openssh-keycat-8.0p1-24.el8 > 6 6_6 3!pQp)Tξ7]mtZ`e7[ ]mtZ`^Z Up f{MH.1Fs)'(Hw y&gMx3u9~/-l1(TW`7G?/&>a8`jicM Y߸0M !cC;Dm藘RݭXG]hI4&|4|4W{`4!E$}ikU&4081e0285a79f39460d6d38790c6dee095d1ef0e978d01afea021011637721d3f95c4a34de80554c383b0acfa12e69a90a709ca7Ф3!pQp)Tξ7]mtZ`e7\ ]mtZ`gQiMX`Db ^sǝH*0X̍Iy]=Fj̦JYq]r6QxNzLӪ4=XXK+ʹaGbtIp MW@HܑUqHOܒڽ'C\|E m-$W9' C#^ry ~rHJywɬnx|P%0Fk_܋Κ(_>U 2%aGγžsT{qjCƌ}RNManz`\؍dU3J߾b5:sbP)d;\W4ݨj ^lbN-֝M?}pSwAweIC*SGBv5N'@)03xJEs0˷s_lDL'sn-;TʾFo XY48R6^-o0~jt4t"?_b'5KvGlםYLk.>p<LD?L4d  ? AGLh v   g 4t (X8`/9/:x/GGHG8IGTXG\YGh\G]G^HbHdJeJfJlJ tJ8uJTvJpwKPxKlyKKKKL0Copenssh-keycat8.0p124.el8A mls keycat backend for opensshOpenSSH mls keycat is backend for using the authorized keys in the openssh in the mls mode.e3vord1-prod-x86build005.svc.aws.rockylinux.org)]KojiRockyBSDinfrastructure@rockylinux.orgSystem Environment/Daemonshttp://www.openssh.com/portable.htmllinuxi686U*&@ȁAAA큤e3se3ue3ue3ue3ue3ue3010e60034729e34223da00495b544c41d7fb7a6b75455bec748d7990afb8b090ea5d0d01b381edf41de1ba11adaeec5ed4bde26b3b1251e5d8361685ace76de93dcb91e3e897c6675060638507344fe70603d164a7b2ace552aaf5d2c69d3f32../../../../usr/libexec/openssh/ssh-keycatrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-8.0p1-24.el8.src.rpmconfig(openssh-keycat)openssh-keycatopenssh-keycat(x86-32)@@@@@@@@@@@@@@@@@@@@@@    @config(openssh-keycat)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.26)libc.so.6(GLIBC_2.28)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypt.so.1libcrypto.so.1.1libdl.so.2libpam.so.0libpam.so.0(LIBPAM_1.0)libresolv.so.2libselinux.so.1libutil.so.1libz.so.1opensshrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)8.0p1-24.el88.0p1-24.el83.0.4-14.6.0-14.0-15.2-14.14.3e@e@e(eJ&e?dF@d!cb>bUbTawapaV@`@`r`@`pA`P^y@^@]6]@\ڭ[@[[-[l,[;e@[3|@ZԐ@ZJ@Zľ@ZZ|;Zk@ZiZc/@Z_:Z2gZ.s@ZfYYzYYm@YyYV=@Xg@X@XZX@Xe@Xk@XIK@X,J@X@W@WWW@WPWWv[@Wm WUeW#LW@WW4W@VaV'@V2V͛@V=@VV@VVVs@V9@V(V7@U@Ud@UoU5@UnU@UK@U@UUUuUn@Ug@U4@U/@U@UUQUTPT\@TgT@T@TT!T~T}TC@TT@T~@Td@T\@TXT @S@S @S @S@SSSSt@RSR@R|@RsRj]@Ri Rg@R].@RSRB@R0[@R7Q@Qp@Q@QaQ@QnQm=@QdQdQ7/QQP@P@P{@PTmPPPPSO^@O~Ou@OiODO/O'N>@N@NN=@NHN$@Nw.Np@NoENoENm@Nm@NiNh@Ng\NS@NA!@N?N?N?N-ZN(N@N @NM6@M@MM@Mߒ@M۝ML@M@MVM@MMmMmM@MM@MlMMx@M@MMx@Mv@MtMp@MoMlMk@MgMgMfH@M] M[@MY@MQ0@MOMIG@M>@M4/@M0:M-M@L@L[@L L LLNL@LLL@L*@L@L@L@L@L@LzL@L@L4l@L+1L$@L#HL!@L0KuK$@K;@KK@K@K @K޺KtKՀ@K͗@KQ@K,K,K8@KO@Ky7@KbK]K]KXAKV@KUKG@KC)K/c@KK@K KKJJJJTJ`@J@JJ_@J@J;JJ J J@JJ#J@Jq@JjJi@J`gJMJI@JHJF J@J2C@J Y@IIcI@IJII@I@IIo%@IAH~@H@H@H4H1kG GGG@G|@GUA@GUA@GB@Fl@FFFyEE{@E@E݅E@Ew@EnEl$ETiEIE @DC@D|Dp@D{D@D?D@C@CCtC@C:@CC@CqC@C}@C|pCqCbCTCNL@CFc@CC@Bw@B@B/@B:B@BQ,@BBB8B#B@B @BBcA3A@Aa;@AN@AF@AEA7 @A7 @A7 @A4h@A+-A @@@@@X@@o@o@V@@E@C%@=@=@9@@,@@@@@@/@?@? ?}?7?@???j?j?j?hL?hL?hL?hL?f@?f@?f@?f@?f@?Xz?Xz?KK?8?8?%@?'@?>@?>@>0>@>~@>L@>G@>.>@=@=@===n =ZF@=@=[@= =@=@ - 8.0p1-24Dmitry Belyavskiy - 8.0p1-23Dmitry Belyavskiy - 8.0p1-22Dmitry Belyavskiy - 8.0p1-21Dmitry Belyavskiy - 8.0p1-20Dmitry Belyavskiy - 8.0p1-19Dmitry Belyavskiy - 8.0p1-18Dmitry Belyavskiy - 8.0p1-17Zoltan Fridrich - 8.0p1-16Zoltan Fridrich - 8.0p1-15Zoltan Fridrich - 8.0p1-14Dmitry Belyavskiy - 8.0p1-13Dmitry Belyavskiy - 8.0p1-12Dmitry Belyavskiy - 8.0p1-11Dmitry Belyavskiy - 8.0p1-10Dmitry Belyavskiy - 8.0p1-9Dmitry Belyavskiy - 8.0p1-8Dmitry Belyavskiy - 8.0p1-7 + 0.10.3-7Dmitry Belyavskiy - 8.0p1-6 + 0.10.3-7Jakub Jelen - 8.0p1-5 + 0.10.3-7Jakub Jelen - 8.0p1-4 + 0.10.3-7Jakub Jelen - 8.0p1-3 + 0.10.3-7Jakub Jelen - 8.0p1-2 + 0.10.3-7Jakub Jelen - 8.0p1-1 + 0.10.3-7Jakub Jelen - 7.8p1-4 + 0.10.3-5Jakub Jelen - 7.8p1-3 + 0.10.3-5Jakub Jelen - 7.8p1-2 + 0.10.3-5Jakub Jelen - 7.7p1-6 + 0.10.3-4Jakub Jelen - 7.7p1-5 + 0.10.3-4Jakub Jelen - 7.7p1-4 + 0.10.3-4Jakub Jelen - 7.7p1-3 + 0.10.3-4Jakub Jelen - 7.7p1-2 + 0.10.3-4Jakub Jelen - 7.7p1-1 + 0.10.3-4Jakub Jelen - 7.6p1-7 + 0.10.3-3Fedora Release Engineering - 7.6p1-6.1Jakub Jelen - 7.6p1-6 + 0.10.3-3Florian Weimer - 7.6p1-5.2Björn Esser - 7.6p1-5.1.1Jakub Jelen - 7.6p1-5 + 0.10.3-3Jakub Jelen - 7.6p1-4 + 0.10.3-3Jakub Jelen - 7.6p1-3 + 0.10.3-3Jakub Jelen - 7.6p1-2 + 0.10.3-3Jakub Jelen - 7.6p1-1 + 0.10.3-3Jakub Jelen - 7.5p1-6 + 0.10.3-2Jakub Jelen - 7.5p1-5 + 0.10.3-2Jakub Jelen - 7.5p1-4 + 0.10.3-2Fedora Release Engineering - 7.5p1-3.1Jakub Jelen - 7.5p1-2 + 0.10.3-2Jakub Jelen - 7.5p1-2 + 0.10.3-2Jakub Jelen - 7.5p1-1 + 0.10.3-2Jakub Jelen - 7.4p1-4 + 0.10.3-1Jakub Jelen - 7.4p1-3 + 0.10.3-1Jakub Jelen - 7.4p1-2 + 0.10.2-5Jakub Jelen - 7.4p1-1 + 0.10.2-5Jakub Jelen - 7.3p1-7 + 0.10.2-4Jakub Jelen - 7.3p1-6 + 0.10.2-4Jakub Jelen - 7.3p1-5 + 0.10.2-4Jakub Jelen - 7.3p1-4 + 0.10.2-4Jakub Jelen - 7.3p1-3 + 0.10.2-4Jakub Jelen - 7.3p1-2 + 0.10.2-4Jakub Jelen - 7.3p1-1 + 0.10.2-4Jakub Jelen - 7.2p2-11 + 0.10.2-3Jakub Jelen - 7.2p2-10 + 0.10.2-3Jakub Jelen - 7.2p2-9 + 0.10.2-3Jakub Jelen - 7.2p2-8 + 0.10.2-3Jakub Jelen - 7.2p2-7Jakub Jelen - 7.2p2-6 + 0.10.2-3Jakub Jelen - 7.2p2-5 + 0.10.2-3Jakub Jelen - 7.2p2-4 + 0.10.2-3Jakub Jelen 7.2p2-3 + 0.10.2-3Jakub Jelen 7.2p2-2 + 0.10.2-3Jakub Jelen 7.2p2-1 + 0.10.2-3Jakub Jelen 7.2p1-2 + 0.10.2-2Jakub Jelen 7.2p1-1 + 0.10.2-2Jakub Jelen 7.1p2-4.1 + 0.10.2-1Fedora Release Engineering - 7.1p2-3.1Jakub Jelen 7.1p2-3 + 0.10.2-1Jakub Jelen 7.1p2-2 + 0.10.2-1Jakub Jelen 7.1p2-1 + 0.9.2-9Jakub Jelen 7.1p1-7 + 0.9.2-8Jakub Jelen 7.1p1-6 + 0.9.2-8Jakub Jelen 7.1p1-5 + 0.9.2-8Jakub Jelen 7.1p1-4 + 0.9.2-8Jakub Jelen 7.1p1-3 + 0.9.2-8Jakub Jelen 7.1p1-2 + 0.9.2-8Jakub Jelen 7.1p1-1 + 0.9.2-8Jakub Jelen 7.0p1-2 + 0.9.3-7Jakub Jelen 7.0p1-1 + 0.9.3-7Jakub Jelen 6.9p1-4 + 0.9.3-6Jakub Jelen 6.9p1-3 + 0.9.3-6Jakub Jelen 6.9p1-2 + 0.9.3-6Jakub Jelen 6.9p1-1 + 0.9.3-6Jakub Jelen 6.8p1-9 + 0.9.3-5Fedora Release Engineering - 6.8p1-8.1Jakub Jelen 6.8p1-8 + 0.9.3-5Jakub Jelen 6.8p1-7 + 0.9.3-5Jakub Jelen 6.8p1-6 + 0.9.3-5Jakub Jelen 6.8p1-5 + 0.9.3-5Jakub Jelen 6.8p1-4 + 0.9.3-5Jakub Jelen 6.8p1-3 + 0.9.3-5Jakub Jelen 6.8p1-2 + 0.9.3-5Jakub Jelen 6.8p1-1 + 0.9.3-5Jakub Jelen 6.7p1-11 + 0.9.3-4Jakub Jelen 6.7p1-10 + 0.9.3-4Jakub Jelen 6.7p1-9 + 0.9.3-4Jakub Jelen 6.7p1-8 + 0.9.3-4Jakub Jelen 6.7p1-7 + 0.9.3-4Jakub Jelen 6.7p1-6 + 0.9.3-4Peter Robinson 6.7p1-5 + 0.9.3-4Jakub Jelen 6.7p1-4 + 0.9.3-4Jakub Jelen 6.7p1-3 + 0.9.3-4Jakub Jelen 6.7p1-2 + 0.9.3-4Petr Lautrbach 6.7p1-1 + 0.9.3-4Jakub Jelen 6.6.1p1-11.1 + 0.9.3-3Petr Lautrbach 6.6.1p1-10 + 0.9.3-3Petr Lautrbach 6.6.1p1-9 + 0.9.3-3Petr Lautrbach 6.6.1p1-8 + 0.9.3-3Petr Lautrbach 6.6.1p1-7 + 0.9.3-3Petr Lautrbach 6.6.1p1-6 + 0.9.3-3Petr Lautrbach 6.6.1p1-5 + 0.9.3-3Fedora Release Engineering - 6.6.1p1-4.1Tom Callaway 6.6.1p1-4 + 0.9.3-3Petr Lautrbach 6.6.1p1-3 + 0.9.3-2Petr Lautrbach 6.6.1p1-2 + 0.9.3-2Fedora Release Engineering - 6.6.1p1-1.1Petr Lautrbach 6.6.1p1-1 + 0.9.3-2Petr Lautrbach 6.6p1-1 + 0.9.3-2Petr Lautrbach 6.4p1-4 + 0.9.3-1Petr Lautrbach 6.4p1-3 + 0.9.3-1Petr Lautrbach 6.4p1-2 + 0.9.3-1Petr Lautrbach 6.4p1-1 + 0.9.3-1Petr Lautrbach 6.3p1-5 + 0.9.3-7Petr Lautrbach 6.3p1-4 + 0.9.3-6Petr Lautrbach 6.3p1-3 + 0.9.3-6Petr Lautrbach 6.3p1-2 + 0.9.3-6Petr Lautrbach 6.3p1-1.1 + 0.9.3-6Petr Lautrbach 6.2p2-9 + 0.9.3-5Petr Lautrbach 6.2p2-8 + 0.9.3-5Petr Lautrbach 6.2p2-7 + 0.9.3-5Petr Lautrbach 6.2p2-6.1 + 0.9.3-5Petr Lautrbach 6.2p2-5 + 0.9.3-5Petr Lautrbach 6.2p2-4 + 0.9.3-5Petr Lautrbach 6.2p2-3 + 0.9.3-5Petr Lautrbach 6.2p2-2 + 0.9.3-5Petr Lautrbach 6.2p2-1 + 0.9.3-5Petr Lautrbach 6.2p1-4 + 0.9.3-4Petr Lautrbach 6.2p1-3 + 0.9.3-4Petr Lautrbach 6.2p1-2 + 0.9.3-4Petr Lautrbach 6.2p1-1 + 0.9.3-4Petr Lautrbach 6.1p1-7 + 0.9.3-3Petr Lautrbach 6.1p1-6 + 0.9.3-3Petr Lautrbach 6.1p1-5 + 0.9.3-3Petr Lautrbach 6.1p1-4 + 0.9.3-3Petr Lautrbach 6.1p1-3 + 0.9.3-3Petr Lautrbach 6.1p1-2Petr Lautrbach 6.1p1-1 + 0.9.3-3Petr Lautrbach 6.0p1-1 + 0.9.3-2Petr Lautrbach 5.9p1-26 + 0.9.3-1Petr Lautrbach 5.9p1-25 + 0.9.3-1Tomas Mraz 5.9p1-24 + 0.9.3-1Tomas Mraz 5.9p1-23 + 0.9.3-1Petr Lautrbach 5.9p1-22 + 0.9.2-32Petr Lautrbach 5.9p1-21 + 0.9.2-32Petr Lautrbach 5.9p1-20 + 0.9.2-32Petr Lautrbach 5.9p1-19 + 0.9.2-32Petr Lautrbach 5.9p1-18 + 0.9.2-32Petr Lautrbach 5.9p1-17 + 0.9.2-32Tomas Mraz 5.9p1-16 + 0.9.2-32Tomas Mraz 5.9p1-15 + 0.9.2-32Petr Lautrbach 5.9p1-14 + 0.9.2-32Tomas Mraz - 5.9p1-13 + 0.9.2-32Tomas Mraz - 5.9p1-12 + 0.9.2-32Tomas Mraz - 5.9p1-11 + 0.9.2-32Jan F. Chadima - 5.9p1-10 + 0.9.2-32Jan F. Chadima - 5.9p1-9 + 0.9.2-32Jan F. Chadima - 5.9p1-8 + 0.9.2-32Jan F. Chadima - 5.9p1-7 + 0.9.2-32Jan F. Chadima - 5.9p1-6 + 0.9.2-32Jan F. Chadima - 5.9p1-5 + 0.9.2-32Jan F. Chadima - 5.9p1-3 + 0.9.2-32Jan F. Chadima - 5.9p1-2 + 0.9.2-32Jan F. Chadima - 5.9p1-1 + 0.9.2-32Jan F. Chadima - 5.8p2-21 + 0.9.2-31Jan F. Chadima - 5.8p2-20 + 0.9.2-31Jan F. Chadima - 5.8p2-19 + 0.9.2-31Jan F. Chadima - 5.8p2-18 + 0.9.2-31Jan F. Chadima - 5.8p2-17 + 0.9.2-31Jan F. Chadima - 5.8p2-16 + 0.9.2-31Jan F. Chadima - 5.8p2-15 + 0.9.2-31Jan F. Chadima - 5.8p2-14 + 0.9.2-31Jan F. Chadima - 5.8p2-12 + 0.9.2-31Jan F. Chadima - 5.8p2-10 + 0.9.2-31Jan F. Chadima - 5.8p2-9 + 0.9.2-31Jan F. Chadima - 5.8p2-7 + 0.9.2-31Jan F. Chadima - 5.8p2-6 + 0.9.2-31Jan F. Chadima - 5.8p2-5 + 0.9.2-31Jan F. Chadima - 5.8p2-4 + 0.9.2-31Jan F. Chadima - 5.8p2-3 + 0.9.2-31Jan F. Chadima - 5.8p2-2 + 0.9.2-31Jan F. Chadima - 5.8p2-1 + 0.9.2-31Jan F. Chadima - 5.8p1-34 + 0.9.2-30Jan F. Chadima - 5.8p1-33 + 0.9.2-30Jan F. Chadima - 5.8p1-32 + 0.9.2-30Jan F. Chadima - 5.8p1-30 + 0.9.2-30Jan F. Chadima - 5.8p1-28 + 0.9.2-30Jan F. Chadima - 5.8p1-27 + 0.9.2-30Jan F. Chadima - 5.8p1-26 + 0.9.2-30Jan F. Chadima - 5.8p1-25 + 0.9.2-30Jan F. Chadima - 5.8p1-24 + 0.9.2-30Jan F. Chadima - 5.8p1-23 + 0.9.2-30Jan F. Chadima - 5.8p1-22 + 0.9.2-30Jan F. Chadima - 5.8p1-20 + 0.9.2-30Jan F. Chadima - 5.8p1-18 + 0.9.2-30Jan F. Chadima - 5.8p1-17 + 0.9.2-30Jan F. Chadima - 5.8p1-16 + 0.9.2-30Jan F. Chadima - 5.8p1-15 + 0.9.2-30Jan F. Chadima - 5.8p1-14 + 0.9.2-30Jan F. Chadima - 5.8p1-13 + 0.9.2-30Jan F. Chadima - 5.8p1-12 + 0.9.2-30Jan F. Chadima - 5.8p1-11 + 0.9.2-30Jan F. Chadima - 5.8p1-10 + 0.9.2-30Jan F. Chadima - 5.8p1-9 + 0.9.2-30Jan F. Chadima - 5.8p1-8 + 0.9.2-30Jan F. Chadima - 5.8p1-4 + 0.9.2-30Jan F. Chadima - 5.8p1-3 + 0.9.2-30Jan F. Chadima - 5.8p1-1 + 0.9.2-30Fedora Release Engineering - 5.6p1-30.1Jan F. Chadima - 5.6p1-30 + 0.9.2-29Jan F. Chadima - 5.6p1-28 + 0.9.2-29Jan F. Chadima - 5.6p1-25 + 0.9.2-29Jan F. Chadima - 5.6p1-24 + 0.9.2-29Jan F. Chadima - 5.6p1-23 + 0.9.2-29Jan F. Chadima - 5.6p1-22 + 0.9.2-29Jan F. Chadima - 5.6p1-21 + 0.9.2-29Jan F. Chadima - 5.6p1-20 + 0.9.2-29Jan F. Chadima - 5.6p1-19 + 0.9.2-28Jan F. Chadima - 5.6p1-18 + 0.9.2-27Jan F. Chadima - 5.6p1-17 + 0.9.2-27Jan F. Chadima - 5.6p1-16 + 0.9.2-27Jan F. Chadima - 5.6p1-15 + 0.9.2-27Jan F. Chadima - 5.6p1-14 + 0.9.2-27Jan F. Chadima - 5.6p1-12 + 0.9.2-27Jan F. Chadima - 5.6p1-11 + 0.9.2-27Jan F. Chadima - 5.6p1-10 + 0.9.2-27Jan F. Chadima - 5.6p1-9 + 0.9.2-27Jan F. Chadima - 5.6p1-8 + 0.9.2-27Jan F. Chadima - 5.6p1-7 + 0.9.2-27Jan F. Chadima - 5.6p1-6 + 0.9.2-27Jan F. Chadima - 5.6p1-5 + 0.9.2-27Jan F. Chadima - 5.6p1-4 + 0.9.2-27Tomas Mraz - 5.6p1-3 + 0.9.2-27Jan F. Chadima - 5.6p1-2 + 0.9.2-27Jan F. Chadima - 5.6p1-1 + 0.9.2-27Jan F. Chadima - 5.5p1-18 + 0.9.2-26Jan F. Chadima - 5.5p1-17 + 0.9.2-26Jan F. Chadima - 5.5p1-16 + 0.9.2-26Jan F. Chadima - 5.5p1-15 + 0.9.2-26Jan F. Chadima - 5.5p1-14 + 0.9.2-26Jan F. Chadima - 5.5p1-13 + 0.9.2-26Jan F. Chadima - 5.5p1-12 + 0.9.2-26Jan F. Chadima - 5.5p1-11 + 0.9.2-26Jan F. Chadima - 5.5p1-10 + 0.9.2-26Jan F. Chadima - 5.5p1-9 + 0.9.2-26Jan F. Chadima - 5.5p1-8 + 0.9.2-26Jan F. Chadima - 5.5p1-7 + 0.9.2-26Jan F. Chadima - 5.5p1-6 + 0.9.2-26Jan F. Chadima - 5.5p1-5 + 0.9.2-26Jan F. Chadima - 5.5p1-4 + 0.9.2-26Jan F. Chadima - 5.5p1-3 + 0.9.2-26Jan F. Chadima - 5.5p1-2 + 0.9.2-26Jan F. Chadima - 5.5p1-1 + 0.9.2-26Jan F. Chadima - 5.4p1-3 + 0.9.2-25Jan F. Chadima - 5.4p1-2Jan F. Chadima - 5.4p1-1Jan F. Chadima - 5.4p1-0.snap20100302.1Jan F. Chadima - 5.3p1-22Jan F. Chadima - 5.3p1-21Jan F. Chadima - 5.3p1-20Tomas Mraz - 5.3p1-19Jan F. Chadima - 5.3p1-18Jan F. Chadima - 5.3p1-17Jan F. Chadima - 5.3p1-16Jan F. Chadima - 5.3p1-15Jan F. Chadima - 5.3p1-14Jan F. Chadima - 5.3p1-13Jan F. Chadima - 5.3p1-12Jan F. Chadima - 5.3p1-11Jan F. Chadima - 5.3p1-10Jan F. Chadima - 5.3p1-9Jan F. Chadima - 5.3p1-8Jan F. Chadima - 5.3p1-7Jan F. Chadima - 5.3p1-6Jan F. Chadima - 5.3p1-5Tomas Mraz - 5.3p1-4Jan F. Chadima - 5.3p1-3Jan F. Chadima - 5.3p1-2Jan F. Chadima - 5.2p1-29Jan F. Chadima - 5.2p1-28Jan F. Chadima - 5.2p1-26Jan F. Chadima - 5.2p1-25Jan F. Chadima - 5.2p1-24Jan F. Chadima - 5.2p1-23Jan F. Chadima - 5.2p1-22Jan F. Chadima - 5.2p1-21Jan F. Chadima - 5.2p1-20Jan F. Chadima - 5.2p1-19Tomas Mraz - 5.2p1-18Jan F. Chadima - 5.2p1-17Fedora Release Engineering - 5.2p1-16Jan F. Chadima - 5.2p1-15Jan F. Chadima - 5.2p1-14Jan F. Chadima - 5.2p1-13Jan F. Chadima - 5.2p1-12Jan F. Chadima - 5.2p1-11Jan F. Chadima - 5.2p1-10Jan F. Chadima - 5.2p1-9Jan F. Chadima - 5.2p1-8Tomas Mraz - 5.2p1-6Tomas Mraz - 5.2p1-5Tomas Mraz - 5.2p1-4Jan F. Chadima - 5.2p1-3Tomas Mraz - 5.2p1-2Jan F. Chadima - 5.2p1-1Fedora Release Engineering - 5.1p1-8Tomas Mraz - 5.1p1-7Tomas Mraz - 5.1p1-6Tomas Mraz - 5.1p1-5Tomas Mraz - 5.1p1-4Tomas Mraz - 5.1p1-3Tomas Mraz - 5.1p1-2Tomas Mraz - 5.1p1-1Tomas Mraz - 5.0p1-3Tomas Mraz - 5.0p1-2Tomas Mraz - 5.0p1-1Tomas Mraz - 4.7p1-10Tomas Mraz - 4.7p1-9Dennis Gilmore - 4.7p1-8Tomas Mraz - 4.7p1-7Tomas Mraz - 4.7p1-6Release Engineering - 4.7p1-5Tomas Mraz - 4.7p1-4Tomas Mraz - 4.7p1-2Tomas Mraz - 4.7p1-1Tomas Mraz - 4.5p1-8Tomas Mraz - 4.5p1-7Tomas Mraz - 4.5p1-6Tomas Mraz - 4.5p1-5Tomas Mraz - 4.5p1-4Tomas Mraz - 4.5p1-3Tomas Mraz - 4.5p1-2Tomas Mraz - 4.5p1-1Tomas Mraz - 4.3p2-14Tomas Mraz - 4.3p2-13Tomas Mraz - 4.3p2-12Tomas Mraz - 4.3p2-11Tomas Mraz - 4.3p2-10Tomas Mraz - 4.3p2-9Tomas Mraz - 4.3p2-8Tomas Mraz - 4.3p2-7Tomas Mraz - 4.3p2-6Jesse Keating - 4.3p2-5.1Tomas Mraz - 4.3p2-5Tomas Mraz - 4.3p2-4Tomas Mraz - 4.3p2-3Tomas Mraz - 4.3p2-2Tomas Mraz - 4.3p2-1Jesse Keating - 4.3p1-2.1Tomas Mraz - 4.3p1-2Tomas Mraz - 4.3p1-1Tomas Mraz - 4.2p1-10Jesse Keating Tomas Mraz - 4.2p1-9Nalin Dahyabhai - 4.2p1-8Warren Togami - 4.2p1-7Jeremy Katz - 4.2p1-6Tomas Mraz 4.2p1-5Dan Walsh 4.2p1-4Tomas Mraz 4.2p1-3Tomas Mraz 4.2p1-2Tomas Mraz 4.2p1-1Tomas Mraz 4.1p1-5Tomas Mraz 4.1p1-4Tomas Mraz 4.1p1-3Tomas Mraz 4.1p1-2Tomas Mraz 4.1p1-1Tomas Mraz 4.0p1-3Tomas Mraz 4.0p1-2Tomas Mraz 4.0p1-1Elliot Lee Nalin Dahyabhai 3.9p1-12Tomas Mraz 3.9p1-11Tomas Mraz Tomas Mraz 3.9p1-10Tomas Mraz Bill Nottingham 3.9p1-9Thomas Woerner 3.9p1-8.1Nalin Dahyabhai 3.9p1-8Bill Nottingham 3.9p1-7Nalin Dahyabhai 3.9p1-6Nalin Dahyabhai Daniel Walsh 3.9p1-5Daniel Walsh 3.9p1-4Daniel Walsh 3.9p1-3Daniel Walsh 3.9p1-2Daniel Walsh 3.9p1-1Alan Cox 3.8.1p1-5Daniel Walsh 3.8.1p1-4Elliot Lee Daniel Walsh 3.8.1p1-2Nalin Dahyabhai 3.8.1p1-1Daniel Walsh 3.6.1p2-36Nalin Dahyabhai 3.8.1p1-0Daniel Walsh 3.6.1p2-35Daniel Walsh 3.6.1p2-34Daniel Walsh 3.6.1p2-33Thomas Woerner 3.6.1p2-32Daniel Walsh 3.6.1p2-31Daniel Walsh 3.6.1p2-30Daniel Walsh 3.6.1p2-29Elliot Lee Daniel Walsh 3.6.1p2-27Daniel Walsh 3.6.1p2-26Daniel Walsh 3.6.1p2-25Daniel Walsh 3.6.1p2-24Nalin Dahyabhai Nalin Dahyabhai David Woodhouse 3.6.1p2-23Nalin Dahyabhai Daniel Walsh 3.6.1p2-22Daniel Walsh 3.6.1p2-21.selDaniel Walsh 3.6.1p2-21Daniel Walsh 3.6.1p2-20.selNalin Dahyabhai Nalin Dahyabhai 3.6.1p2-19Nalin Dahyabhai 3.6.1p2-18Daniel Walsh 3.6.1p2-17Daniel Walsh 3.6.1p2-16.selBill Nottingham 3.6.1p2-15Bill Nottingham 3.6.1p2-14Daniel Walsh 3.6.1p2-13.selNalin Dahyabhai 3.6.1p2-12Nalin Dahyabhai 3.6.1p2-11Daniel Walsh 3.6.1p2-10Daniel Walsh 3.6.1p2-9.selDaniel Walsh 3.6.1p2-8Nalin Dahyabhai 3.6.1p2-7Nalin Dahyabhai 3.6.1p2-6Daniel Walsh 3.6.1p2-5Nalin Dahyabhai 3.6.1p2-4Nalin Dahyabhai 3.6.1p2-3Nalin Dahyabhai 3.6.1p2-2Nalin Dahyabhai 3.6.1p2-1Elliot Lee Florian La Roche Nalin Dahyabhai 3.5p1-6Nalin Dahyabhai 3.5p1-5Tim Powers Nalin Dahyabhai 3.5p1-3Nalin Dahyabhai 3.5p1-2Nalin Dahyabhai 3.5p1-1Nalin Dahyabhai 3.4p1-3Than Ngo 3.4p1-2.1Curtis Zinzilieta 3.4p1-2gssNalin Dahyabhai 3.4p1-2Nalin Dahyabhai 3.4p1-1Nalin Dahyabhai 3.3p1-2Nalin Dahyabhai 3.3p1-1Tim Powers Nalin Dahyabhai 3.2.3p1-3Nalin Dahyabhai 3.2.3p1-2Nalin Dahyabhai 3.2.3p1-1Nalin Dahyabhai 3.2.2p1-1Nalin Dahyabhai 3.1p1-4Nalin Dahyabhai 3.1p1-3Nalin Dahyabhai 3.1p1-2gssNalin Dahyabhai 3.1p1-2Nalin Dahyabhai 3.1p1-1Nalin Dahyabhai 3.1p1-0Nalin Dahyabhai SNAP-20020305Nalin Dahyabhai SNAP-20020220Nalin Dahyabhai 3.0.2p1-3Nalin Dahyabhai 3.0.2p1-2Nalin Dahyabhai Nalin Dahyabhai 3.0.2p1-1Nalin Dahyabhai 3.0.1p1-1Nalin Dahyabhai Nalin Dahyabhai 3.0p1-1Nalin Dahyabhai Nalin Dahyabhai 2.9p2-9Bernhard Rosenkraenzer 2.9p2-8Nalin Dahyabhai 2.9p2-7Nalin Dahyabhai 2.9p2-6Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Preston Brown Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Trond Eivind Glomsrxd Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller - Providing a kill switch for scp to deal with CVE-2020-15778 Resolves: RHEL-22870- Fix Terrapin attack Resolves: RHEL-19308- Fix Terrapin attack Resolves: RHEL-19308 - Forbid shell metasymbols in username/hostname Resolves: RHEL-19788- Using DigestSign/DigestVerify functions for better FIPS compatibility Resolves: RHEL-5217- Limit artificial delays in sshd while login using AD user Resolves: RHEL-1684 - Add comment to OpenSSH server config about FIPS-incompatible key Resolves: RHEL-5221 - Avoid killing all processes on system in case of race condition Resolves: RHEL-11548 - Avoid sshd_config 256K limit Resolves: RHEL-5279 - Using DigestSign/DigestVerify functions for better FIPS compatibility Resolves: RHEL-5217 - Fix GSS KEX causing ssh failures when connecting to WinSSHD Resolves: RHEL-5321- rebuilt Related: CVE-2023-38408- Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- Fix parsing of IPv6 IPs in sftp client (#2151334) - Avoid ssh banner one-byte overflow (#2138344) - Avoid crash of sshd when Include folder does not exist (#2133087)- Omit client side from minimize-sha1-use.patch to prevent regression (#2093897)- Fix new issues found by static analyzers- Upstream: add a local implementation of BSD realpath() for sftp-server (#2064249) - Change product name from Fedora to RHEL in openssh-7.8p1-UsePAM-warning.patch (#1953807) - Include caveat for crypto-policy in sshd manpage (#2044354) - Change log level of FIPS specific log message to verbose (#2050511) - Clarify force_file_perms (-m) documentation in sftp-server manpage (#1862504) - Minimize the use of SHA1 as a proof of possession for RSA key (#2093897)- Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)- Add support for "Include" directive in sshd_config file (#1926103)- CVE-2021-41617 upstream fix (#2008885)- sshd -T requires -C when "Match" is used in sshd_config (#1836277)- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252) - Hostbased ssh authentication fails if session ID contains a '/' (#1944125)- ssh doesn't restore the blocking mode on standard output (#1942901)- SFTP sort upon the modification time (#1909988) - ssh-keygen printing fingerprint issue with Windows keys (#1901518) - PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372) - ssh-agent segfaults during ssh-add -s pkcs11 (#1868996) - ssh-copy-id could not resolve ipv6 address ends with colon (#1933517) - sshd provides PAM an incorrect error code (#1879503)- Openssh client window fix (#1913041)- Do not print "no slots" warning by default (#1744220) - Unbreak connecting using gssapi through proxy commands (#1749862) - Document in manual pages that CASignatureAlgorithms are handled by crypto policies (#1790604) - Use SHA2-based signature algorithms by default for signing certificates (#1790610) - Prevent simple ProxyJump loops in configuration files (#1804099) - Teach ssh-keyscan to use SHA2 RSA variants (#1744108) - Do not fail hard if getrandom() is not available and no SSH_USE_STRONG_RNG is specified (#1812120) - Improve wording of crypto policies references in manual pages (#1812854) - Do not break X11 forwarding if IPv6 is disabled (#1662189) - Enable SHA2-based GSSAPI key exchange algorithms by default (#1816226) - Mark RDomain server configuration option unsupported in RHEL (#1807686) - Clarify crypto policies defaults in manual pages (#1724195) - Mention RSA SHA2 variants in ssh-keygen manual page (#1665900)- Restore entropy patch for CC certification (#1785655)- Fix typos in manual pages (#1668325) - Use the upstream support for PKCS#8 PEM files alongside with the legacy PEM files (#1712436) - Unbreak ssh-keygen -A in FIPS mode (#1732424) - Add missing RSA certificate types to offered hostkey types in FIPS mode (#1732449)- Allow specifying a pin-value in PKCS #11 URI in ssh-add (#1639698) - Whitelist another syscall variant for s390x cryptographic module (ibmca engine) (#1714915)- New upstream release (#1691045) - Remove support for unused VendorPatchLevel configuration option - Fix kerberos cleanup procedures (#1683295) - Do not negotiate arbitrary primes with DH GEX in FIPS (#1685096) - Several GSSAPI key exchange improvements and sync with Debian - Allow to use labels in PKCS#11 URIs even if they do not match on private key (#1671262) - Do not fall back to sshd_net_t SELinux context (#1678695) - Use FIPS compliant high-level signature OpenSSL API and KDF - Mention crypto-policies in manual pages - Do not fail if non-FIPS approved algorithm is enabled in FIPS - Generate the PEM files in new PKCS#8 format without the need of MD5 (#1712436)- Unbreak PKCS#11 URI tests (#1648262) - Allow to disable RSA signatures with SHA1 (#1648898) - Dump missing GSS options from client configuration (#1649505) - Minor fixes from Fedora related to GSSAPI and keberos - Follow the system-wide PATH settings- Disable OpenSSH hardening flags and use the ones provided by system (#1630615) - Ignore unknown parts of PKCS#11 URI (#1631478) - Do not fail with GSSAPI enabled in match blocks (#1580017) - Fix the segfaulting cavs test (#1629692)- New upstream release fixing CVE 2018-15473 - Remove unused patches - Remove reference to unused enviornment variable SSH_USE_STRONG_RNG - Address coverity issues - Unbreak scp between two IPv6 hosts (#1620333) - Unbreak GSSAPI key exchange (#1624323) - Unbreak rekeying with GSSAPI key exchange (#1624344)- Fix listing of kex algoritms in FIPS mode - Allow aes-gcm cipher modes in FIPS mode - Coverity fixes- Disable manual printing of motd by default (#1591381)- Better handling of kerberos tickets storage (#1566494) - Add pam_motd to pam stack (#1591381)- Fix tun devices and other issues fixed after release upstream (#1567775)- Do not break quotes parsing in configuration file (#1566295)- New upstream release (#1563223) - Add support for ECDSA keys in PKCS#11 (#1354510) - Add support for PKCS#11 URIs- Require crypto-policies version and new path - Remove bogus NSS linking- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- Rebuild for gcc bug on i386 (#1536555)- Rebuild to work around gcc bug leading to sshd miscompilation (#1538648)- Rebuilt for switch to libxcrypt- Drop support for TCP wrappers (#1530163) - Do not pass hostnames to audit -- UseDNS is usually disabled (#1534577)- Whitelist gettid() syscall in seccomp filter (#1524392)- Do not segfault during audit cleanup (#1524233) - Avoid gcc warnings about uninitialized variables- Do not build everything against libldap - Do not segfault for ECC keys in PKCS#11- New upstream release OpenSSH 7.6 - Addressing review remarks for OpenSSL 1.1.0 patch - Fix PermitOpen bug in OpenSSH 7.6 - Drop support for ExposeAuthenticationMethods option- Do not export KRB5CCNAME if the default path is used (#1199363) - Add enablement for openssl-ibmca and openssl-ibmpkcs11 (#1477636) - Add new GSSAPI kex algorithms with SHA-2, but leave them disabled for now - Enforce pam_sepermit for all logins in SSH (#1492313) - Remove pam_reauthorize, since it is not needed by cockpit anymore (#1492313)- Another less-intrusive approach to crypto policy (#1479271)- Remove SSH-1 subpackage for Fedora 27 (#1474942) - Follow system-wide crypto policy in server (#1479271)- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Sync downstream patches with RHEL (FIPS) - Resolve potential issues with OpenSSL 1.1.0 patch- Fix various after-release typos including failed build in s390x (#1434341) - Revert chroot magic with SELinux- New upstream release- Avoid sending the SD_NOTIFY messages from wrong processes (#1427526) - Address reports by coverity- Properly report errors from included files (#1408558) - New pam_ssh_agent_auth 0.10.3 release - Switch to SD_NOTIFY to make systemd happy- Fix ssh-agent cert signing error (#1416584) - Fix wrong path to crypto policies - Attempt to resolve issue with systemd- New upstream release (#1406204) - Cache supported OIDs for GSSAPI key exchange (#1395288) - Fix typo causing heap corruption (use-after-free) (#1409433) - Prevent hangs with long MOTD- Properly deserialize received RSA certificates in ssh-agent (#1402029) - Move MAX_DISPLAYS to a configuration option- GSSAPI requires futex syscall in privsep child (#1395288)- Build against OpenSSL 1.1.0 with compat changes - Recommend crypto-policies - Fix chroot dropping capabilities (#1386755)- Fix NULL dereference (#1380297) - Include client Crypto Policy (#1225752)- Proper content of included configuration file- Fix permissions on the include directory (#1365270)- New upstream release (#1362156)- Remove slogin and sshd-keygen (#1359762) - Prevent guest_t from running sudo (#1357860)- CVE-2016-6210: User enumeration via covert timing channel (#1357443) - Expose more information about authentication to PAM - Make closefrom() ignore softlinks to the /dev/ devices on s390- Fix wrong detection of UseLogin in server configuration (#1350347)- Enable seccomp filter for MIPS architectures - UseLogin=yes is not supported in Fedora - SFTP server forced permissions should restore umask - pam_ssh_agent_auth: Fix conflict bewteen two getpwuid() calls (#1349551)- Fix regression in certificate-based authentication (#1333498) - Check for real location of .k5login file (#1328243) - Fix unchecked dereference in pam_ssh_agent_auth - Clean up old patches - Build with seccomp filter on ppc64(le) (#1195065)- Add legacy sshd-keygen for anaconda (#1331077)- CVE-2015-8325: ignore PAM environment vars when UseLogin=yes (#1328013) - Fix typo in sysconfig/sshd (#1325535)- Revise socket activation and services dependencies (#1325535) - Drop unused init script- Make sshd-keygen comply with packaging guidelines (#1325535) - Soft-deny socket() syscall in seccomp sandbox (#1324493) - Remove *sha1 Kex in FIPS mode (#1324493) - Remove *gcm ciphers in FIPS mode (#1324493)- Fix GSSAPI Key Exchange according to RFC (#1323622) - Remove init.d/functions dependency from sshd-keygen (#1317722) - Do not use MD5 in pam_ssh_agent_auth in FIPS mode- New upstream (security) release (#1316529) - Clean up audit patch- Restore slogin symlinks to preserve backward compatibility- New upstream release (#1312870)- Fix race condition in auditing events when using multiplexing (#1308295) - Fix X11 forwarding CVE according to upstream - Fix problem when running without privsep (#1303910) - Remove hard glob limit in SFTP- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild- Fix segfaults with pam_ssh_agent_auth (#1303036) - Silently disable X11 forwarding on problems - Systemd service should be forking to detect immediate failures- Rebased to recent version of pam_ssh_agent_auth - Upstream fix for CVE-2016-1908 - Remove useless defattr- New security upstream release for CVE-2016-0777- Change RPM define macros to global according to packaging guidelines - Fix wrong handling of SSH_COPY_ID_LEGACY environment variable - Update ssh-agent and ssh-keysign permissions (#1296724) - Fix few problems with alternative builds without GSSAPI or openSSL - Fix condition to run sshd-keygen- Preserve IUTF8 tty mode flag over ssh connections (#1270248) - Do not require sysconfig file to start service (#1279521) - Update ssh-copy-id to upstream version - GSSAPI Key Exchange documentation improvements - Remove unused patches- Do not set user context too many times for root logins (#1269072)- Review SELinux user context handling after authentication (#1269072) - Handle root logins the same way as other users (#1269072) - Audit implicit mac, if mac is covered in cipher (#1271694) - Increase size limit for remote glob over sftp- Fix FIPS mode for DH kex (#1260253) - Provide full RELRO and PIE form askpass helper (#1264036) - Fix gssapi key exchange on server and client (#1261414) - Allow gss-keyex root login when without-password is set (upstream #2456) - Fix obsolete usage of SELinux constants (#1261496)- Fix warnings reported by gcc related to keysign and keyAlgorithms- New upstream release- Fix problem with DSA keys using pam_ssh_agent_auth (#1251777) - Add GSSAPIKexAlgorithms option for server and client application - Possibility to validate legacy systems by more fingerprints (#1249626)- New upstream release (#1252639) - Fix pam_ssh_agent_auth package (#1251777) - Security: Use-after-free bug related to PAM support (#1252853) - Security: Privilege separation weakness related to PAM support (#1252854) - Security: Incorrectly set TTYs to be world-writable (#1252862)- Handle terminal control characters in scp progressmeter (#1247204)- CVE-2015-5600: only query each keyboard-interactive device once (#1245971)- Enable SECCOMP filter for s390* architecture (#1195065) - Fix race condition when multiplexing connection (#1242682)- New upstream release (#1238253) - Increase limitation number of files which can be listed using glob in sftp - Correctly revert "PermitRootLogin no" option from upstream sources (#89216)- Allow socketcall(SYS_SHUTDOWN) for net_child on ix86 architecture- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- Return stat syscall to seccomp filter (#1228323)- Handle pam_ssh_agent_auth memory, buffers and variable sizes (#1225106)- Resolve problem with pam_ssh_agent_auth after rebase (#1225106) - ssh-copy-id: tcsh doesnt work with multiline strings - Fix upstream memory problems - Add missing options in testmode output and manual pages - Provide LDIF version of LPK schema - Document required selinux boolean for working ssh-ldap-helper- Fix segfault on daemon exit caused by API change (#1213423)- Fix audit_end_command to restore ControlPersist function (#1203900)- Fixed issue with GSSAPI key exchange (#1207719) - Add pam_namespace to sshd pam stack (based on #1125110) - Remove krb5-config workaround for #1203900 - Fix handling SELinux context in MLS systems - Regression: solve sshd segfaults if other instance already running- Update audit and gss patches after rebase - Fix reintroduced upstrem bug #1878- new upstream release openssh-6.8p1 (#1203245) - Resolve segfault with auditing commands (#1203900) - Workaround krb5-config bug (#1204646)- Ability to specify LDAP filter in ldap.conf for ssh-ldap-helper - Fix auditing when using combination of ForceCommand and PTY - Add sftp option to force mode of created files (from rhel) - Fix tmpfiles.d entries to be more consistent (#1196807)- Add tmpfiles.d entries (#1196807)- Adjust seccomp filter for primary architectures and solve aarch64 issue (#1197051) - Solve issue with ssh-copy-id and keys without trailing newline (#1093168)- Add AArch64 support for seccomp_filter sandbox (#1195065)- Fix seccomp filter on architectures without getuid32- Update seccomp filter to work on i686 architectures (#1194401) - Fix previous failing build (#1195065)- Only use seccomp for sandboxing on supported platforms- Move cavs tests into subpackage -cavs (#1194320)- update coverity patch - make output of sshd -T more consistent (#1187521) - enable seccomp for sandboxing instead of rlimit (#1062953) - update hardening to compile on gcc5 - Add SSH KDF CAVS test driver (#1193045) - Fix ssh-copy-id on non-sh remote shells (#1045191)- fixed audit patch after rebase- new upstream release openssh-6.7p1- error message if scp when directory doesn't exist (#1142223) - parsing configuration file values (#1130733) - documentation in service and socket files for systemd (#1181593) - updated ldap patch (#981058) - fixed vendor-patchlevel - add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1170745)- log via monitor in chroots without /dev/log- the .local domain example should be in ssh_config, not in sshd_config - use different values for DH for Cisco servers (#1026430)- fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005)- correct the calculation of bytes for authctxt->krb5_ccname (#1161073)- privsep_preauth: use SELinux context from selinux-policy (#1008580) - change audit trail for unknown users (mindrot#2245) - fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly - revert the default of KerberosUseKuserok back to yes (#1153076) - ignore SIGXFSZ in postauth monitor (mindrot#2263) - sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode- set a client's address right after a connection is set (mindrot#2257) - apply RFC3454 stringprep to banners when possible (mindrot#2058) - don't consider a partial success as a failure (mindrot#2270)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- fix license handling (both)- standardise on NI_MAXHOST for gethostname() string lengths (#1051490)- add pam_reauthorize.so to sshd.pam (#1115977) - spec file and patches clenup- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- disable the curve25519 KEX when speaking to OpenSSH 6.5 or 6.6 - add support for ED25519 keys to sshd-keygen and sshd.sysconfig - drop openssh-server-sysvinit subpackage - slightly change systemd units logic - use sshd-keygen.service (#1066615)- new upstream release openssh-6.6p1- use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode - make /etc/ssh/moduli file public (#1043661) - test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service - don't clean up gssapi credentials by default (#1055016) - ssh-agent - try CLOCK_BOOTTIME with fallback (#1091992) - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338) - ignore environment variables with embedded '=' or '\0' characters - CVE-2014-2532 (#1077843)- sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default- fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662)- new upstream release- adjust gss kex mechanism to the upstream changes (#1024004) - don't use xfree in pam_ssh_agent_auth sources (#1024965)- rebuild with the openssl with the ECC support- don't use SSH_FP_MD5 for fingerprints in FIPS mode- use default_ccache_name from /etc/krb5.conf for a kerberos cache (#991186) - increase the size of the Diffie-Hellman groups (#1010607) - sshd-keygen to generate ECDSA keys (#1019222)- new upstream release (#1007769)- use dracut-fips package to determine if a FIPS module is installed - revert -fips subpackages and hmac files suffixes- sshd-keygen: generate only RSA keys by default (#1010092) - use dist tag in suffixes for hmac checksum files- use hmac_suffix for ssh{,d} hmac checksums - bump the minimum value of SSH_USE_STRONG_RNG to 14 according to SP800-131A - automatically restart sshd.service on-failure after 42s interval- add -fips subpackages that contains the FIPS module files- gssapi credentials need to be stored before a pam session opened (#987792)- don't show Success for EAI_SYSTEM (#985964) - make sftp's libedit interface marginally multibyte aware (#841771)- move default gssapi cache to /run/user/ (#848228)- add socket activated sshd units to the package (#963268) - fix the example in the HOWTO.ldap-keys- new upstream release (#963582)- don't use export in sysconfig file (#953111)- sshd.service: use KillMode=process (#890376) - add latest config.{sub,guess} to support aarch64 (#926284)- keep track of which IndentityFile options were manually supplied and which were default options, and don't warn if the latter are missing. (mindrot#2084)- new upstream release (#924727)- use SELinux type sshd_net_t for [net] childs (#915085)- fix AuthorizedKeysCommand option- change default value of MaxStartups - CVE-2010-5107 (#908707)- fix segfault in openssh-5.8p2-force_krb.patch (#882541)- replace RequiredAuthentications2 with AuthenticationMethods based on upstream - obsolete RequiredAuthentications[12] options - fix openssh-6.1p1-privsep-selinux.patch- add SELinux comment to /etc/ssh/sshd_config about SELinux command to modify port (#861400) - drop required chkconfig (#865498) - drop openssh-5.9p1-sftp-chroot.patch (#830237)- new upstream release (#852651) - use DIR: kerberos type cache (#848228) - don't use chroot_user_t for chrooted users (#830237) - replace scriptlets with systemd macros (#850249) - don't use /bin and /sbin paths (#856590)- new upstream release- change SELinux context also for root user (#827109)- fix various issues in openssh-5.9p1-required-authentications.patch- allow sha256 and sha512 hmacs in the FIPS mode- fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent is not running, most probably not exploitable - update pam_ssh_agent_auth to 0.9.3 upstream version- don't create RSA1 key in FIPS mode - don't install sshd-keygen.service (#810419)- fix various issues in openssh-5.9p1-required-authentications.patch- Fix dependencies in systemd units, don't enable sshd-keygen.service (#805338)- Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)- replace TwoFactorAuth with RequiredAuthentications[12] https://bugzilla.mindrot.org/show_bug.cgi?id=983- run privsep slave process as the users SELinux context (#781634)- add CAVS test driver for the aes-ctr ciphers- enable aes-ctr ciphers use the EVP engines from OpenSSL such as the AES-NI- warn about unsupported option UsePAM=no (#757545)- add back the restorecon call to ssh-copy-id - it might be needed on older distributions (#739989)- still support /etc/sysconfig/sshd loading in sshd service (#754732) - fix incorrect key permissions generated by sshd-keygen script (#754779)- remove unnecessary requires on initscripts - set VerifyHostKeyDNS to ask in the default configuration (#739856)- selinux sandbox rewrite - two factor authentication tweaking- coverity upgrade - wipe off nonfunctional nss - selinux sandbox tweaking- coverity upgrade - experimental selinux sandbox- fully reanable auditing- repair signedness in akc patch- temporarily disable part of audit4 patch- Coverity second pass - Reenable akc patch- Coverity first pass- Rebase to 5.9p1 - Add chroot sftp patch - Add two factor auth patch- ignore SIGPIPE in ssh keyscan- save ssh-askpass's debuginfo- compile ssh-askpass with corect CFLAGS- improve selinux's change context log- repair broken man pages- rebuild due to broken rpmbiild- Do not change context when run under unconfined_t- Add postlogin to pam. (#718807)- Systemd compatibility according to Mathieu Bridon - Split out the host keygen into their own command, to ease future migration to systemd. Compatitbility with the init script was kept. - Migrate the package to full native systemd unit files, according to the Fedora packaging guidelines. - Prepate the unit files for running an ondemand server. (do not add it actually)- Mention IPv6 usage in man pages- Improve init script- Add possibility to compile openssh without downstream patches- remove stale control sockets (#706396)- improove entropy manuals- improove entropy handling - concat ldap patches- improove ldap manuals- add gssapi forced command- update the openssh version- temporarily disabling systemd units- add flags AI_V4MAPPED and AI_ADDRCONFIG to getaddrinfo- update scriptlets- add systemd units- improving sshd -> passwd transation - add template for .local domain to sshd_config- the private keys may be 640 root:ssh_keys ssh_keysign is sgid- improving sshd -> passwd transation- the intermediate context is set to sshd_sftpd_t - do not crash in packet.c if no connection- resolve warnings in port_linux.c- add /etc/sysconfig/sshd- improve reseeding and seed source (documentation)- use /dev/random or /dev/urandom for seeding prng - improve periodical reseeding of random generator- add periodical reseeding of random generator - change selinux contex for internal sftp in do_usercontext - exit(0) after sigterm- improove ssh-ldap (documentation)- improve session keys audit- CVE-2010-4755- improove ssh-keycat (documentation)- improve audit of logins and auths- improove ssk-keycat- add ssk-keycat- reenable auth-keys ldap backend- another audit improovements- another audit improovements - switchable fingerprint mode- improve audit of server key management- improve audit of logins and auths- bump openssh version to 5.8p1- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- clean the data structures in the non privileged process - clean the data structures when roaming- clean the data structures in the privileged process- clean the data structures before exit net process- make audit compatible with the fips mode- add audit of destruction the server keys- add audit of destruction the session keys- reenable run sshd as non root user - renable rekeying- reapair clientloop crash (#627332) - properly restore euid in case connect to the ssh-agent socket fails- striped read permissions from suid and sgid binaries- used upstream version of the biguid patch- improoved kuserok patch- add auditing the host based key ussage - repait X11 abstract layer socket (#648896)- add auditing the kex result- add auditing the key ussage- update gsskex patch (#645389)- rebase linux audit according to upstream- add missing headers to linux audit- audit module now uses openssh audit framevork- Add the GSSAPI kuserok switch to the kuserok patch- Repaired the kuserok patch- Repaired the problem with puting entries with very big uid into lastlog- Merging selabel patch with the upstream version. (#632914)- Tweaking selabel patch to work properly without selinux rules loaded. (#632914)- Make fipscheck hmacs compliant with FHS - requires new fipscheck- Added -z relro -z now to LDFLAGS- Rebased to openssh5.6p1- merged with newer bugzilla's version of authorized keys command patch- improved the x11 patch according to upstream (#598671)- improved the x11 patch (#598671)- changed _PATH_UNIX_X to unexistent file name (#598671)- sftp works in deviceless chroot again (broken from 5.5p1-3)- add option to switch out krb5_kuserok- synchronize uid and gid for the user sshd- Typo in ssh-ldap.conf(5) and ssh-ladap-helper(8)- Repair the reference in man ssh-ldap-helper(8) - Repair the PubkeyAgent section in sshd_config(5) - Provide example ldap.conf- Make the Ldap configuration widely compatible - create the aditional docs for LDAP support.- Make LDAP config elements TLS_CACERT and TLS_REQCERT compatiple with pam_ldap (#589360)- Make LDAP config element tls_checkpeer compatiple with nss_ldap (#589360)- Comment spec.file - Sync patches from upstream- Create separate ldap package - Tweak the ldap patch - Rename stderr patch properly- Added LDAP support- Ignore .bashrc output to stderr in the subsystems- Drop dependency on man- Update to 5.5p1- repair configure script of pam_ssh_agent - repair error mesage in ssh-keygen- source krb5-devel profile script only if exists- Update to 5.4p1 - discontinued support for nss-keys - discontinued support for scard- Prepare update to 5.4p1- ImplicitDSOLinking (#564824)- Allow to use hardware crypto if awailable (#559555)- optimized FD_CLOEXEC on accept socket (#541809)- updated pam_ssh_agent_auth to new version from upstream (just a licence change)- optimized RAND_cleanup patch (#557166)- add RAND_cleanup at the exit of each program using RAND (#557166)- set FD_CLOEXEC on accepted socket (#541809)- replaced define by global in macros- Update the pka patch- Update the audit patch- Add possibility to autocreate only RSA key into initscript (#533339)- Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411)- Update NSS key patch (#537411, #356451)- Add gssapi key exchange patch (#455351)- Add public key agent patch (#455350)- Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849)- Modify the init script to prevent it to hang during generating the keys (#515145)- Add README.nss- Add pam_ssh_agent_auth module to a subpackage.- Reenable audit.- Upgrade to new wersion 5.3p1- Resolve locking in ssh-add (#491312)- Repair initscript to be acord to guidelines (#521860) - Add bugzilla# to application of edns and xmodifiers patch- Changed pam stack to password-auth- Dropped homechroot patch- Add check for nosuid, nodev in homechroot- add correct patch for ip-opts- replace ip-opts patch by an upstream candidate version- rearange selinux patch to be acceptable for upstream - replace seftp patch by an upstream version- merged xmodifiers to redhat patch - merged gssapi-role to selinux patch - merged cve-2007_3102 to audit patch - sesftp patch only with WITH_SELINUX flag - rearange sesftp patch according to upstream request- minor change in sesftp patch- rebuilt with new openssl- Added dnssec support. (#205842)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- only INTERNAL_SFTP can be home-chrooted - save _u and _r parts of context changing to sftpd_t- changed internal-sftp context to sftpd_t- changed home length path patch to upstream version- create '~/.ssh/known_hosts' within proper context- length of home path in ssh now limited by PATH_MAX - correct timezone with daylight processing- final version chroot %h (sftp only)- repair broken ls in chroot %h- add XMODIFIERS to exported environment (#495690)- allow only protocol 2 in the FIPS mode- do integrity verification only on binaries which are part of the OpenSSH FIPS modules- log if FIPS mode is initialized - make aes-ctr cipher modes work in the FIPS mode- fix logging after chroot - enable non root users to use chroot %h in internal-sftp- add AES-CTR ciphers to the FIPS mode proposal- upgrade to new upstream release- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- drop obsolete triggers - add testing FIPS mode support - LSBize the initscript (#247014)- enable use of ssl engines (#481100)- remove obsolete --with-rsh (#478298) - add pam_sepermit to allow blocking confined users in permissive mode (#471746) - move system-auth after pam_selinux in the session stack- set FD_CLOEXEC on channel sockets (#475866) - adjust summary - adjust nss-keys patch so it is applicable without selinux patches (#470859)- fix compatibility with some servers (#466818)- fixed zero length banner problem (#457326)- upgrade to new upstream release - fixed a problem with public key authentication and explicitely specified SELinux role- pass the connection socket to ssh-keysign (#447680)- add LANGUAGE to accepted/sent environment variables (#443231) - use pam_selinux to obtain the user context instead of doing it itself - unbreak server keep alive settings (patch from upstream) - small addition to scp manpage- upgrade to new upstream (#441066) - prevent initscript from killing itself on halt with upstart (#438449) - initscript status should show that the daemon is running only when the main daemon is still alive (#430882)- fix race on control master and cleanup stale control socket (#436311) patches by David Woodhouse- set FD_CLOEXEC on client socket - apply real fix for window size problem (#286181) from upstream - apply fix for the spurious failed bind from upstream - apply open handle leak in sftp fix from upstream- we build for sparcv9 now and it needs -fPIE- fix gssapi auth with explicit selinux role requested (#427303) - patch by Nalin Dahyabhai- explicitly source krb5-devel profile script- Rebuild for openssl bump- do not copy /etc/localtime into the chroot as it is not necessary anymore (#193184) - call setkeycreatecon when selinux context is established - test for NULL privk when freeing key (#391871) - patch by Pierre Ossman- revert default window size adjustments (#286181)- upgrade to latest upstream - use libedit in sftp (#203009) - fixed audit log injection problem (CVE-2007-3102)- fix sftp client problems on write error (#247802) - allow disabling autocreation of server keys (#235466)- experimental NSS keys support - correctly setup context when empty level requested (#234951)- mls level check must be done with default role same as requested- make profile.d/gnome-ssh-askpass.* regular files (#226218)- reject connection if requested mls range is not obtained (#229278)- improve Buildroot - remove duplicate /etc/ssh from files- support mls on labeled networks (#220487) - support mls level selection on unlabeled networks - allow / in usernames in scp (only beginning /, ./, and ../ is special)- update to 4.5p1 (#212606)- fix gssapi with DNS loadbalanced clusters (#216857)- improved pam_session patch so it doesn't regress, the patch is necessary for the pam_session_close to be called correctly as uid 0- CVE-2006-5794 - properly detect failed key verify in monitor (#214641)- merge sshd initscript patches - kill all ssh sessions when stop is called in halt or reboot runlevel - remove -TERM option from killproc so we don't race on sshd restart- improve gssapi-no-spnego patch (#208102) - CVE-2006-4924 - prevent DoS on deattack detector (#207957) - CVE-2006-5051 - don't call cleanups from signal handler (#208459)- don't report duplicate syslog messages, use correct local time (#189158) - don't allow spnego as gssapi mechanism (from upstream) - fixed memleaks found by Coverity (from upstream) - allow ip options except source routing (#202856) (patch by HP)- drop the pam-session patch from the previous build (#201341) - don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594)- dropped old ssh obsoletes - call the pam_session_open/close from the monitor when privsep is enabled so it is always called as root (patch by Darren Tucker)- improve selinux patch (by Jan Kiszka) - upstream patch for buffer append space error (#191940) - fixed typo in configure.ac (#198986) - added pam_keyinit to pam configuration (#198628) - improved error message when askpass dialog cannot grab keyboard input (#198332) - buildrequires xauth instead of xorg-x11-xauth - fixed a few rpmlint warnings- rebuild- don't request pseudoterminal allocation if stdin is not tty (#188983)- allow access if audit is not compiled in kernel (#183243)- enable the subprocess in chroot to send messages to system log - sshd should prevent login if audit call fails- print error from scp if not remote (patch by Bjorn Augustsson #178923)- new version- bump again for double-long bug on ppc(64)- fixed another place where syslog was called in signal handler - pass locale environment variables to server, accept them there (#179851)- new version, dropped obsolete patches- hopefully make the askpass dialog less confusing (#174765)- rebuilt- drop x11-ssh-askpass from the package - drop old build_6x ifs from spec file - improve gnome-ssh-askpass so it doesn't reveal number of passphrase characters to person looking at the display - less hackish fix for the __USE_GNU problem- work around missing gccmakedep by wrapping makedepend in a local script - remove now-obsolete build dependency on "xauth"- xorg-x11-devel -> libXt-devel - rebuild for new xauth location so X forwarding works - buildreq audit-libs-devel - buildreq automake for aclocal - buildreq imake for xmkmf - -D_GNU_SOURCE in flags in order to get it to build Ugly hack to workaround openssh defining __USE_GNU which is not allowed and causes problems according to Ulrich Drepper fix this the correct way after FC5test1- rebuild against new openssl- put back the possibility to skip SELinux patch - add patch for user login auditing by Steve Grubb- Change selinux patch to use get_default_context_with_rolelevel in libselinux.- Update selinux patch to use getseuserbyname- use include instead of pam_stack in pam config - use fork+exec instead of system in scp - CVE-2006-0225 (#168167) - upstream patch for displaying authentication errors- upgrade to a new upstream version- use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207) - install ssh-copy-id from contrib (#88707)- don't deadlock on exit with multiple X forwarded channels (#152432) - don't use X11 port which can't be bound on all IP families (#163732)- fix small regression caused by the nologin patch (#161956) - fix race in getpeername error checking (mindrot #1054)- use only pam_nologin for nologin testing- upgrade to a new upstream version - call pam_loginuid as a pam session module- link libselinux only to sshd (#157678)- fixed Local/RemoteForward in ssh_config.5 manpage - fix fatal when Local/RemoteForward is used and scp run (#153258) - don't leak user validity when using krb5 authentication- upgrade to 4.0p1 - remove obsolete groups patch- rebuilt- rebuild so that configure can detect that krb5_init_ets is gone now- don't call syslog in signal handler - allow password authentication when copying from remote to remote machine (#103364)- add spaces to messages in initscript (#138508)- enable trusted forwarding by default if X11 forwarding is required by user (#137685 and duplicates) - disable protocol 1 support by default in sshd server config (#88329) - keep the gnome-askpass dialog above others (#69131)- change permissions on pam.d/sshd to 0644 (#64697) - patch initscript so it doesn't kill opened sessions if the sshd daemon isn't running anymore (#67624)- don't use initlog- fixed PIE build for all architectures- add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option to enable display of a vendor patch level during version exchange (#120285) - configure with --disable-strip to build useful debuginfo subpackages- when using gtk2 for askpass, don't buildprereq gnome-libs-devel- build- disable ACSS support- Change selinux patch to use get_default_context_with_role in libselinux.- Fix patch * Bad debug statement. * Handle root/sysadm_r:kerberos- Modify Colin Walter's patch to allow specifying rule during connection- Fix TTY handling for SELinux- Update to upstream- Apply buildreq fixup patch (#125296)- Clean up patch for upstream submission.- rebuilt- Remove use of pam_selinux and patch selinux in directly.- request gssapi-with-mic by default but not delegation (flag day for anyone who used previous gssapi patches) - no longer request x11 forwarding by default- Change pam file to use open and close with pam_selinux- update to 3.8.1p1 - add workaround from CVS to reintroduce passwordauth using pam- Remove CLOSEXEC on STDERR* Wed Mar 03 2004 Phil Knirsch 3.6.1p2-33.30.1 - Built RHLE3 U2 update package.- Close file descriptors on exec- fixed pie build- Add restorecon to startup scripts- Add multiple qualified to openssh- Eliminate selinux code and use pam_selinux- rebuilt- turn off pie on ppc- fix is_selinux_enabled- Rebuild to grab shared libselinux- turn on selinux- un#ifdef out code for reporting password expiration in non-privsep mode (#83585)- add machinery to build with/without -fpie/-pie, default to doing so- Don't whinge about getsockopt failing (#109161)- add missing buildprereq on zlib-devel (#104558)- turn selinux off- turn selinux on- turn selinux off- turn selinux on- additional fix for apparently-never-happens double-free in buffer_free() - extend fix for #103998 to cover SSH1- rebuild- additional buffer manipulation cleanups from Solar Designer- turn selinux off- turn selinux on- rebuild- additional buffer manipulation fixes (CAN-2003-0695)- turn selinux on- rebuild- apply patch to store the correct buffer size in allocated buffers (CAN-2003-0693) - skip the initial PAM authentication attempt with an empty password if empty passwords are not permitted in our configuration (#103998)- turn selinux off- turn selinux on- Add BuildPreReq gtk2-devel if gtk2- rebuild- modify patch which clears the supplemental group list at startup to only complain if setgroups() fails if sshd has euid == 0 - handle krb5 installed in %{_prefix} or elsewhere by using krb5-config- Add SELinux patch- rebuild- rebuild- rebuild- update to 3.6.1p26 rebuilt- add patch for getsockopt() call to work on bigendian 64bit archs- move scp to the -clients subpackage, because it directly depends on ssh which is also in -clients (#84329)- rebuild- rebuilt- rebuild- patch PAM configuration to use relative path names for the modules, allowing us to not worry about which arch the modules are built for on multilib systems- update to 3.5p1, merging in filelist/perm changes from the upstream spec- merge- fix to build on multilib systems- added gssapi patches and uncommented patch here- pull patch from CVS to fix too-early free in ssh-keysign (#70009)- 3.4p1 - drop anon mmap patch- rework the close-on-exit docs - include configuration file man pages - make use of nologin as the privsep shell optional- update to 3.3p1 - merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign) - disable gtk2 askpass - require pam-devel by filename rather than by package for erratum - include patch from Solar Designer to work around anonymous mmap failures- automated rebuild- don't require autoconf any more- build gnome-ssh-askpass with gtk2- update to 3.2.3p1 - merge in spec file changes from upstream- update to 3.2.2p1- drop buildreq on db1-devel - require pam-devel by package name - require autoconf instead of autoconf253 again- pull patch from CVS to avoid printing error messages when some of the default keys aren't available when running ssh-add - refresh to current revisions of Simon's patches- reintroduce Simon's gssapi patches - add buildprereq for autoconf253, which is needed to regenerate configure after applying the gssapi patches - refresh to the latest version of Markus's patch to build properly with older versions of OpenSSL- bump and grind (through the build system)- require sharutils for building (mindrot #137) - require db1-devel only when building for 6.x (#55105), which probably won't work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck - require pam-devel by file (not by package name) again - add Markus's patch to compile with OpenSSL 0.9.5a (from http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're building for 6.x- update to 3.1p1- update to SNAP-20020305 - drop debug patch, fixed upstream- update to SNAP-20020220 for testing purposes (you've been warned, if there's anything to be warned about, gss patches won't apply, I don't mind)- add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key exchange, authentication, and named key support- remove dependency on db1-devel, which has just been swallowed up whole by gnome-libs-devel- adjust build dependencies so that build6x actually works right (fix from Hugo van der Kooij)- update to 3.0.2p1- update to 3.0.1p1- update to current CVS (not for use in distribution)- merge some of Damien Miller changes from the upstream 3.0p1 spec file and init script- update to 3.0p1 - update to x11-ssh-askpass 1.2.4.1 - change build dependency on a file from pam-devel to the pam-devel package - replace primes with moduli- incorporate fix from Markus Friedl's advisory for IP-based authorization bugs- Merge changes to rescue build from current sysadmin survival cd- fix scp's server's reporting of file sizes, and build with the proper preprocessor define to get large-file capable open(), stat(), etc. (sftp has been doing this correctly all along) (#51827) - configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247) - pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298) - mark profile.d scriptlets as config files (#42337) - refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug - change a couple of log() statements to debug() statements (#50751) - pull cvs patch to add -t flag to sshd (#28611) - clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221)- add db1-devel as a BuildPrerequisite (noted by Hans Ecke)- pull cvs patch to fix remote port forwarding with protocol 2- pull cvs patch to add session initialization to no-pty sessions - pull cvs patch to not cut off challengeresponse auth needlessly - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed (#49263)- don't apply patches to code we don't intend to build (spotted by Matt Galgoci)- pass OPTIONS correctly to initlog (#50151)- switch to x11-ssh-askpass 1.2.2- rebuild in new environment- disable the gssapi patch- update to 2.9p2 - refresh to a new version of the gssapi patch- change Copyright: BSD to License: BSD - add Markus Friedl's unverified patch for the cookie file deletion problem so that we can verify it - drop patch to check if xauth is present (was folded into cookie patch) - don't apply gssapi patches for the errata candidate - clear supplemental groups list at startup- fix an error parsing the new default sshd_config - add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not dealing with comments right- add in Simon Wilkinson's GSSAPI patch to give it some testing in-house, to be removed before the next beta cycle because it's a big departure from the upstream version- finish marking strings in the init script for translation - modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd at startup (change merged from openssh.com init script, originally by Pekka Savola) - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed- update to 2.9 - drop various patches that came from or went upstream or to or from CVS- only require initscripts 5.00 on 6.2 (reported by Peter Bieringer)- remove explicit openssl requirement, fixes builddistro issue - make initscript stop() function wait until sshd really dead to avoid races in condrestart- mention that challengereponse supports PAM, so disabling password doesn't limit users to pubkey and rsa auth (#34378) - bypass the daemon() function in the init script and call initlog directly, because daemon() won't start a daemon it detects is already running (like open connections) - require the version of openssl we had when we were built- make do_pam_setcred() smart enough to know when to establish creds and when to reinitialize them - add in a couple of other fixes from Damien for inclusion in the errata- update to 2.5.2p2 - call setcred() again after initgroups, because the "creds" could actually be group memberships- update to 2.5.2p1 (includes endianness fixes in the rijndael implementation) - don't enable challenge-response by default until we find a way to not have too many userauth requests (we may make up to six pubkey and up to three password attempts as it is) - remove build dependency on rsh to match openssh.com's packages more closely- remove dependency on openssl -- would need to be too precise- rebuild in new environment- Revert the patch to move pam_open_session. - Init script and spec file changes from Pekka Savola. (#28750) - Patch sftp to recognize '-o protocol' arguments. (#29540)- Chuck the closing patch. - Add a trigger to add host keys for protocol 2 to the config file, now that configuration file syntax requires us to specify it with HostKey if we specify any other HostKey values, which we do.- Redo patch to move pam_open_session after the server setuid()s to the user. - Rework the nopam patch to use be picked up by autoconf.- Update for 2.5.1p1. - Add init script mods from Pekka Savola. - Tweak the init script to match the CVS contrib script more closely. - Redo patch to ssh-add to try to adding both identity and id_dsa to also try adding id_rsa.- Update for 2.5.0p1. - Use $RPM_OPT_FLAGS instead of -O when building gnome-ssh-askpass - Resync with parts of Damien Miller's openssh.spec from CVS, including update of x11 askpass to 1.2.0. - Only require openssl (don't prereq) because we generate keys in the init script now.- Don't open a PAM session until we've forked and become the user (#25690). - Apply Andrew Bartlett's patch for letting pam_authenticate() know which host the user is attempting a login from. - Resync with parts of Damien Miller's openssh.spec from CVS. - Don't expose KbdInt responses in debug messages (from CVS). - Detect and handle errors in rsa_{public,private}_decrypt (from CVS).- i18n-tweak to initscript.- More gettextizing. - Close all files after going into daemon mode (needs more testing). - Extract patch from CVS to handle auth banners (in the client). - Extract patch from CVS to handle compat weirdness.- Finish with the gettextizing.- Fix a bug in auth2-pam.c (#23877) - Gettextize the init script.- Incorporate a switch for using PAM configs for 6.x, just in case.- Incorporate Bero's changes for a build specifically for rescue CDs.- Don't treat pam_setcred() failure as fatal unless pam_authenticate() has succeeded, to allow public-key authentication after a failure with "none" authentication. (#21268)- Update to x11-askpass 1.1.1. (#21301) - Don't second-guess fixpaths, which causes paths to get fixed twice. (#21290)- Merge multiple PAM text messages into subsequent prompts when possible when doing keyboard-interactive authentication.- Disable the built-in MD5 password support. We're using PAM. - Take a crack at doing keyboard-interactive authentication with PAM, and enable use of it in the default client configuration so that the client will try it when the server disallows password authentication. - Build with debugging flags. Build root policies strip all binaries anyway.- Use DESTDIR instead of %makeinstall. - Remove /usr/X11R6/bin from the path-fixing patch.- Add the primes file from the latest snapshot to the main package (#20884). - Add the dev package to the prereq list (#19984). - Remove the default path and mimic login's behavior in the server itself.- Resync with conditional options in Damien Miller's .spec file for an errata. - Change libexecdir from %{_libexecdir}/ssh to %{_libexecdir}/openssh.- Update to OpenSSH 2.3.0p1. - Update to x11-askpass 1.1.0. - Enable keyboard-interactive authentication.- Update to ssh-askpass-x11 1.0.3. - Change authentication related messages to be private (#19966).- Patch ssh-keygen to be able to list signatures for DSA public key files it generates.- Add BuildPreReq on /usr/include/security/pam_appl.h to be sure we always build PAM authentication in. - Try setting SSH_ASKPASS if gnome-ssh-askpass is installed. - Clean out no-longer-used patches. - Patch ssh-add to try to add both identity and id_dsa, and to error only when neither exists.- Update x11-askpass to 1.0.2. (#17835) - Add BuildPreReqs for /bin/login and /usr/bin/rsh so that configure will always find them in the right place. (#17909) - Set the default path to be the same as the one supplied by /bin/login, but add /usr/X11R6/bin. (#17909) - Try to handle obsoletion of ssh-server more cleanly. Package names are different, but init script name isn't. (#17865)- Update to 2.2.0p1. (#17835) - Tweak the init script to allow proper restarting. (#18023)- Update to 20000823 snapshot. - Change subpackage requirements from %{version} to %{version}-%{release} - Back out the pipe patch.- Update to 2.1.1p4, which includes fixes for config file parsing problems. - Move the init script back. - Add Damien's quick fix for wackiness.- Update to 2.1.1p3, which includes fixes for X11 forwarding and strtok().- Move condrestart to server postun. - Move key generation to init script. - Actually use the right patch for moving the key generation to the init script. - Clean up the init script a bit.- Fix X11 forwarding, from mail post by Chan Shih-Ping Richard.- Update to 2.1.1p2. - Use of strtok() considered harmful.- Get the build root out of the man pages.- Add and use condrestart support in the init script. - Add newer initscripts as a prereq.- Build in new environment (release 2) - Move -clients subpackage to Applications/Internet group- Update to 2.2.1p1- Patch to build with neither RSA nor RSAref. - Miscellaneous FHS-compliance tweaks. - Fix for possibly-compressed man pages.- Updated for new location - Updated for new gnome-ssh-askpass build- Added Jim Knoble's askpass- Split subpackages further based on patch from jim knoble - Added 'Obsoletes' directives- Use make install - Subpackages- Added links for slogin - Fixed perms on manpages- Renamed init script- Back to old binary names- Use autoconf - New binary names- Initial RPMification, based on Jan "Yenya" Kasprzak's spec.8.0p1-24.el88.0p1-24.el88.0p1-24.el8ssh-keycat.build-id1132b15ce4328b2ae40fb8a45d7d727e50c30b12ssh-keycatopenssh-keycatHOWTO.ssh-keycat/etc/pam.d//usr/lib//usr/lib/.build-id//usr/lib/.build-id/11//usr/libexec/openssh//usr/share/doc//usr/share/doc/openssh-keycat/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=x86-64 -mtune=generic -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2i686-redhat-linux-gnuASCII textdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=1132b15ce4328b2ae40fb8a45d7d727e50c30b12, strippedRRR R RR R RRR RRRRRRRRRRRRRutf-8fbfc5ee606a3213ac6102cf481cf6ed5a37c771d028fb57b78244f6dfd08126d?@7zXZ !#,.8] b2u Q{LX]=`-HUA'CY?q%ֶ[>^1 IY}܇q,>^FPƁy+ >V^)T/.]=\\[qW}II eOv,i%r_;*ӏĭ'"piOûŅ3vrO_!:3AL|Ddz>գ1C7 qm'>ݜOD5V;%]c{uEy`GxyѺ~KħbqDž|QjQc2ek&iH.TW# zWy:G22^_6@gz`fG QE;.L%DbZUXкbqc//;B?G4:Ŀm[GTkMLn|L0 18e)ҸCͨ nyHil}` jJl OR׹O—MxU IV@O@%^7V4I.rPk|8~/oP RFm/c3@DWw!jTש+ܡgYo ԽYeB*1].Qlq*EY!p31ma2"erZHJb`w` 6$#mD}Vb9U Vb#/a5 4]R Of/h;|?Y]yƙ˰M@\^ mD5p*byh/m%Njeα.5Zp)tP i=, 4(K/2ub/#4p UgdI#d;R/s꯳TТZEGn^~ >I tlMW"nDZqQ$m濷eƠ4 +K;⎘wC'+̯#g~դOj,g!8^?h-T7S)G4|]Ѧ$m|5AVm/%d_6[Y5f'}#~V-h% ]r#ο!~+.$kS2J]g\pSPw/&&e3{3<$WN9A.”tlvH&\-`4ɥi{>w q0jdgGƾt-%j;"̚ QD\W ۊ~`c1RM0L&T[#ѡf`yń9kЖ#ͦѫa8rQnLO$!s( ގ߁j P,_FQ>P&Ϯ2!%t)*:y\It築b}7ef9z;բ#qt(hi[?0` f,Z.U ֱ!7} 5ʽ$–b.,v9qb ȁP(Xd1&Gs*`C9sK}NPe$힪PNpn\ |񨺇[F1/cLo $ҼAdCRnR:np?)rU 3ձ`E.vhhوGY#}<(ĒZmc,K2 f~•4"ݴW2B6 ;JqWeIh?a=pн\҇hy%]hڤ=e}ب}ckWD͘8/>FÔ(t%||t㢰L׵*"qZ)u*Q]!zrB`V6Y{@WUR R.sy. ;AcPA͞Lr-sEN\ef駍u5.b!{;tL':PL:(9wo!}1L1b0^h] | 1"<GK>k'LPh&gSUߋwBi?#J}O1S\Ɏla0l]./Q8Lm ԯt,ϑhB3,Mw|X^^'%:88DUv>g퓁h[~JҰN4]Nẖ#0J ,Čؼ?3 4x }asX~0G!7h6hlqܗ2ۻ/xx5 {6f=ә['<~Ӭ:w#e'$0*oxXEEPXZgYe|m=y[Yę^nk 0|d~kW݀(iyKV?RdEf}^ê.h^m١ɵ~= ^$R)xk/hY5h^cSE#CwFc?߹mXPCu̴Qg旅A -Q#"ss XA(.)H>?5',]UHY} S8"Lױ/v;9Yَ֣visӢa% 샥-i^nЇ2i2<eZƚ4N6ʃ ͗iʲVHKWZ'Hxm"Vr<rSJ Mdn*]錼''wW_S#}TGz F, ]T?AB"D)9\s+" åߞ|^͛HjKaŐ%bjǾ%ӞeK7 PeS!+ZE_Zz#Nsx!J!ջbS9oiS #qDKb1/wjS+ؙOq"F$@4jx Z徺.) QEOl EKOoQ%2q}X:cN-@ c_X?fUK|(r[ūIpa:weVf'mkVEƒw_&vȚ#|2SP~W,?\ ^Ujddeܴ06EuuʹL#]>)'*c5,"Q9F,Wsz9fTJˉ1P'TPwʉ5 -JB%qD\(9 ZJFl=+gM¥vnYT/df%frLMJ0j^k 6=udg[aף{]:fEP"#1n u^*xVAQG)},,ҟ1!OIzH.lnyc pZk|7ݖÔB0z<;DV 9 l{8;ۗ͊1S@i:w#ivV0ZLz~s XY[h&z3v,Gw~Y(tdkG2#$sZ#j0D2l*:! @@F[.APo$ {qΣ}(n虶 ½\DSX)FK h{s{ZӸĕي* @Fy]4»,VGf` >UMveTjO`c'EX_ |XZEoҍ`$êkHV:=ގ=zӎxV;u 7-u/ɹ( rOMCLl.px' 7g$[K( 8 T)(z9Ce )(#?Kc/ʩ"̱vmzZ"2YH#&}HŐ;^JfFwPַ~8a9|en,` +M5`0'!i$/yv* t.tמE7;/ k؋Ĭ.QnU3 /i p#8VPTGȸD}Lݜ= PQ; Z٤KJH\1NR%OCZZKYY;~c}%J-T-qF610&fL{"7:c~^[#L\kR=uۓkkt:59bg |^lwˢa/o EbKJ-DQ`z+hVFAe,{o ]a`gR>mtsɪ q$2;BָIp.0 ^;BiM jl1L┊I=#VݠEp! e@ǵl;$ݰÛzZH s>rmvdHg7'L&-=[/~Z-aU'|~D'b }=6HS6,L8ڳƄq0ΎZ\;mX=oUC}oU}e5\}:@kn<$^rPdD]T|4l%J+Tia6+CYt(P!T($:UA{,KB /I+!p2u]TLEG `2 înwk7B{`!8;k4O+kZȈחwO n:|LjND=D_de:^*Wݡ0sv#|I*Hؗ)wa -K9Ø ]zIY/ZCbdM+H985']j {}# ]ɁCoݳJσфz &[hejz& *^-F@[h~DQ&sVRދ~4 ׊]ޣ6@cxΎS颍L -6p|gМ7. Q^0Ê8fsUۗ,Wٹ1| J_:֤qV[݀IL\mM_A2k *g$/.Q&Wzx;'4kVot`*4+doxтw~j?I`dZ8#Ò=,u {^Su2}$,T  ;5>ҋ#%az1 Nb멢 >K=#`1s?L0M_9Ľ܇AXkܾ؃Y7e$!Pu٭bE0-D m%xp~CS:"n Eq"Hת,>kY3y1Z}SFRԬ{BWPu(*哖s =`>x5FlgK1;ۇKbOwHu8t$n 0+&bN8Ybwގf?NPƾE-]YIJŝz噥Q=r|]ggx\-2=a~IFf)}wxP {D Z}öz¹2~(Vu}@_,sZAi6>s:$;'wYOdOx*|sJ%RJהH`w%nO=,yxJT/l`wܓmqYJ,=n/E9D^Fp.L $/͡R~ Ls:- `p_ϕ'rvH+ a NS(R71>niS׎pkƆ=0 20I@ r{ei#xwQ̨FqܶnzhPf&u0t?o}v͵,l-bn෣FdJ;⚼e:[eG,aYqN jK2뾉I"]`9)'uu)>Ac/b!I;4 4|l: ܀/Nx!3%#X čpmV`$vWCЗݷ:?vݢ~HpqFc,:+#lExi8+W-;L+~j mh*+mt $Z%GQ{1mlCgǎ,zp<{k#ya"MN= 56=2D7ST\cUp;Jщ˲Ds8* E.,+M&Fvghu%SD]-t0I)uhuS%ũëh^͈,0>9ֳ/V#|ԕCRF߫=6e8TxwP3-8LRa?#.ҘJvB9ȻEw ^ngpQ5e/LF@R@&!&XvuD#ɨDW^¡e|u 3"}s{K!&]M@d݇h&\ ]#xdmG^9( Lr.b}?"f\ꏩl tjۢ^@TutNfȈ^Gej3uhɼ?d;bB0S^wcÓ9qƮƧ7 q 1,}Uf##Nb, ?6Vz r7C8̚ l&X{Gb "D>Y{ Y|ҒK׼Ttpv =Wcz h<G*&?00:zx$.]o3+f@Ǣ[R{ #^gNcfᑃd37 ~J4Wܝi8p;Pk5Ԏmz2ow*vxT8Iva]K'z!UEO1nq UҒ>ZXAt44IQ,_okQv^E=jHFa٦QHA#z \:51+GX8xbZa}}-Cə0v>3\ /=i8vx. /5p(_BhJFh JkË+nB>LS-2> LN],3Yf8##:h{x'ĚjA򆺉&r)} ^_v?ikḍi$-vKMѫRJDaEv6!Mstdq/w)7>{ 20K o"r+r:mUelsȕ*% g,*Cd쳰X[пj{Gbb/-zO#Qh#' aJ>Z%7j'n߿\9H:H.PӣDZ0=W<3skeY2%iqpwPJlڻsqA/颠Bln(PΚmvqVTx+E) AՖoH9g"h Zp)$9DL7db/39MaeIv!7B)QAx6Ge^{V=1Ӎð|@-_T|=gao-$yvE&sě'e ij qB$^vQI+"'Hbp~(N8{w% !NҚ" cl lCIKfTzr8^Xv‘)&f22go{0ͱ9*-WbC. r/|DiNY}a(`)E&ƿ5㞨0ar5{3˙[cE] } 6ݒ(ȓ;;_ Y/>v-0:֤֞r*fe%ts8êT^ȵ h'i~=7sw2A3ɧ-A^<_iϾ!(Wj%7cտO`i/O0UZ5{Aiظ|@:ʮ#_>nȊJoj@?nւGVժL/t'1G5ɒk}k  TKZ&:&_H- ߌ~,Psw$&̏K1QZ?0ph˞0= qrX#hӃbɶE{]y 1Xp>Ui~2̱< #lI|Hΐ'g}>_Gh!\.~X{glɻN'J:bubNW*āBqжCFʉfuyNRrn:9Liܺtltj<#0uŤᨙp.C!؄}5YE^5,Uw%8g>C{ kNƮO|a-ɑ!2쇪$ Y#9I:(H(T!p󈠴eޕknΖ3+jS^ g@2e6>cּ)T4L$=I0@E`ogV(ک5sh uO'{ҫ,s0 q}5q)OZ,׈ԡkLwz([XPV!NM=KwLz{sQ j>|*tRzP>aH)6_;4;p†:\~J}g5o&4 Ke݇H\wJ"8eR5/S:7ḱҟ kWthؽ > ׭ CgOn>;s\ PP"7PIћTK)('bYvPz=h TWq_iowzzU׿81@lBqVug<-;0] 6 *hۓj5獴kVBLyC9G{BZ"oYСxJ2!!ic*Pp$~V<@{)aح"ܡrg}XƏ7o=mHX ѿWra!|>ELXŮiV<5L[ fK GzڳR&CqdHŞU>![cJ?aE_iKz4jeʣ0 NYSA С 6߆'1>bBb+1_b̍3p(9^E`MٝoGn,? Tw:dč"drJILMdJ:3]*;1Plmec6uU@b) 1U?ouYoN/ʨ/Z\<nQ4vпO6 ;uS'^#a܊\'O/ \ "H 4e&d*49K j0`B'gl =ëK1ؙDs cet,G`μr:w6 Z G4lw',=4:QV5ȵe&]T\=5JCK\:m IhbGP`-4`9EdMAӺ LOt-K@vS#n2JJɅblOŸfݓo(/q/Vqꡙȑ:~䆶 {zc=??Py\GJH?u9dj^r!Ƃ(BۨeY9L0&vF7K*{&-dV[zEU 6xS`N ɩ%[:Jk+ZFQ(?9$,cgB*CepB6*(_Rܜ6ENYяWOftڂ}YrFx7<;)H 9E>*aE_Akg72ja˒ؗm/OuQ0p.$yqV䱴o]gx ,IJdêh"~ &Y,`mӊ{g-$n̟cJ XZ̲}N2e 0;c&z1}KJb3"tÄ1u $1~)rE` Naw)޾}ZnJ"XB;-ybY+ly̿RlfkrM\0Q 75RCbĆ!l#9io ,e^nHd`;UL&92Ȍ;4daNIf{ 6sdr>[.Dy眲bcj]aOY" &ƆyW<Ȇy It4 7Xp LE5v&Rp&bEͷ3MzxsfzH j#<9Ь8IW&h#m8mNJH&w@=atvk5! VmJ!? XqN#o9#-3ϫN\~ Ƈ:rF$Ne ǽkѧ_Bnki>jclI!%ǵJnBf0 _"8qqT81 #wҐvyR,+!TBgx5|ӐTBbiJ_P[uZ$+!*%1QB4[p^AW^s1@x ΀t-C"|$Q=_4@AI&RTy6KDž_>=Ladn~ G{E\vx *w6ke2"܊dP{:ZlߊbQލ\{iڭn"Je㎜z۝Z9+S2pdQa Ô۷ ݜ?L b`ryjsz>+f2WncI(s7/pWLxᭌ tGꓕH~>;ďmj7#ԓ)Yii =(`c~_7X*m9~?WU4]L|*-qD{nC8pd9@[-,k3Dj(u4&l+Z4(3!&iGorSr|8ۦQ U'1Sleϑ6.y"TۇQ ^tN-0_1WCk9/H‘_ہ7o#ߣ#jqpJymH=\O=Y7?#HJX՛˚@boTc'eSI%Q T˦dmn֊OpW6c3nfMĒL hd 0M 1JO_+LT8}@)? ~U^f3Q21W'ZfUwcb)MAZ4D.}:%/:b.fqٵO}PRr(|]#Pz쒣lQD4TF=.+ZKNCQNzpznO8IXAkz 3QpB!5^ـ(z娢MAGj\0К}5" "DH# zaIoBj9 ȼ-D.D=Rxȥm@ 5= S)G[XS/?6ObF6^ߴjOHf0څҎn-nn(oawB,Ka-ሀaHt8/yzVoG7V6TT )*K*},R$C]l%z7Kx5|* `!a#cqH/ZiJժ~00MO@R⠳. KFw?SGW2+طضO!kvZ>S1ZS{Oj|2ezC} 6n ulmBk?g0iiL@5ނ: .Hؤ|mM番Zoo{eW>,5Ga-BiicV`!wzUTgE`1ҊG9*~I&d>9Ĥ8-r3P:lsJs$*Xjp]EIx^J [U*Ϊ4q |qf [G ʹ~]& ǥV>{W 8- wŔU#":XZvAVTL7R}U;PWgv[-S3^„ɬ 4~X2ưPpz̧o5?Yx'93Pe#U o]D 3UI'ya(u#{f w)F߄+Z\{#kcx ;~7Rw.!+aS)h\a=qh:έ~T^ RК#Y4E}#yX [l49<[!%3F%E㼵^>ԉ,|l_$qKZ'=*)`ѿ/ Cʩ#$6~K'v:} T"lP2_U uOJ [9Wԯ- M_8{him#[,i (rҫm:IX"r; `_UR4!AE2K!Z xw ;h>Y()li0W&TԨQdV1$KcihAg1lN _ڝᓿ9[_p͚sYJS"TiYY3dp@{ yQ2n62|o0#<=A`cښ@a#0on]xJW@wK1%'Ea-9ZQ[Bl#Ǖ(ӶmQa Tdܑ}L=uYQJbvb42Ȟy  і2x6oT; nPZi(Ě0`c"֊SB%άj2,X4qJ R 3W r \T,2rXslxzhpUtKt1:sz} Bzq; CdM9>5+9_Z<^`'*g.'crxGhe}6W ]}q{jVt?Q,tzw_-GFay$V~TKQn9LWԲ|KنHxbu\MYօ F2!Gq1O'1kk.w,K^\oE(o3L, Ӽu5-sI:W$11TO2@h$EWOba2")Er43$ޫ͔.=* HKF`6"PHb`[ pʻ,5]n"*f kwT5iՎ=];:[Iȗpyсk?й1:?\s ܼ1k |Ků?'ӇaM]g\-۔yx9)bd\,_9!}ªa8*u;Í^ڕR#eLJbE9@MØ+\^կWs.I;7 I:Ghz ר-.dkqa_lȪqvɢ9y-F<7px6ب7ADQNulE-"o+jtZ jZS07f:IT<] "=h HI?۽  ۈ Sݞ^!cL4[7`[6zͧR$dH>豊,H#xzD'.h ]ۺSGƭ1WryF9BIbTɠyLpu$`P(p*HHa\3}A*H|~D%L[CZJ>y:EcrՈ&( K&# 9|r&IL;6P;)DuBPS;rk;W*sBJp}5v.X BR-!3+9Ƃq \2 c)_Nᒎ V ID~\%*}vwۏ[K̓Hlt)X/*Li\9Ô?9둇y ' ]J,nE;!-:ތ :%M޹%( i;k%,P˻+^>4_u5 #5S>EZO70 | Ed199u];&Mr$a ,ehi)Nev@j[G.+"D ~fsTD .*X 7{SUv%q} g,KoEԧQ+JAj݆ vlgjc&"!&[W "LݐlZ}B1^ĬIƕ!H .J̘O ֗*&*[X _aAАBrd/ *c" ˦DM.ގ)J]2` vN$nO "62PE*S:N9g&0b|͸FuZ>Ka#nPm3Z6LKMx!s-#+-O8NӴӛ{3e1e&#ܟEЙXyw[ ذ3t|@+i8wW/L@W#3X #xHؐ^_q:ӁT?EWxϾNCs%h7Oų$y0CY9VjG[xj$=sdfWb Jukաzfb=W6x|.Pii6v F.10bB1Z*s]}W ?FQp m ?Z1+dO , i 08Ls>g\Qyr3w a^l-^/މdL0K&\s8jhNycB0Ykmmt*) KsjV7}+84noSj& Fyo]CkOJAarE(A1DSTi=\.T)HuT!Y`@pov ?yG)ރ3MJF{MX pMF!Lwz2hl"֧Ew'0L4lxU9[&!A*C'Z?afST;NKN}SJrp6Xkඹ]HՀ♶sA>M)CGY(?h(a-@WPj.",u6"f,}_k(AΫhA{|?On`+1i.R-is/b>?̓ihܳƱ$ JڷΙ:Sj/PSYpWߜNc[&8PAu7Sj,nǍ&%?kAAeijv6g~,ذiܳ#53}.~f_Co=""N 4&|pgRA+ ,&.bEMŒ墻Ue,KV)aRχ\HޜN8d /eUqk h * .|U n-#z&Di||%-n8< ?LzNg4DЁ]VR&M^&| :?Q]-P 1wש\9<k:e>;gC)]#~ޘhsώBߐ{Nqu`GQ$yAчV3 $xioQŖ+\UT5jb+ڻZ#BMfDyנK$jm@LV6Y m3;?0Pʄ;A$qܫcH? _/ơQ CR }(bV|\Z=TWmuy'c_]*!9DwNpm'opA8Yr mUB'磣o(DF ƘdHva ?㘇hqON&ŹX01iA@QT%A??l^C`E 0}^tFn5oe!3Q6jV]yz^7Ȥadcx Ě/"V @v"W=b‘I~Nܻ-޸"e30Ґ*_bfq/; f@SB y8D*#3.+!E6[DPO̸*x(_Ay17%Wҍ6QyopyF 4{1lBG G{Ğ DF= K(R"n Xx[SwՑ6p,|h 7f`QBcf p$TUܿs:tSxz쭓њga& Zp~PԢvTEϒj[ ݹt*̎%x z;9|mnÑ5B ַxLvP\퇬4[`0띯4O-Rw%+Q[ѫQd|JܦC"hO7wnk (1TF d{WgzZ~P#U,O&ȋ:J%G{@^=+vhyuZA?f>sU(n!rq7BNPP5ۘ62ӄȘbw/\vE)~ +ȃo_؈q nrWb! ~|7W_Z]_GB/K 9n=Kn7I:$h rrOdBE\2"l-Μ ,C~R=$mU.FfXdcC*S%gl34;$ /oHJ?*{ KgQE4)&*c_' ה&6;$^'V%>7 ^?0x< (&ЛPV%r!NwAHr yYR"PSBߴKBx ?Z0eCJTrCFnf'Ɣ-ޢR›Gb&҇R<9~ɡ|}֫OC΀r)J|Ag'eQҎ {eD$=W$do Yr>UCOh0X&67v]./sƉEكP`xƢgqE{:4k`3X$gDX"֑7bZ}RO XZ]"N .ȿǔQ\7lF4J>΀2v1EFy~X<2PɩP$V߿S #hR xD]##5_L PwgLnR|ڎa3ْM\!,u&}eܤ NYpA#@Θk÷J96ZR l g@U5DJ+aT\Q^')uJ͌242z|+Pq)Hݝ [o| r˰*@@~g_Gva K˟})iƣ=2a9vN=V@c 1d0s,㤮k !Ϫ'ыu;[yy4g >C krpşwQݪϝt+t"IWϞALJܝvHl .'y 鹤Ɔz,KQa!~7d^Ä*Bx rӕn&J!b_ f>Ynr"?fhl X'8V#׿`Ҹ'n|C=Ht c8 jQ?"uU/j!aundEB92c/J#w#[v 60ojc|Mq8,gM >%D P^)}9~| ڃADO>[\2y`LWI>kxL-؈`T lQ-Lgy 5ؙVS*XWB~[4]d^s'Q4, _ȴi ^@/>sc}gOTQV7{ھl f3SE֭-k y(_gQ0+À#ced 9\@YRW#_@PP^wI@Э{M!>0@cb${wmү],{ [盙FB$M |茗 dskf7~’ѷaM(mx%D@r^k ;n40c:J;׌ +Q5`I" C+.r^f?au".gŁ~db˳=~rԳk9_8 dQ((*g^_l}.ki5 nCk8eAz)cngg4XK(/O#,ˑU&1u`+3+Hu;A0GQ|bW8ls-Z7B߰I10FU <@}[ +b[*\a80T#k;8)7u^*Cƿ)HS/!U&Q?OnlӢwvoRa2fBF! pu,;Yıi! #AϹAozLSr< 6 8K61č Q6]+  Z43k:~Zàz .m-~JĩṼKv\},˄qwQ̡hT_ß= ߕ*;{[o_҃OB qfAr+n,gٷ*-SvC#.=M޴ Bz7>XCl vCi\C,‚A0%a7Wh"궺ts2plM _f/2kPbb*դIB)uhF6'6pZ~H#=I莞-lv߾TŴGPS&9`Lr:)#pPDE!-sDdJ?vJn*ۤCآ0yνop:(5+;`0z^"15:cH &ԅ$*"+y^/4m컇C-WqNU; oLf.bj#K]I{`z޷,4E(C&@XSΏp%CυE2Z'i mJ6į?`vINSW¦I|@%)GusY9 5 ^jUܱND0XY^=38gn#;=Z# gXW-H/2v׌Η+6Ts f+ԟ6dxd\zbY$͈?@Y¸ {$"KwB9a-|ns2OlS 2thR<|.c-3)3β&çE\3_mL nBACS\j|ǥ1bu'"$f'D6W?oG {˿;WR_)HI/6P[93zaEUhw =?c`p͆V1^(R-\X6G~#a_]x!(bv\犩ؗ'd42oTS>4)xz:6W@"9w2 id@X6.Nӎi"iR{ Vah4OzrLL nȎ]!)^dǥ5o|eU*sX,U5Qcb06&  Tc0u~ ǵxQfμ^$R5jGU {sMԾXEWɣfX11h W#{:j1%Xt~ {nE\bib0A"`iyv 9 f*k0/+9XsrOp75ʸCˋ#} `ql_Kњ/JNPb䔒f0&<)(3RgC/`.ve3Q-6v iKgڽ@é]ΝIif5]ק 9K 4ߕ%c3ϦA,n \0{Y7eC2ٺ9 6/חE99YK`pVò "fF?b#2|u4 nW%Rҥf%8AVwB,`WV xN ./>mv 8z1yP() V3Ot+c֭_[t xB%4RȑsG( OLPbp_7h5 ~zC$Vf Kq7cCvmMA|\SS4so$P>&*nQ@sHрA.;)잕} bJYlFĮOdD5B/_ j۩4=>~kԝ" iE2%rYWH4мW=G*S~_cs0pJrU&;f l(~x[$Y4"2o+=|;>jv|zY.͉؃KaYi9bҘe~0943T DR=2{)[Jb뎉x"F.Ea qg CܠCP H7Zc!Ik\l2,]"&2} TI\'6| ˷fq*̾aMιwң&"4?s| YZ