permissions-20180125-lp150.2.3.1 4>$  Ap[ǵ/=„nQI_b5d{"ؘLnn`i9ǢIjO}WFL9Зq%*nvXj&vOoN^=[&w"7H?{i(,Aϰa m{[W}fSzq7Oqka-]D}z4r*v<3TvTAیHڷƁ 0N~ 8 Vnb,z׭UO'A.?3u`oYWc4n;ӦSQ8e29e51f4a6ab8297cebacc70d629f609b9fea40e1814eaf2a8bc5a4109397883e919e93bcb64e0a812ae378af3ae5e95a9e082e[ǵ/=„ikj`߳=eS?M!Uk;\E-[l* h[@KN*D^:Z[0Z~acM媏rl>z}On#XMϺE~jGG dwHuEy(ŭ( vKACP,e a,|5ѶΪ?mu@p[X_dCp@;?;d # B #,5 Nd0 T  f  x        A n   L z( 8 f9 Xf::f>6LF6TG6h H6 I6 X6Y6\7 ]70 ^7b8c8d9Te9Yf9\l9^u9p v9w: x: y;z;$;4;8;>;Cpermissions20180125lp150.2.3.1SUSE Linux Default PermissionsPermission settings of files and directories depending on the local security settings. The local security setting (easy, secure, or paranoid) can be configured in /etc/sysconfig/security.[ǯbuild73openSUSE Leap 15.0openSUSEGPL-2.0+http://bugs.opensuse.orgProductivity/Securityhttp://github.com/openSUSE/permissionslinuxx86_64 PNAME=security SUBPNAME= SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi # apply all potentially changed permissions /usr/bin/chkstat --system0QL&PVj9;@큤[Ǯ[Ǯ[Ǯ[Ǯ[Ǯ[Ǯ[Ǯ[Ǯ[Ǯ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-20180125-lp150.2.3.1.src.rpmaaa_base:/etc/permissionsconfig(permissions)permissionspermissions(x86-64)@@@@@    /bin/shconfig(permissions)coreutilsdiffutilsfillupgrepgroup(trusted)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)20180125-lp150.2.3.13.0.4-14.6.0-14.0-15.2-14.14.1[z@ZiZ\Z%8ZZ@Z@Z@ZNY|Y@Y˒Y@YY@Y7Y2Y1S@W"W@W@WBWBVV@VV2 @V +V +UuT~@TZ@SvSہ@SϣSSS@S[SM@S0@RnQR@RR@R@QbQQ>@Q@QP@P@P{PaO@Ọ@OȮO]@OE@O2cO1@N@N|tNyNx@Nx@N @MAM@MMtMY@MRL@L@LLr@Lr@L7L7LLҠ@LNL6L@LL(KыKsK?ĴJu@J#JJ:J@JJ|@JzJn@I@matthias.gerstner@suse.commeissner@suse.comkrahmer@suse.comkukuk@suse.commpluskal@suse.comastieger@suse.comrbrown@suse.comkrahmer@suse.comeeich@suse.comjsegitz@suse.comastieger@suse.compgajdos@suse.comastieger@suse.comastieger@suse.comopensuse-packaging@opensuse.orgdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.demeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.demeissner@suse.demeissner@suse.delnussel@suse.delnussel@suse.de- 0001-whitelisting-add-spice-gtk-usb-helper-setuid-binary-.patch: add whitelisting for the spice-gtk setuid binary (bsc#1101420) for improved usability.- Update to version 20180125: * the eror should be reported for permfiles[i], not argv[i], as these are not the same files. (bsc#1047247) * make btmp root:utmp (bsc#1050467)- Update to version 20180115: * - polkit-default-privs: usbauth (bsc#1066877)- fillup is required for post, not pre installation- Cleanup spec file with spec-cleaner - Drop conditions/definitions related to old distros- Update to version 20171129: * permissions: adding gvfs (bsc#1065864) * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410 * Allow fping cap_net_raw (bsc#1047921)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to version 20171121: * - permissions: adding kwayland (bsc#1062182)- Update to version 20171106: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20171025: * Stricter permissions on cron directories (paranoid) and stricter permissions on sshd_config (secure/paranoid)- Update to version 20170928: * Fix invalid syntax bsc#1048645 bsc#1060738- Update to version 20170927: * fix typos in manpages- Update to version 20170922: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20170913: * Allow setuid for shadow newuidmap, newgidmap bsc#979282, bsc#1048645)- Update to version 20170906: * permissions - copy dbus-daemon-launch-helper from / to /usr - bsc#1056764 * permissions: Adding suid bit for VBoxNetNAT (bsc#1033425)- BuildIgnore group(trusted): we don't really care for this group in the buildroot and do not want to get system-users into the bootstrap cycle as we can avoid it.- Require: group(trusted), as we are handing it out to some unsuspecting binaries and it is no longer default. (bsc#1041159 for fuse, also cronie, etc)- Update to version 20170602: * make /etc/ppp owned by root:root. The group dialout usage is no longer used- Update to version 20160807: * suexec2 is a symlink, no need for permissions handling- Update to version 20160802: * list the newuidmap and newgidmap, currently 0755 until review is done (bsc#979282) * root:shadow 0755 for newuidmap/newgidmap- adding qemu-bridge-helper mode 04750 (bsc#988279)- Introduce _service to easier update the package. For simplicity, change the version from yyyy.mm.dd to yyyymmdd (which is eactly %cd in the _service defintion). Upgrading is no problem.- chage only needs read rights to /etc/shadow, so setgid shadow is sufficient (bsc#975352)- permissions: adding gstreamer ptp file caps (bsc#960173)- the apache folks renamed suexec2 to suexec with symlink. adjust both (bsc#962060)- pinger needs to be squid:root, not root:squid (there is no squid group) bsc#961363- add suexec with 0755 to all standard profiles. this can and should be overridden in permissions.local if you need it setuid root. bsc#951765 bsc#263789 - added missing / to the squid specific directories (bsc#950557)- adjusted radosgw to root:www mode 0750 (bsc#943471)- radosgw can get capability cap_bind_net_service (bsc#943471)- remove /usr/bin/get_printing_ticket; (bnc#906336)- Added iouyap capabilities (bnc#904060)- %{_bindir}/get_printing_ticket turned to mode 700, setuid root no longer needed (bnc#685093) - permissions: incorporating squid changes from bnc#891268 - hint that chkstat --system --set needs to be run after editing bnc#895647- Do not applies permissions from backup files (~ / .rpmsave / .rpmnew) (bnc#893370) - do not mention SuSEconfig anymore, long dead (bnc#843083)- append a / to /var/log/journal so the framework makes sure it is a directory bnc#888151- make innbind mode 4550 (bnc#876287) - permissions: Adding systemd-journal directory (bnc#888151)- permissions: Adding new kdesud path for KDE5 (bnc#872276)- vlock_main lost its permission checking, so remove from here.- opiesu,wodim,vlock-main have no setuid root. (bnc#882035)- tighten /etc/crontab to be always mode 600, even in easy (bnc#867799)- duplicate /var/run entries to /run (bnc#873708)- permissions: incorporating capability for mtr, removing +s from ping (bnc#865351)- GIT repo moved to GITHUB. - removed the setuid bit from "eject" (bnc#824406)- do not use magic constants for strlen (bnc#834790- Chrome sandbox also allowed to be setuid root in secure mode now (bnc#718016)- use PERMISSION_FSCAPS- it is PERMISSIONS_FSCAPS (bnc#834790) - qemu-bridge-helper has no special privileges currently (bnc#765948)- utempter helper binary moved in new version to /usr/lib/utempter/utempter (bnc#823302)- cdrtools: allow some filesystem capabilities for more stable CD/DVD burning in "easy" mode. (bnc#550021) (cap_sys_nice, cap_sys_rawio, cap_sys_resource, cap_ipc_lock)- leave out readcd,cdda2wav,cdrecord until it is ready for the distro (bnc#550021)- cdrecord currently has no special permissions approved (bnc#550021) - append a /- Allow pcp to have stickybit worldwriteable directories- add /usr/bin/dumpcap to watchlist - make fscaps=1 the default on "" - added PERMISSION_FSCAPS to the sysconfig/security fillup template. - /bin/ping(6) was moved to /usr/bin/ping(6) /bin/eject was moved to /usr/bin/eject- apply permissions settings in %post. During initial installation some packages might be installed before the permissions package due to dependency loops so we need to make sure their settings are applied too. Also, on update of the permissions package changed permission settings may need to be applied.- temporarily add su.core. workaround for the migration of su from coreutils to util-linux needs to be reverted as soon as util-linux is also in- no longer install SuSEconfig.permissions, SuSEconfig is gone.- enable ecryptfs-utils setuid root mount wrapper (bnc#740110) in .easy- remove /var/run/vi.recover (bnc#765288)- remove /var/cache/fonts (bnc#764885) - remove /var/lib/xemacs/lock/ (bnc#764887)- Revert "Use credentials from within the root file system" breaks use of --root option in brp-05-permissions- print warning when requested to check not listed files - Use credentials from within the root file system- add duplicate entries for / and /usr (bnc#745622)- add scripts for automatic package sumission - drop zypp-refresh-wrapper (bnc#738677)- disable run time fscaps detection (bnc#728312)- set permission by default in SuSEconfig mode as permissions are only set when called explicitly anyways (bnc#720010).- fix typo in path- remove world writable /var/crash again (bnc#438041) - remove world writable permissions from /usr/src/packages (bnc#719217)- add chromium browser sandbox helper (bnc#718016) - don't offer PERMISSION_SECURITY in config anymore - remove setgid games bits (bnc#429882)- remove setuid bit from opiesu (bnc#698772)- disable fscaps by default as factory kernel still doesn't have the required patch for auto detection- read /sys/kernel/fscaps for fscaps settings- change path to gnome-pty-helper (bnc#690202)- setuid bit on VBoxNetDHCP (bnc#669055)- fix hawk permissions (bnc#665045)- add hawk (bnc#665045)- remove Xorg setuid bit (bnc#632737)- update permissions of lastlog, faillog, wtmp, utmp and btmp- remove permissions handling for /etc/inittab, /etc/inetd.conf and /etc/mtab - revert previous commit, done in coreutils instead- change fillup deps to requires to avoid coreutils loop- change utempter from group tty to group utmp (bnc#652877)- add permissions man page - update docu - add --level option - set perms for setuid files always if owner changes - strip root dir when printing file names- add option to explicitly warn only- reimplement the core features in chkstat itself instead of SuSEconfig.permissions- don't make changes if not called explicitly- add support for file system capabilities- remove vlock (bnc#629236#c13)- update path to gnome-pty-helper (bnc#634199)- vlock -> vlock-main (bnc#629236)- use %_smp_mflags- add lockdev (bnc#588325)- update for innd update (bnc#594393) - remove lppasswd (bnc#574336)- enable parallel building- add /usr/lib/virtualbox/VBoxNetAdpCtl (bnc#533550)- add /usr/src/packages/BUILDROOT/ for rpm 4.7- add more arm directories to /usr/src/packages/RPMS/- remove permissions handling for traceroute6 and cdrecord which are symlinks nowadays- fix weird sendfax permissions (bnc#525954)- permissions now maintained at gitorious so use tarball instead of individual files- added polkit setuid root helpers after review (bnc#523377)- also added KDE4 start_kdeinit (same source as kde3 start_kdeinit), bnc#523833- open-vm-tools gets setuid root:root in mode easy (bnc#474285)- hylafax directory permissions are handled by the package - change group of amanda binaries (bnc#523006)- add some missing slashes to directories and remove entries for at and cron (bnc#480855)/bin/shbuild73 1536149423 20180125-lp150.2.3.120180125-lp150.2.3.120180125-lp150.2.3.1permissionspermissions.easypermissions.localpermissions.paranoidpermissions.securechkstatsysconfig.securitypermissions.5.gzchkstat.8.gz/etc//usr/bin//usr/share/fillup-templates//usr/share/man/man5//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:8698/openSUSE_Leap_15.0_Update/ff7fe192c1bfe06b5a7b85017a229b07-permissions.openSUSE_Leap_15.0_Updatecpioxz5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=35f9e62cd5e194c883a87f537ffae9fb981939ae, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R R RR R<1Ŏl }>utf-80cddcff88caf3245836d12e6f063933a91b225eecbaab151e605ed79fae68ca3?7zXZ !t/P] crv(vX0{BƥVX45e֗uUKebq5?pPγN1vgJݵz E֭9YDzpe5 \fFڸ:E`TB6?p|2ybIˋYtc-8QTqJ~Ng̈́4 m i=)r I6e+d[DK-nZį8w5Z+(8z2@FlwD J+0ChrR)kS()ƾ9˅J\9{Vo͔rKQ_ᐨTRX~IpGrHˏμ1c19L8Y^?ZJs'Ed{$0*Vؼ07*0.#I"7xLamP<"ڃu,BkmN;mLJ藩RĐMV_5HxeU5UK ®]{ Xs(W2Kk}"xM?Z!Kq\b:JWkz4@y'*fV?Oל^㤕O>&Cׂ84ߏ]Q Nҳ!eH\wv2DUZ)(}1np913Z=m 8pi_Oy4z{jiS琴Hqf]&-CMiR8L1x賾3r[XyJC!h/)EUp`T9usz"WKfuAkBFa4^KrR,ߚj||Ú8v#<_?(QwDĪRwim7X&Tp>Ŵ> FeItIAziJeH9`<#tHɗYC{Bc~..@" &7E;M93-q ?!M AG- Ҷ,^P #14feޙzBwwD9jLIJ ] ߒyf-v apMF4sf=fKqz=K{*"ő-ZRB aEh+DFzhΰ"ϏlS'Oen 7^]Neg2Ǿ>AEv Y {|ý;Q:YbQNIyPϳR0>˦?BZ=K㘙EJZh91^yy5/ݭ':y&دٞ˧_S| 4t4z+z̏gSd@M> ؒeϵ'wNh4)@k?t<:IU \i`'B:Rjzoփ?,a@pRl#>\0= Py[Kvr\Rp1| uщ-{IvP]ge BVY>sJqOU+Υ*:/ey[ĭK]q-Ƨy(;ARҸ63.L1]K_ۿoܾ[LJxҕŏuj\>O=.s^[MzdK4ZY<[ &lP\zQEU%ޮ=1jgbכD^‹=Qؤ3$'(v0QJPq/6u#3xC;}AaͪÆpS6H>5ıƟF[ee̷hLjϯ̙t L:nƱSX1'Dͤ2S?RmeUU;< 6HFy?G(Fm+Q uq(/Ӱk*?Y'v嬘NY IN#ᖡb1Y7.&z5Ά  tU(׻Ә00L*no3)0IKo<˅-\Ŗ ?hIF\d>]k8v?ݴibX(>xU?R 1˄A5&1STZlO ufL&h[3=H7|Ē= έ4WCѸ`Y2y|>Ehip"8dH=f8|4OTy\n{џ0 {N#3%@Pч8-|>K oۍ ]+)ܯHS$Oe.@HuD` `?m!4M5']{u&`w?6[VXҶ geTy{p/u9D| ߱zPR(u*+! ǯj,5 ~yi("jo7T>S@T7W{߫d "*w 챙=YǬesWo @l>L?J_}$\{֖%4튎8fWi֭ m^n= s2^hG"jLOU(*RnA\D&w)8NXZ1땞URw4W|NμK4Lxor-k*+DB\xWV4R$~b^ kI%#%ЮL=zI=yNGz ~eFKC'/J ||@.>_-FMဂ_'cCπ&I#n di<^1[Drt8'{^N\uLuэN1Av́̎El)*O)0ߖ||f.M $fax}&b>|Pqi+5ZTJ!bUZNWh)M)(ve_U tKxq{bl~Z#~~ 5 0 AƬaܥĚN$%'L7ʊlC/VW6.: O({ 衩xXLZ/R%2:y e0 grsO>Y߹}$e!haBEHB=rd}.WZY?⊦jzPh Eσ.g= $ O2n0HcU\^7ʐ$]ϖe/B[c@Q|N`*M!P)m懢˸;3쭶\92dx-k&jH^&<4g9?a^ƒ`8p%g{j~CC)';d$D k![V8ʈs#cW;\-xb t_>; mihV:hoh5*m^qB99zw$Qj7-Z')P/x%Zab4N#õ%m6KZv#Ӓ7 w̦+ޜPA bm1w_\r,eQ*0hL2U^ҫaz.gIqkݖq0"ܚ8WZbt99870d>ڦ' 8ԔV#%e܎bڧt߫(/p'Bj.K%\V/ ǫl45#s)Tu)`\2>jB중AtZ^M,LD\?e~5e ޠY>U<<04,KPy)d5#_j$s懬wHl1}^~g!5Ť#2(Q =J#݉zgsXj39u6'l!K'{yOoVf0vaItiE̵uenoRs*~caFoGG2™4ٕewA?-j`!&$bۿqNdA2"~gEA[KX݊6_ߋ@Bu~̃0~=*x&ajI0B)J-'SԩpE_lYɋ _v[urM,.Gey-Q]1 L >pIY@,)uƬq"K'@`nU|{} NYg?ƿ] 5r[ٓ*4>2(>@5Sqbl9|sa >k=ޏ)*rbr\:Fzx2Dc^DA99^69<ަi~^=V> }'^ץ;6ByΣf"Z6JJyZysWTgEUf%AL/$,kĘ@:ܕsa`ռpȜ ɁC%'g=Sݩ M$ {BՁ#B&k?r P![u^˓N͜)Ti\c`Y/F'/W~*r4{iX82OxXdN֙8y?MǥaHցfg)쇩Pmp|ywGU 4!{LNW⺟) Ugm%6lJxx0V V^jzkg KmrrXWcN+=!; 'g^ V]wÝK]Xzy!eaH#)ggI rML?m`B^B{_bJv }r@pm3nDd`@h,zm=J|='+dCD.i 0!8MΔqiʨ+D1Ҿ IsSWQ3x8K]O!FωE)]E$|z:r$H?X7 FH˧ SSfAee5דBf mi9^غHb'sY"MBd̺-)M}zҺU=Qx׈]5 IL0<-2[Unrj" {-+ 1tj8qr 9Q`LH%C?r]`bWY4qt@ilsu xk)#Nndۥ+63@+sP,%Gg  7qia1г,ȩ-%$-hgH}u9n̬܅ h72UC&qq&"w7iCFrX;# ?J~f䮠 7z&K/V~Y)K}%IbdV/\,^ |g L3REq,"=SW#zAu(^VmY|Ykb:׶\, ЇN5s]|, %u@isVm 7LV̡n8'm0“$H@ZmZLe.!x?!}(A>k՚i>3YPl\N8ቍ 4߻Qig (41ćD* !~ /vW"k;3 TU%{ JR HLc\l[W?@ U`.jB&b}rrTYYY4B׀m|WE P;ˆ!E` 6rG:!p3!cƠmNL?J8}, \#t5h5 | xFM!)yz7K:^i_&ׅJ }eڞvM99F]ge`A|y~2GoQ 8!Ѫ؍%\VE 0SuparX)*ͽf)z)0|VcsQ'zظK+3@s ԐjH ǏB*\U25˯#cð'' "e%¡cHiމ_% ڶQ<7b+@bb gH `78 ƣyʖ]\&VY7ZWK̤NX6xNҞvu(e/*tcAUd'EM- Mzø7j}]t{`[wIwP6gzQ cy29Whp ; ,{8<.[Ѐ Vw7jIEq80diǪKlE;QDZn̎Ν8g;0nixFp d 2jH3߆]+o ~eL?',|U=?"O\5-pL #lfFN,$Œ폪*$5`pOGdEסH +^7Jc3\D\]`Tc9c_`+3!/KYqg{"nb" Q^?+3(ӍĬ/QU@:Blkb tWHN0w < &[;`cC ?vԩEWveǞU'@@ٜԖFtqV_Uab}Y* M!K'bQw sGH(滘mͽu6}Cz?UnkG>C6!,sh-ěn>S +K\rB^tt\"-k-fLU;< Gm7 (~vmQl^Y,>o}>4!IO'x6E䏋N.W\ /41# ⵩ԞJ%z \t㲧v^FNrG9C8'8Zy{~rՂ*LoѨӿ q91Q:JsxkfZԚI"Zϡzyڅg,aWrӖ9uA@~rOQu*⚎޳f@)p\}6>L ]$C^^a6&W>i-[T=uكI^|Wb{{5;xL׉dqm!QPK-%aL,Icvy`#5ݡ*w{ה6{؉?in(Ly+S INoUţ L'b}$@a'o;i,uD߫ ǷA0zjQ:]rIQy&Frze>͓Kp1q3Dᔶy.swf&$"LRRzSLxW#k9` rU3n5-Tվc\~>=l%(|ʢEmN;X>nF$7R+wr^G:3A|e0-d%e4_L7bӸZi^<4fa5]_Dn]vaN|:m<&rL.&ҷ @E&j8D[~Cugmc:#2߸Cgђh HU5Fzu kD0׳eoy(#K>X+sgEm/ TCM !0IJ0+w x.k ߒcB V(jcKE9 MU(Q0aнO>E1 3V{f;ͽY[ uwoUBrzƃ/?f]RY̝g~޺]$܆yxb 6U9_$Nf*S?" eh(ESXWJ&@g/q8 7h .42ь\ Y@Jj?戢 &[IXTkdPKY3֗6}(UAy\\w<6 (EIM,b =POiG>7Τ]Ce* +HR>2d Z9Я~Q koByi +AKA/R%߂ 8dTllT%OY K'CLH S1Yaq0EtYj&"([JvHиkPVI2ԮN5FGA2n ;WxOl7 Lmd1d_aoHtfC> r)l[J!LFj_7Jmc9(RjCms)\9|$p02T6ԾbRCT=mJےy3w WѧY?9RIovDI/R *Wi[<%GYy (5?KPM)I4GSckI.!GϽo!] %[C4XꟊG}rulLYY mJu%jx%Γai$I[䧞lҦG˞ d »áK;(~yI~ȣMf9Saiӣ">xŬ#.!GvCHE[eX 8tS"gڌ=r :6lq{RqMRک!yL#za%3f|x-}:$9s Tz ׂE#\EI uk=<7_A}Ymi|8}I0:閆F7y(3;Nb-% iwdq rZ\Sbv'o2#Kx )7~-Xn@O7VAԲk+ >4Wf Pcmq 7Ukju;jJ/ >q<|*GfZ*\wnH]Uyjq_snWV" EC(^o^7G⺯k&'^Y_=pAK\Z.C$~+e:}!dFdt tƸ_`i_Kd0^-+ER^[YR#:3[of:^޳9mEus-~S@l;RU֨x,|La^`%uG^*S8h0DN-R)"Ruw%;cbF,‹t$#A(2?N!V ;cI=9 v/81iww 4~$xLdm" IJd ; kIVN P W Ŏ7e|Ƒoi}4"v<(y͐/yJ۵8KJd:-kyxp|G3V Eh+ V ROW;~r&Be pj|`NrI7y)›m0 $ NMkEčȨiZS0zfzXݎܻ7'>}DXNLRg1R:>3t򟸃4샶~ ZC#q8^3؄`v2?NLq yxCti:V^Em"H/%~'$}6djyw7[@H@QPdÍ%^H#JllNoT /YaE9#>SEy;cDTÅ<{6{rHv ; +e>Gsv 5Y)E gX'$ĵ,(l6NHhs k<>ZzAčY}Mrrp݊ܜfٝi0Ba6Wc?#^_/}p9.'elYJgW(@7琤8M$i̤^r^ EjzL2]_B';2nib֜pk@| >UMؕH>в]4YSpHAVΉd}*TA,xo߫&iʷ^"+( #KHAC 7gu~3 !e (gļipc({69gm,*޴ W$Q3~< q7Y(Rg;V:Џ;(9RT+Z:km4&▵GPl~1IJv/Ò抏agADqf7 tWT L@ 2v!ʄll2SnʹEiCWQ?!wj{SC0uZ cTQr[),wcGһ(T 9 u9wo_OHZnFNk9Z7<,rM03b|60ڂTg*|?4,R"62,껄X˔hbOWa3g{1= z%/r\SSsgƵtxi IQi}U{4Z Pr:>y렋>ώ’ U` luJ=ܚ~*9߆jzUˑ68a 1I%^Re㝦EO>"0IL0fn̢$T'~&%x&Clp;r:fafR<'WLU`pzr }4hgC$&bcEbB2|[uE]tɽL*=c Nme?DLP+< N i<: 欤]W{8t;onRէذXSbϯ<ܦ̫`9Du$oQQFljDJJ57`B)My hE]Qͺw8^4; ssQ)3**ШtO^9-طX%6GDIU _vf(ocPlQIY6q֔T?jN^Qc\djXZlT=\5\ }۰*SU]K{`H@ wSX']н׸я>))&rVCq<ַcOxiv9ӯR@PC6*dI⮎]9}ߖt*O=|1Q& )`3~9ݵ]Lʯ$ϯܦrYC0j6䑁/=:mѸPR2+ۢ?EJpy6+q}Ȼ@gR7~+Fzv<8;B^IѥToiؖہ5HNXiϯгvx1]HGe=GpsI+i>e~8p2&D"Z7|$k}%x|&`p4zű2~g`mY|T.@ua«M"Ò@.Y! 9;,1Dk4sd(a[.ȯɏe7;CnWQfKq}!HFulY+^^yȮ6Z_tE?CH4.qB}QMŸ^hOkL},T-V`i4c%ڜAp3YJ  -@$ĸH?Ux䕙+"Q0۷E5%14P yS͜[fnChLWA]G3V҅4B>][T~)GC-͞l j3UA/a~:XkP64~IU#8 @3 3[3Lײkghf=z]9fDcT!"^:ʽl/pؼl?+46{ư%]+4S{eb ŦNh ' ]LS[U'ĔQ* 5=Y"Td[*N'r"h¿Iq6{V;Q ?;IRɛ.|0mgPNsw]H0>/p,Ѐ}mQnk9 m ׄHtT&bZ3.=MJ4mG 1U~k&'qQC,8͋r{˭s:#p'ɻO \&k)9*S(ڤpWO.nʚdh3d%7fU2Csk:,f~?8|jY* JIQTM9Ԣ3zwDD1Ffdþב˳x (tXæ ;d?駦=#3 :?]N^52;]W 1\ ;G?Y@NJrȹ[3J/U&yv醖MxEW1 R2"ȨMGʞkCk\f. ٳ kmeM!cuRl?gF%/`Щ3 -7foP IM;k>3>wuBZ,Щh*n--49JSW+^ͽ{[2RR3Dwv 7Nf5&>Ah/U9 Hk.4rYN"8k6V/\E؟~O _DŽjA?]F|#ޱl]' >fo g&E^idՉAxJ,,Iw7 U.o쌨ɡPAWAȨHڗʫwQ9UZ?UOqH߽굜d2CX'B34kkn&8qwpL܇ W̓0LM3S$4f(FuAzXk<ǧ7Pq.!ehµQ͹'?V#N݀dֳ*{x@ c>2wUs6N) *sAWg4߀ӑ,}c()bx_HTjj+dǖJ~Q*Bzf[h(+'UA^%~Kt Y'{<>mg@U^^Vrpݮƅ'i߮{30XtUOok<.> L18 j6GҀ,a~P">|-y~8Ÿ(#fQǼA<Nb [lkc_u;fRH)\6mNw'-XVdY]A41L!h.EChHjoHS a Cqu(PʳA@TzO亙6=\03MY}($H{]rCߛHAz\ XE'ܺ H}#]bt]r3~d˲rvCD&?{mk|+?ԥpĤG&abad{Hט@ b1_#vq215`M,k"zgP%(zIw>$H@LLCbi *\'ޭgdodŸn:;&#t0> pf? ա;}^17g%dƅ /}'t3S dSW i s-3L̛LG{гY${78۠j"X&NPewk,8q$k½„ 0>Z\L/Z{8IG-u. >f|p5!q3= ]-xm 6W?)䧙Ŀ1]Y\ __ 1yn,SIVsQpul*F.uŻ$Lya|ʋOᢚ4>LDOIShxI( ?OY3|FzE]4[)?@P ya.yMAITD@YvyMᙑ/f,.\UěԥjU"[1 \8+r ˳*v&(8dCz x1bOí#!ޤ68lɀFr<Z|$ F}FD|&_q+>):Auz1 9<"n2 r#WB9*^rVG CP 6@UO*]J4daj-jA-G= P.IEm.O:#G +8 fq:EהI'l36uͩ7 AkYtMZ0jvy W,=&F6i%ZԻ. U ph&?ɕvĬF'$Pֺ|%#i\' hn5,nK1œ[zKjӍlE2,wRx@f/#Q}po"ی+!sՀEQ8zDŽC(,F&?伒'U NZ\`# tMM^f>kS9rz_dwc'Z~K -53*7  n%Q0f2Ac:cDǭqO3*^]=:!70z@,D0./X&d8 xj0MIw> ELkH&f#RgkxiCn{ qM)ҘnD)K=i2سϗ]jaKzCݝ{I-rӉ%I:1 G7|x(Ap5vBY,i!].9QZt^5XJ(3' Y 22=xRjfN:N5,fu!LNkԕ/UJ؄_r2',@R`m==(QcADK"#HErf ` %:B +Ifc,7y)& SdZ nbUb3X?)}bB-~s\'y8O<8_\f~2RC8Kı5?HS>qZȼŤwO5jwIi0^?6yXgu݄ ˥Z}y )(wJ9Б17wFClz-"V9 ۯ]Ȋm Wە (h~۸8I=⨣ "A}>apcM1IoEKXX9ɫ՛_ iY5M[b:GKWB#[Xrvajzhng'ng0 * {9w{P74^kмcgq:}—xqSV@4e]|Τ9<|SRF29p* ?\рd5d6q9vTw LFq:L22Rqmպ|"X+xN(pw4L.q{ Pͬ<-I]FiMUoTӨ c~Ν;d@(LUF} #Um_5祏uk>r`M~\P|Jyy0HWP y >2 "G*%:7I^zA@>(wpf97f3rTxS.kt,";ǔާ[ӸGByM}Ge1z YZ