permissions-20180125-lp150.2.6.1 4>$  Ap\vq/=„s|s|XL`sva4[ꈴkbm@T_'Љ]vô> -v&fhÆ`D+1 CP~LD[HI"628 q ɇx$Vî.0qhMdaSti+d$=/,~usQihAS/-::(ր_AߐKC^6n581b974ee2f9f6f9b0c244adcfb7eec77fa881ebf79209636247d320ce22387b17320234f48cd4cc8f2818f10fcbb2bc126d978dt\vq/=„1 ٪`:gg[L?g?HD~5>e}|RdMR&|B@ij¯nVJd+Wi5_C0. | Ê"M2< ֐֙Ba7<0թU%){a,ªN> :Ϻ8Qz/|^=HPb_ףRQ KPfźpF2v`UV$wtFX_ڴIOj:¾ ڣ3\B5>p@=?=d # B #,5 Nd0 T  f  x        A n   L z( 8 g9 \g:Og>8lF8tG8 H8 I8 X8Y8\9, ]9P ^9b:7c:d;te;yf;|l;~u; v;w< x= y=0z=D=T=X=^=Cpermissions20180125lp150.2.6.1SUSE Linux Default PermissionsPermission settings of files and directories depending on the local security settings. The local security setting (easy, secure, or paranoid) can be configured in /etc/sysconfig/security.\vqsheep83PopenSUSE Leap 15.0openSUSEGPL-2.0+http://bugs.opensuse.orgProductivity/Securityhttp://github.com/openSUSE/permissionslinuxx86_64 PNAME=security SUBPNAME= SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi # apply all potentially changed permissions /usr/bin/chkstat --system0QNR4Yj9;@큤\vq\vq\vq\vq\vq\vq\vq\vq\vq5c87548409566ff97aa79fe4d5839cf99f868f31bb9f1cec0d933e2dacbdcfbe81a57841e4028ca791ed84b68a3c21609e945445ea5bee0719cd4b723cc6779c00622acbe32ab6c2ffff5ea3072f287b251acd20240ab18acfe9d3c64b7b1b14cb444b5ce7fd604d4056a9ec7bfac52496ed8edde14dd960ad91be19223cf1d63bfd1c9ae1ea5be3b93544e86b0bbd9ad006ce76b53f2b334d413b0ad685f50a66be6bb5d03a7bbb27115aa1cbb218f8898587625e1b1c952b0f844422ea566935eca1eb5762d2b602f4b5114a54eb6e6815d26f10b5dab00cda67f2860ca4a32dcb772c1e9949198bc7695bd25c20cd21aea565905b0975de2edeafb31d8202acbebeb00ef9fccc619e66ad50b5c31ac346b2e06ec7d429ec8d2181bc5bd2f1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpermissions-20180125-lp150.2.6.1.src.rpmaaa_base:/etc/permissionsconfig(permissions)permissionspermissions(x86-64)@@@@@    /bin/shconfig(permissions)coreutilsdiffutilsfillupgrepgroup(trusted)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)20180125-lp150.2.6.13.0.4-14.6.0-14.0-15.2-14.14.1\b@[z@ZiZ\Z%8ZZ@Z@Z@ZNY|Y@Y˒Y@YY@Y7Y2Y1S@W"W@W@WBWBVV@VV2 @V +V +UuT~@TZ@SvSہ@SϣSSS@S[SM@S0@RnQR@RR@R@QbQQ>@Q@QP@P@P{PaO@Ọ@OȮO]@OE@O2cO1@N@N|tNyNx@Nx@N @MAM@MMtMY@MRL@L@LLr@Lr@L7L7LLҠ@LNL6L@LL(KыKsK?ĴJu@J#JJ:J@JJ|@JzJn@I@jsegitz@suse.commatthias.gerstner@suse.commeissner@suse.comkrahmer@suse.comkukuk@suse.commpluskal@suse.comastieger@suse.comrbrown@suse.comkrahmer@suse.comeeich@suse.comjsegitz@suse.comastieger@suse.compgajdos@suse.comastieger@suse.comastieger@suse.comopensuse-packaging@opensuse.orgdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.demeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.demeissner@suse.demeissner@suse.delnussel@suse.delnussel@suse.de- Added 0002-whitelisting-update-virtualbox.patch (bsc#1120650) New whitelisting for /usr/lib/virtualbox/VirtualBoxVM and removed stale entries for VirtualBox - Added 0003-consistency-between-profiles.patch Ensure consistency of entries, otherwise switching between settings becomes problematic - Added 0004-var-run-postgresql.patch (bsc#1123886) Whitelist for postgresql. Currently the checker doesn't complain because the directories aren't packaged, but that might change and/or our checkers might improve- 0001-whitelisting-add-spice-gtk-usb-helper-setuid-binary-.patch: add whitelisting for the spice-gtk setuid binary (bsc#1101420) for improved usability.- Update to version 20180125: * the eror should be reported for permfiles[i], not argv[i], as these are not the same files. (bsc#1047247) * make btmp root:utmp (bsc#1050467)- Update to version 20180115: * - polkit-default-privs: usbauth (bsc#1066877)- fillup is required for post, not pre installation- Cleanup spec file with spec-cleaner - Drop conditions/definitions related to old distros- Update to version 20171129: * permissions: adding gvfs (bsc#1065864) * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410 * Allow fping cap_net_raw (bsc#1047921)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to version 20171121: * - permissions: adding kwayland (bsc#1062182)- Update to version 20171106: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20171025: * Stricter permissions on cron directories (paranoid) and stricter permissions on sshd_config (secure/paranoid)- Update to version 20170928: * Fix invalid syntax bsc#1048645 bsc#1060738- Update to version 20170927: * fix typos in manpages- Update to version 20170922: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20170913: * Allow setuid for shadow newuidmap, newgidmap bsc#979282, bsc#1048645)- Update to version 20170906: * permissions - copy dbus-daemon-launch-helper from / to /usr - bsc#1056764 * permissions: Adding suid bit for VBoxNetNAT (bsc#1033425)- BuildIgnore group(trusted): we don't really care for this group in the buildroot and do not want to get system-users into the bootstrap cycle as we can avoid it.- Require: group(trusted), as we are handing it out to some unsuspecting binaries and it is no longer default. (bsc#1041159 for fuse, also cronie, etc)- Update to version 20170602: * make /etc/ppp owned by root:root. The group dialout usage is no longer used- Update to version 20160807: * suexec2 is a symlink, no need for permissions handling- Update to version 20160802: * list the newuidmap and newgidmap, currently 0755 until review is done (bsc#979282) * root:shadow 0755 for newuidmap/newgidmap- adding qemu-bridge-helper mode 04750 (bsc#988279)- Introduce _service to easier update the package. For simplicity, change the version from yyyy.mm.dd to yyyymmdd (which is eactly %cd in the _service defintion). Upgrading is no problem.- chage only needs read rights to /etc/shadow, so setgid shadow is sufficient (bsc#975352)- permissions: adding gstreamer ptp file caps (bsc#960173)- the apache folks renamed suexec2 to suexec with symlink. adjust both (bsc#962060)- pinger needs to be squid:root, not root:squid (there is no squid group) bsc#961363- add suexec with 0755 to all standard profiles. this can and should be overridden in permissions.local if you need it setuid root. bsc#951765 bsc#263789 - added missing / to the squid specific directories (bsc#950557)- adjusted radosgw to root:www mode 0750 (bsc#943471)- radosgw can get capability cap_bind_net_service (bsc#943471)- remove /usr/bin/get_printing_ticket; (bnc#906336)- Added iouyap capabilities (bnc#904060)- %{_bindir}/get_printing_ticket turned to mode 700, setuid root no longer needed (bnc#685093) - permissions: incorporating squid changes from bnc#891268 - hint that chkstat --system --set needs to be run after editing bnc#895647- Do not applies permissions from backup files (~ / .rpmsave / .rpmnew) (bnc#893370) - do not mention SuSEconfig anymore, long dead (bnc#843083)- append a / to /var/log/journal so the framework makes sure it is a directory bnc#888151- make innbind mode 4550 (bnc#876287) - permissions: Adding systemd-journal directory (bnc#888151)- permissions: Adding new kdesud path for KDE5 (bnc#872276)- vlock_main lost its permission checking, so remove from here.- opiesu,wodim,vlock-main have no setuid root. (bnc#882035)- tighten /etc/crontab to be always mode 600, even in easy (bnc#867799)- duplicate /var/run entries to /run (bnc#873708)- permissions: incorporating capability for mtr, removing +s from ping (bnc#865351)- GIT repo moved to GITHUB. - removed the setuid bit from "eject" (bnc#824406)- do not use magic constants for strlen (bnc#834790- Chrome sandbox also allowed to be setuid root in secure mode now (bnc#718016)- use PERMISSION_FSCAPS- it is PERMISSIONS_FSCAPS (bnc#834790) - qemu-bridge-helper has no special privileges currently (bnc#765948)- utempter helper binary moved in new version to /usr/lib/utempter/utempter (bnc#823302)- cdrtools: allow some filesystem capabilities for more stable CD/DVD burning in "easy" mode. (bnc#550021) (cap_sys_nice, cap_sys_rawio, cap_sys_resource, cap_ipc_lock)- leave out readcd,cdda2wav,cdrecord until it is ready for the distro (bnc#550021)- cdrecord currently has no special permissions approved (bnc#550021) - append a /- Allow pcp to have stickybit worldwriteable directories- add /usr/bin/dumpcap to watchlist - make fscaps=1 the default on "" - added PERMISSION_FSCAPS to the sysconfig/security fillup template. - /bin/ping(6) was moved to /usr/bin/ping(6) /bin/eject was moved to /usr/bin/eject- apply permissions settings in %post. During initial installation some packages might be installed before the permissions package due to dependency loops so we need to make sure their settings are applied too. Also, on update of the permissions package changed permission settings may need to be applied.- temporarily add su.core. workaround for the migration of su from coreutils to util-linux needs to be reverted as soon as util-linux is also in- no longer install SuSEconfig.permissions, SuSEconfig is gone.- enable ecryptfs-utils setuid root mount wrapper (bnc#740110) in .easy- remove /var/run/vi.recover (bnc#765288)- remove /var/cache/fonts (bnc#764885) - remove /var/lib/xemacs/lock/ (bnc#764887)- Revert "Use credentials from within the root file system" breaks use of --root option in brp-05-permissions- print warning when requested to check not listed files - Use credentials from within the root file system- add duplicate entries for / and /usr (bnc#745622)- add scripts for automatic package sumission - drop zypp-refresh-wrapper (bnc#738677)- disable run time fscaps detection (bnc#728312)- set permission by default in SuSEconfig mode as permissions are only set when called explicitly anyways (bnc#720010).- fix typo in path- remove world writable /var/crash again (bnc#438041) - remove world writable permissions from /usr/src/packages (bnc#719217)- add chromium browser sandbox helper (bnc#718016) - don't offer PERMISSION_SECURITY in config anymore - remove setgid games bits (bnc#429882)- remove setuid bit from opiesu (bnc#698772)- disable fscaps by default as factory kernel still doesn't have the required patch for auto detection- read /sys/kernel/fscaps for fscaps settings- change path to gnome-pty-helper (bnc#690202)- setuid bit on VBoxNetDHCP (bnc#669055)- fix hawk permissions (bnc#665045)- add hawk (bnc#665045)- remove Xorg setuid bit (bnc#632737)- update permissions of lastlog, faillog, wtmp, utmp and btmp- remove permissions handling for /etc/inittab, /etc/inetd.conf and /etc/mtab - revert previous commit, done in coreutils instead- change fillup deps to requires to avoid coreutils loop- change utempter from group tty to group utmp (bnc#652877)- add permissions man page - update docu - add --level option - set perms for setuid files always if owner changes - strip root dir when printing file names- add option to explicitly warn only- reimplement the core features in chkstat itself instead of SuSEconfig.permissions- don't make changes if not called explicitly- add support for file system capabilities- remove vlock (bnc#629236#c13)- update path to gnome-pty-helper (bnc#634199)- vlock -> vlock-main (bnc#629236)- use %_smp_mflags- add lockdev (bnc#588325)- update for innd update (bnc#594393) - remove lppasswd (bnc#574336)- enable parallel building- add /usr/lib/virtualbox/VBoxNetAdpCtl (bnc#533550)- add /usr/src/packages/BUILDROOT/ for rpm 4.7- add more arm directories to /usr/src/packages/RPMS/- remove permissions handling for traceroute6 and cdrecord which are symlinks nowadays- fix weird sendfax permissions (bnc#525954)- permissions now maintained at gitorious so use tarball instead of individual files- added polkit setuid root helpers after review (bnc#523377)- also added KDE4 start_kdeinit (same source as kde3 start_kdeinit), bnc#523833- open-vm-tools gets setuid root:root in mode easy (bnc#474285)- hylafax directory permissions are handled by the package - change group of amanda binaries (bnc#523006)- add some missing slashes to directories and remove entries for at and cron (bnc#480855)/bin/shsheep83 1551266283 20180125-lp150.2.6.120180125-lp150.2.6.120180125-lp150.2.6.1permissionspermissions.easypermissions.localpermissions.paranoidpermissions.securechkstatsysconfig.securitypermissions.5.gzchkstat.8.gz/etc//usr/bin//usr/share/fillup-templates//usr/share/man/man5//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9753/openSUSE_Leap_15.0_Update/4b8141324db8658a361fce170b26d498-permissions.openSUSE_Leap_15.0_Updatecpioxz5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=395c7d7e90ab907f2b34714731a774e2d0bf74d8, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R R RR R_qKy\utf-81c2064a549d3dad64ccb2d466ec1405ceacc7fc5c58d595aafa4dd1825b8f720?7zXZ !t/᩿QU] crv(vX0}jgN T.]?HJD\+ 黡tU!}5}c=(V\rQ̃XEO %(+󛐒ľOXΛ".jX5^ ȃ2VL*? x('kЄ^"1Ovɾ5xe8h"|(}k,dB]} sMF]_/KG)wzw 2OK&+V1t|溂epǑ˞:uUQ&0˧Sԛly^S }](K:MDB4(8ggN&7% l 9Xȑsjd@I|xF2n qA* H55$w 3_DyÝ9s@c';~ZK $F=WOrz'X1g  `=0]G >4|>T=^v)a;"~cւv #3̕Z:7-c@j%Pcaz-k6 ZTB̮B)TL cr;\w7jx״El[ۭΦrХe!e 6]P9xҙkEE~ߍGeRl0A!=*&mp쾺ݝH|8|_Ʀ-ߏ6:*=өP:^mpb}!>$;+.ᐖA @S%l*#O&>輈$z^m2O+Z3sWXL ޼kߖ>;aA ֟WIMM*piW**a>lnuoo9U 3mm?]̏ G" zLVЕlCx%;>抇-vWd_F%P-?^![":w07tQ@;ji7!@WrɴƾOp4{y__M'™jr D2d)J|8%|nHDGB񡅮,¿Z}[>=61Y~@E5rm^g}O {jq}Uu:[~,yU6"^&ǿ; z_(ǿs )4G- ebùvY ~%򡈳Yk:TlDzwl5 zw"4H ?7=[>6@lM=`JΎG*.Ru[,, ۵u^ N۵= 1}tG8a]9I@^7tF\|a Y6s;sG`ҽICj`pN/w2Ym@@m`2tv 7E.rJh } VM1E"2p@D+]~E4oǶdj-D%]so, v"F+θvݣ o>T(XJXֲgn,&L+m`Iљwy@&z$y*qvW|{USa-j̒nn9ȕ boҠ`Q)WnvO)W#Z[MkR޿M9*N\kzJ~7[D$.QC5 rPjˋJk8(4aus?c+}9t3w_rq nFQ5qjЇ=Ϛ/7~{ (BO#Ō|VU)?Uz5}/V[(a#q1ě|*ܬf`/0B@ IEQF$Q@{U@pQJDJDwB:C}"XХ@4ٛ΍ bزkN5$IEa#x^7N4۽`VlrWZ[6[BM+|# yW̑]׍]f]NhZ|V"6zp׋*zxe&0/Fޅ'HکhW<x}ٻ@B!v!xE>aA,QᑋϻHЁx?g-u"˄GN*T/ d1C8i4u'݋*9")qaϊ-gE6dю D\ E>Yq5c;4MCݠ> T%w,p4ؒ _{1891o8#λ~ 0zP|d#7>LJ/3z2"Ţ-Rє(qUs0]WwF;u`~jeWkjN {T fa9' LF"|ߡ9ySwШh\f+/.tXI>LӴNQΖM?#"P[Q˰7]gsKJ@"ϥ­hz r:Swޚ*:W׫A1'NY!Dudf }!A 2.I"~SRJcԏ= a9hI>vqiŇO%SjI r#vzB%pb2I^;?J=uZ@ "DJ#:&wSʚhNʿQ]c 4_  Zn!p۝"JWkmR ct>L:^-v?;i6|%t]R}T1HZh6co'%43"lO58ed0YJlMK|?aų#2Yy2cL5r:{j.>QMDsAWL X]/l\x̆PkIq`"G+X(0$֫`cW\2H4?t#Ylv\ꩲ]1^wYԬF#?SU2+~D,2GiNVX:xP5; ׅ;|" UUć&0F#U#ZI~L?IC q2Xǐ{'Y60dJi FE=,Z :SC+-X0~ t?@ۊ 5z ^WH6O􉨈X#xt?:Պr -n{geX$_Ph)F l)0&R>JdN*gX1pjR޹4+ Κ]Bp!瞛Whxnʣmsٰb]KM+6u<1 BOoXF$P[Bv뇈ȯiپqu 1w=ci*fDC}0,g`-Sr}x6 !R!.Mnw}Z& D5Vka~?ģ<+Ae@m3Hoó69ŤS)hGWe `!.x)Z211kuvonz(g\ -NyCV3:K)BXnج_+ʲJ470kQuxVO1;Y͂{I; c$ܹ.|a7e2)xu'qtlÐ"T7c6DTY>.S6%VDճB- ?[j2Bѫ\siܟ6蜀`%\XN̵1IIM2ݰ:o~;S懤sy+C&gDmWke;x,JJŹTy7_ʨ'\ ] "m%1B+z_}iιER,ו7UY7Xg-\^z)i}zYzRb /:&(d֨}FOZ:9X,F N8]O׬~E{ WD6>q젋@QeՃ.篡x:k>n =7z ף:Ձ5(H@q=mŲ^QdU5IL-=Mơɒ5;g۝%)k6.¦ɤSRWjqe *C̀y@Q5qAϿCYE.[@m_iQS&|PQ^7_'֭>|z#t}`&SoWm@fx7^ZenSsfRn\37LR$&10/9Ne%6N[36['b'a }Ƀ;OyVEyƜ>!Zt "By)u,&;DV )(lQvꬹ4gjۀ;_j+Ұr2(_UWY-@T Foyͤ*c{!拸ZW6iwH8ӗezLd=|`hG vFhMLtlH4a!:έU 9GlF|ݎB!ld6lƻ2$;+F9}uA9d9e1/CĨD3 9| ^xk@q" 3ing,=Ie #6OU>G/)lj{ns-F JgQ r>($E|GFO zjW-KkAӴ(O/:̋M gfe`.ˆQ_V=futrZ }7A2RQhZo{6MQTHǎ B9/]Y2^rhN`#(UfBp ȶSyo_AT܄1:@K IA2wv:,УsbldwS y=WAHX5a]p[szFTAa EFΥB]wD8ȹd.yMTLX Ѫ rdQ|G6l|ԫ }߫[z(t%9Ҕ(K}\@9B~I`+2|g^4;/1@~9\a+iVgBlNU'OC*tt b&v4X6"iT#Xq!&R[@+ 4^j{pK~7; fQP0 "oe]F+OH(ӽhE$I2# n4O0"w?mgV| u Їjc0EG0ڳf'"& 23K 2gx;pwh(Rrā}Mr LU2ΦQVC<Wc䜲=DWS(ĸ|0Ux>R)&}=)Ew[09e kiu#@` ٟXE=)C-@r@݅BzBCRUqBm,oӶfڢC9G8ݜNULq="tS ˥W?w xAX>4q)t#@T*gtQR-[X.ljd s%/$IQaYnܸǘfd򔤺P!+neYlWݰ*1N?I12( ['\#G.2XrG> I#̬M@X&WQlhZ!>K~s$Hk=gL Y,|l[:M5'% ~"9G:'eC&ֻz oWsi)yY5d\PCT]˜;gVL:3o$Wa3Yu0. ~ĆOت/s~K.]\֨S齝sb:}.r]u_6 ng U? d+C'r;5u\bǰHP9GmA۵4WPN#;NWFX';j6},t&LHgܥ% P>0F1ZɍwdGY9 "VqOY|ή>뻦:mB(FGŲ˾Y(xOI.#ް^̲O (:F$-e[k-J\BHy Ưy?܌f'-hR=b$?8ܹFc)ZVST$ r<8en#qgR܋JT'{͘V䂏ӊrwsͦJ~m7%$BsGzל'1]Pe\8߷H+g:Kε)v`m6i]TVo$&ȣ-d>phtWqoD쎡0A櫎W,YD4n_CmKÑ|R i7(,K|7wH m('.LSA5W0xwjGeA ]|WsH .mLQ5R! ; k"fEjZH]S`x#Ӆ]n?sBgn/S)(%}Kl]0ք[48d9X0Es-_s 771泬 Yf 5["=ܵRovFnLrD|Z|Zz(%62fDX{x+FuXl-md\9j$f]CLl#38&1}]>cߥq{TPӄe?(z="ښ Mp û|yf)΢ jU}^ _fM|PCpfe~@<}faI,{cr^̭k_d*R C 1aB싈10?D[5Qq8cTk 2t k^䭜OiV|'McRh*sk$Ʃ0(;5&gsu"1m;$e9)zৎ/B=cxm|^{b:_ڔ{QW(.)?5~ axa#xrS !;ҎueB? jgM9ms&񕰭'//iz燪Qi"B˟ Y޸ly ݱF uDkW[1iZIA*Bn_xp䌷@_}~0쳧G-H c ]ivʍp9_?HgA'rʽ$ >_ iV:ՙrp*›}g/'om"Py1λeϰ4R_0qXE-nBq(#-¨Tzΰd@4IX׏S~j7.3cd:Y_h&PLGxJC8KlE-kґ[H&~sA3VGT@>R{IZ͙9#AZs/\W,ԙ/}O`\p Wv uiז# =7t|9GAGofjT…2P 2:=j/l+auGLy$eQWdexzgdIfto~ߕ5ޮL[vqGO*R001G`;L 1 ,km(}ނ-}!'.C~.jW:e8{uGO!ӎN 8aA(.ߛw%^msi^Kap?8pba.ơ#Fc_QS4]b!$Af#|qT?Ϛ)#a0M>ņv|,GPe1DXaVHTpqLc3¬#"c~eU 3ōnK~ _.+"-64G3Q54Pr~rŤ9;hЁ&+gMtulqiH;~+LsNy޶" ԃ{|rl_ܽt8 x"Bb:asi݉n:%XvI0ӆa4QNCݦ /`@b# k%}x̤^XKQH|/nD =aeS4N~'HQIc5M*acVPTx&eT0݉\x;UqoD7߂q̡Olr [7ҦgCܞf[%+7ѱ\WU#Zj`M4d""b L >D,iSͱt?TinGHc4vK5'jisWo3 c?65sj#k1j볠!D L>3/ 2>j*=!kQ";Dax@_6 ?٪>Ν9ZDEs.IvKJcd'.OcPZRk".p t.Y? SJǥJ9"pM4S,䂥Hf+wKWx~70t8gIna((ͽƤ]4IQx_bZUuү&3 I-!Hͬ!2":5P3Ok~~ǺqPmDn5mR`~^mX+ f~n^Kd-`U݈ҁüd_h^/xjm&Ǟ@s"Ҥa#ZԔkX}IyJ&upoz:}@r'=[x4h:JJb-E`'nݪaC]vh'nF~Nk\̄?i,I0{&#Dqd|xv.Hv{EZgNol귗lt–2.e|r3_c${mv.]Wz($(^+LRvS;4aS;C-*|͛}f0O麏V&(ea J2Epҗ܃ԕs)f hk^u747iQ#}º696UZ&UVlFxКSX֦ O}Mw4h\ =REˤ&:zBR?s%xj9:!B3t"XppB6Eh%_Jy# qmph nQIliSdFf =& s=ёY ǁ`-ƵE)UZ9CYocS.%k/.=SAI*kθm~ ! _Q2Z8Ud>mqC+KR$*6is t{XyY䬗#tAܭ{D--16tEw&_veJ"`#ukiq-*SΥ^o\ƭgDa6kEڞZ3cVl}О%2__g=\0$ho6Ael+U3*u}&p-IGĺi0D杍0w RTXJ&c,%MvcxB<%vH]{M`PJ=z\fU-4 n7% 8)$m4 KF, V$GS3U]8v;Tjq$`cAqp;_Z 9E?5f+F{ek,4]fSAb LKZlwTsEdƒc֥(,j]\h⛩zR2IϘvĎ|`R] u.nVF# =(RV/9!qX{Jk:+she^۽Et”@X8ņ#S·P1$땼`٫S:U_x1uQnyEHLP+n^+#< 5o"D,6qlJy X`Rͼ0eȃ kO7-(,F_CX^ =&/A!ːF(9Hٚ^0Q`ྪ.M2' 5b0 Sܰqs`cYuåNH)#Lq:bҍ!qW/_U=ו-B[#|R-,DDYVHF-,3y(veGF ܜKU)BV(7}7UOIxt :«.:g; F[!ѳf3oᄷА[;1>ř"O?!LVsiGl[F{p+M9=wa|f|Dn nE/̿\e`tX |̄!02 {ٸӅ`lնd{=vQ<xU7M~>66nm I|HX]oW7/Qˑv'fM1*ґ+fn-cfV1Wd]IO6T2,{#29>c{=%=^@M"A&'9Kr V,RF)"pGL s -ND BycMMbehT! ^2Gp)q^47uga߂?)^<|=, H [?聛o}s'k咴'a%@756x5o\I ? Ox4=[e+2#MQ,^=G*zrߤ VA} heKs %Z?'Eo_P{T?nj CW4j;N?\7;?J=Į#@+Hoޢ7H d'^:lg҃54Cڎ.^dr.[t~8Jԉ9XR ԁ֯(CYcC?Ϲp$gsAP1tr%Qy[t.kɆLZkӴh+I1N2aM"p.*ckT<$Ef3aw田5D)TP[sxPvThH~;Ducٕ,;=HW;Ev|3 W"`Ŷ9ߧ! HD哺JX&I'?Jf;y<N2xxR@HDKu5f@:w4&]T˰L4EuT^j9qLYDzPl"hd2|WN2*ZcZy߽4?rzLwu8| |;L`mVX -[K=V.Jnfo~70,ܳǙ.7L7}d3MAÓ̌yM\?{e8Y5d(wevXٍD}O嫄9::ُtض1Kw[E)C~YeprgJ`e|.rX\xtF]Č`D, _6B {2}=@*?~RHٍ;[ O%aPv_ ceg8:S>Pw>9D6A@I*A*# Q[b>^` [)*LwzTP]#"ffقiso7J`v^9.kYsʉHA@}m;KQe\e(ݱkd(ۺ^Y%&z#ZNX u8MAdfl vWF&8Lp}t@쪽;B77PI2 2(iAY*dB>K}vj9söcJN}"sU>xm{DN7McWnlM18on~\2nS؅&=/SH뛎yM/X)_p/yg rOhfp= 9(0Ks]%iA>wr%mӤ;`nvfxh/2`{ʥwUWeKm{i5GYR쎟FV%J8rT$ê jv:<<n~HGk`eͳf=Fm$ppgKq<2Y,= N(,|\}TL%\eVb÷jNJ`S84l(P"-}B+ݶ0/X.}U%)lLCvj_9U3bݰ=.zpNŨ.JIN,RY4oqowٰAACb`3Mʒ%]16|<φܽlm YFMzb(Ҷ|Ɓ/*?'ؠ7"1#$>ss۫ }Ї6p^JcH@2j7LN12rܦ=?l? +ɦ FCK]GYbHdmvmN%/xT6(,3L3u^L7C@YS=+pzjZDW ;Um6JQ*t΢Dxf^Nik1']]TDr[0`G'فf!s$oғtf:n!.PdXwd:%-#NSkJ/>-)PSF{/#.DCVz i9I,j{l:tzz1&V#y1:STej"ShEFP ^uR*kd uʦjY Ǥfd^y2ҩ`nlE5>O}^8KmHV"O" ̝rEp)pAK!.6}h)5e(GoH3AѰͺvEvtl0͟>0b[t(ۡ1 =2 / crFK+z$wD[`y7/.4Ra•HtÍڣ)u $Fl-JY:)$i̸Psk\x )SDH zjacO?֜6N%'w)UyIkZmuFnõ0 7iwEtI0GGƄ=퉲 Ρe xqF ʝ(|ح1#&PX(7z,띎ѣj%>g*[hAɬb`aJi?Փz̟'3@ }0VG YZ