libnfsidmap-sss-1.16.1-lp150.2.6.1 4>$  Ap\/=„A- PxZ৛:==}ŢٳxR<⨅&ƭ{֧_/!$Yq !E}[@-7)yUVO^^}{3wMsv^}񙏾DFujW$UKi 1n7SQMU_Ѧ0ҜX_3(~D/+侪ǎcӟݿP$R pv\ܓŷܡ^v*UuiQZ* ^EB7RWj97b7578b325c9d84d9aceca280e43900d877c20e9367faafcba4e66cfddb74844e7dc1c5c5b35109a889ff4d59cb7e032cc3ab8f\/=„X&$d\%k՟HG~c:=] #-(i[䚎;-yFBI6jf. H({n33a`=+"$ˢ>釹gM})DްK2lj%^퀳"" hzo`|?N6W}.j'|K,!۶>Ję ) 19HO*j8䶥LokI"5F7>pAب?ؘd % a  '-4l     0v< l  (8d9dd:5dFG(H`IҘXҨYҰ\]^ӉbԝcFdefluv(w׀x׸yz $EHLRؔClibnfsidmap-sss1.16.1lp150.2.6.1Library to allow communication between libnfsidmap and SSSDA utility library to allow communication between libnfsidmap and SSSD.\Hcloud130fopenSUSE Leap 15.0openSUSEGPL-3.0+http://bugs.opensuse.orgSystem/Librarieshttps://pagure.io/SSSD/sssdlinuxx86_64{XAA큤AAAAA큤AAA큤\G\G\G\G\G\G\G\G\G\G\G\G\G\G7db9bc52a591ca033a82e6ae71535d3bc36193a10a155e2c9cbccf2663bd21b8147df45d33674d94f5e684c05f9197b3d4cba16c459e3bf81eea4f35419849786e4f2ca734b2f1c1b3533e9926e74a7e41b0e768e0d2224732a4660077020a3163a4c19a38add8aa1e9ddab8bcdf1adc20a9ec5ae1d82a73b7c16bd6f62cea06rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsssd-1.16.1-lp150.2.6.1.src.rpmlibnfsidmap-ssslibnfsidmap-sss(x86-64)@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libnfsidmap.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1[t[*AZZ@ZH@Z%8Z!D@YYw2X~@X,XX@X7@X@X@XN@XGX`@WWW@W@V&@VqR@VO @V U@U5@UU@U}lT@TTq@T6T`TR(@T9T9T2@S0S^S@S~@SSr @ShS_@SR1@R0@RsR%@QQU@Q^QIQ,QQ \PPPPAOOO@O O|7O\NNw.N7N2N1O@MM?MM@MM2@Mv@M6@M5M LOLr@L@L@L{@K9@K9@KK@KKjJ@J@J ckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comhguo@suse.comhguo@suse.comhguo@suse.commichael@stroeder.commichael@stroeder.comhguo@suse.commichael@stroeder.comjengelh@inai.demichael@stroeder.comkukuk@suse.deluizluca@gmail.commichael@stroeder.comdimstar@opensuse.orgjengelh@inai.demichael@stroeder.commichael@stroeder.comjengelh@inai.dehguo@suse.commichael@stroeder.commpluskal@suse.comjengelh@inai.dejengelh@inai.demichael@stroeder.comjengelh@inai.dejengelh@inai.dehguo@suse.comcrrodriguez@opensuse.orgmichael@stroeder.comhguo@suse.comhoward@localhostjengelh@inai.demeissner@suse.comLed jengelh@inai.dejengelh@inai.decrrodriguez@opensuse.orgjengelh@inai.delchiquitto@suse.comjengelh@inai.deckornacker@suse.comcrrodriguez@opensuse.orgjengelh@inai.devarkoly@suse.comddiss@suse.comvarkoly@suse.comjengelh@inai.dejengelh@inai.deckornacker@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.derhafer@suse.comjengelh@inai.derhafer@suse.comrhafer@suse.comrhafer@suse.comrhafer@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.deben.kevan@gmail.comben.kevan@gmail.comben.kevan@gmail.comjengelh@medozas.derhafer@suse.dejengelh@medozas.derhafer@suse.dejengelh@medozas.dejengelh@medozas.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.derhafer@suse.deaj@suse.derhafer@novell.comrhafer@novell.comcoolo@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.comrhafer@novell.com- Added dependency to adcli for sssd-ad (fate#326619, bsc#1109849)- Introduce patches: * Create sockets with right permissions: 0001-SUDO-Create-the-socket-with-stricter-permissions.patch (bsc#1098377, CVE-2018-10852) * Fix for sssd upstream integration tests 0002-intg-Do-not-hardcode-nsslibdir.patch (bsc#1098163)- Update to new minor upstream release 1.16.1 (fate#323340): New Features: * A new option auto_private_groups was added. If this option is enabled, SSSD will automatically create user private groups based on user’s UID number. The GID number is ignored in this case. * The SSSD smart card integration now supports a special type of PAM conversation implemented by GDM which allows the user to select the appropriate smrt card certificate in GDM. * A new API for accessing user and group information was added. This API is similar to the tradiional Name Service Switch API, but allows the consumer to talk to SSSD directly as well as to fine-tune the query with e.g. how cache should be evaluated. * The sssctl command line tool gained a new command access-report, which can generate who can access the client machine. Currently only generating the report on an IPA client based on HBAC rules is supported. * The hostid provider was moved from the IPA specific code to the generic LDAP code. This allows SSH host keys to be access by the generic LDAP provider as well. See the ldap_host_* options in the sssd-ldap manual page for more details. * Setting the memcache_timeout option to 0 disabled creating the memory cache files altogether. This can be useful in cases there is a bug in the memory cache that needs working around.- Updated sssd.spec: The IPA provider depends on AD provider's PAC executable, hence introducing the package dependency. (bsc#1021441, bsc#1062124)- Remove package descriptions for the python 2 packages that are no longer distributed: * python-ipa_hbac * python-sss-murmur * python-sss_nss_idmap * python-sssd-config - Correct python version dependency of tools package. (bsc#1082108)- Correct dependency of sss_obfuscate command line program.- In an ongoing effort to reduce dependency on python version 2, the following python libraries are no longer built. Nevertheless their python3 counterparts remain in place: * python-ipa_hbac * python-sss-murmur * python-sss_nss_idmap * python-sssd-config- Update to new upstream release 1.16.0 Security fixes * This release fixes CVE-2017-12173: Unsanitized input when searching in local cache database. SSSD stores its cached data in an LDAP like local database file using libldb. To lookup cached data LDAP search filters like (objectClass=user)(name=user_name) are used. However, in sysdb_search_user_by_upn_res(), the input was not sanitized and allowed to manipulate the search filter for cache lookups. This would allow a logged in user to discover the password hash of a different user. New Features * SSSD now supports session recording configuration through tlog. This feature enables recording of everything specific users see or type during their sessions on a text terminal. For more information, see the sssd-session-recording(5) manual page. * SSSD can act as a client agent to deliver Fleet Commander policies defined on an IPA server. Fleet Commander provides a configuration management interface that is controlled centrally and that covers desktop, applications and network configuration. * Several new systemtap probes were added into various locations in SSSD code to assist in troubleshooting and analyzing performance related issues. Please see the sssd-systemtap(5) manual page for more information. * A new LDAP provide access control mechanism that allows to restrict access based on PAM's rhost data field was added. For more details, please consult the sssd-ldap(5) manual page, in particular the options ldap_user_authorized_rhost and the rhost value of ldap_access_filter.- Update to new upstream release 1.15.3 (KCM disabled) New Features * In a setup where an IPA domain trusts an Active Directory domain, it is now possible to define the domain resolution order (see http://www.freeipa.org/page/Releases/4.5.0#AD_User_Short_Names). * Design page - Shortnames in trusted domains * SSSD ships with a new service called KCM. This service acts as a storage for Kerberos tickets when "libkrb5" is configured to use "KCM:" in "krb5.conf". * Design page - KCM server for SSSD * NOTE: There are several known issues in the "KCM" responder that will be handled in the next release. * Support for user and group resolution through the D-Bus interface and authentication and/or authorization through the PAM interface even for setups without UIDs or Windows SIDs present on the LDAP directory side. This enhancement allows SSSD to be used together with apache modules to provide identities for applications * Design page - Support for non-POSIX users and groups * SSSD ships a new public library called "libsss_certmap" that allows a flexible and configurable way of mapping a certificate to a user identity. * Design page - Matching and Mapping Certificates * The Kerberos locator plugin can be disabled using an environment variable "SSSD_KRB5_LOCATOR_DISABLE". Please refer to the "sssd_krb5_locator_plugin" manual page for mode details. * The "sssctl" command line tool supports a new command "user-checks" that enables the administrator to check whether a certain user should be allowed or denied access to a certain PAM service. * The "secrets" responder now forwards requests to a proxy Custodia back end over a secure channel.- Introduce mandatory runtime requirement "cyrus-sasl-gssapi" to krb5-common sub-package. Address bsc#1024836.- Update to new upstream release 1.15.2 * It is now possible to configure certain parameters of a trusted domain in a configuration file sub-section. * Several issues related to socket-activating the NSS service, especially if SSSD was configured to use a non-privileged userm were fixed. The NSS service now does not change the ownership of its log files to avoid triggering a name-service lookup while the NSS service is not running yet. Additionally, the NSS service is started before any other service to make sure username resolution works and the other service can resolve the SSSD user correctly. * A new option "cache_first" allows the administrator to change the way multiple domains are searched. When this option is enabled, SSSD will first try to "pin" the requested name or ID to a domain by searching the entries that are already cached and contact the domain that contains the cached entry first. Previously, SSSD would check the cache and the remote server for each domain. This option brings performance benefit for setups that use multiple domains (even auto-discovered trusted domains), especially for ID lookups that would previously iterate over all domains. Please note that this option must be enabled with care as the administrator must ensure that the ID space of domains does not overlap. * The SSSD D-Bus interface gained two new methods: "FindByNameAndCertificate" and "ListByCertificate". These methods will be used primarily by IPA and `mod_lookup_identity to correctly match multple users who use the same certificate for Smart Card login. * A bug where SSSD did not properly sanitize a username with a newline character in it was fixed.- Switch *all* URLs after fedorahosted.org retirement- Updated project URL - Update to new upstream release 1.15.1 * Several issues related to starting the SSSD services on-demand via socket activation were fixed. In particular, it is no longer possible to have a service started both by sssd and socket-activated. Another bug which might have caused the responder to start before SSSD started and cause issues especially on system startup was fixed. * A new 'files' provider was added. This provider mirrors the contents of '/etc/passwd' and '/etc/shadow' into the SSSD database. The purpose of this new provider is to make it possible to use SSSD's interfaces, such as the D-Bus interface for local users and enable leveraging the in-memory fast cache for local users as well, as a replacement for `nscd`. In future, we intend to extend the D-Bus interface to also provide setting and retrieving additional custom attributes for the files users. * SSSD now autogenerates a fallback configuration that enables the files domain if no SSSD configuration exists. This allows distributions to enable the 'sssd' service when the SSSD package is installed. Please note that SSSD must be build with the configuration option '--enable-files-domain' for this functionality to be enabled. * Support for public-key authentication with Kerberos (PKINIT) was added. This support will enable users who authenticate with a Smart Card to obtain a Kerberos ticket during authentication.- Remove obsolete insserv call- Added /etc/sssd/conf.d/ for configuration snippets- Removed 0001-krb5-1.15-build-fix.patch obsoleted by upstream update - Update to new upstream release 1.15.0 * SSSD now allows the responders to be activated by the systemd service manager and exit when idle. This means the services line in sssd.conf is optional and the responders can be started on-demand, simplifying the sssd configuration. Please note that this change is backwards-compatible and the responders listed explicitly in sssd.conf's services line are managed by sssd in the same manner as in previous releases. Please refer to man sssd.conf(5) for more information * The sudo provider is no longer disabled for configurations that do not explicitly include the sudo responder in the services list. In order to disable the sudo-related back end code that executes the periodic LDAP queries, set the sudo_provider to none explicitly * The watchdog signal handler no longer uses signal-unsafe functions. This bug was causing a deadlock in case the watchdog was about to kill a stuck process * A bug that prevented TLS to be set up correctly on systems where libldap links with GnuTLS was fixed * The functionality to alter SSSD configuration through the D-Bus interface provided by the IFP responder was removed. This functionality was not used to the best of our knowledge, had no tests and prevented the InfoPipe responder from running as a non-privileged user. * A bug that prevented statically-linked applications from using libnss_sss was fixed by removing dependency on -lpthreads from the libnss_sss library (please see https://sourceware.org/bugzilla/show_bug.cgi?id=20500 for an example on why linking with -lpthread from an NSS modules is problematic) * Previously, SSSD did not ignore GPOs that were missing the gPCFunctionalityVersion attribute and failed the whole GPO processing. Starting with this version, the GPOs without the gPCFunctionalityVersion are skipped.- BuildRequire pkgconfig(libsystemd) instead of pkgconfig(libsystemd-login): the latter has been deprecated since systemd 209 and finally removed with systemd 230.- Add 0001-krb5-1.15-build-fix.patch to unlock building against future KRB versions.- Update to new upstream release 1.14.2 * Several more regressions caused by cache refactoring to use qualified names internally were fixed, including a regression that prevented the krb5_map_user option from working correctly. * A regression when logging in with a smart card using the GDM login manager was fixed * SSSD now removes the internal timestamp on startup cache when the persistent cache is removed. This enables admins to follow their existing workflow of just removing the persistent cache and start from a fresh slate * Several fixes to the sssd-secrets responder are present in this release * A bug in the autofs responder that prevented automounter maps from being returned when sssd_be was offline was fixed * A similar bug in the NSS responder that prevented netgroups from being returned when sssd_be was offline was fixed * Disabling the netlink integration can now be done with a new option disable_netlink. Previously, the netlink integration could be disabled with a sssd command line switch, which is being deprecated in this release. * The internal watchdog no longer kills sssd processes in case time shifts during sssd runtime * The fail over code is able to cope with concurrent SRV resolution requests better in this release * The proxy provider gained a new option proxy_max_children that allows the administrator to control the maximum number of child helper processes that authenticate users with auth_provider=proxy * The InfoPipe D-Bus responder exports the UUIDs of user and group objects through a uniqueID property- Update to new upstream release 1.14.1 * The IPA provider now supports logins with enterprise principals (also known as additional UPN suffixes). This functionality also enabled Active Directory users from trusted AD domains who use an additional UPN suffix to log in. Please note that this feature requires a recent IPA server. * When a user name is overriden in an IPA domain, resolving a group these users are a member of now returns the overriden user names * Users can be looked up by and log in with their e-mail address as an identifier. In order to do so, an attribute that represents the user's e-mail address is fetched by default. This attribute can by customized by setting the ldap_user_email configuration option. * A new ad_enabled_domains option was added. This option lets the administrator select domains that SSSD should attempt to reach in the AD forest SSSD is joined to. This option is useful for deployments where not all domains are reachable on the network level, yet the administrator needs to access some trusted domains and therefore disabling the subdomains provider completely is not desirable. * The sssctl tool has two new commands active-server and servers that allow the administrator to observe the server that SSSD is bound to and the servers that SSSD autodiscovered * SSSD used to fail to start when an attribute name is present in both the default SSSD attribute map and the custom ldap_user_extra_attrs map * GPO policy procesing no longer fails if the gPCMachineExtensionNames attribute only contains whitespaces * Several commits fix regressions related to switching all user and group names to fully qualified format, such as running initgroups for a user who is only a member of a primary group * Several patches fix regressions caused by splitting the database into two ldb files, such as when user attributes change without increasing the modifyTimestamp attribute value * systemd unit files are now shipped for the sssd-secrets responder, allowing the responder to be socket-activated. To do so, administrators should enable the sssd-secrets.socket and sssd-secrets.service systemd units. * The sssd binary has a new switch --disable-netlink that lets sssd skip messages from the kernel's netlink interface. * A crash when entries with special characters such as '(' were requested was fixed * The ldap_rfc_2307_fallback_to_local_users option was broken in the previous version. This release fixes the functionality.- Update to new upstream release 1.14.0 * The AD provider is now able to look up users from Active Directory domains by certificate. This change enables logins for Active Directory users with the help of a smart card. * The sss_override tool is now able to add certificates as local overrides in the SSSD cache. Please note that the certificate overrides are stored in the local cache, so removing the cache also removes all the certificates! * Invalid certificates are skipped instead of aborting the whole operation when logging in with a smart card using SSH. * This version allows several OCSP-related options such as the OCSP responder to be configured during smart card authentication. * SSSD is now able to determine the name of the user who logs in from the inserted smart card without having to type in the username. Note that this functionality must be enabled with the allow_missing_name pam_sss option. * The sss_cache command line tool is now able to invalidate SUDO rules with its new -r/-R switches. Note that the sudo rules ar not refreshed with the sss_cache tool immediately. * A new command line tool called sssctl was added. This tool allows to observe the status of SSSD. * A new option local_negative_timeout was added. This option allows the admin to specify the time during which lookups for users that are not handled by SSSD but are present on the system (typically in /etc/passwd and /etc/group) and prevents repeated lookups of local users on the remote server during initgroups operation. * An ID-mapping plugin for the winbind deamon was added. With this plugin, it's possible for winbind to use the same ID-mapping scheme as SSSD uses, producing consistent ID values. - Remove 0001-build-detect-endianness-at-configure-time.patch (included upstream)- Enable PAC responder. PAC is an extension element returned by domain controller, to speed up resolution of authorisation data such as group memberships.- Update to new upstream release 1.13.4 * The IPA sudo provider was reimplemented. The new version reads the data from IPA's LDAP tree (as opposed to the compat tree populated by the slapi-nis plugin that was used previously). The benefit is that deployments which don't require the compat tree for other purposes, such as support for non-SSSD clients can disable those autogenerated LDAP trees to conserve resources that slapi-nis otherwise requires. There should be no visible changes to the end user. * SSSD now has the ability to renew the machine credentials (keytabs) when the ad provider is used. Please note that a recent version of the adcli (0.8 or newer) package is required for this feature to work. * The automatic ID mapping feature was improved so that the administrator is no longer required to manually set the range size in case a RID in the AD domain is larger than the default range size * A potential infinite loop in the NFS ID mapping plugin that was resulting in an excessive memory usage was fixed * Clients that are pinned to a particular AD site using the ad_site option no longer communicate with DCs outside that site during service discovery. * The IPA identity provider is now able to resolve external (typically coming from a trusted AD forest) group members during get-group-information requests. Please note that resolving external group memberships for AD users during the initgroup requests used to work even prior to this update. This feature is mostly useful for cases where an IPA client is using the compat tree to resolve AD trust users. * The IPA ID views feature now works correctly even for deployments without a trust relationship. Previously, the subdomains IPA provider failed to read the views data if no master domain record was created on the IPA server during trust establishment. * A race condition in the client libraries between the SSSD closing the socket as idle and the client application using the socket was fixed. This bug manifested with a Broken Pipe error message on the client. * SSSD is now able to resolve users with the same usernames in different OUs of an AD domain * The smartcard authentication now works properly with gnome-screensaver- Enable internal testsuite- Update to new maintenance release 1.13.3 * A bug that prevented user lookups and logins after migration from winsync to IPA-AD trusts was fixed. * A bug that prevented the ignore_group_members option from working correctly in AD provider setups that use a dedicated primary group (as opposed to a user-private group) was fixed. * Offline detection and offline login timeouts were improved for AD users logging in from a domain trusted by an IPA server. * The AD provider supports setting up autofs_provider=ad .- Update to new upstream release 1.13.2 * Initial support for Smart Card authentication was added. * The PAM prompting was enhanced so that when Two-Factor Authentication is used, both factors (password and token) can be entered separately on separate prompts. * This release supports authenticating againt a KDC proxy.- Update to new upstream release 1.13.1 * Initial support for Smart Card authentication was added. The feature can be activated with the new pam_cert_auth option. * The PAM prompting was enhanced so that when Two-Factor Authentication is used, both factors (password and token) can be entered separately on separate prompts. At the same time, only the long-term password is cached, so offline access would still work using the long term password. * A new command line tool sss_override is present in this release. The tools allows to override attributes on the SSSD side. It's helpful in environment where e.g. some hosts need to have a different view of POSIX attributes than others. Please note that the overrides are stored in the cache as well, so removing the cache will also remove the overrides. * Several enhancements to the dynamic DNS update code. Notably, clients that update multiple interfaces work better with this release. * This release supports authenticating againt a KDC proxy * The fail over code was enhanced so that if a trusted domain is not reachable, only that domain will be marked as inactive but the backed would stay in online mode.- Update to new upstream release 1.13 * Support for separate prompts when using two-factor authentication * Added support for one-way trusts between an IPA and Active Directory environment. (Depends on IPA 4.2) * The fast memory cache now also supports the initgroups operation. * The PAM responder is now capable of caching authentication for configurable period, which might reduce server load in cases where accounts authenticate very frequently. Refer to the "cached_auth_timeout" option in sssd.conf(5). * The Active Directory provider has changed the default value of the "ad_gpo_access_control" option from permissive to enforcing. As a consequence, the GPO access control now affects all clients that set access_provider to ad. In order to restore the previous behaviour, set ad_gpo_access_control to permissive or use a different access_provider type. * Group Policy objects defined in a different AD domain that the computer object is defined in are now supported. * Credential caching and Offline authentication are also available when using two-factor authentication * The Python bindings are now built for both Python2 and Python3. * The LDAP bind timeout, StartTLS timeout and password change timeout are now configurable using the ldap_opt_timeout option.- Kill unused libsss_sudo-devel solvable.- Obsolete/provide libsss_sudo in sssd main package. Sudo capability is an integral feature in SSSD and the library is not supposed to be used separately.- sssd.service: add Before= and Wants=nss-user-lookup.target correct fix for bsc#926961- Update to new upstream release 1.12.5 * The background refresh tasks now supports refreshing users and groups as well. See the "refresh_expired_interval" parameter in the sssd.conf manpage. * A new option subdomain_inherit was added. * When an expired account attempts to log in, a configurable error message can be displayed with sufficient pam_verbosity setting. See the "pam_account_expired_message" option. * OpenLDAP ppolicy can be honored even when an alternate login method (such as SSH key) is used. See the "ldap_access_order" option. * A new option :krb5_map_user" was added, allowing the admin to map UNIX usernames to Kerberos principals. * BUG FIXES: * Fixed AD-specific bugs that resulted in the incorrect set of groups being displayed after the initgroups operation. * Fixes related to the IPA ID views feature. Setups using this should update sssd on both IPA servers and clients. * The AD provider now handles binary GUIDs correctly. * A bug that prevented the `ignore_group_members` parameter to be used with the AD provider was fixed. * The failover code now reads and honors TTL value for SRV queries as well. * Race condition between setting the timeout in the back ends and reading it in the front end during initgroup operation was fixed. This bug affected applications that perform the initgroups(3) operation in multiple processes simultaneously. * Setups that only want to use the domain SSSD is connected to, but not the autodiscovered trusted domains by setting `subdomains_provider=none` now work correctly as long as the domain SID is set manually in the config file. * In case only "allow" rules are used, the simple access provider is now able to skip unresolvable groups. * The GPO access control code now handles situations where user and computer objects were in different domains.- Update to new upstream release 1.12.4 (Changelog highlights following) * This is mostly a bug fixing release with only minor enhancements visible to the end user. * Contains many fixes and enhancements related to the ID views functionality of FreeIPA servers. * Several fixes related to retrieving AD group membership in an IPA-AD trust scenario. * Fixes a bug where the GPO access control previously didn't work at all if debugging was enabled in smb.conf. * SSSD can now be pinned to a particular AD site instead of autodiscovering the site. * A regression that caused setting the SELinux context for IPA users to fail, was fixed. * Fixed a potential crash caused by a double-free error when an SSSD service was killed by the monitor process.- A minor rpmspec cleanup to get rid of five rpmlint warnings * Remove mentioning of system-wide dbus configuration file from comments. * Remove traditional init script. * Remove compatibility for producing packages on older OpenSUSE releases.- Update to new upstream release 1.12.3 * SSSD now allows the IPA client to move from one ID view to another after SSSD restart. * It is possible to apply ID views to IPA domains as well. Previous SSSD versions only allowed views to be applied to AD trusted domains. * Overriding SSH public keys is supported in this release. * Move semanage related functions to a separate library.- build with PIE- fix bashism in postun script- Update to new upstream release 1.12.2 (bugfix release, bnc#900159) * Fixed a regression where the IPA provider did not fetch User Private Groups correctly * An important bug in the GPO access control which resulted in a wrong principal being used, was fixed. * Several new options are available for deployments that need to restrict a certain PAM service from connecting to a certain SSSD domain. For more details, see the description of pam_trusted_users and pam_public_domains options in the sssd.conf(5) man page and the domains option in the pam_sss(8) man page. * When SSSD is acting as an IPA client in setup with trusted AD domains, it is able to return group members or full group memberships for users from trusted AD domains. * Support for the "views" feature of IPA. - Remove 0001-build-call-AC_BUILD_AUX_DIR-before-anything-else.patch (merged upstream)- Add 0001-build-call-AC_BUILD_AUX_DIR-before-anything-else.patch to workaround bad autoconf invocation- 0001-build-detect-endianness-at-configure-time.patch Correct defective endianness test.- Update to new upstream release 1.12.1 * The GPO access control was further enhanced to allow the access control decisions while offline and map the Windows logon rights onto Linux PAM services. * The SSSD now ships a plugin for the rpc.idmapd daemon, sss_rpcidmapd(5). * A MIT Kerberos localauth plugin was added to SSSD. This plugin helps translating principals to user names in IPA-AD trust scenarios, allowing the krb5.conf configuration to be less complex. * A libwbclient plugin implementation is now part of the SSSD. The main purpose is to map Active Directory users and groups identified by their SID to POSIX users and groups for the file-server use-case. * Active Directory users ca nnow use their User Logon Name to log in. * The sss_cache tool was enhanced to allow invalidating the SSH host keys. * Groups without full POSIX information can now be used to enroll group membership (CVE-2014-0249). * Detection of transition from offline to online state was improved, resulting in fewer timeouts when SSSD is offline. * The Active Directory provider now correctly detects Windows Server 2012 R2. Previous versions would fall back to the slower non-AD path with 2012 R2. * Several other bugs related to deployments where SSSD is acting as an AD client were fixed.- The utility sss_obfuscate uses the Python module pysss, so add a dependency on python-sssd-config to sssd-tools (bnc#890242)- Update to new upstream release 1.12.0 * A new responder, called InfoPipe was added. This responder provides a public D-Bus interface accessible over the system bus. In this release, methods for retrieving user attributes and list of groups were added as well as objects representing SSSD domains and processes. (The next 1.12.x releases will publish objects representing users and groups, too.) * SSSD provides an ID-mapping plugin for cifs-utils so that Windows SIDs can be mapped onto POSIX IDs and/or names without requiring Winbind and using the same code as the SSSD uses for identity information. * First phase of Group Policy-based access control for the AD provider was added. At the moment, the gpo-ldap component that downloads the list of GPOs that apply for the specific client has been implemented as well as the gpo-smb component that retrieves the group policy files and determines the access control check results based on those files. Future improvements will focus on storing the GPO policies as local files and mapping the Windows logon rights onto Linux PAM services. * Added a new library called sss_sifp that provides a simple synchronous API for communication with our new InfoPipe responder over the system bus. - Remove 0001-BUILD-Link-libsss_ldap_common.so-to-libsss_idmap.so.patch (merged upstream) - Provide "rcsssd" in systemd environments - Ensure sssd is always startable by removing /var/lib/sss/db/*.ldb on package installation so as to avoid potentially cache format incompatibility which would cause sssd to exit- fix %postun to not erroneously remove sss pam module- Switch to libnl-3 so we can get rid of libnl-1.- Redo 0001-build-detect-endianness-at-configure-time.patch to be -p1 - Add 0001-BUILD-Link-libsss_ldap_common.so-to-libsss_idmap.so.patch to resolve runtime loading problems (http://lists.opensuse.org/opensuse-factory/2014-05/msg00181.html )- bnc#877457 - 78 Configuration file /usr/lib/systemd/system/sssd.service is marked executable. Please remove executable permission bits.- Detect endianness at configure time, for use by Samba's byteorder.h header; (bnc#876544). + 0001-build-detect-endianness-at-configure-time.patch- Update to new upstream release 1.11.5.1 * sssd crashes after upgrade from 1.11.4 to 1.11.5 when using a samba4 domain * SSSD pam module accepts usernames with leading spaces * [RFE] Expose the list of trusted domains to IPA * If both IPA and LDAP are set up with enumeration on, two enum tasks are running * sssd.conf man pages don't list a configuration option. * Make SSSD compilable on systems with non-standard paths to krb5 includes * [freebsd] pam_sss: add ignore_unknown_user option * MAN: Remove misleading memberof example from ldap_access_filter example * not retrieving homedirs of AD users with posix attributes * Document that `sssd` cache needs to be cleared manually, if ID mapping configuration changes * Check IPA idranges before saving them to the cache * Evaluate usage of sudo LDAP provider together with the AD provider * Setting int option to 0 yields the default value * ipa-server-mode: Use lower-case user name component in home dir path * SSSD Does not cache SELinux map from FreeIPA correctly * IPA SELinux code looks for the host in the wrong sysdb subdir when a trusted user logs in * sssd fails to handle expired passwords when OTP is used * Add another Kerberos error code to trigger IPA password migration * Double OK when starting the service * SSSD should create the SELinux mapping file with format expected by pam_selinux * Valgrind: Invalid read of int while processing netgroup * other subdomains are unavailable when joined to a subdomain in the ad forest * Error during password change * configure time variables not expanded when running ./configure * RHEL7 IPA selinuxusermap hbac rule not always matching- Update to new upstream release 1.11.4 * The simple access provider supports specifying users and groups using their NetBIOS domain name (such as DOMAIN\username) * Support for enumerating users and groups from trusted AD domains was added to the AD provider * The Active Directory site discovery was made more robust for configurations which use multiple trusted domains * Several bugs in the LDAP provider that affected setups which mapped Windows SIDs to POSIX IDs were fixed * The SSSD is now able to use One Time Password (OTP) authentication configured on an IPA server.- Update to new upstream release 1.11.3 * The AD provider is able to resolve group memberships for groups with Global and Universal scope * The initgroups (get groups for user) operation for users from trusted AD domains was made more reliable by reading the required tokenGroups attribute from LDAP instead of Global Catalog * A new option ad_enable_gc was added to the AD provider. This option allows the administrator to force SSSD to talk to LDAP port only and never try the Global Catalog * The AD provider is now able to leverage the tokenGroups attribute even when POSIX attributes are used, providing better performance during logins. * A memory leak in the NSS responder that affected long-lived clients that requested netgroup data was fixed - Remove sssd-ldflags.diff (merged upstream)- Migrate deprecated krb5_kdcip variable to krb5_server (bnc#851048)- Update to new upstream release 1.11.2 * A new option ad_access_filter was added. This option allows the administrator to easily configure LDAP search filter that the users logging in must match in order to be granted access. * The Kerberos provider will no longer try to create public directories when evaluating the krb5_ccachedir option. - Remove 0005-implicit-decl.diff (merged upstream)- Update to new upstream release 1.11.0 * The sudo integration was made more robust. SSSD is now able to gracefully handle situations where it is not able to resolve the client host name or sudo rules have multiple name attributes. * Several nested group membership bugs were fixed * The PAC responder was made more robust and efficient, modifying existing cache entries instead of always recreating them. * The Kerberos provider now supports the new KEYRING ccache type. - Remove sssd-no-ldb-check.diff, now implemented through a configure argument --disable-ldb-version-check- Explicitly formulate SASL BuildRequires- Update to new upstream release 1.9.5 * Includes a fix for CVE-2013-0287: A simple access provider flaw prevents intended ACL use when SSSD is configured as an Active Directory client. * Fixed spurious password expiration warning that was printed on login with the Kerberos back end. * A new option ldap_rfc2307_fallback_to_local_users was added. If this option is set to true, SSSD is be able to resolve local group members of LDAP groups. * Fixed an indexing bug that prevented the contents of autofs maps from being returned to the automounter deamon in case the map contained a large number of entries. * Several fixes for safer handling of Kerberos credential caches for cases where the ccache is set to be stored in a DIR: type. - Remove Provide-a-be_get_account_info_send-function.patch, Add-unit-tests-for-simple-access-test-by-groups.patch, Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch, Resolve-GIDs-in-the-simple-access-provider.patch (CVE-2013-0287 material is in upstream), sssd-sysdb-binary-attrs.diff (merged upstream)- Implement signature verification- Fixed security issue: CVE-2013-0287 (bnc#809153): When SSSD is configured as an Active Directory client by using the new Active Directory provider or equivalent configuration of the LDAP provider, the Simple Access Provider does not handle access control correctly. If any groups are specified with the simple_deny_groups option, the group members are permitted access. New patches: * Provide-a-be_get_account_info_send-function.patch * Add-unit-tests-for-simple-access-test-by-groups.patch * Do-not-compile-main-in-DP-if-UNIT_TESTING-is-defined.patch * Resolve-GIDs-in-the-simple-access-provider.patch- Resolve user retrieval problems when encountering binary data in LDAP attributes (bnc#806078), added sssd-sysdb-binary-attrs.diff - Added sssd-no-ldb-check.diff so that SSSD continues to start even after an LDB update.- fix package name in baselibs.conf (bnc#796423)- update to 1.9.4 (bnc#801036): * A security bug assigned CVE-2013-0219 was fixed - TOCTOU race conditions when creating or removing home directories for users in local domain * A security bug assigned CVE-2013-0220 was fixed - out-of-bounds reads in autofs and ssh responder * The sssd_pam responder processes pending requests after reconnect * A serious memory leak in the NSS responder was fixed * Requests that were processing group entries with DNs pointing out of any configured search bases were not terminated correctly, causing long timeouts * Kerberos tickets are correctly renewed even after SSSD daemon restart * Multiple fixes related to SUDO integration, in particular fixing functionality when the sssd back end process was changing its online/offline status * The pwd_exp_warning option was fixed to function as documented in the manual page - refreshed sssd-ldflags.diff to apply cleanly- Removed left-over "Requires" for no longer existing sssd-client subpackage. - New patch: sssd-ldflags.diff to fix link failures due to erroneous LDFLAGS usage- Switch back to using libcrypto instead of mozilla-nss as it seems to be supported upstream again, cf. https://lists.fedorahosted.org/pipermail/sssd-devel/2012-June/010202.html - Cleanup PAM configuration after uninstalling sssd (bnc#788328)- Update to new upstream release 1.9.3 * Many fixes related to deployments where the SSSD is running as a client of IPA server with trust relation established with an Active Directory server * Multiple fixes related to correct reporting of group memberships, especially in setups that use nested groups * Fixed a bug that prevented upgrade from the 1.8 series if the cache contained nested groups before the upgrade * Restarting the responders is more robust for cases where the machine is under heavy load during back end restart * The default_shell option can now be also set per-domain in addition to global setting.- Update to new upstream release 1.9.2 * Users or groups from trusted domains can be retrieved by UID or GID as well * Several fixes that mitigate file descriptor leak during logins * SSH host keys are also removed from the cache after being removed from the server * Fix intermittent crash in responders if the responder was shutting down while requests were still pending * Catch an error condition that might have caused a tight loop in the sssd_nss process while refreshing expired enumeration request * Fixed memory hierarchy of subdomains discovery requests that caused use-after-free access bugs * The krb5_child and ldap_child processes can print libkrb5 tracing information in the debug logs- Update to new upstream release 1.8.93 (1.9.0~beta3) * Add native support for autofs to the IPA provider * Support for id mapping when connecting to Active Directory * Support for handling very large (> 1500 users) groups in Active Directory * Add a new fast in-memory cache to speed up lookups of cached data on repeated requests * Add support for the Kerberos DIR cache for storing multiple TGTs automatically * Add a new PAC responder for dealing with cross-realm Kerberos trusts * Terminate idle connections to the NSS and PAM responders- Update to new upstream release 1.8.3 * LDAP: Handle situations where the RootDSE is not available anonymously * LDAP: Fix regression for users using non-standard LDAP attributes for user information - Switch from openssl to mozilla-nss, as this is the officially supported crypto integration- Fix build error on SLES 11 builds- Add suse_version condition for glib over libunistring for SLES 11 SP2. - Update to new upstream release 1.8.2 * Fix for GSSAPI binds when the keytab contains unrelated principals * Workarounds added for LDAP servers with unreadable RootDSE- Update to new upstream release 1.8.1 * Resolve issue where we could enter an infinite loop trying to connect to an auth server- Update to new upstream release 1.8.0 * Support for the service map in NSS * Support for setting default SELinux user context from FreeIPA * Support for retrieving SSH user and host keys from LDAP * Support for caching autofs LDAP requests * Support for caching SUDO rules * Include the IPA AutoFS provider * Fixed several memory-corruption bugs * Fixed a regression in the proxy provider- Fixed systemd related packaging issues (bnc#724157) - fixed build on older openSUSE releases- Resolve "have choice for libnl-devel: libnl-1_1-devel libnl3-devel"- Fixed typos in configure args - Cherry-picked password policy fixes from 1.5 branch (bnc#705768) - switched to fd-leak fix cherry-picked from 1.5 branch - Add /usr/sbin to the search path to make configure find nscd (bnc#709747)- Add patches to fix an fd leak in sssd_pam- Update to new upstream release 1.5.11 * Support for overriding home directory, shell and primary GID locally * Properly honor TTL values from SRV record lookups * Support non-POSIX groups in nested group chains (for RFC2307bis LDAP servers) * Properly escape IPv6 addresses in the failover code * Do not crash if inotify fails (e.g. resource exhaustion) - Remove redundant %clean section; delete .la files more efficiently- Update to 1.5.8: * Support for the LDAP paging control * Support for multiple DNS servers for name resolution * Fixes for several group membership bugs * Fixes for rare crash bugs- Update to 1.5.7 * A flaw was found in the handling of cached passwords when kerberos renewal tickets is enabled. Due to a bug, the cached password was overwritten with a (moderately) predictable filename, which could allow a user to authenticate as someone else if they knew the name of the cache file (bnc#691135, CVE-2011-1758) - Changes in 1.5.6: * Fixed a serious memory leak in the memberOf plugin * Fixed a regression with the negative cache that caused it to be essentially nonfunctional * Fixed an issue where the user's full name would sometimes be removed from the cache * Fixed an issue with password changes in the kerberos provider not working with kpasswd- Update to 1.5.5 * Fixes for several crash bugs * LDAP group lookups will no longer abort if there is a zero-length member attribute * Add automatic fallback to 'cn' if the 'gecos' attribute does not exist- Should build in SLE-11-SP1 now- Updated to 1.5.4 * Fixes for Active Directory when not all users and groups have POSIX attributes * Fixes for handling users and groups that have name aliases (aliases are ignored) * Fix group memberships after initgroups in the IPA provider- Updated to 1.5.3 * Support for libldb >= 1.0.0 * Proper detection of manpage translations * Changes between 1.5.1 and 1.5.2 * Fixes for support of FreeIPA v2 * Fixes for failover if DNS entries change * Improved sss_obfuscate tool with better interactive mode * Fix several crash bugs * Don't attempt to use START_TLS over SSL. Some LDAP servers can't handle this * Delete users from the local cache if initgroups calls return 'no such user' (previously only worked for getpwnam/getpwuid) * Use new Transifex.net translations * Better support for automatic TGT renewal (now survives restart) * Netgroup fixes- Updated to 1.5.1 * Vast performance improvements when enumerate = true * All PAM actions will now perform a forced initgroups lookup instead of just a user information lookup This guarantees that all group information is available to other providers, such as the simple provider. * For backwards-compatibility, DNS lookups will also fall back to trying the SSSD domain name as a DNS discovery domain. * Support for more password expiration policies in LDAP - 389 Directory Server - FreeIPA - ActiveDirectory * Support for ldap_tls_{cert,key,cipher_suite} config options * Assorted bugfixes- /var/lib/sss/pubconf was missing (bnc#665442)- It was possible to make sssd hang forever inside a loop in the PAM responder by sending a carefully crafted packet to sssd. This could be exploited by a local attacker to crash sssd and prevent other legitimate users from logging into the system. (bnc#660481, CVE-2010-4341)- Own /etc/systemd directories to fix build.- install systemd service file- Updated to 1.4.1 * Add support for netgroups to the LDAP and proxy providers * Fixes a minor bug with UIDs/GIDs >= 2^31 * Fixes a segfault in the kerberos provider * Fixes a segfault in the NSS responder if a data provider crashes * Correctly use sdap_netgroup_search_base * the utility libraries libpath_utils1, libpath_utils-devel, libref_array1 and libref_array-devel moved to their own separate upstream project (ding-libs) * Performance improvements made to group processing of RFC2307 LDAP servers * Fixed nested group issues with RFC2307bis LDAP servers without a memberOf plugin * Manpage reviewed and updated- remove hard coded python version- No dependencies on %{release}- Updated to 1.3.1 * Fixes to the HBAC backend for obsolete or removed HBAC entries * Improvements to log messages around TLS and GSSAPI for LDAP * Support for building in environments using --as-needed LDFLAGS * Vast performance improvement for initgroups on RFC2307 LDAP servers * Long-running SSSD clients (e.g. GDM) will now reconnect properly to the daemon if SSSD is restarted * Rewrote the internal LDB cache API. As a synchronous API it is now faster to access and easier to work with * Eugene Indenbom contributed a sizeable amount of code to the LDAP provider - We now handle failover situations much more reliably than we did previously - We also will now monitor the GSSAPI kerberos ticket and automatically renew it when appropriate, instead of waiting for a connection to fail * Support for netlink now allows us to more quickly detect situations where we may have come online * New option "dns_discovery_domain" allows better configuration for using SRV records for failover - New subpackages: libpath_utils1, libpath_utils-devel, libref_array1 and libref_array-devel- Package pam- and nss-Modules as baselibs - cleaned up file list and dependencies - fixed init script dependencies- Updated to 1.1.0 * Support for IPv6 * Support for LDAP referrals * Offline failed login counter * Fix for the long-standing cache cleanup performance issues * libini_config, libcollection, libdhash, libref_array and libpath_utils are now built as shared libraries for general consumption (libref_array and libpath_utils are currently not packaged, as no component in sssd links against them) * Users get feedback from PAM if they authenticated offline * Native local backend now has a utility to show nested memberships (sss_groupshow) * New "simple" access provider for easy restriction of users - Backported libcrypto support from master to avoid Mozilla NSS dependency - Backported password policy improvments for LDAP provider from master- use logfiles for debug messages by default- subpackages for commandline tools, ipa-provider plugin and python API- Updated to 1.0.5. Highlights: * Removed some dead code (libreplace * Clarify licenses throughout the code- Updated to 1.0.4- Update to 0.6.0- fix LDAP filter for initgroups() with rfc2307bis setups- initial package submissioncloud130 1544571040 1.16.1-lp150.2.6.11.16.1-lp150.2.6.1 libnfsidmapsss.soman5sss_rpcidmapd.5.gzman5man5man5man5man5sss_rpcidmapd.5.gzman5man5man5sss_rpcidmapd.5.gz/usr/lib64//usr/lib64/libnfsidmap//usr/share/man/ca//usr/share/man/ca/man5//usr/share/man/cs//usr/share/man/de//usr/share/man/es//usr/share/man/fr//usr/share/man/ja//usr/share/man/man5//usr/share/man/nl//usr/share/man/pt//usr/share/man/uk//usr/share/man/uk/man5/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9295/openSUSE_Leap_15.0_Update/badbaba066bface36b521debe00da854-sssd.openSUSE_Leap_15.0_Updatecpioxz5x86_64-suse-linuxdirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=84e50b3d33d0de5b18b10a1e4ef6e93915be68d2, strippedtroff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRR/}yt&k9̀ packageand(nfsidmap:sssd-client)utf-8550ed4f0bbb2d3323d31f63bf3fcaef5d4b4346357d5432e0abaee51c3fb73a5?7zXZ !t/>] crt:bLL [aW$0Q49B$yvF{|9E7=e諃9T~CE% p٘mrF{ȳnVgBr G1~t \th= +%CY>3Qh1? k kָ?/-"gL % '&l%VC?B%ILA8'ҐeOSz<B`8@fq1b4N8tQ_5| )‘|?\ױ47\~g)Eu"pjEe<ɸ+zRtЕt^:p u7=u ;?_wO;Y7l?M^坭üw{\\eiW9.A> Oŋ(KxrEQ}:FC^N&\ur^8_d ư~XhMo'%c W |zbz&U0*Np~hvYbbd,M4loQ<n2ίDDDO*tNQt _0ys,[j}qe'9 mO`A;dvLS*RAPxN9оԕGX4˥ 0uOb^Mj(;ۤ4j{ wǜ#yhp]Ydo@ΉW|/Gko_ SHM-ח|W.'v'ܲ#:}H>BY3W~t-Ram czinySπMiF~j(iF>z?=iQsQ品G/@\z=]eG>D\O,WӋ?=qF7s>]k,0Ap;!S  _tbj{qF#ʬ3F}/PlrEIi"k.ev4l!f )= ~sem*A] Oz[| |9X 4JZZ{9Y6\zpwKĀJŒܪOˇ_2E|8)D8a10&I@tN3 PXL7$o'{%%{JXbKy)d[|`&tС!A;3mMJz/.D zJ1c/ǑF_'aG h*&nb^|E⍇qZ eu ޙ!A M/sྊ{6 G6%˝ݮŬɘώSqin{ͺ`:U#!PS^gHVh^/04qJUu?TwX<9zr5vQ(zD=J̫u$[غD!^QfmX AqA0F/mGJ[!V )Ux^X lLԡ6,H'*yh[@<”L9> NVرJ 4,UL|M[FVgj%1deͯ)U/q$sqg֏ӵ1phl`p BĒ$[<=c~qt%qy|T(e$!ݳ&bf?Hd+?z򟓔*cdW*]3m;K?0Rvh;mtcc{dșl_SɕV惏ғ9'т1{%ş'Nu)mKTRN+ԀPHZ9RqE|^~ Bԕ? 7Do\ x.Mkz9$=,mCۅgde8[H~n 4'ZݠJV|yWZ[4(IijLO\:H3 :(>( oR٭B9' =ک5䠌 zOmйpj|%R^/Z:dDr{i[^;aBu_,`T,02Ms;#W0;߃| ;ꋔͮĠo6OvPXOR7-| ŦAvv 'ˡM?m0*tAak/ieF y HC+f#LzY)w5 gNnq{d6=Vb0U11 N#qq4ya6[t:r hv :iL1Ԑ+ ʻ\\=4Z@6Z]!؏Phqd*JK1)F7[sE\PA Fcgωt!94 $f[3nŽM3J@kNЪ H?6Tco,3}#N&VB$!luWTug8;vr[$wJLWm*wq/V9?~:tqy9mko&AũH1 ty!e!KzvYqd|( 9-:$3w7w;V>SOVI} s gN$.qen0[-sN2}6@+Ʀ B~{t!=;i|:ӮoVn* n oH몡[ 3RTļݷI+oFg[*˫% 7CѿMZ+q4U[V~ |$1vpzq)A6]x[FЊ3aQJ16GT5Uժğ/ٝQ0XfDyg'׋O!A3MA<$Ca[_.s slCa^xL0$a<# "}#+$;XV(PWxG=KMK5kf{!*O0 6m zz>YzHb,űhOlCnp3RC"yө<&T<Tzb&&S&+jYD&&e fq!0azjiš[%'IfqBJ/RGt`K/R8[PƎV3׋[<ȪXHrU$(tns&9&%ʀMVKYQr̮u%ә݋4:u_3pf9 iUDYVDr:ʊ:7ZB0^>a i;fx2[}۔G/&Y(!DGŊ56tڡ bP&\61 5~EGIÈDX_㥹~K7,<>w giIx^}*k௎/-s4 %C <+]4 YQ*wa0WCh.)n6qwG thQg8g=2JPƇa\'lqDuUK 󝚉#$aXd9@ aw hȆ]qr~ηuңz[_/W p)gU453&v% ) g@XZ{ Tć.:0܆v p"0]fSsE<,i;9OHI2 :.[1˲^c3@u ān ;jWȨLa)FP1.ojLy=f|dHu4c|+J5[{k5U& v9\t+j96K~9jRqoѵug8A` BG H*ϖV/-1< /oyr'ʦ8ٱ)jg 4s 9e,TIK}0,:1Hڔ~kY3 ;lMnpNb==ao0`֍č4dLk)uSL6×A"KD9?G!"K+唴T7CUA2oMbbϝՠUYp= ( D1y[dPح[K|p^pg"_XZfu]f$RawCyp~4K@'l61R3 2.E3Ao*m$]va>7+e]!PP&EٳKrZ4wQs>d(7M<;?Lcl=UDy[u*"S?&2x5abbb2Y|e] @*F2zl@j6 3P/-T3?כL$Ѣ־ojI"7!hOso󠢃Rm73~ ܒ |łt8rmы%SW6mAMo(n^(_^bҧAݹJQvqUW[(LNt0C`m"{\A#_@I?1##l6ۂ-6|  oJM[>:g{ gl&QC$dO-`b^qP7|%eavQ[{i#sɿVkj+wl:uYcu0@Z vƳkt x"4\_2WN1W4Z IR`Sw7.;Ͳ/<70hM~*^Hn(CerMͫ3)%Yvv Yc>QW2 E$w3ƳhdC ywAWCv5ktBZ6f4sժ&h$&cfI[ITӑg#S@t|AI0vE<Wvf7ly\#{eDǑ\ MqN=iT#Һ)EBj@L6 )i΂ )ͻC%*G'N ػOƇw4ٛl0{tЅ#`+Zs gE\E;' 8t˖S"px1؄43C \C7]u#N;װYOÌDmŸ3Qub`·+Ű->RqH$\Á WTX^d+U.9/kd (8oxk:4_[[Vut zG>jٓ)[:g#ՔTKV@_0No:c!<Չ4v&oKA UH`@uB°䐱?3rcڰv?m1z)兤%vt\~`X$$RLj:M2ύUpzegDrjHksoY_r|6n!]\^R$ vcw^wIO?S.m,.74Y$AèŋP6fNH;*Zq}IrW,@sSUJ]8.8&&XvT3!IJ`Lji31b/Q 9 BA>Wy}eoߙc0O.Ȫ G+dPh=.rZ(JTO#ߕzǾ!fzB:wv龶 Vp?ua(`~ VqM&'z'9Tkl\[Z{6RH8%mPv}s)hɃ2dĚ K=\ZKEM^D?9[ Rܺ)Pz翚 icznQ;fD`j`Bd+ď)i'Itu:ڐ_=뗷|^y&:Αu=i.Eh<+ٚWilV! p?¹'Ѹgv8)Н IїZI9_D'ݕNy3 R$ J9p :1/э _Nƽ9.\cBp5D'-*a^VgxkB@ݢq*JeTnMG7TNb\H-;1m \{.RL)|ZҿA~-J!91L}wڻ<p]绡n 2&Pm 1)z TV1'\Pc \bf&ͪvi}s>Wh!DDm]P\n^1 ͥwn/ENtFs;i/'i vDA.QɵBb__Qq8Pq{*fDG ]gD*f n#5 &(.(ǂ<|2 Z / ?ޡ؇laeiZ1(fci{蜖U>XRy{ t,>;W,iGS?j.H/KaCL'J!ktw)YTK!L{r[bRTZEB-wm "$L)g9J[\Ht $WØnU|Tū%>yGM&%, ZbLSf%Q٢.+TH$o! ƇF%L;8A%Vapy*55kjն}]%]0 9٤v3z=HDﶧJP>+e`k:C*hKT$ ݽ ",bC˾LYS5I ꐡ DHHY kR\̡:cJ](m܍ۥHw*6L}}4Q{lcģ=m4ouJ-ef74_vСmc:US.o"sX=3*h~lќdfZȻVH;/9=0)՘qwy U]3Wj링o\JMFp-bFv 7G2jkjzn!3ƫ#f=Ԗ|br=Z޳TguD DCɢ>/EN𛛂!YF[A5|+ B  .SqvЅ`cd?dI-UaW2۳Q $=1&:$0"{_X8+xzqȐ#_RY">{{ nѤ( ի݁Xj;u;bR.. n}ᝍkS>9Wց= ִfYҡY}yG|]ٜL c[48Œڙ8)xyia)@PLrSj} {~!JlI[oi@be?QEQFb5 r2ujdahpLSvFl;C7Yjn5Lu]O{df蠳ϖ7D@~( B*?A&r(P kE]!㵾 nR7fh _?Ui>x`a,[)t2.fJJHN(e |l6x>L "\ LfZ+*Ѧ<5U< ^4w̹7x-1;$$S vrV1d'I ͻZ QCtAA~}>g)n\<΁5ur /8'C %'ѪOS9:kVDtYt4n_Ψ,;+z=PxZظQd$ RLW"TTC ޣ0!Us~|-YgRmq1TQ@9r2pLeh4^'Ff_K{7WWd|,ߠXՁ<1z>*Zm 0)8n^T (8h y2/9[vX zX'<W#[H0T?#tB7o=A`ylPN[Qsڝ .JMp"8cJ/ Cy>NL閇µ^eP44]-G =fpl $ {@8p9}).@_ua_B(8*zGu`}t$pqmAی+8\CQׂITko&%'2SE#%9|mЪ|g3$SVO2'U5U +TQ{oV$ݥ>'2 SB9=}0bD)K^So7^d=OV*vE9%q x2\ueҨV]%T$" YCMltJ,،nVnZE@Ng]I'GYtZ.ږ%c9 = h ԄqɣKh礨&@Y.5j=>=R: PAyc }p_3:\e D:"{L~tFYKgf;9o Ӓ| IGf 0uA߮mzqs/5W2:P>lAOjbXm=99<~3sz黱F$Q a!M}!:3JW:E:a+jzm[SL%*n38tp:&uĨ^)gB2jaZ:!ϥ8e8CSkb8Wa{qeĨQ>/.czF#cag\Gv5FrȓʷEuV!RxYĴ˞RO699.$.EX72NH̬e[/&#/8!EDQ"Xb;T:0D!Dq5p w[%YU|"@#~yj&0$@rU'0)4F3u#~M_qHLfr*Bnܫ}Va FـR=CaE!R:(Yln?\'NXlTܨjVulTPM'gaBѴp`?y8.JS7ԉXWZ|ZCZCvX27 i0@x,^Lg\nZoU0pCe'$CVӌ*Yqϔ;`~MYW5L-~27!IiEĕ2nG[EINuS[zp۞?y7 ACT|PJ9M#?ݒrٹߙA/fcWt [o>d|?ڟg߬ڵ@;V>r 9ME7ɳ(w;>e"uN;V )X2 _'szD+10zA@^B;ŧs|$ݼ;ДU=FX;i:KBP|KT޲".F(Riվ p} ˅~6DƊ ՔVߏÒK&ZR~Zpd]>x0c/"aEq "*#pF,TrU$O0n"aTVS7Zclj fp*(`~`ܿqt=;qtÑY}bU@8cu}zBZT@<i?LK9՛- 2;X_`}[7bGJnr4!f^cpjI<(=hYfUHCzU9urC| K=$<Ŋ/bOiyZeT g% Xњq7q-KFϴ=x5%??1J[V[@Dշpd'LbZm+)9-:go4@$y|E.l#G AÌFҮV"|Q[ EǴXˡbPW8m8jաIRy VK?ϯE:&tX*.6 Hx%/F[x.U@)Æއ*߹WhklWۙ<6yiVaۗ 5|M+W{,&mVeTK#ӽ!:3 l"̧{wwW*_h,ݟ}cQ2D_64$%>d qSV:/d?Hvs~{2ߑqi~eͮ7Va@ɊHɌ*t \[RkfA]ZxCqPM7 ᠁aVԝtbJ<2}XaWs3wǧ/%;Ow=3jt,^&gJba>vwYBH3~8۾ ,bgޭ )?#4aAao`C;).#8.zKfuA;#_BSvk L3;[$|Ny7rp󊓥ʗm:$tP$,锰 m[ 7<\Tdu!7~,]aBt5&wBrE]\k>'{bg8/$<՟a4YZ̹:PĻkCd K mfk#B# e`Sf:9S ϡ8H>̛jKժ3xN'.y˼GYEz{m_j9 FA A7 !E/36sX59rUj|wFrI }5vΨq?`iE{Ҧc]D'EVT'r.MFN%W~Ojܗ5v\YF_7PϷl؈Sޣ[fhvʘxF#ݙXAJSY*|'4ĺ}G+'eVjeUDr 9\4e^*FS?5<2czTkVIGu#bR;t5Uehϣ%ۥL4D`D8RL̠'9 ѽ3]9.1cA9>Y` .up8NW`.Qx f3(Hw.Am[6#wtG2uRwz\!uw濸ΙY$/!NWVu\PN,Q} YZ