permissions-2015.09.28.1626-16.1>t  DH`pYX\/=„2x޹>:lՀ(aOPSmJ:Y睽J4mabjjQ*B|:}9:(ʴwi}6&T= 4a˅kFpI][-<8r&BC*ҜlBz1w4睡v䈴$yl{9pkO+7k汰Is;{CO}u'/U2R썒׊ ̫7 }b91da0cb58d1cfaefaa88f110741fcce5c8b4bdaYX\/=„gpi'o!KiR '9D[yaȵ*m8G03Sh&Is2F!1ח)pVBai9}uJV5-9(\Ĩ ܵWA]A? $6g!!P jUxc^"QE.}P!R b*5ˊz#|'pF7Uva ̀Q1 ]0H,>aGN6/m'⚿9Y.><0?/d # B #,5 NdX |            I v LY(8U9 U:U>+EF+MG+` H+ I+ X+Y+\, ],( ^,b- c-d.*e./f.4l.6u.H v.lw/ x/ y/z/Cpermissions2015.09.28.162616.1SUSE Linux Default PermissionsPermission settings of files and directories depending on the local security settings. The local security setting (easy, secure, or paranoid) can be configured in /etc/sysconfig/security.YXPlamb10topenSUSE Leap 42.3openSUSEGPL-2.0+http://bugs.opensuse.orgProductivity/Securityhttp://github.com/openSUSE/permissionslinuxx86_64 PNAME=security SUBPNAME= TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi # apply all potentially changed permissions /usr/bin/chkstat --system0QHK^R1Z?<9큤YXOYXOYXOYXOYXOYXOYXOYXOYXOf0f096f39905c1239462dea55bc34c8d33bb8124f97514ef1ecc2dd5a8da8afb679c1c8263d75afca5e78b6768f9a1a564701cf109517057fa5900979e3d01706a7af8890b2b1f7d98d7f248aa6cd7db7651b053a019aeafb14acbd14f85645151d22b54d368056a59f951cebccfa5faa5cd5c3f099b7102c06ea5b580e112a7393eff1cdef020bd23c98e04879eb92frootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpermissions-2015.09.28.1626-16.1.src.rpmaaa_base:/etc/permissionsconfig(permissions)permissionspermissions(x86-64) @@@@@   /bin/shconfig(permissions)coreutilsdiffutilsfillupgreplibc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)2015.09.28.1626-16.13.0.4-14.0-14.4.6-14.11.2Y@Y@W"W@W@WPVV@VV2 @V +V +UuT~@TZ@SvSہ@SϣSSS@S[SM@S0@RnQR@RR@R@QbQQ>@Q@QP@P@P{PaO@Ọ@OȮO]@OE@O2cO1@N@N|tNyNx@Nx@N @MAM@MMtMY@MRL@L@LLr@Lr@L7L7LLҠ@LNL6L@LL(KыKsK?ĴJu@J#JJ:J@JJ|@JzJn@I@astieger@suse.comastieger@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.demeissner@suse.commeissner@suse.comlnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.dejengelh@medozas.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.delnussel@suse.demeissner@suse.demeissner@suse.demeissner@suse.delnussel@suse.delnussel@suse.de- Update to version 20170928: * Fix invalid syntax bsc#1048645 bsc#1060738 * permissions-singularity-setuidroot2.patch- Update to version 20170922: * Allow setuid root for singularity (group only) bsc#1028304 * permissions-singularity-setuidroot.patch- permissions-suexec2-is-symlink.patch: suexec2 is just a symlink- permissions-shadow-bsc979282.patch: * list the newuidmap and newgidmap, currently 0755 until review is done (bsc#979282) * root:shadow 0755 for newuidmap/newgidmap- permissions-qemu-bridge-helper-988279.patch: adding qemu-bridge-helper mode 04750 (bsc#988279)- bsc975352-make-chage-sgid.patch: chage only needs read rights for /etc/shadow, so setgid shadow instead of setuid root. (bsc#975352)- permissions-gst-ptp-helper-960173.patch: permissions: adding gstreamer ptp file caps (bsc#960173)- permissions-suexec-bsc962060.patch: the apache folks renamed suexec2 to suexec with symlink. adjust both (bsc#962060)- pinger needs to be squid:root, not root:squid (there is no squid group) bsc#961363- permissions-suexec-bsc951765.patch: add suexec with 0755 to all standard profiles. this can and should be overridden in permissions.local if you need it setuid root. bsc#951765 bsc#263789- adjusted radosgw to root:www mode 0750 (bsc#943471)- radosgw can get capability cap_bind_net_service (bsc#943471)- remove /usr/bin/get_printing_ticket; (bnc#906336)- Added iouyap capabilities (bnc#904060)- %{_bindir}/get_printing_ticket turned to mode 700, setuid root no longer needed (bnc#685093) - permissions: incorporating squid changes from bnc#891268 - hint that chkstat --system --set needs to be run after editing bnc#895647- Do not applies permissions from backup files (~ / .rpmsave / .rpmnew) (bnc#893370) - do not mention SuSEconfig anymore, long dead (bnc#843083)- append a / to /var/log/journal so the framework makes sure it is a directory bnc#888151- make innbind mode 4550 (bnc#876287) - permissions: Adding systemd-journal directory (bnc#888151)- permissions: Adding new kdesud path for KDE5 (bnc#872276)- vlock_main lost its permission checking, so remove from here.- opiesu,wodim,vlock-main have no setuid root. (bnc#882035)- tighten /etc/crontab to be always mode 600, even in easy (bnc#867799)- duplicate /var/run entries to /run (bnc#873708)- permissions: incorporating capability for mtr, removing +s from ping (bnc#865351)- GIT repo moved to GITHUB. - removed the setuid bit from "eject" (bnc#824406)- do not use magic constants for strlen (bnc#834790- Chrome sandbox also allowed to be setuid root in secure mode now (bnc#718016)- use PERMISSION_FSCAPS- it is PERMISSIONS_FSCAPS (bnc#834790) - qemu-bridge-helper has no special privileges currently (bnc#765948)- utempter helper binary moved in new version to /usr/lib/utempter/utempter (bnc#823302)- cdrtools: allow some filesystem capabilities for more stable CD/DVD burning in "easy" mode. (bnc#550021) (cap_sys_nice, cap_sys_rawio, cap_sys_resource, cap_ipc_lock)- leave out readcd,cdda2wav,cdrecord until it is ready for the distro (bnc#550021)- cdrecord currently has no special permissions approved (bnc#550021) - append a /- Allow pcp to have stickybit worldwriteable directories- add /usr/bin/dumpcap to watchlist - make fscaps=1 the default on "" - added PERMISSION_FSCAPS to the sysconfig/security fillup template. - /bin/ping(6) was moved to /usr/bin/ping(6) /bin/eject was moved to /usr/bin/eject- apply permissions settings in %post. During initial installation some packages might be installed before the permissions package due to dependency loops so we need to make sure their settings are applied too. Also, on update of the permissions package changed permission settings may need to be applied.- temporarily add su.core. workaround for the migration of su from coreutils to util-linux needs to be reverted as soon as util-linux is also in- no longer install SuSEconfig.permissions, SuSEconfig is gone.- enable ecryptfs-utils setuid root mount wrapper (bnc#740110) in .easy- remove /var/run/vi.recover (bnc#765288)- remove /var/cache/fonts (bnc#764885) - remove /var/lib/xemacs/lock/ (bnc#764887)- Revert "Use credentials from within the root file system" breaks use of --root option in brp-05-permissions- print warning when requested to check not listed files - Use credentials from within the root file system- add duplicate entries for / and /usr (bnc#745622)- add scripts for automatic package sumission - drop zypp-refresh-wrapper (bnc#738677)- disable run time fscaps detection (bnc#728312)- set permission by default in SuSEconfig mode as permissions are only set when called explicitly anyways (bnc#720010).- fix typo in path- remove world writable /var/crash again (bnc#438041) - remove world writable permissions from /usr/src/packages (bnc#719217)- add chromium browser sandbox helper (bnc#718016) - don't offer PERMISSION_SECURITY in config anymore - remove setgid games bits (bnc#429882)- remove setuid bit from opiesu (bnc#698772)- disable fscaps by default as factory kernel still doesn't have the required patch for auto detection- read /sys/kernel/fscaps for fscaps settings- change path to gnome-pty-helper (bnc#690202)- setuid bit on VBoxNetDHCP (bnc#669055)- fix hawk permissions (bnc#665045)- add hawk (bnc#665045)- remove Xorg setuid bit (bnc#632737)- update permissions of lastlog, faillog, wtmp, utmp and btmp- remove permissions handling for /etc/inittab, /etc/inetd.conf and /etc/mtab - revert previous commit, done in coreutils instead- change fillup deps to requires to avoid coreutils loop- change utempter from group tty to group utmp (bnc#652877)- add permissions man page - update docu - add --level option - set perms for setuid files always if owner changes - strip root dir when printing file names- add option to explicitly warn only- reimplement the core features in chkstat itself instead of SuSEconfig.permissions- don't make changes if not called explicitly- add support for file system capabilities- remove vlock (bnc#629236#c13)- update path to gnome-pty-helper (bnc#634199)- vlock -> vlock-main (bnc#629236)- use %_smp_mflags- add lockdev (bnc#588325)- update for innd update (bnc#594393) - remove lppasswd (bnc#574336)- enable parallel building- add /usr/lib/virtualbox/VBoxNetAdpCtl (bnc#533550)- add /usr/src/packages/BUILDROOT/ for rpm 4.7- add more arm directories to /usr/src/packages/RPMS/- remove permissions handling for traceroute6 and cdrecord which are symlinks nowadays- fix weird sendfax permissions (bnc#525954)- permissions now maintained at gitorious so use tarball instead of individual files- added polkit setuid root helpers after review (bnc#523377)- also added KDE4 start_kdeinit (same source as kde3 start_kdeinit), bnc#523833- open-vm-tools gets setuid root:root in mode easy (bnc#474285)- hylafax directory permissions are handled by the package - change group of amanda binaries (bnc#523006)- add some missing slashes to directories and remove entries for at and cron (bnc#480855)/bin/shlamb10 1509185616 2015.09.28.1626-16.12015.09.28.1626-16.12015.09.28.1626-16.1permissionspermissions.easypermissions.localpermissions.paranoidpermissions.securechkstatpermissions.5.gzchkstat.8.gzsysconfig.security/etc//usr/bin//usr/share/man/man5//usr/share/man/man8//var/adm/fillup-templates/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Maintenance:7436/openSUSE_Leap_42.3_Update/fcde417c9f70dd1572278d08e7ce6b9f-permissions.openSUSE_Leap_42.3_Updatecpiolzma5x86_64-suse-linuxASCII textELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 3.0.0, BuildID[sha1]=e0cce563e62e43fc6d9340d504f67f6c4901451c, strippedtroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R RRR R3g<ta G/?@] crv(vX0Dstj C`[~mc7_CO?:8G,OqewJ 2XG}ǕݶX+"4aL/Ȱϙ6k;sx_[[>wI]y(L?B"9n;;:[ v)]Ae6y;tⰽ R*J1l  CJ%Km5be%?'6DB; q ")n*1"Rq<(ejfwGO( 3|4 qaDN6mU\G慘gesLYGy{뜩&Rεz݄TKjRΐ^ n+W_h"N!.CQ@+';hQf`I3Tn[Y ?/Z6mTD}hɜܕ:\Xf13i%\^.杷O=&˺|^Fِ[e%/5am4EYD1m8'/1si ^Hx #ʅ{OSzi!# A.d& )/Yl_5;'C Y LU;p^6F 'x~ M3.,~#a[0%BF "?O4b#c[c3X8 ,N0a[l8Μ![3zE Xd ZM)d~$n] # 6%uSןm8 @Zv 'ye%6akP]v[XKw>נ/c;ݙ&O*+l.,fe'jNᾐa!Yo3>~T#wF.<Ӊ"# Z-d^w02뒍}i=ܟY(L!Ď>jC~Kp<ia]4VIFDӺGGc%rvQ=eKJ5Un]d/٭eqz E)8Pk(,qXU}|,MBEf\]Dg+Iie]{*a Jg?&ȡ)BPDgvg]%vle㣑 hCsTtXʰ{۷l*Q~UѲN|O7؄GNqwZ_:}T+V=jE\zF~Фl$*쭡ѷ %{e M/-,;mZ}L)9õBg/!Lb\Q~Md1,SL,*.$VNPn>FKo rd9Pi:i'.M$A8'V z`TB*j2 ڄޱ14T 2D\L2ǵv+_ EKFA|Xqr0;R%q`,S/kyK$g!YRЋr %M@YY;p-.>]D@k1U*<|Ta0{wq8ua-- ɴjuE= mJMJFJl i ?x9=TpӠҌ<:t^_(m4 LDHw$|gؘfIo5XpsªAjՄS]N7ޛ^$X럨q}=^X^Ö-#}vi:+I_tX^~ntXgT bcB 'HgVgI|ӵ%-TCoP@Cjs@uՇXd~+b^8MDiӭ47 KU1ڡ+=ţGɏ^|P ʼnɢ%)OUh069<}rsD퉈! ,(a.HlkL SrXu<6 f؛YbC=5)oNtC7\ڨoϘ|Qbs<%oT!9'CQ e61˗$*ߞ(2 #&g @ dMisҨ&&afuN]w=>7Ruts:M~gߴ!5tP&9WOE&֍ÍLypZ5m9=JqdLJ$)0earg k!;w7؇4 ~Q{LJKp0+茇4?Y5tWb^]@>=oR 5=Eh5ĀaFQx.6(vH.^34* 4YvVz3^^MwOFڟsStmV\DX5 bݳ30jvΑ*.v(RHT,"$vaC'R68˝l+ ?QIݭ_.Yپ0,JbC+?hVe ez/*N@S0_<õ4N"Vq>'.^u?ީxWT rbdβIHf&lic@KɊ!$Qxnl#(4fFo*MxD]QQ9^B:{PЃњyٚsWNQtnBv=_`P(_Pm%%אn=^6Rhfo'.ZVR1v"D8t{8T@ZsHlo)UB<+k6{7x WȤInŷ?>-{dEȅk\TH9f՟29w:άX+T&gԖSJ :xX`#sٻ>c44AG[/'O !٧YEQؤ(VMZ1+)y[ ,P i~){Q,6g׋)Șwyc H ,e8kpSpW%1Lkōr@OX.}mrecX2MDBc~VL JpfG> 9F_!JY+wQEn)6S$[?e<]O.WDY[mI^טgH_;hӥ}^~JwI OL`,[?gܘNNiUWTN%Z7^ EN iѺIQeR4y4U ꓞ7ɿ y_0[P/\dukI*ڽ. w0ut?3Y{^?$7F%'ø2-,%=VBmhKk}o_=Lp;K?rHcM ht¥%Z3nڀsv{ffhYnFr;Flxzv/sri<{{D(I׫4*Psv4֝? НY k2=)|k7 h;tdu6n˖:F݌LmvZך8wkoq a 7+(YpTWe`x٭8*l*N?Nj_ˋp5[>E8q@MOQ3uL92^ڻ~ՐS%$G (@YEZ/{OzbNef@r /҃0vWD?x!kRX>ۜnzAD!\W;sU q^F D3 k9uxye?'g @1@reIHL8 Ssrvd@7E+#vX̂M֦a*1-OPgfblnJ='e THA}wo?~R J:Bx,ZgMq")9tc چu1.z"o.ô *>J;SoL)mWҼ&0(nΆbՙ 4%4Wl1.ε#"_{s.@vO''GpAwUr3[\ i #SnB;|36ys1F؍QDËO-pQu3E (qp \ ˃Ja&":8T-gV1[cx~S%$TD!T5흏03ji!gVbzZ0E9] |5(Dyh@RD|ůg'c=F#xy!=NoJs\~$LZ=/l=MR e ׋bt@H::Y NLq^y5:(1-n>9+ੜhyLq BW/Skcjň[Z7 e4.JuqWs㓺.ўR^q$w9(|nqѥ6;NRϤ&ݳ*% h,,4tr&iƚb/7(nIdgQ;qG"f BNt WPH޵n3wV 3}Eg|=B1=J"#[K)<.8EͤM7 waG؇^,=V˦sM|Տk=Ƌ.o>uJ12X_p"5d0S](2#DQZZCyBQo%&*$G}dPF7;AL&5E\ȃC_5?2͙d~wq-ڷ5%AӨ/~k0Ә馡" dN4WyXzqIJ vD|7`z,1X~yڥg׋El#V籁wh}4)F9{Uһ-=/]3$?@eG%?h>pP$ hÄQi0D3vn\XMUYB^:qnj,ŕspLšZ3Qv\R(`JAe "81W#GX} dYJ|9-L~^="e~˼+ a67c%´mx5S xˈJق_n,{<BFBƭW8鹭DPu,޴{ ZvL$7u0If2 @>_7&$H$KʂnBwe&mUɡ\ Zɤ97l J OaM&~$<75&Z4w+a|S=S91Ol`z0t3Z) h .>&"^jܔq+iՔRga'=Ϳid8XSO=16)s¤̀~֋@9e:`K:_8אdUf㳳NsJb FyD)yOa=ƤRڕ³YRciz0KPZ,$pK-^2XT$"('{ ;qpkBYC==A^mvj,U } /+(&V6G)H[1^:|=F(:!ְ @KSAΎZ#b/4vAϷk1ͷШA<dϒH?P~3Xb<[dz*mNH͈u'^Z'GT'8hV~}6,pĿzUOq_Jm~ґhaVҿ6?=od%> x=ꀊ )m?A+ 4R?QӅШ0daO">WuA۞) QohVAhPyԕegM QtQp+$+GlZNWEWWz#˼q Q?xSLB>W ߽ t i 9,HI%^\zFp1:LwAđ5kyA[48u|+ Eėt GT@a>cR@- >_6;]"EDZ ]{gpk} Ba-4~r_@i-mv kL5( 1@p<^p O%LƑzl(Bn sUvbe Q^nדTESbܨ|bDiaq)5zkH~ԇbBM'(09l&W#>= >m99aذy %S@+fXQy]Y;a; UёޜA-z%y)uL*-H-)73;hvߞ@гxrkk%Yu#Q؅".ҙ\BD!5$Y 6=뤝oOTSY Ne;c`ҦgvIDmmxZTՇtV GnN/%<`-,^~m?ěBȈ/ _}[meXxh^8W'rn͘T%Q"x6gCIq#șN/h͋(DhO!Ǣq1q-Ky=)YE ПXP*q/mSѻ,H͡qlf7z$7]q^\#:*gtBo+`![#V T$lOӲȿ&p9ne휻ē F|B Zh31s,S:Cupr߄o@2Ǩf:x)7%}6R)ޚ@DOauJٌN0pĪI'Oʲ`_xE~ > ߸(ޑxD =HCw `D/)+#ⲧM8OQx})Bg\JbvU!' (&|wH^#^_eNk F(*LiG]gewTI֪͊oHR>yq"`;J\q }`NيΰH#qF!e4#]ԅ3:&ZDuKSl&4~^)TOB`&Qa !ȩ'\ji6o3 WG#Fs*@tp?PP%UZE XksUX)8{O c̹䕦%]VKh^yi6n`͜}n8K=xBcVm%jr,4JO!VNtAHύ2u*0Ǝ3@ J͚(,ۂVh*YtDW+Y$p@d]R2JT7ܑO* p-Z\YyT2XhƔČ]<)0)!6Uz)A+92̺#&^EZ:pƃuC]m>ZK8wn2k2 @YV(Q}AT_1'H- EA#;FxGGwUp>0]/ʳC[z 9Gx<y;7n07(YnItֆ6W[x] Crkų \X|A9L_ClyL/4l`hdAQ&d-'P}7?B5~'RP(cs #j9Ȋq!Or 频8'+sFvRU+?j;لe( q|-·,Y(ڣk,qi$oirrt!nM6PʈjNxHFmWVh8:D#d xDN XvL׆ ~@7OR-A qfhN/12zXORH4C;JzȠQ5SkD Y MWԜNmЪx :  J!e{ -xN\%ܞ:E%f{i>55iH{i#P57K !{t׀Z֯a8-|jZ]O$ &vf5&A#ƣ_b|Vmr$i%o DZG ~a."=6iE+ 9CI1bozk$~0lI +T`an[OƋ.#3ԅ&Qy0eK-";!ت0O^Sv`1˶;s#aƉFV~|[̓ h5 W'́32Ϟ 2ț.y_\e!02T ?w~!_Bl@d/";`wlY?{7'Z7d@M?CB!`O˗)-3 !k@X=zkt*yvqy1S}pI8b|) v?-/5hd>Ev1 WV;٨U' YS.:E:d& 񪸝{ěUknۈ}]YK,K>4T/mtu05c#glqq܀@TN+bm= ;R ȇؙ 8Z`A^^\yD*?@-<igLN8| {)dFN,'&xm),Nk#gH5Y@F+&knZm_Bg˩9: Í8* Tp8cYO;LC@F 9cE=GYL]72ֳ X@W_Ө`}. m 9`jSg:9PBa9rMEh0V3F IS).ehD%L~ (\GGx@eٲ,.ż4Vv _K+m" x<~!D{8bb;fuq,*.'VS/󅻷;"dr|`lUD\#qPO B!J4+/*@P.nBÖL̒Wf R6"xʹI_ki,SnXzA>/u,h!]fFsKPT9Joo<GL*NTG4r.83K hϷ:bАPvi?^ E0z8zB+}U;g bh LȮR[`|fgɌ#Ԣ%‡c}aXԣVwgÇlq0UMq3:4WWEUCe\+TbSQ; b8`أH2$2\a*ã]j*01,<X(dpL=.OYUG_ĕay/8nٙB-ĸ6녮tIÊkf4$ >*ie{Fy{նzDaOa3~PQ/!G܍2ȟQ +t Jȼޟ<1"FyVޜ=-U_+TE :ˉdJ !ʰj<&}q3!˒@`(Ō|Xh2y/bxzŋ/1'=TT8uNG˸FRD}Uچ3*,T9??/-]}Z4:֚uQ g7.N0yE.[7~#]'uE&+8aYվ`{hdVz(g?%{ֲ72LgwZt$גt]d-#dz p&gW#XfX-~ƘfX*nJwOT;ztP JiY|D[XLBvW U>6ϧ`" 2oagB̯+& ^PWX-7<^ڦ='gViBuɋ$L _vv }8ogFsu&iоn\ JCʙ>`Ţ(AiK'ĊgQ'Q #Tô69+Q7I4\Y_[[[je~BW_KE.74$Hr sMɯ)r[!_xWk߈2Wp@^C +<ҐJM0iόLko*ٍW B .*vJߕ c˾aS:dfR:~\Ԋ>nY(:<NSPH.'$8./xczAgP5ϴRoldh6}j7IU(@Lc?%GЋY+;i!/ٖo,z;on2\=јdX8Q ϼ `sAS:zOĺ_ XO $|Êꇾ<N65>F:1m#Ko#*'ns#{e,!oP6IM׉ #l|* Ld('tD&_]Je=ϰJjpޤXRLKAT1u7SCFi L-)`٧u?RScri(sZ拡0ô*/:>‚Ȏ9Lݺ{u Uۚ3mΊ: ڗnb3qAgϋ^ٟ^;,ۄ($^JV$^eiw.&$ /N82A riJ:1 X ޹WkJ!&/Aaܘv99R4a/U+ATU*_ky%e\۷`}/etkh*^TB&1}B^Gk>oMFKGLf+Y?-7tAL?,v~.! &!)8aF%|sPkҶM$9I]m+-iEݙ6AjNDhG&3떒S|WԠmń}`>&]*%{%1 XMaӕ֚iɛ s+5{?,#0GDz-6[51J/ݺ BD)?;bL1IT|.bb5. |^dL+_x;ρ޸ Fr)б0HSB$QW̦X,dSF!y*#7'7/%  kBNJ}w7, $//'%g{6>~ !M.a*/7A*Gl\ Zdܾ H WW@\%=I) !avvKZ?\ 2ƃJž\z2[ޗ_k%ZEF +敪☄aJ.UQ6.4F1G.cI3J/MTy/Y2JG o*/|P5{ `?7x@tNF\&1u= +z'C u|aS_UjZKݖ1HIY j25j`Vf\y ܈OnW 'bȿ,m ^)X i0ؽ!GGC𖈼ARV|قX>d| U( j-X wU P;_iFѣ=~D{z#QK3L*Z{de74WYLb4|&!6FHKԛ]bo]ue2B1W1bSG!ܗI xծF(5MId WCD`u|}Z[6¸@ US#Q?K 4f݀Q{4eGu_7KDH!IJu57#i r*q{SjOSIBָa55} fqST>:IoƛEښ2ӿ Qo#Z0lZ!|B{lCuU^#qvF:d4ݸ wgdib,]ʴ 䧻q 4ЬM2ꖒ1y/^o~ kΝ]dg D]kf"6E\K@ /҂EdWyhYI+Sǽb{D\nźҘ[?u\[/yBO =e^cVB;W'" ~Fu&֩jt >{iYДyY ɞ=|XD.&Z)Bk쯻G1Š NV,Z.J#;%UӋe9xfEG[2CƇhp'l+AxZX xoy|51Scu3 TBA᥷%5(*1rӆHo2<.!b(&?1 ,XQ­dnΞƊBk%?SuQ>qyn~cG(o`W %{lNN ˚ | 6zmm45C+T刴/-5;Ղʞ8Z(4a 4cEot`XM Q) °tFiA2'2 zJ`[+[!k\gA0Q+Bwd%Mlq9a\v7Zs- @vJLOl7H )]xw[]m#s1 ~zPV2Ó" g,' v2;aא8 le^sރxɷΦ:Ri1 :G2tOTBDQFi;<O.J9yY>T;\|݆ݏKgVNV$]@qmL6j[uj<0A92q|,n&1-X#}۴y-&A!泿(rji ;_:QHjoAAm8(dНo|*!nSU\Ƞ**}n'Ngb/Qw:m} 4R҇%~y9hu뢸+x;+`Yш0X"I\ }l'BA)xrz-:1GDs5gcKLUЊT*y![+kYG~k7ڧjPV;rJ(bf7/0=֮J{Fmߌ„$aҿOpyL9 qc*Y2lM3Nyh+ŀfC͸MA^Ykyk59fg37TzŲ c*qז`*)15{G&QYMf#huɶ ֖3OCzq!S6YLfjVᶗYRe%)OgUE8pdY#hp_3SNZ@M;