for details.- Bugfix release 5.1.3.2 Previously, if a Shorewall Variable (e.g., @chain) was the target of a conditional ?RESET directive (one that was enclosed in ?if. ?else...?endif logic), the compiler could incorrectly use an existing chain created from the action rather than creating a new (and different) chain. That has been corrected. Previously, if alternate input format specified a column that had already been specified, the contents of that column were silently overwritten. Now, a warning message is issued stating that the prior value has been replaced by the newer value.- Update to last bugfix version 5.1.3.1 Problems Corrected: There was a typo in the BLACKLIST_DEFAULT settings in the 5.1.3 sample config files, which resulted in a compilation error. That typo has been corrected. There was also a typo in the two-interface IPv4 sample snat file; 192.168.0.0/16 was inadvertently entered as 92.168.0.0/16. That has been corrected. Previously, when processing the policy file, 'all+' was incorrectly treated the same as 'all'. That has been corrected so that 'all+' causes intra-zone traffic to be included in the policy.- Upgrade to last stable 5.1.3 For details see changelog.txt and releasenotes.txt containing all informations for a correct upgrade path. - Packaging Redone patches for var-fillup + shorewall-fillup-install.patch + shorewall-init-fillup-install.patch + shorewall-lite-fillup-install.patch- Upgrade to stable 5.1.1 For details see changelog.txt and releasenotes.txt containing all informations for a correct upgrade path. - Packaging: + use proper %{} syntax + Adjust year copyright + Remove attr on sbindir symlink + Move Samples and Contrib to doc package- Upgrade to last stable of 5.0.x version 5.0.15 For details see changelog.txt and releasenotes.txt containing all informations for a correct upgrade path. - Packaging : + Remove all non suse %if + Cleanup older non supported version + Remove upstream merged patch * 0001-remote_fs.patch * 0001-required-stop-fix.patch + Remove 0001-fillup-install.patch replaced by specific product patch for correct usage of var-fillup + Added patches for var-fillup when not specific %name6 is also supported * shorewall-fillup-install.patch * shorewall-init-fillup-install.patch * shorewall-lite-fillup-install.patch + spec-cleaner minimal- Update to last 4x bugfix version 4.6.13.4 For details see changelog.txt and releasenotes.txt - 4.6.13.4 * This release includes a couple of additional configure/install fixes from Matt Darfeuille. * The DROP command was previously rejected in the mangle file. That has been corrected. - 4.6.13.3 * Previously, Shorewall6 rejected rules in which the SOURCE contained both an interface name and a MAC address (in Shorewall format). That defect has been corrected so that such rules are now accepted. * A number of corrections have been made to the install, uninstall and configure scripts (Matt Darfeuille). * Previously, optional interfaces were not enabled during 'start' and 'restart' unless there was at least one entry in the 'providers' file. This resulted in these interfaces not appearing in the output of 'shorewall[6] status -i'. * The check for use of a circular kernel log buffer (as opposed to a log file) has been improved. * Previously, if a circular log buffer was being used, the output of various commands still displayed '/var/log/messages' as the log file. Now, it is displayed as 'logread'. * When processing the 'dump' command, the CLI now uses 'netstat' to print socket information when the 'ss' utility is not installed. - 4.6.13.2 * Previously, if statistical load balancing was used in the providers file, the default route in the main table was not deleted during firewall start/restart. That route is now correctly deleted. - 4.6.13.1 * Previously, the 'reset' command would fail if chain names were included. Now, the command succeeds, provided that all of the specified chains exist in the filter table. * The TCP meta-connection is now supported by the Tinc macro and tunnel type. Previously, only the UDP data connection was supported.- Update to version 4.6.13 For more details see changelog.txt and realeasenotes.txt * The 'rules' file manpages have been corrected regarding the packets that are processed by rules in the NEW section. * Parsing of IPv6 address ranges has been corrected. Previously, use of ranges resulted in 'Invalid IPv6 Address' errors. * The shorewall6-hosts man page has been corrected to show the proper contents of the HOST(S) column. * Previously, INLINE statements in the mangle file were not recognized if a chain designator (:F, :P, etc.) followingowed INLINE(...). As a consequence, additional matches following a semicolon were interpreted as column/value pairs unless INLINE_MATCHES=Yes, resulting in compilation failure. * Inline matches on IP[6]TABLE rules could be ignored if INLINE_MATCHES=No. They are now recognized. * Specifying an action with a logging level in one of the _DEFAULT options in shorewall[6].conf (e.g., REJECT_DEFAULT=Reject:info) produced a compilation error: ERROR: Invalid value (:info) for first Reject parameter /usr/share/shorewall/action.Rejectect (line 52) That has been corrected. Note, however, that specifying logging with a default action tends to defeat one of the main purposes of default actions which is to suppress logging. * Previously, it was necessary to set TC_EXPERT=Yes to have full access to the user mark in fw marks. That has been corrected so that any place that a mark or mask can be specified, both the TC mark and the User mark are accessible.- Update to version 4.6.11 For more details see changelog.txt and releasenotes.txt * Previously, when the -c option was given to the 'compile' command, the progress message "Compiling..." was issued before it was determined if compilation was necessary. Now, that message is suppressed when re-compilation is not required. * Previously, when the -c option was given to the 'compile' command, the 'postcompile' extension script was executed even when there was no (re-)compilation. Now, the 'postcompile' script is only invoked when a new script is generated. * If CONFDIR was other than /etc, then ordinary users would not receive a clear error message when they attempted to execute one of the commands that change the firewall state. * Previously, IPv4 DHCP client broadcasts were blocked by the 'rpfilter' interface option. That has been corrected. * The 'update' command incorrectly added the INLINE_MATCHES option to shorewall6.conf with a default value of 'Yes'. This caused 'start' to fail with invalid ip6tables rules when the alternate input format using ';' is used. Note: This last issue is not documented in the release notes included with the release.- Update to version 4.6.10.1 For more details see changelog.txt and releasenotes.txt * Indentation is now consistent in lib.core (Tuomo Soini). * The first problem corrected in 4.6.10 below was incomplete. It is now complete (Tuomo Soini). * Similarly, the second fix was also incomplete and is now completed (Tuomo Soini).- Update to version 4.6.9 For more details see changelog.txt and releasenotes.txt * This release contains defect repair from Shorewall 4.6.8.1 and earlier releases. * The means for preventing loading of helper modules has been clarified in the documentation. * The SetEvent and ResetEvent actions previously set/reset the event even if the packet did not match the other specified columns. This has been corrected. * Previously, the 'show capabilities' command was ignoring the HELPERS setting. This resulted in unwanted modules being autoloaded and, when the -f option was given, an incorrect capabilities file was generated. * Previously, when 'wait' was specified for an interface, the generated script erroneously checked for required interfaces on all commands rather than just start, restart and restore.- Update to version 4.6.8.1 For more details see changnlog.txt and releasenotes.txt * Previously, when servicd was installed and there were one or more required interfaces, the firewall would fail to start at boot.This has been corrected by Tuomo Soini. * Some startup logic in lib.cli has been deleted. A bug prevented the code from working as intended, so there is no loss of functionality resulting from deletion of the code.- Update to version 4.6.8 For more details see changelog.txt and releasenotes.txt * This release includes defect repair from Shorewall 4.6.6.2 and earlier releases. * Previously, when the -n option was specified and NetworkManager was installed on the target system, the Shorewall-init installer would still create ${DESTDIR}etc/NetworkManager/dispatcher.d/01-shorewall, regardless of the setting of $CONFDIR. That has been corrected such that the directory ${DESTDIR}${CONFDIR}/NetworkManager/dispatcher.d/01-shorewall is created instead. * Previously, handling of the IPTABLES and IP6TABLES actions in the conntrack file was broken. nfw provided a fix on IRC. * The Shorewall-core and Shorewall6 installers would previously report incorrectly that the product release was not installed. Matt Darfeuille provided fixes.- Update to version 4.6.7 For more details see changelog.txt and releasenotes.txt * This release includes defect repair from Shorewall 4.6.6.2 and earlier releases. * The 'tunnels' file now supports 'tinc' tunnels. * Previously, the SAME action in the mangle file had a fixed timeout of 300 seconds (5 minutes). That action now allows specification of a different timeout. * It is now possible to add or delete addresses from an ipset with entries in the mangle file. The ADD and DEL actions have the same behavior in the mangle file as they do in the rules file. - Added systemd_version macro in anticipation of detecting the correct service file when systemd version is >= 214- Update to version 4.6.6.2 For more details see changelog.txt and releasenotes.txt * The compiler failed to parse the construct +[n] where n is an integer (e.g., +bad[2]). * Orion Paplawski has provided a patch that adds 'ko.xz' to the default MODULE_SUFFIX setting. This change deals with recent Fedora releases where the module names now end with ".ko.xz". In addition to Orion's patch, the sample configurations have been modified to specify MODULE_SUFFIX="ko ko.xz".- Update to version 4.6.6.1 For more details see changelog.txt and releasenotes.txt * Previously the SAVE and RESTORE actions were erroneously disallowed in the INPUT chain within the mangle file. * The manpage descriptions of the mangle SAVE and RESTORE actions incorrectly required a slash (/) prior to the mask value. * Race conditions could previously occur between the 'start' command and the 'enable' and 'disable' commands. * The 'update' command incorrectly added the INLINE_MATCHES option to shorewall.conf with a default value of 'Yes'. This caused 'start' to fail with invalid iptables rules when the alternate input format using ';' is used. * Previously the LOCKFILE setting was not propagated to the generated script. So when the script was run directly, the script unconditionally used ${VARDIR}/lock.- Update to version 4.6.6 For more details see changlelog.txt and releasenotes.txt As there are many new features with this release please consult the mentioned files. * Previously, a line beginning with 'shell' was interpreted as a shell script. Now, the line must begin with 'SHELL' (case-sensitive). Note that ?SHELL and BEGIN SHELL are still case-insensitive.- Update to version 4.6.5.5 For more details see changelog.txt and releasenotes.txt * This release adds Tuomo Soini's fix for Shorewall-init to 4.6.5.5. Previously, the ifupdown scripts were looking in the wrong directory for the firewall script.- Update to version 4.6.5.4 For more details see changelog.txt and releasenotes.txt * The '-c' option of the 'dump' and 'show routing' commands is now documented. * The handling of the 'DIGEST' environmental variable has been corrected in the Shorewall installer. Previously, specifying that option would not correctly update the Chains module which led to a Perl compilation failure. * Handling of ipset names in PORT columns has been corrected. Previously, such usage resulted in an invalid iptables rule being generated.- Update to version 4.6.5.3 For more details see changelog.txt and releasenotes.txt * The Shorewall-init scripts were using the incorrect variable to set the state directory. Correction provided by Roberto Sanchez. * For normal dynamic zones, the 'add' command failed with a diagnostic such as: ERROR: Zone ast, interface net0 does not have a dynamic host list * When a mark range was used in the marks (tcrules) file, a run-time error occurred while attempting to load the generated ruleset.- Do not buildrequire openSUSE-release: it's a daily changing package and causes thus frequent rebuilds for no reason. configure and install both try to guess the target from /etc/os-release. So we simply inject BUILD=suse for the openSUSE case.- Update to version 4.6.5.2 For more details see changelog.txt and releasenotes.txt * LOG_BACKEND=LOG failed at run-time for all but the most recent kernels. - Changes in 4.6.5.1 * The generated script can now detect an gateway address assigned by later versions of that program (Alan Barrett). * In 4.6.5, the bash-based configure script would issue the following diagnostic if SERVICEDIR was not specified in the shorewallrc file: ./configure: line 199: [SERVICEDIR]=: command not found This was compounded by the fact that all of the released shorewallrc files still specified SYSTEMDDIR rather than SERVICEDIR (Evangelos Foutras) * The shorewallrc.archlinux file now reflects a change in SBINDIR that occurred in Arch Linux in mid 2013 (Evangelos Foutras).- Update to versioin 4.6.4.3 For more details see changelog.txt and releasenotes.txt * The fix for LOG_BACKEND in 4.6.4.2 worked on some older distributions but not on newer ones. This release fixes the problem in the remaining cases./bin/sh/bin/sh/bin/sh/bin/shbuild77 1684754618 5.2.8-bp155.4.65.2.8-bp155.4.65.2.8-bp155.4.6 shorewall6-liteshorewall6-lite.confetclogrotate.dshorewall6-liteshorewall6-liteshorecapshorewall6-lite.servicercshorewall6-liteshorewall6-liteshorewall6-liteCOPYINGchangelog.txtreleasenotes.txtsysconfig.shorewall6-liteshorewall6-lite-vardir.5.gzshorewall6-lite.conf.5.gzshorewall6-lite.8.gzshorewall6-liteconfigpathfunctionshelperslib.baseversionshorewall6-lite/etc//etc/shorewall6-lite//usr//usr/etc//usr/etc/logrotate.d//usr/lib//usr/lib/shorewall6-lite//usr/lib/systemd/system//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/shorewall6-lite//usr/share/fillup-templates//usr/share/man/man5//usr/share/man/man8//usr/share//usr/share/shorewall6-lite//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Backports:SLE-15-SP5/standard/f80c202db0d1e263607aea4166538e7d-shorewallcpioxz5noarch-suse-linuxdirectoryASCII textPOSIX shell script, ASCII text executableUTF-8 Unicode texttroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)Rvt?wfutf-8ae0f5854ae2ba48bdb26452fe100f7b5f4ff75099308958b65c728de7475ca6e?7zXZ !t//O] crt:bLL ؝.ηl2֋Ԡ6 RC<`jVe5ƁPS+ 8׹;7 1Sx{ w~)ߣxjJLؘ}8}"͵n[#G/Q TV!w콲$2ѐQAnק#!oEfq7r?7r ҍݕ!qbu`ؾ % zж#xxG/&5{ʶz lϷyB.IYQT?:mԩ{53 E%M N'AŗU׬/w[xvcONrVrqb\3^tU{QR=XTKrؓ&TZtt4Zm`˵p2bw^UzϼԂoQ6Gf߀<.ѥ.R_ Lі Ψ."(kYA["9ԃ39J?`堢Oif/_h2Y3ܨJ`bGTCJ8PnwON*sjngQorD20l(PzKasibTK&!p gW8pT0oꤟ9L5#PU̐9D]PCP5pjlE2F{ (";ZE-rOމi$t {BD6~n`a?-mntU^Ha|m!8A_E}Ѭ߬!KJ &۬TJ=)xKㄓS[t Ay>7aXh!Dpi_\ 6X_*-cfKIIt4!Q t#J4/n|^|S&`k#3Chwb~޹X/xgV ՆL@"w^is""^7oZ8 xa3 ] eTrN!6 ^d4ʅxKwƶp~]3P^"A'JZn!i;nkx3,\s|cPIF얬,/p7>F Pc {kԥssQ< 9 rZN ^s-v0lz])xU|]fh+TS !5|E"[BPj2j[WI7\}'z63a2p3@|lcaYWcmpS'D./lVYɥACtW[P2>QÉ.%/wpI&b2 ޺]EܡOzal;NTMpʎ' [@E;9QjCERuK?$<-N0fy1di]wֹ -&5@YXI1𧤘^2r!OTH3,!?/B) f9pk -? G>x J./k2HFqNtژB\ 3Gj6ޅQsXl[U`o -~%3Dj A_*a Z($Ƣ,B_dpsm-W`xLyjsBB<:3̟WyķVpXHImX.q՘E<ػO҆D_1}&XIqb+"۸͞9>*~2N)Uӝ x4Bh T)YYrϺvSW=f;ȶT#6n~w^d@jʵqv 5^鎄;Vt:YdiN|H.؞RVsnU9֞DOzVl?]JBS̭{[)F*s)S4Y-I ʶDE?HkLCũ.l^"HGwN.G E{6_opDtˋF(Y&!WJ$h [ <迣idni oSϳ U.lQ JR,~iM [ 3&I$D>]:6yOdy!c`ސR6+*5D )AR}2)q-xN$`` ྻL&q7vI\eτ֧jC7X ?MRi,B9;y>.1:oRQ_ݒe  :up u`ɣm,߳p]ZvQWOZ`ǵo:0sh_TLJ!^@JU't]V`8zw( gI.= _4oؕ'v9o$G~8J s?eX}4.P#=zT~.]x"I Xtc,ֺ ]?iʇ<W/{7bEjs++lVF+9uuh/x@qx> 32mu?Fa5?/S[ɍ"N Y8iNsCTU1t'$hAHa4S: M+>=nUNhozzRٮZ]FTC;jWtK :oWm(Zֹy8ҭDs4\]0)>3 f#_C]4l`!\FE' ;> 3 jDj. w^bʢХs"';4> rn.QtD`_ eQo,ԑǹ_C'_ehs1)uw+,fr΋id]RC۴oWl;8v\i(9,}Ή Z*Y؏u ! 'dR yOx }baJ'lݻV ]*l(< ߼3N@ ,Fp%fiS+{FDBw3X's }[ O.si]cJU[CejI*8 "hO _{+w656[jbu˯q3L_u3?p1|pܗx_\#[l哽91RY}D1wd:S5"vrSgc+[0t@v=vК.^ʓ WR3T7=o' IE% صA<<6dR1ǴHؒ_JL:?W|XۊkƝ<.4Qըۢڵm$p65\q75i)jDRГsZ nhd\k 䧄z9Ώ& :W,eQ YNIvì!Ma1AA8Yչ!hui,!P:)´gE]nyȍ;E\q6-(G}NIC.ܨX3}ILlk,7] 'wEîeFrO|7ndJҙ?kvQ.更 L  qلb'>]BaTL[0q8{RذzXkf{i A~~HG#8(2m\,e}:zāSV3*aŸaBH8p=d^KhxA9.17:}r>H Sf?#r 0)Zg%ms<q*]RDO7.`9Ԉjeˆ}^x`UzS8E&998hZ lL|qvtTR_]o7g,Bi@0қ.{)G9WۓσCp %%ex ( ZСj+9hxZ; 0"&Yi'q\ndɞF>DUo]iTkg忲dPĎ<#(ǸIQ^kW.α!﷊j5hGgxq96G$IG f~q7˜b$H`sI!;fPW8_ LYцqf_ :;+CY,b4 RQfR8ѣnFK996{BCM׉+߷Dot5YƮ zQ ;i7aZM QoJ |t>T-y+\́"Y8#LI4E+jlEmOL#H!ZJ!B>MKBok8i&D01xꋙaСu2g39PI٪)Ck1Dho0-q$ܑM]7 `uuaZɣN~~2|ݑ{YgKT\Y+؋6 2" )6*Srf|yeDWv 8bԌ6̌Hss&nU&sj]M  \_K%s6J׏ q zfI^_p` m`>}7$ *Ua-]}5s01QcnH5RhyU*"XdPͮhqN}^wxd`+i'6yFBO=o_ IJ(כg)?ڿRxPݱs<: 8i|<Sߨ':<#=2f4W`AAS)?93#`T\-shRYDR}Ǟu06x_s8z?cy`dq;+*wOsO^q>E d{?RzV# ^Oz'Ǖ5\L9A(r$)V[vx|%1[ _?Ik_* b7|<5^Aj)˨ooYX9WYcXQnd鼏+s ?^iu>9mxB``VׯZ7)7~)n,5+vE"0 2$]@7Anji;*QFvggm3\Zpp%])k*fY$cn,uz.t$6{WNm(Gy5]@̪ 'Y4]`N7*zbϑ[EKuy"2 7^n&(<b3F~5%f'N);&ɑctBf&ɮN]@bA:/ {SeDq"d}[N[.(=~Plaoy(Vْz m73Ңu U/À:}̠V ht>;7U^oEY5)+E^N)0:luj<⼠.8l?闿n^*]LRفiWMoShwFiet3l{Kƽ>o'yA!Z~\bU? Y/spjsSJy8~'n9&%da >v ˳` ۅȑZNjFr#dܱpt ?]xhNbm@4iILWU1ąNf?I GaXqY 8 MLUܽMGV=Kd"$RxZn.*)$X/PǢtϋw7GeaXJJĤ\Li T!?럕V f\nv+j ]!4xVf<+Xd#A<9ؕ1S3ј{& !Lɖ'V3MC74CIF̥&2GpSԒT(:dVٜޢ}݃qOT-$s#xU s!g44ٸt$ZK]v9) ]LOoN)pՅ(uuR256ż4 m"0̸n\ɍ?# |I3u ej7 "ANrmq˔J.@@jmVda4Mh3?Q|s"]ύAnƫ 8̶I~.dv eX5T2V9vΕgg~8a'5. RM?{|F6Pbm[!R lB]ЙShx07 , t AarL&m9K9P-dBsK*9;ډ(M<%6'=pp?RSeVOSpP5\6ˤh~Y{ d,\ @쫓ϏtUh]˼]| 5a0c3$ p_d l$BeGU aotbjՊK5;99:ͱ{ڃs._圡Z2?6@-X1@Qa7s%4z[iE^sZ-#*kv +6Ɋ ǩ0񧄤d"T<kU1Qr};(Т)zomZmEtN,5Ák,(\}Px8o}5GELB$mԣP[wVN"Sf&SK2$'NݓZdVQ+}mɶW@5{2wl1;LK+uf&ueKM,c)s@@tom3oSru=zњx2"f+U=r@D÷ƒđF lxN4~,浫DZ3_RdiFЅ_EA]7Ye++PUg@N]h.ԅ) *ϷFa|Bf?<*3A:R}f<;:rUܤ,woaG:SM4A:D}?[|1' K9?T~d]Q7nL3d|\(fg3E`[dvo8Ωxw]b>f]{dQ,0QxeWU`H3B׋K8W=b_&$Y"[ WCd&y& ~w% n㋀{b!o41EG`2 (B@Lκ,myȣ$%|&3Q<R[ ᨎ02-5B7EWׯ99j)ODaO͇?+O7!:jIlUz\?fx37Uwv= ńhaҝ'2:w@9ԩ E("雞ȟybѴó#DX1]B-\hJX[뤏䒇<&^ع,9,"[wrE1aimNJ47wp91fHniN>K4sa=CV "P=i+j!2,>?;eP SNx2,+.&6U#L[Ϛ\R'm1#]n&F{hSVO?dD"9Ȟ?mJ'çWQp\e (ZQa$cbu5s<;fcի5N47ǒqteF;PXJ./ʣgOkB5-sG^c'XA+a#(`9ͱ7F,[wLb<$8I߿t81 ~[/v:DֲCdhhmbeܥ7N5I|~EC]@.x#Md!nyJ%ǘP᫽AC\ztqIJ^dgCv.D-3y;Z^`֒<? cKH%Ճ6VdmʯbGCu=/t@⿏խ&7Ɗ(fT ݔ#Џ0_2O}6<>e[hl@pƭ,3HDai`dy[ Wuhض*J$ ܒF+uafȀ`V_F%DtYĉ#?>lj22Q3[5>pTSm1ZwHq r?YXҀZE]V@"֩@QHGmWEDO6#hDVJ/%կ>PYm$<^Q+Y>Yz>=Bm0e k#aQp "% L=) =7K ~W|xizf@ +צ젖b z ?3Zxܢ2$- bsA=5f)DAЮ&(m:o ) *%+ϵW)+P#1R (XfUZPG:Ty%Xu7=4J׃BAM0u>a$oşρ.aA%֗7h 5>ށz0ol|- d#7h?Mi[|0zU){b70B-x5$]*x,蕅f w,d*'B 6rΟDl.d1RgG1n@ aX> 3ߖ6UlOp4f &"46z.3 q²0T81]1 &>Ď%#c*FDXffE,P,< lOYDpn}BF|u@X6U;2 B#3Jlh52^C 2''\H Z"Sb)4gF Mɟ7bVj*Qliov m9Ra*^{`}.JGh$<RI^yK숬o9O-s[āyiRs6}5yuߟB*. {o[+ D0ǥCA ƋVc^#ex;S+;'5L\4= qkmGDg&ҏj2 [i ϙ_=pPp@D˶twh[:ϛPL#:umY~͏QAkqѻA:pQAjb-b[D o'B_`XrDgW|;KeW<:c&y*C k\HM 0*p{zo]#+|T)Qt#pee10V̉Au=rt"?gӳ,ˆDm:JI;˿$$7e>^XuL۔y}DBhGYj$NǛ sd:̚Ǵ '0؏Ld>I (8W"X-ISo,OqXu收;j= `+V&IKUshvcTr\bMQml@f n)9vq@%,"UB9zOg"AfVUuʍ8V'ؖҔ1"9ߦ4>Pg~sY۵A J!̾pN)8ݜZf¸à';2̾m\j75pkgF~P~D61K-p^ ҇PѴx(lOBH|s~?b=WAc"  mLèp*GeZʑzȒ_+D:0)<3 mrhIY6B$I,Hۍq] Jxn &6͌w_ju8±ޗx!PF6-@{e@w0ٖ zC>ңEkjZ`](1^UrUMzivpMЛ1nNΙ߹G)y#_l$]ӮR ˤ %i^xJwAIA2̹2P2yG~Lд5`geGJKqY\CCҐ(!!e/\F>m f}!gVFȱMJ2`aJA X&]l[GGe:\{jRܷe v9+7lϔ%\!g=+ vqk˗܆+~VffC~jeR@Z[ggw?C+fܪ7:-07ao敵#3Vz7ʹj9MDr2ʻ^BbRGH%(O&k&D35K%#`܁=tep1(]5 ^J^@Cr5R'yډW`,EH mZ(L;MA(qY6[n3JRHj oI-1H =lliU쇷a#luiG \M}|#*=-f:d ġhR+vQ-Tw:yFDC;MT Y41<\,T2D%7&lX D])r#@}VFuwQ#H\a&:N f!^Iq %?~RLd"IL<_/*&$$`b=YZ'vvDԃ4`è.oA ^`*AIu8*>0+Ӎ4ظq\O{e_|Ť3Kgd9$}8GyĊ藨C^ BXIx,trq~P37twM&bI3UQ=$UĖ* kfB2: -atq޴R 몜[r+uY?m!0fXmjqm<|y0˱њh2Z tM%udK*Xb.MG登+UJǡ"\m&b}Csr;=EWk '4,@0Oܘޮ0Si`gAk" vKf A>QC-'G8'5݊ pK(9 EI' ۓu72NWU*5BBp&aeKC%&j`b\*eBH[#?"3r ?NO/?p~2gZs 4V̺fOz5CG ..,r)cf*@CA+ZDo_C0PY8L&m lmK7q2aݥzI wۘ@m~۝Òk6\ڃn#tۘke@V~]N"4pLbO w ˘0Z2Dɮ1Ʒ ?o?Qb"Q%pw޶2K[$8{ ՂOwCEʱyvf ĵe?NjX)KH{ 2HG=e?M{~`݋o2fآN.!reM2Jzk Yυl<A7jca+oșe&UFdyw/zOн9I&ڨ ZqZ} E :7!5u~%k ~ppɫ+U=>: czߢA͚I ow ߃tF}VnYʯmM5f|݄:B;[?`< }: PPD$^eBt"0AC9tHv_k~K8,׌w@~@=O,}Ĺ}k-]䩤llADĠ>$'[|S.;:t2JֽaD%"t)󻴧(&Ή;)!^X/屚N2 &vĵ4L?D,SBscZOp%KX(39 6bڛ]y6̌^IkS4|`BSI#Ms /ID=kQ*$̠ "-ytwފyXQU^# Hsw;̕|N?}uia Šsp~9G:Y+anAZ<^G%M9tH :Nby%Q\8#bA @~­\]_44?KJ,#ҙr՝e=T*>ZY϶&;WAUV4Ft߄H:!>{̄CAI0m+ZM-hmK5xz*1 9z,w.wH~g (VLExj^2??=zɛw2';!#HwWc,W V>xle{EK+=_t.dxs[Ub`: yùϸ7fTM9{b-"g$RǒjxILT=:gWwnپ70*G>HPaQ /FNaJfCG wIzj 궘7R {V.R~7&y9$j?́ݳaB24^5ڶ7p{(nE43Z@ؾdbJb>twWjx1Qn ,ӏ~(2{GLT Eo v !vy|kzp:0~]l?{W >Ob!}%b]D˜ui5{ # oX_N*sy2, $ĘN`ase8B Z\g󒈸&?Y¹륉K? 9^t`ƽT*lg,$<\% `"4o\Z[a2T ?aΥȽJ eVCx_/Q>Ή4hβ#x4o(mA͕J;`CX>퟼Ž8R *UY44L|ʼn*7#>^&+&rƙe`]AȻ6aYFOYUׄ%,.XoR>-Pd YH ^Ҳcy5,'irc^xX|OaL_z%{|냶: صD8mػ@7RKB#NfoЎ 5ȐLf[?ޡ֧\C͘ctK]73W7Fdi&i$NuK&9̸v_8M"0MOQxNhZRayi˂&ۄg< 8B^?nKk)b$lP tA%At \n]4cu~ThZ:tl=2v(6WoyH3û k)[5J6%2P"YE, qgkh9S=@Ce(&)^y0@a{`-Ь:P5z+KS =Q€4EФ+jpO"K>L7n}< K6uX_#NaQVq28J) Q c7ht)Tx?n,Yuofayl],!~Y=- c4A1+Ϙ[LOR6K KRMN& ӌA%fwM_KRףss;@A <yM}J{d2J}k/B1n *X>)C;\{p~ Ϲu-91ң4rt89%Ca9N (guWsM6@z H  #3Tb;H* A \Ȏ_]5-=~rHk-e禰#V@U"%hqavl( E[49*t `g3&Z!U +u(pr t=4 'N _+fӺ=`DkH,t㕰͚4沪Tz!(15 P*xμRHC/V<0Ɠ*X8DxyP7 ,]dD,h"i2 YRq+tṱ|6hBB g.mpK5QIb53^  ۴ZwIk/i|IQ$1sgtܰOI/49|z`ؘza?,Nrc Jaq-xc>YEZ"WLtʬyh̺<=><7%j A . yk%-Ρk=ByAЬ돮H9[c` 6.yzߛ@O)Ww{~7 c7'b,2yKԮО͑>{DK"ax Ĝ'r0 mhIZY֞w}hM#HaWD!e  ^)V5q1P=`2Ps duWq?i\JC^18WFaZGQPqkN٥tQ4:SA=ũxctڹr^tV;L(v-xDN 2`5 .}t|$V3 QdR2;0#4ց71YЫJymP`.22 ,W EDf߻;FN+Ik5TȆ|*-7 1~|*؊jIGH㳱>[R_HUSBSKvFDbp9S&ULP G{ 3ɕ-fiB)YJNfK=ۿ 2?T@rEc mPKZYTgpP?J<аѪK[cc*o>*m)FczcKH/Mς}lx{HU*T="j_Χ!u!\4G_d&k)WzHDǚ[ mr@E4?>…1s~5uTd5нfXͮ ƦY?n "n~{K QvHo븘ZZDYIt0!ihu\cq5}0o=1PZAsRx]hxiG riǜzB^j$)ڠ։4#) Bs~W&uY`J7ʮw}M|߅6vN%C $cB4ۣ]Nx9ɦYA=SmpeVAa7(0XU =o,/`~#n2nFy FA'3 P]C~|BXi=KP wj[ %y%K4uwF<32#Y4wLh36 `*tبaw/%QYnjY +5~sh9P/#|+3 nh|`t_Xb8(6 Ku ӺEj$+x6¼FP0ڊI0/¯Q:/R5|m]R_hَ;&ŠE3IGCD|jX18%t~șd9DǴ+;1 &? $j8 #aKE[[Bv1Lzi]uAvn%+W/3s PJ&z AғMVNt%ۂ&ܴx%wU8T7]#<C5]#*pC~ 1c~0F(D=A ]toA?9uc&gG SQ*)5ֈ<26l<$ %J\(TY9YCv| zOW bO6ZARIj2Jm7ʱP^^j/m{eE6B 5I:bT3S>{mQTHgY)o}`F A3q韨"RdNٯ~`tAa.zsI-#5SD9/s k;t%;l3]r9E6SD7DӜn૽,FdiIBK'h=}>@$l/mid ׀X'dg}vW{F@mM1y s 8le*Sl߽vK:S]OǼt E.iGJ9@ѳl1:N,\;a se䦗f]Y*UmnҽB~_r+u4qB ׻!"Sj ޹)_֧dz0C%%.TWN3wS4|mEX~i )[ՂyZznXNa[h 5MI$/4)\-r|AƊ9n`SA n:Ta$Ȣ׎03*O*O!ʹ/女cmD!F>,~,CM /m `3ŗAh/LRiVMUv=˾i_#Srǖ5Qb|^!l_,SbN֠aҠv~_ -lD`N%~,ViI0;(!=+;BEq#Gt4=z^ 2-bW W g2<;SkC{eBu#&H xK!]>#k|ɯPBlX~"UDЯ#c_PvmW2 q*EB"Kȼ w#8+Spo꾡vdžBlsXS5fZ_6ZG/KحOJo& ̈́|' Y9S9iG9N k`]&ߚ?BEC}v:wK(buM2TS@MڵQwZ" @bNλy YLxI ŗ;u@@´=df(Sd,:> ʿkF O2kIUz25}G*[1Ċ{_\Zq1r=:U b2Qx ʝjևzԟ½#y,g 6jEp+: r#|RPȤ. 崜Ȫ'~:oW|2)kzuO?va]iiE^@{r H-<>@q- USee}zXWKSY(CY\\``,|e򫮦=nu+6@ ׆3{֝}nXjb "[Lb2Xi)wX#r4l Ih } p~tQB|]JT UxQH;WR+XRף&=AKN*;4`qcrƁc`E$X1^>lbέ]9Ҋ+,{qoe sFѳj;.շ UY e5iVVf;k8xU,fWϢQ5XGa_<:I+̄`^I9gj݆>3 ̙Ja^4r.)vO_3S b=}qaml%ԟ+Ԝ\ž09׀84,9GȌɠ+{wNiޮQh{ND]]j1!2/];ڱrXP!0K.`*~[s?Ho5U]埮##hhI*iajg+f>wV}9ZJ\EALHAm#"I ƅ\ WPk 62[ʼ ݊fn7Gp:K솫ٚOgrIڎz2b*x_ȔڒMoTQ*?HBE 懄Nqs^' y@[G7X`I}'@1+7Ҏ"  cX8ý'&qkmp"?vp iu(Tw˜=<^&ܡ71H?^t =[O͸I-X$~TT{"I/Oל*VyL`pΐʜ)q伡7=VRƥA*!krr=iDeJоMBo;mQaZrWϙyN!ȁj+"i2zV yg`8aȅ9}+i|fh@a@WGi߬[ nS#gOe% 􀦁dLB8ugqU)kMj}(>`c$[o,:T?W8t݄mg3a'*2fmWx'|E[(?qHKd⳦_i7`VyB~<vL]r"m0_٨OΗu1P"G|G z(| % BHi7؆q*5=ݦ˙ _bvyZ)߽ 96Gx{n_XD3ۘF^==:yn5gOrԆV[#IR?Xޯ$(p* Y\v 2b`İ1 Ak|hӠ#,? N˫h?ǺS<kI R6ƘBw Cm}&v'Uj.7G^&,:a:}qe!x/ H 8/SABA,ԒpbQ 蕗IiiG MG1?߶ ʝVpx}-96{?ɤz1[TFBҿhqcCܭd qHɲ6˫!iNgPKGpT\ +>bz OZ{K^%0"!LE?v.vMEƭT`:C}wV Pq$F/B,.bRr}2Uqff_Bpl?oO ׺8̙FZG#/agq˧#6~C1>A"yȳ F4s/*;Jϗ;WSz۳dUo.iܻ,$ zkhEc]%a*{[ /|y۰2򪆤fg?Z/T4=4 !_gW&>Ku9 &.!!2L#- ׇ}Jmw.jie6nAԂ'YDNfu@o1syR04 §p?Sǩp SF!*"]T%,@0L\>!>z ? "9wFVXq TԵ#L!VϦx݁[AK/ .&ʏPF 4TN_Ò!wNh]]b$g} q- =,t2e=%ۮ2N])H &’_WY"_ViDt{B&]GT!⦁|з1ApܥZsH)( >6.3hQEڲ_j\+O[=#QzCqlRea~LoiЁ{>[fWnN/]qч@. iyOsZf ꬼR(i#Ϯz&r s-c2-lEԎvw"Z䙦sQnEu=qqIo׭0Agar.;/uN*nB'c^ U% '8j]G<}wcm@\^PB:lc2?_'ťĦ8rqFBOgγeI& ߈6\GjpHrYCOaEŲqjUw2\ic8sj.w\϶L;j1( 8 3d@s1Uo)~{uԡfhJB):x2'u Cb {X퍿yHJM,MN׉6bR Pf 8'TLt)qDFβ3hrkb0R15~\$F~S,l`4i;n;I ӎH CqNB,s 1kM7j\Fcįl]wŷ7/T dSʖ=d`1>#4M\?D0GR𨠮C@t֯g2xH ugM9a/`tk2mBg]YH4CtS5Խ`Ea\D@^íhy54Lw)MWTh i'4sO^'<'1tT?+\N *%YC;(d yaR/\'f6 JkMm 9! WRum'½1k T"3-^J&y@M ڦsS)u8T0r"ŏqL@=g5ɮpL{G`+O =%7vN=7O@6w;-'TLAY=iG?p*8tqcԁYɋs'H³#1$!Mi&ϘkHH@̯o2鴊ez4aj(R-_yO&(QM 4{rH> ([4DZ:0Y^xH''!M PgoAkA5.h,@Q׋=nŚeD@0D&);3smCLbokCzf R,rnr4l$T6FEi7% l$d>54Sĕg\$Yy`k feP27Po\l~k<:ԟ67Tg;shjYg'piP~𥔙Tas诽,4X<6|\jN>hIM']Ki)v"*`ٗ蕊 {KxiD߆w0?sQ 2e~ &Ƶ$ѺEE\N'+@W(Z #:>.ųCN+E_-;un%@j+AfV дR58324F0Zz_" e᪔^sV xY"X/<q<XJ)RiW!jσBsN">`bV2@|}E,zN%!\2 ;KoÙT5*4zq8 ̶K鬨w~cċdG_ھ!,*gvu[B٪1i𹩇=TF]j6uE2@Kp0bd̦F"Ja3Ӏ[_'!?FIN=Rʲb\Un_Ei