openssh-keycat-debuginfo-8.0p1-25.el8_10 > 6 6_6 3!pQp)Tξ7]mtZ`f ]mtZ`mw|n}w2KY\2au6) w^k5ǫ99X`O6gZ2{Ŭ<oqNCVyM÷+B>fgè 5sMZ;19M#Vj0]oi O)&О)*uPF{U?!Dj(FB( ^1L/w{Jʹyx{ې^nX%vzJ#S>aX}H#'OT9=ZufkH-*eS7D)Sjg3P)R$`IcrP981 ]eң,pN A&*NaRtV֑J2D:b[-gBK~X$5oI)佦ӤXq2?y =9pՙ Zr\j*_և馫թ)B-GsJP($4348be3452cb45a62975b295208639380d09030e4e44b8e2bfab8a66f18c51e8fa63489a795533eddd1253feba43eb367cf9119eP3!pQp)Tξ7]mtZ`f ]mtZ`uMכz߹san7C9j*(o$)7N KqʽTq-% 4~Qm)-Y%$)j#̴/o{)ؒXewHSw5ET1t@¦G)wń!_GZV!A0{ĹjJ騩왑d%6nVWW,yHe!)j2QW蓲i3j-^< =>Z*}"`QbmfNi*H+C~$}S+n.]zSI+0M@X"lѕi|/̨@WFug^O'CׁcEF'.$-bQf% ^ `CҎj1@޻ZW_򊁃܍C;@]4JfcZfc''̢w~ jIyg05$Pn0~nF"xW>p>K?K ) V @DIOS q       $  m   0 ]   4(809 0:v0GF HF4 IFX XFdYFp\F ]F ^GbH(dIxeI}fIlItI uI vIwJ xJ yKKKK$K4K8K>Kopenssh-keycat-debuginfo8.0p125.el8_10Debug information for package openssh-keycatThis package provides debug information for package openssh-keycat. Debug information is useful when developing applications that use this package or when debugging this package.ford1-prod-x86build001.svc.aws.rockylinux.orgPKojiRockyBSDinfrastructure@rockylinux.orgDevelopment/Debughttp://www.openssh.com/portable.htmllinuxx86_64<XPAAAAAA큤fffffffff83311bd40e0dab8efbe08da6e2ec58023f1181197f0e39f8877d0a8c7cab4a9c../../../.build-id/14/344fadac3e09a10873d9ff7d0f8af444141947../../../../../usr/lib/debug/usr/libexec/openssh/ssh-keycat-8.0p1-25.el8_10.x86_64.debugrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-8.0p1-25.el8_10.src.rpmdebuginfo(build-id)openssh-keycat-debuginfoopenssh-keycat-debuginfo(x86-64)    openssh-debuginfo(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)8.0p1-25.el8_103.0.4-14.6.0-14.0-15.2-14.14.3fz@e@e@e(eJ&e?dF@d!cb>bUbTawapaV@`@`r`@`pA`P^y@^@]6]@\ڭ[@[[-[l,[;e@[3|@ZԐ@ZJ@Zľ@ZZ|;Zk@ZiZc/@Z_:Z2gZ.s@ZfYYzYYm@YyYV=@Xg@X@XZX@Xe@Xk@XIK@X,J@X@W@WWW@WPWWv[@Wm WUeW#LW@WW4W@VaV'@V2V͛@V=@VV@VVVs@V9@V(V7@U@Ud@UoU5@UnU@UK@U@UUUuUn@Ug@U4@U/@U@UUQUTPT\@TgT@T@TT!T~T}TC@TT@T~@Td@T\@TXT @S@S @S @S@SSSSt@RSR@R|@RsRj]@Ri Rg@R].@RSRB@R0[@R7Q@Qp@Q@QaQ@QnQm=@QdQdQ7/QQP@P@P{@PTmPPPPSO^@O~Ou@OiODO/O'N>@N@NN=@NHN$@Nw.Np@NoENoENm@Nm@NiNh@Ng\NS@NA!@N?N?N?N-ZN(N@N @NM6@M@MM@Mߒ@M۝ML@M@MVM@MMmMmM@MM@MlMMx@M@MMx@Mv@MtMp@MoMlMk@MgMgMfH@M] M[@MY@MQ0@MOMIG@M>@M4/@M0:M-M@L@L[@L L LLNL@LLL@L*@L@L@L@L@L@LzL@L@L4l@L+1L$@L#HL!@L0KuK$@K;@KK@K@K @K޺KtKՀ@K͗@KQ@K,K,K8@KO@Ky7@KbK]K]KXAKV@KUKG@KC)K/c@KK@K KKJJJJTJ`@J@JJ_@J@J;JJ J J@JJ#J@Jq@JjJi@J`gJMJI@JHJF J@J2C@J Y@IIcI@IJII@I@IIo%@IAH~@H@H@H4H1kG GGG@G|@GUA@GUA@GB@Fl@FFFyEE{@E@E݅E@Ew@EnEl$ETiEIE @DC@D|Dp@D{D@D?D@C@CCtC@C:@CC@CqC@C}@C|pCqCbCTCNL@CFc@CC@Bw@B@B/@B:B@BQ,@BBB8B#B@B @BBcA3A@Aa;@AN@AF@AEA7 @A7 @A7 @A4h@A+-A @@@@@X@@o@o@V@@E@C%@=@=@9@@,@@@@@@/@?@? ?}?7?@???j?j?j?hL?hL?hL?hL?f@?f@?f@?f@?f@?Xz?Xz?KK?8?8?%@?'@?>@?>@>0>@>~@>L@>G@>.>@=@=@===n =ZF@=@=[@= =@=@ - 8.0p1-25Dmitry Belyavskiy - 8.0p1-24Dmitry Belyavskiy - 8.0p1-23Dmitry Belyavskiy - 8.0p1-22Dmitry Belyavskiy - 8.0p1-21Dmitry Belyavskiy - 8.0p1-20Dmitry Belyavskiy - 8.0p1-19Dmitry Belyavskiy - 8.0p1-18Dmitry Belyavskiy - 8.0p1-17Zoltan Fridrich - 8.0p1-16Zoltan Fridrich - 8.0p1-15Zoltan Fridrich - 8.0p1-14Dmitry Belyavskiy - 8.0p1-13Dmitry Belyavskiy - 8.0p1-12Dmitry Belyavskiy - 8.0p1-11Dmitry Belyavskiy - 8.0p1-10Dmitry Belyavskiy - 8.0p1-9Dmitry Belyavskiy - 8.0p1-8Dmitry Belyavskiy - 8.0p1-7 + 0.10.3-7Dmitry Belyavskiy - 8.0p1-6 + 0.10.3-7Jakub Jelen - 8.0p1-5 + 0.10.3-7Jakub Jelen - 8.0p1-4 + 0.10.3-7Jakub Jelen - 8.0p1-3 + 0.10.3-7Jakub Jelen - 8.0p1-2 + 0.10.3-7Jakub Jelen - 8.0p1-1 + 0.10.3-7Jakub Jelen - 7.8p1-4 + 0.10.3-5Jakub Jelen - 7.8p1-3 + 0.10.3-5Jakub Jelen - 7.8p1-2 + 0.10.3-5Jakub Jelen - 7.7p1-6 + 0.10.3-4Jakub Jelen - 7.7p1-5 + 0.10.3-4Jakub Jelen - 7.7p1-4 + 0.10.3-4Jakub Jelen - 7.7p1-3 + 0.10.3-4Jakub Jelen - 7.7p1-2 + 0.10.3-4Jakub Jelen - 7.7p1-1 + 0.10.3-4Jakub Jelen - 7.6p1-7 + 0.10.3-3Fedora Release Engineering - 7.6p1-6.1Jakub Jelen - 7.6p1-6 + 0.10.3-3Florian Weimer - 7.6p1-5.2Björn Esser - 7.6p1-5.1.1Jakub Jelen - 7.6p1-5 + 0.10.3-3Jakub Jelen - 7.6p1-4 + 0.10.3-3Jakub Jelen - 7.6p1-3 + 0.10.3-3Jakub Jelen - 7.6p1-2 + 0.10.3-3Jakub Jelen - 7.6p1-1 + 0.10.3-3Jakub Jelen - 7.5p1-6 + 0.10.3-2Jakub Jelen - 7.5p1-5 + 0.10.3-2Jakub Jelen - 7.5p1-4 + 0.10.3-2Fedora Release Engineering - 7.5p1-3.1Jakub Jelen - 7.5p1-2 + 0.10.3-2Jakub Jelen - 7.5p1-2 + 0.10.3-2Jakub Jelen - 7.5p1-1 + 0.10.3-2Jakub Jelen - 7.4p1-4 + 0.10.3-1Jakub Jelen - 7.4p1-3 + 0.10.3-1Jakub Jelen - 7.4p1-2 + 0.10.2-5Jakub Jelen - 7.4p1-1 + 0.10.2-5Jakub Jelen - 7.3p1-7 + 0.10.2-4Jakub Jelen - 7.3p1-6 + 0.10.2-4Jakub Jelen - 7.3p1-5 + 0.10.2-4Jakub Jelen - 7.3p1-4 + 0.10.2-4Jakub Jelen - 7.3p1-3 + 0.10.2-4Jakub Jelen - 7.3p1-2 + 0.10.2-4Jakub Jelen - 7.3p1-1 + 0.10.2-4Jakub Jelen - 7.2p2-11 + 0.10.2-3Jakub Jelen - 7.2p2-10 + 0.10.2-3Jakub Jelen - 7.2p2-9 + 0.10.2-3Jakub Jelen - 7.2p2-8 + 0.10.2-3Jakub Jelen - 7.2p2-7Jakub Jelen - 7.2p2-6 + 0.10.2-3Jakub Jelen - 7.2p2-5 + 0.10.2-3Jakub Jelen - 7.2p2-4 + 0.10.2-3Jakub Jelen 7.2p2-3 + 0.10.2-3Jakub Jelen 7.2p2-2 + 0.10.2-3Jakub Jelen 7.2p2-1 + 0.10.2-3Jakub Jelen 7.2p1-2 + 0.10.2-2Jakub Jelen 7.2p1-1 + 0.10.2-2Jakub Jelen 7.1p2-4.1 + 0.10.2-1Fedora Release Engineering - 7.1p2-3.1Jakub Jelen 7.1p2-3 + 0.10.2-1Jakub Jelen 7.1p2-2 + 0.10.2-1Jakub Jelen 7.1p2-1 + 0.9.2-9Jakub Jelen 7.1p1-7 + 0.9.2-8Jakub Jelen 7.1p1-6 + 0.9.2-8Jakub Jelen 7.1p1-5 + 0.9.2-8Jakub Jelen 7.1p1-4 + 0.9.2-8Jakub Jelen 7.1p1-3 + 0.9.2-8Jakub Jelen 7.1p1-2 + 0.9.2-8Jakub Jelen 7.1p1-1 + 0.9.2-8Jakub Jelen 7.0p1-2 + 0.9.3-7Jakub Jelen 7.0p1-1 + 0.9.3-7Jakub Jelen 6.9p1-4 + 0.9.3-6Jakub Jelen 6.9p1-3 + 0.9.3-6Jakub Jelen 6.9p1-2 + 0.9.3-6Jakub Jelen 6.9p1-1 + 0.9.3-6Jakub Jelen 6.8p1-9 + 0.9.3-5Fedora Release Engineering - 6.8p1-8.1Jakub Jelen 6.8p1-8 + 0.9.3-5Jakub Jelen 6.8p1-7 + 0.9.3-5Jakub Jelen 6.8p1-6 + 0.9.3-5Jakub Jelen 6.8p1-5 + 0.9.3-5Jakub Jelen 6.8p1-4 + 0.9.3-5Jakub Jelen 6.8p1-3 + 0.9.3-5Jakub Jelen 6.8p1-2 + 0.9.3-5Jakub Jelen 6.8p1-1 + 0.9.3-5Jakub Jelen 6.7p1-11 + 0.9.3-4Jakub Jelen 6.7p1-10 + 0.9.3-4Jakub Jelen 6.7p1-9 + 0.9.3-4Jakub Jelen 6.7p1-8 + 0.9.3-4Jakub Jelen 6.7p1-7 + 0.9.3-4Jakub Jelen 6.7p1-6 + 0.9.3-4Peter Robinson 6.7p1-5 + 0.9.3-4Jakub Jelen 6.7p1-4 + 0.9.3-4Jakub Jelen 6.7p1-3 + 0.9.3-4Jakub Jelen 6.7p1-2 + 0.9.3-4Petr Lautrbach 6.7p1-1 + 0.9.3-4Jakub Jelen 6.6.1p1-11.1 + 0.9.3-3Petr Lautrbach 6.6.1p1-10 + 0.9.3-3Petr Lautrbach 6.6.1p1-9 + 0.9.3-3Petr Lautrbach 6.6.1p1-8 + 0.9.3-3Petr Lautrbach 6.6.1p1-7 + 0.9.3-3Petr Lautrbach 6.6.1p1-6 + 0.9.3-3Petr Lautrbach 6.6.1p1-5 + 0.9.3-3Fedora Release Engineering - 6.6.1p1-4.1Tom Callaway 6.6.1p1-4 + 0.9.3-3Petr Lautrbach 6.6.1p1-3 + 0.9.3-2Petr Lautrbach 6.6.1p1-2 + 0.9.3-2Fedora Release Engineering - 6.6.1p1-1.1Petr Lautrbach 6.6.1p1-1 + 0.9.3-2Petr Lautrbach 6.6p1-1 + 0.9.3-2Petr Lautrbach 6.4p1-4 + 0.9.3-1Petr Lautrbach 6.4p1-3 + 0.9.3-1Petr Lautrbach 6.4p1-2 + 0.9.3-1Petr Lautrbach 6.4p1-1 + 0.9.3-1Petr Lautrbach 6.3p1-5 + 0.9.3-7Petr Lautrbach 6.3p1-4 + 0.9.3-6Petr Lautrbach 6.3p1-3 + 0.9.3-6Petr Lautrbach 6.3p1-2 + 0.9.3-6Petr Lautrbach 6.3p1-1.1 + 0.9.3-6Petr Lautrbach 6.2p2-9 + 0.9.3-5Petr Lautrbach 6.2p2-8 + 0.9.3-5Petr Lautrbach 6.2p2-7 + 0.9.3-5Petr Lautrbach 6.2p2-6.1 + 0.9.3-5Petr Lautrbach 6.2p2-5 + 0.9.3-5Petr Lautrbach 6.2p2-4 + 0.9.3-5Petr Lautrbach 6.2p2-3 + 0.9.3-5Petr Lautrbach 6.2p2-2 + 0.9.3-5Petr Lautrbach 6.2p2-1 + 0.9.3-5Petr Lautrbach 6.2p1-4 + 0.9.3-4Petr Lautrbach 6.2p1-3 + 0.9.3-4Petr Lautrbach 6.2p1-2 + 0.9.3-4Petr Lautrbach 6.2p1-1 + 0.9.3-4Petr Lautrbach 6.1p1-7 + 0.9.3-3Petr Lautrbach 6.1p1-6 + 0.9.3-3Petr Lautrbach 6.1p1-5 + 0.9.3-3Petr Lautrbach 6.1p1-4 + 0.9.3-3Petr Lautrbach 6.1p1-3 + 0.9.3-3Petr Lautrbach 6.1p1-2Petr Lautrbach 6.1p1-1 + 0.9.3-3Petr Lautrbach 6.0p1-1 + 0.9.3-2Petr Lautrbach 5.9p1-26 + 0.9.3-1Petr Lautrbach 5.9p1-25 + 0.9.3-1Tomas Mraz 5.9p1-24 + 0.9.3-1Tomas Mraz 5.9p1-23 + 0.9.3-1Petr Lautrbach 5.9p1-22 + 0.9.2-32Petr Lautrbach 5.9p1-21 + 0.9.2-32Petr Lautrbach 5.9p1-20 + 0.9.2-32Petr Lautrbach 5.9p1-19 + 0.9.2-32Petr Lautrbach 5.9p1-18 + 0.9.2-32Petr Lautrbach 5.9p1-17 + 0.9.2-32Tomas Mraz 5.9p1-16 + 0.9.2-32Tomas Mraz 5.9p1-15 + 0.9.2-32Petr Lautrbach 5.9p1-14 + 0.9.2-32Tomas Mraz - 5.9p1-13 + 0.9.2-32Tomas Mraz - 5.9p1-12 + 0.9.2-32Tomas Mraz - 5.9p1-11 + 0.9.2-32Jan F. Chadima - 5.9p1-10 + 0.9.2-32Jan F. Chadima - 5.9p1-9 + 0.9.2-32Jan F. Chadima - 5.9p1-8 + 0.9.2-32Jan F. Chadima - 5.9p1-7 + 0.9.2-32Jan F. Chadima - 5.9p1-6 + 0.9.2-32Jan F. Chadima - 5.9p1-5 + 0.9.2-32Jan F. Chadima - 5.9p1-3 + 0.9.2-32Jan F. Chadima - 5.9p1-2 + 0.9.2-32Jan F. Chadima - 5.9p1-1 + 0.9.2-32Jan F. Chadima - 5.8p2-21 + 0.9.2-31Jan F. Chadima - 5.8p2-20 + 0.9.2-31Jan F. Chadima - 5.8p2-19 + 0.9.2-31Jan F. Chadima - 5.8p2-18 + 0.9.2-31Jan F. Chadima - 5.8p2-17 + 0.9.2-31Jan F. Chadima - 5.8p2-16 + 0.9.2-31Jan F. Chadima - 5.8p2-15 + 0.9.2-31Jan F. Chadima - 5.8p2-14 + 0.9.2-31Jan F. Chadima - 5.8p2-12 + 0.9.2-31Jan F. Chadima - 5.8p2-10 + 0.9.2-31Jan F. Chadima - 5.8p2-9 + 0.9.2-31Jan F. Chadima - 5.8p2-7 + 0.9.2-31Jan F. Chadima - 5.8p2-6 + 0.9.2-31Jan F. Chadima - 5.8p2-5 + 0.9.2-31Jan F. Chadima - 5.8p2-4 + 0.9.2-31Jan F. Chadima - 5.8p2-3 + 0.9.2-31Jan F. Chadima - 5.8p2-2 + 0.9.2-31Jan F. Chadima - 5.8p2-1 + 0.9.2-31Jan F. Chadima - 5.8p1-34 + 0.9.2-30Jan F. Chadima - 5.8p1-33 + 0.9.2-30Jan F. Chadima - 5.8p1-32 + 0.9.2-30Jan F. Chadima - 5.8p1-30 + 0.9.2-30Jan F. Chadima - 5.8p1-28 + 0.9.2-30Jan F. Chadima - 5.8p1-27 + 0.9.2-30Jan F. Chadima - 5.8p1-26 + 0.9.2-30Jan F. Chadima - 5.8p1-25 + 0.9.2-30Jan F. Chadima - 5.8p1-24 + 0.9.2-30Jan F. Chadima - 5.8p1-23 + 0.9.2-30Jan F. Chadima - 5.8p1-22 + 0.9.2-30Jan F. Chadima - 5.8p1-20 + 0.9.2-30Jan F. Chadima - 5.8p1-18 + 0.9.2-30Jan F. Chadima - 5.8p1-17 + 0.9.2-30Jan F. Chadima - 5.8p1-16 + 0.9.2-30Jan F. Chadima - 5.8p1-15 + 0.9.2-30Jan F. Chadima - 5.8p1-14 + 0.9.2-30Jan F. Chadima - 5.8p1-13 + 0.9.2-30Jan F. Chadima - 5.8p1-12 + 0.9.2-30Jan F. Chadima - 5.8p1-11 + 0.9.2-30Jan F. Chadima - 5.8p1-10 + 0.9.2-30Jan F. Chadima - 5.8p1-9 + 0.9.2-30Jan F. Chadima - 5.8p1-8 + 0.9.2-30Jan F. Chadima - 5.8p1-4 + 0.9.2-30Jan F. Chadima - 5.8p1-3 + 0.9.2-30Jan F. Chadima - 5.8p1-1 + 0.9.2-30Fedora Release Engineering - 5.6p1-30.1Jan F. Chadima - 5.6p1-30 + 0.9.2-29Jan F. Chadima - 5.6p1-28 + 0.9.2-29Jan F. Chadima - 5.6p1-25 + 0.9.2-29Jan F. Chadima - 5.6p1-24 + 0.9.2-29Jan F. Chadima - 5.6p1-23 + 0.9.2-29Jan F. Chadima - 5.6p1-22 + 0.9.2-29Jan F. Chadima - 5.6p1-21 + 0.9.2-29Jan F. Chadima - 5.6p1-20 + 0.9.2-29Jan F. Chadima - 5.6p1-19 + 0.9.2-28Jan F. Chadima - 5.6p1-18 + 0.9.2-27Jan F. Chadima - 5.6p1-17 + 0.9.2-27Jan F. Chadima - 5.6p1-16 + 0.9.2-27Jan F. Chadima - 5.6p1-15 + 0.9.2-27Jan F. Chadima - 5.6p1-14 + 0.9.2-27Jan F. Chadima - 5.6p1-12 + 0.9.2-27Jan F. Chadima - 5.6p1-11 + 0.9.2-27Jan F. Chadima - 5.6p1-10 + 0.9.2-27Jan F. Chadima - 5.6p1-9 + 0.9.2-27Jan F. Chadima - 5.6p1-8 + 0.9.2-27Jan F. Chadima - 5.6p1-7 + 0.9.2-27Jan F. Chadima - 5.6p1-6 + 0.9.2-27Jan F. Chadima - 5.6p1-5 + 0.9.2-27Jan F. Chadima - 5.6p1-4 + 0.9.2-27Tomas Mraz - 5.6p1-3 + 0.9.2-27Jan F. Chadima - 5.6p1-2 + 0.9.2-27Jan F. Chadima - 5.6p1-1 + 0.9.2-27Jan F. Chadima - 5.5p1-18 + 0.9.2-26Jan F. Chadima - 5.5p1-17 + 0.9.2-26Jan F. Chadima - 5.5p1-16 + 0.9.2-26Jan F. Chadima - 5.5p1-15 + 0.9.2-26Jan F. Chadima - 5.5p1-14 + 0.9.2-26Jan F. Chadima - 5.5p1-13 + 0.9.2-26Jan F. Chadima - 5.5p1-12 + 0.9.2-26Jan F. Chadima - 5.5p1-11 + 0.9.2-26Jan F. Chadima - 5.5p1-10 + 0.9.2-26Jan F. Chadima - 5.5p1-9 + 0.9.2-26Jan F. Chadima - 5.5p1-8 + 0.9.2-26Jan F. Chadima - 5.5p1-7 + 0.9.2-26Jan F. Chadima - 5.5p1-6 + 0.9.2-26Jan F. Chadima - 5.5p1-5 + 0.9.2-26Jan F. Chadima - 5.5p1-4 + 0.9.2-26Jan F. Chadima - 5.5p1-3 + 0.9.2-26Jan F. Chadima - 5.5p1-2 + 0.9.2-26Jan F. Chadima - 5.5p1-1 + 0.9.2-26Jan F. Chadima - 5.4p1-3 + 0.9.2-25Jan F. Chadima - 5.4p1-2Jan F. Chadima - 5.4p1-1Jan F. Chadima - 5.4p1-0.snap20100302.1Jan F. Chadima - 5.3p1-22Jan F. Chadima - 5.3p1-21Jan F. Chadima - 5.3p1-20Tomas Mraz - 5.3p1-19Jan F. Chadima - 5.3p1-18Jan F. Chadima - 5.3p1-17Jan F. Chadima - 5.3p1-16Jan F. Chadima - 5.3p1-15Jan F. Chadima - 5.3p1-14Jan F. Chadima - 5.3p1-13Jan F. Chadima - 5.3p1-12Jan F. Chadima - 5.3p1-11Jan F. Chadima - 5.3p1-10Jan F. Chadima - 5.3p1-9Jan F. Chadima - 5.3p1-8Jan F. Chadima - 5.3p1-7Jan F. Chadima - 5.3p1-6Jan F. Chadima - 5.3p1-5Tomas Mraz - 5.3p1-4Jan F. Chadima - 5.3p1-3Jan F. Chadima - 5.3p1-2Jan F. Chadima - 5.2p1-29Jan F. Chadima - 5.2p1-28Jan F. Chadima - 5.2p1-26Jan F. Chadima - 5.2p1-25Jan F. Chadima - 5.2p1-24Jan F. Chadima - 5.2p1-23Jan F. Chadima - 5.2p1-22Jan F. Chadima - 5.2p1-21Jan F. Chadima - 5.2p1-20Jan F. Chadima - 5.2p1-19Tomas Mraz - 5.2p1-18Jan F. Chadima - 5.2p1-17Fedora Release Engineering - 5.2p1-16Jan F. Chadima - 5.2p1-15Jan F. Chadima - 5.2p1-14Jan F. Chadima - 5.2p1-13Jan F. Chadima - 5.2p1-12Jan F. Chadima - 5.2p1-11Jan F. Chadima - 5.2p1-10Jan F. Chadima - 5.2p1-9Jan F. Chadima - 5.2p1-8Tomas Mraz - 5.2p1-6Tomas Mraz - 5.2p1-5Tomas Mraz - 5.2p1-4Jan F. Chadima - 5.2p1-3Tomas Mraz - 5.2p1-2Jan F. Chadima - 5.2p1-1Fedora Release Engineering - 5.1p1-8Tomas Mraz - 5.1p1-7Tomas Mraz - 5.1p1-6Tomas Mraz - 5.1p1-5Tomas Mraz - 5.1p1-4Tomas Mraz - 5.1p1-3Tomas Mraz - 5.1p1-2Tomas Mraz - 5.1p1-1Tomas Mraz - 5.0p1-3Tomas Mraz - 5.0p1-2Tomas Mraz - 5.0p1-1Tomas Mraz - 4.7p1-10Tomas Mraz - 4.7p1-9Dennis Gilmore - 4.7p1-8Tomas Mraz - 4.7p1-7Tomas Mraz - 4.7p1-6Release Engineering - 4.7p1-5Tomas Mraz - 4.7p1-4Tomas Mraz - 4.7p1-2Tomas Mraz - 4.7p1-1Tomas Mraz - 4.5p1-8Tomas Mraz - 4.5p1-7Tomas Mraz - 4.5p1-6Tomas Mraz - 4.5p1-5Tomas Mraz - 4.5p1-4Tomas Mraz - 4.5p1-3Tomas Mraz - 4.5p1-2Tomas Mraz - 4.5p1-1Tomas Mraz - 4.3p2-14Tomas Mraz - 4.3p2-13Tomas Mraz - 4.3p2-12Tomas Mraz - 4.3p2-11Tomas Mraz - 4.3p2-10Tomas Mraz - 4.3p2-9Tomas Mraz - 4.3p2-8Tomas Mraz - 4.3p2-7Tomas Mraz - 4.3p2-6Jesse Keating - 4.3p2-5.1Tomas Mraz - 4.3p2-5Tomas Mraz - 4.3p2-4Tomas Mraz - 4.3p2-3Tomas Mraz - 4.3p2-2Tomas Mraz - 4.3p2-1Jesse Keating - 4.3p1-2.1Tomas Mraz - 4.3p1-2Tomas Mraz - 4.3p1-1Tomas Mraz - 4.2p1-10Jesse Keating Tomas Mraz - 4.2p1-9Nalin Dahyabhai - 4.2p1-8Warren Togami - 4.2p1-7Jeremy Katz - 4.2p1-6Tomas Mraz 4.2p1-5Dan Walsh 4.2p1-4Tomas Mraz 4.2p1-3Tomas Mraz 4.2p1-2Tomas Mraz 4.2p1-1Tomas Mraz 4.1p1-5Tomas Mraz 4.1p1-4Tomas Mraz 4.1p1-3Tomas Mraz 4.1p1-2Tomas Mraz 4.1p1-1Tomas Mraz 4.0p1-3Tomas Mraz 4.0p1-2Tomas Mraz 4.0p1-1Elliot Lee Nalin Dahyabhai 3.9p1-12Tomas Mraz 3.9p1-11Tomas Mraz Tomas Mraz 3.9p1-10Tomas Mraz Bill Nottingham 3.9p1-9Thomas Woerner 3.9p1-8.1Nalin Dahyabhai 3.9p1-8Bill Nottingham 3.9p1-7Nalin Dahyabhai 3.9p1-6Nalin Dahyabhai Daniel Walsh 3.9p1-5Daniel Walsh 3.9p1-4Daniel Walsh 3.9p1-3Daniel Walsh 3.9p1-2Daniel Walsh 3.9p1-1Alan Cox 3.8.1p1-5Daniel Walsh 3.8.1p1-4Elliot Lee Daniel Walsh 3.8.1p1-2Nalin Dahyabhai 3.8.1p1-1Daniel Walsh 3.6.1p2-36Nalin Dahyabhai 3.8.1p1-0Daniel Walsh 3.6.1p2-35Daniel Walsh 3.6.1p2-34Daniel Walsh 3.6.1p2-33Thomas Woerner 3.6.1p2-32Daniel Walsh 3.6.1p2-31Daniel Walsh 3.6.1p2-30Daniel Walsh 3.6.1p2-29Elliot Lee Daniel Walsh 3.6.1p2-27Daniel Walsh 3.6.1p2-26Daniel Walsh 3.6.1p2-25Daniel Walsh 3.6.1p2-24Nalin Dahyabhai Nalin Dahyabhai David Woodhouse 3.6.1p2-23Nalin Dahyabhai Daniel Walsh 3.6.1p2-22Daniel Walsh 3.6.1p2-21.selDaniel Walsh 3.6.1p2-21Daniel Walsh 3.6.1p2-20.selNalin Dahyabhai Nalin Dahyabhai 3.6.1p2-19Nalin Dahyabhai 3.6.1p2-18Daniel Walsh 3.6.1p2-17Daniel Walsh 3.6.1p2-16.selBill Nottingham 3.6.1p2-15Bill Nottingham 3.6.1p2-14Daniel Walsh 3.6.1p2-13.selNalin Dahyabhai 3.6.1p2-12Nalin Dahyabhai 3.6.1p2-11Daniel Walsh 3.6.1p2-10Daniel Walsh 3.6.1p2-9.selDaniel Walsh 3.6.1p2-8Nalin Dahyabhai 3.6.1p2-7Nalin Dahyabhai 3.6.1p2-6Daniel Walsh 3.6.1p2-5Nalin Dahyabhai 3.6.1p2-4Nalin Dahyabhai 3.6.1p2-3Nalin Dahyabhai 3.6.1p2-2Nalin Dahyabhai 3.6.1p2-1Elliot Lee Florian La Roche Nalin Dahyabhai 3.5p1-6Nalin Dahyabhai 3.5p1-5Tim Powers Nalin Dahyabhai 3.5p1-3Nalin Dahyabhai 3.5p1-2Nalin Dahyabhai 3.5p1-1Nalin Dahyabhai 3.4p1-3Than Ngo 3.4p1-2.1Curtis Zinzilieta 3.4p1-2gssNalin Dahyabhai 3.4p1-2Nalin Dahyabhai 3.4p1-1Nalin Dahyabhai 3.3p1-2Nalin Dahyabhai 3.3p1-1Tim Powers Nalin Dahyabhai 3.2.3p1-3Nalin Dahyabhai 3.2.3p1-2Nalin Dahyabhai 3.2.3p1-1Nalin Dahyabhai 3.2.2p1-1Nalin Dahyabhai 3.1p1-4Nalin Dahyabhai 3.1p1-3Nalin Dahyabhai 3.1p1-2gssNalin Dahyabhai 3.1p1-2Nalin Dahyabhai 3.1p1-1Nalin Dahyabhai 3.1p1-0Nalin Dahyabhai SNAP-20020305Nalin Dahyabhai SNAP-20020220Nalin Dahyabhai 3.0.2p1-3Nalin Dahyabhai 3.0.2p1-2Nalin Dahyabhai Nalin Dahyabhai 3.0.2p1-1Nalin Dahyabhai 3.0.1p1-1Nalin Dahyabhai Nalin Dahyabhai 3.0p1-1Nalin Dahyabhai Nalin Dahyabhai 2.9p2-9Bernhard Rosenkraenzer 2.9p2-8Nalin Dahyabhai 2.9p2-7Nalin Dahyabhai 2.9p2-6Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Preston Brown Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Trond Eivind Glomsrxd Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller - Upstream: Ignore SIGPIPE earlier in main() Resolves: RHEL-37743- Providing a kill switch for scp to deal with CVE-2020-15778 Resolves: RHEL-22870- Fix Terrapin attack Resolves: RHEL-19308- Fix Terrapin attack Resolves: RHEL-19308 - Forbid shell metasymbols in username/hostname Resolves: RHEL-19788- Using DigestSign/DigestVerify functions for better FIPS compatibility Resolves: RHEL-5217- Limit artificial delays in sshd while login using AD user Resolves: RHEL-1684 - Add comment to OpenSSH server config about FIPS-incompatible key Resolves: RHEL-5221 - Avoid killing all processes on system in case of race condition Resolves: RHEL-11548 - Avoid sshd_config 256K limit Resolves: RHEL-5279 - Using DigestSign/DigestVerify functions for better FIPS compatibility Resolves: RHEL-5217 - Fix GSS KEX causing ssh failures when connecting to WinSSHD Resolves: RHEL-5321- rebuilt Related: CVE-2023-38408- Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- Fix parsing of IPv6 IPs in sftp client (#2151334) - Avoid ssh banner one-byte overflow (#2138344) - Avoid crash of sshd when Include folder does not exist (#2133087)- Omit client side from minimize-sha1-use.patch to prevent regression (#2093897)- Fix new issues found by static analyzers- Upstream: add a local implementation of BSD realpath() for sftp-server (#2064249) - Change product name from Fedora to RHEL in openssh-7.8p1-UsePAM-warning.patch (#1953807) - Include caveat for crypto-policy in sshd manpage (#2044354) - Change log level of FIPS specific log message to verbose (#2050511) - Clarify force_file_perms (-m) documentation in sftp-server manpage (#1862504) - Minimize the use of SHA1 as a proof of possession for RSA key (#2093897)- Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)- Add support for "Include" directive in sshd_config file (#1926103)- CVE-2021-41617 upstream fix (#2008885)- sshd -T requires -C when "Match" is used in sshd_config (#1836277)- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252) - Hostbased ssh authentication fails if session ID contains a '/' (#1944125)- ssh doesn't restore the blocking mode on standard output (#1942901)- SFTP sort upon the modification time (#1909988) - ssh-keygen printing fingerprint issue with Windows keys (#1901518) - PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372) - ssh-agent segfaults during ssh-add -s pkcs11 (#1868996) - ssh-copy-id could not resolve ipv6 address ends with colon (#1933517) - sshd provides PAM an incorrect error code (#1879503)- Openssh client window fix (#1913041)- Do not print "no slots" warning by default (#1744220) - Unbreak connecting using gssapi through proxy commands (#1749862) - Document in manual pages that CASignatureAlgorithms are handled by crypto policies (#1790604) - Use SHA2-based signature algorithms by default for signing certificates (#1790610) - Prevent simple ProxyJump loops in configuration files (#1804099) - Teach ssh-keyscan to use SHA2 RSA variants (#1744108) - Do not fail hard if getrandom() is not available and no SSH_USE_STRONG_RNG is specified (#1812120) - Improve wording of crypto policies references in manual pages (#1812854) - Do not break X11 forwarding if IPv6 is disabled (#1662189) - Enable SHA2-based GSSAPI key exchange algorithms by default (#1816226) - Mark RDomain server configuration option unsupported in RHEL (#1807686) - Clarify crypto policies defaults in manual pages (#1724195) - Mention RSA SHA2 variants in ssh-keygen manual page (#1665900)- Restore entropy patch for CC certification (#1785655)- Fix typos in manual pages (#1668325) - Use the upstream support for PKCS#8 PEM files alongside with the legacy PEM files (#1712436) - Unbreak ssh-keygen -A in FIPS mode (#1732424) - Add missing RSA certificate types to offered hostkey types in FIPS mode (#1732449)- Allow specifying a pin-value in PKCS #11 URI in ssh-add (#1639698) - Whitelist another syscall variant for s390x cryptographic module (ibmca engine) (#1714915)- New upstream release (#1691045) - Remove support for unused VendorPatchLevel configuration option - Fix kerberos cleanup procedures (#1683295) - Do not negotiate arbitrary primes with DH GEX in FIPS (#1685096) - Several GSSAPI key exchange improvements and sync with Debian - Allow to use labels in PKCS#11 URIs even if they do not match on private key (#1671262) - Do not fall back to sshd_net_t SELinux context (#1678695) - Use FIPS compliant high-level signature OpenSSL API and KDF - Mention crypto-policies in manual pages - Do not fail if non-FIPS approved algorithm is enabled in FIPS - Generate the PEM files in new PKCS#8 format without the need of MD5 (#1712436)- Unbreak PKCS#11 URI tests (#1648262) - Allow to disable RSA signatures with SHA1 (#1648898) - Dump missing GSS options from client configuration (#1649505) - Minor fixes from Fedora related to GSSAPI and keberos - Follow the system-wide PATH settings- Disable OpenSSH hardening flags and use the ones provided by system (#1630615) - Ignore unknown parts of PKCS#11 URI (#1631478) - Do not fail with GSSAPI enabled in match blocks (#1580017) - Fix the segfaulting cavs test (#1629692)- New upstream release fixing CVE 2018-15473 - Remove unused patches - Remove reference to unused enviornment variable SSH_USE_STRONG_RNG - Address coverity issues - Unbreak scp between two IPv6 hosts (#1620333) - Unbreak GSSAPI key exchange (#1624323) - Unbreak rekeying with GSSAPI key exchange (#1624344)- Fix listing of kex algoritms in FIPS mode - Allow aes-gcm cipher modes in FIPS mode - Coverity fixes- Disable manual printing of motd by default (#1591381)- Better handling of kerberos tickets storage (#1566494) - Add pam_motd to pam stack (#1591381)- Fix tun devices and other issues fixed after release upstream (#1567775)- Do not break quotes parsing in configuration file (#1566295)- New upstream release (#1563223) - Add support for ECDSA keys in PKCS#11 (#1354510) - Add support for PKCS#11 URIs- Require crypto-policies version and new path - Remove bogus NSS linking- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- Rebuild for gcc bug on i386 (#1536555)- Rebuild to work around gcc bug leading to sshd miscompilation (#1538648)- Rebuilt for switch to libxcrypt- Drop support for TCP wrappers (#1530163) - Do not pass hostnames to audit -- UseDNS is usually disabled (#1534577)- Whitelist gettid() syscall in seccomp filter (#1524392)- Do not segfault during audit cleanup (#1524233) - Avoid gcc warnings about uninitialized variables- Do not build everything against libldap - Do not segfault for ECC keys in PKCS#11- New upstream release OpenSSH 7.6 - Addressing review remarks for OpenSSL 1.1.0 patch - Fix PermitOpen bug in OpenSSH 7.6 - Drop support for ExposeAuthenticationMethods option- Do not export KRB5CCNAME if the default path is used (#1199363) - Add enablement for openssl-ibmca and openssl-ibmpkcs11 (#1477636) - Add new GSSAPI kex algorithms with SHA-2, but leave them disabled for now - Enforce pam_sepermit for all logins in SSH (#1492313) - Remove pam_reauthorize, since it is not needed by cockpit anymore (#1492313)- Another less-intrusive approach to crypto policy (#1479271)- Remove SSH-1 subpackage for Fedora 27 (#1474942) - Follow system-wide crypto policy in server (#1479271)- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Sync downstream patches with RHEL (FIPS) - Resolve potential issues with OpenSSL 1.1.0 patch- Fix various after-release typos including failed build in s390x (#1434341) - Revert chroot magic with SELinux- New upstream release- Avoid sending the SD_NOTIFY messages from wrong processes (#1427526) - Address reports by coverity- Properly report errors from included files (#1408558) - New pam_ssh_agent_auth 0.10.3 release - Switch to SD_NOTIFY to make systemd happy- Fix ssh-agent cert signing error (#1416584) - Fix wrong path to crypto policies - Attempt to resolve issue with systemd- New upstream release (#1406204) - Cache supported OIDs for GSSAPI key exchange (#1395288) - Fix typo causing heap corruption (use-after-free) (#1409433) - Prevent hangs with long MOTD- Properly deserialize received RSA certificates in ssh-agent (#1402029) - Move MAX_DISPLAYS to a configuration option- GSSAPI requires futex syscall in privsep child (#1395288)- Build against OpenSSL 1.1.0 with compat changes - Recommend crypto-policies - Fix chroot dropping capabilities (#1386755)- Fix NULL dereference (#1380297) - Include client Crypto Policy (#1225752)- Proper content of included configuration file- Fix permissions on the include directory (#1365270)- New upstream release (#1362156)- Remove slogin and sshd-keygen (#1359762) - Prevent guest_t from running sudo (#1357860)- CVE-2016-6210: User enumeration via covert timing channel (#1357443) - Expose more information about authentication to PAM - Make closefrom() ignore softlinks to the /dev/ devices on s390- Fix wrong detection of UseLogin in server configuration (#1350347)- Enable seccomp filter for MIPS architectures - UseLogin=yes is not supported in Fedora - SFTP server forced permissions should restore umask - pam_ssh_agent_auth: Fix conflict bewteen two getpwuid() calls (#1349551)- Fix regression in certificate-based authentication (#1333498) - Check for real location of .k5login file (#1328243) - Fix unchecked dereference in pam_ssh_agent_auth - Clean up old patches - Build with seccomp filter on ppc64(le) (#1195065)- Add legacy sshd-keygen for anaconda (#1331077)- CVE-2015-8325: ignore PAM environment vars when UseLogin=yes (#1328013) - Fix typo in sysconfig/sshd (#1325535)- Revise socket activation and services dependencies (#1325535) - Drop unused init script- Make sshd-keygen comply with packaging guidelines (#1325535) - Soft-deny socket() syscall in seccomp sandbox (#1324493) - Remove *sha1 Kex in FIPS mode (#1324493) - Remove *gcm ciphers in FIPS mode (#1324493)- Fix GSSAPI Key Exchange according to RFC (#1323622) - Remove init.d/functions dependency from sshd-keygen (#1317722) - Do not use MD5 in pam_ssh_agent_auth in FIPS mode- New upstream (security) release (#1316529) - Clean up audit patch- Restore slogin symlinks to preserve backward compatibility- New upstream release (#1312870)- Fix race condition in auditing events when using multiplexing (#1308295) - Fix X11 forwarding CVE according to upstream - Fix problem when running without privsep (#1303910) - Remove hard glob limit in SFTP- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild- Fix segfaults with pam_ssh_agent_auth (#1303036) - Silently disable X11 forwarding on problems - Systemd service should be forking to detect immediate failures- Rebased to recent version of pam_ssh_agent_auth - Upstream fix for CVE-2016-1908 - Remove useless defattr- New security upstream release for CVE-2016-0777- Change RPM define macros to global according to packaging guidelines - Fix wrong handling of SSH_COPY_ID_LEGACY environment variable - Update ssh-agent and ssh-keysign permissions (#1296724) - Fix few problems with alternative builds without GSSAPI or openSSL - Fix condition to run sshd-keygen- Preserve IUTF8 tty mode flag over ssh connections (#1270248) - Do not require sysconfig file to start service (#1279521) - Update ssh-copy-id to upstream version - GSSAPI Key Exchange documentation improvements - Remove unused patches- Do not set user context too many times for root logins (#1269072)- Review SELinux user context handling after authentication (#1269072) - Handle root logins the same way as other users (#1269072) - Audit implicit mac, if mac is covered in cipher (#1271694) - Increase size limit for remote glob over sftp- Fix FIPS mode for DH kex (#1260253) - Provide full RELRO and PIE form askpass helper (#1264036) - Fix gssapi key exchange on server and client (#1261414) - Allow gss-keyex root login when without-password is set (upstream #2456) - Fix obsolete usage of SELinux constants (#1261496)- Fix warnings reported by gcc related to keysign and keyAlgorithms- New upstream release- Fix problem with DSA keys using pam_ssh_agent_auth (#1251777) - Add GSSAPIKexAlgorithms option for server and client application - Possibility to validate legacy systems by more fingerprints (#1249626)- New upstream release (#1252639) - Fix pam_ssh_agent_auth package (#1251777) - Security: Use-after-free bug related to PAM support (#1252853) - Security: Privilege separation weakness related to PAM support (#1252854) - Security: Incorrectly set TTYs to be world-writable (#1252862)- Handle terminal control characters in scp progressmeter (#1247204)- CVE-2015-5600: only query each keyboard-interactive device once (#1245971)- Enable SECCOMP filter for s390* architecture (#1195065) - Fix race condition when multiplexing connection (#1242682)- New upstream release (#1238253) - Increase limitation number of files which can be listed using glob in sftp - Correctly revert "PermitRootLogin no" option from upstream sources (#89216)- Allow socketcall(SYS_SHUTDOWN) for net_child on ix86 architecture- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild- Return stat syscall to seccomp filter (#1228323)- Handle pam_ssh_agent_auth memory, buffers and variable sizes (#1225106)- Resolve problem with pam_ssh_agent_auth after rebase (#1225106) - ssh-copy-id: tcsh doesnt work with multiline strings - Fix upstream memory problems - Add missing options in testmode output and manual pages - Provide LDIF version of LPK schema - Document required selinux boolean for working ssh-ldap-helper- Fix segfault on daemon exit caused by API change (#1213423)- Fix audit_end_command to restore ControlPersist function (#1203900)- Fixed issue with GSSAPI key exchange (#1207719) - Add pam_namespace to sshd pam stack (based on #1125110) - Remove krb5-config workaround for #1203900 - Fix handling SELinux context in MLS systems - Regression: solve sshd segfaults if other instance already running- Update audit and gss patches after rebase - Fix reintroduced upstrem bug #1878- new upstream release openssh-6.8p1 (#1203245) - Resolve segfault with auditing commands (#1203900) - Workaround krb5-config bug (#1204646)- Ability to specify LDAP filter in ldap.conf for ssh-ldap-helper - Fix auditing when using combination of ForceCommand and PTY - Add sftp option to force mode of created files (from rhel) - Fix tmpfiles.d entries to be more consistent (#1196807)- Add tmpfiles.d entries (#1196807)- Adjust seccomp filter for primary architectures and solve aarch64 issue (#1197051) - Solve issue with ssh-copy-id and keys without trailing newline (#1093168)- Add AArch64 support for seccomp_filter sandbox (#1195065)- Fix seccomp filter on architectures without getuid32- Update seccomp filter to work on i686 architectures (#1194401) - Fix previous failing build (#1195065)- Only use seccomp for sandboxing on supported platforms- Move cavs tests into subpackage -cavs (#1194320)- update coverity patch - make output of sshd -T more consistent (#1187521) - enable seccomp for sandboxing instead of rlimit (#1062953) - update hardening to compile on gcc5 - Add SSH KDF CAVS test driver (#1193045) - Fix ssh-copy-id on non-sh remote shells (#1045191)- fixed audit patch after rebase- new upstream release openssh-6.7p1- error message if scp when directory doesn't exist (#1142223) - parsing configuration file values (#1130733) - documentation in service and socket files for systemd (#1181593) - updated ldap patch (#981058) - fixed vendor-patchlevel - add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1170745)- log via monitor in chroots without /dev/log- the .local domain example should be in ssh_config, not in sshd_config - use different values for DH for Cisco servers (#1026430)- fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005)- correct the calculation of bytes for authctxt->krb5_ccname (#1161073)- privsep_preauth: use SELinux context from selinux-policy (#1008580) - change audit trail for unknown users (mindrot#2245) - fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly - revert the default of KerberosUseKuserok back to yes (#1153076) - ignore SIGXFSZ in postauth monitor (mindrot#2263) - sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode- set a client's address right after a connection is set (mindrot#2257) - apply RFC3454 stringprep to banners when possible (mindrot#2058) - don't consider a partial success as a failure (mindrot#2270)- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild- fix license handling (both)- standardise on NI_MAXHOST for gethostname() string lengths (#1051490)- add pam_reauthorize.so to sshd.pam (#1115977) - spec file and patches clenup- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild- disable the curve25519 KEX when speaking to OpenSSH 6.5 or 6.6 - add support for ED25519 keys to sshd-keygen and sshd.sysconfig - drop openssh-server-sysvinit subpackage - slightly change systemd units logic - use sshd-keygen.service (#1066615)- new upstream release openssh-6.6p1- use SSH_COPY_ID_LEGACY variable to run ssh-copy-id in the legacy mode - make /etc/ssh/moduli file public (#1043661) - test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service - don't clean up gssapi credentials by default (#1055016) - ssh-agent - try CLOCK_BOOTTIME with fallback (#1091992) - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338) - ignore environment variables with embedded '=' or '\0' characters - CVE-2014-2532 (#1077843)- sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default- fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662)- new upstream release- adjust gss kex mechanism to the upstream changes (#1024004) - don't use xfree in pam_ssh_agent_auth sources (#1024965)- rebuild with the openssl with the ECC support- don't use SSH_FP_MD5 for fingerprints in FIPS mode- use default_ccache_name from /etc/krb5.conf for a kerberos cache (#991186) - increase the size of the Diffie-Hellman groups (#1010607) - sshd-keygen to generate ECDSA keys (#1019222)- new upstream release (#1007769)- use dracut-fips package to determine if a FIPS module is installed - revert -fips subpackages and hmac files suffixes- sshd-keygen: generate only RSA keys by default (#1010092) - use dist tag in suffixes for hmac checksum files- use hmac_suffix for ssh{,d} hmac checksums - bump the minimum value of SSH_USE_STRONG_RNG to 14 according to SP800-131A - automatically restart sshd.service on-failure after 42s interval- add -fips subpackages that contains the FIPS module files- gssapi credentials need to be stored before a pam session opened (#987792)- don't show Success for EAI_SYSTEM (#985964) - make sftp's libedit interface marginally multibyte aware (#841771)- move default gssapi cache to /run/user/ (#848228)- add socket activated sshd units to the package (#963268) - fix the example in the HOWTO.ldap-keys- new upstream release (#963582)- don't use export in sysconfig file (#953111)- sshd.service: use KillMode=process (#890376) - add latest config.{sub,guess} to support aarch64 (#926284)- keep track of which IndentityFile options were manually supplied and which were default options, and don't warn if the latter are missing. (mindrot#2084)- new upstream release (#924727)- use SELinux type sshd_net_t for [net] childs (#915085)- fix AuthorizedKeysCommand option- change default value of MaxStartups - CVE-2010-5107 (#908707)- fix segfault in openssh-5.8p2-force_krb.patch (#882541)- replace RequiredAuthentications2 with AuthenticationMethods based on upstream - obsolete RequiredAuthentications[12] options - fix openssh-6.1p1-privsep-selinux.patch- add SELinux comment to /etc/ssh/sshd_config about SELinux command to modify port (#861400) - drop required chkconfig (#865498) - drop openssh-5.9p1-sftp-chroot.patch (#830237)- new upstream release (#852651) - use DIR: kerberos type cache (#848228) - don't use chroot_user_t for chrooted users (#830237) - replace scriptlets with systemd macros (#850249) - don't use /bin and /sbin paths (#856590)- new upstream release- change SELinux context also for root user (#827109)- fix various issues in openssh-5.9p1-required-authentications.patch- allow sha256 and sha512 hmacs in the FIPS mode- fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent is not running, most probably not exploitable - update pam_ssh_agent_auth to 0.9.3 upstream version- don't create RSA1 key in FIPS mode - don't install sshd-keygen.service (#810419)- fix various issues in openssh-5.9p1-required-authentications.patch- Fix dependencies in systemd units, don't enable sshd-keygen.service (#805338)- Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)- replace TwoFactorAuth with RequiredAuthentications[12] https://bugzilla.mindrot.org/show_bug.cgi?id=983- run privsep slave process as the users SELinux context (#781634)- add CAVS test driver for the aes-ctr ciphers- enable aes-ctr ciphers use the EVP engines from OpenSSL such as the AES-NI- warn about unsupported option UsePAM=no (#757545)- add back the restorecon call to ssh-copy-id - it might be needed on older distributions (#739989)- still support /etc/sysconfig/sshd loading in sshd service (#754732) - fix incorrect key permissions generated by sshd-keygen script (#754779)- remove unnecessary requires on initscripts - set VerifyHostKeyDNS to ask in the default configuration (#739856)- selinux sandbox rewrite - two factor authentication tweaking- coverity upgrade - wipe off nonfunctional nss - selinux sandbox tweaking- coverity upgrade - experimental selinux sandbox- fully reanable auditing- repair signedness in akc patch- temporarily disable part of audit4 patch- Coverity second pass - Reenable akc patch- Coverity first pass- Rebase to 5.9p1 - Add chroot sftp patch - Add two factor auth patch- ignore SIGPIPE in ssh keyscan- save ssh-askpass's debuginfo- compile ssh-askpass with corect CFLAGS- improve selinux's change context log- repair broken man pages- rebuild due to broken rpmbiild- Do not change context when run under unconfined_t- Add postlogin to pam. (#718807)- Systemd compatibility according to Mathieu Bridon - Split out the host keygen into their own command, to ease future migration to systemd. Compatitbility with the init script was kept. - Migrate the package to full native systemd unit files, according to the Fedora packaging guidelines. - Prepate the unit files for running an ondemand server. (do not add it actually)- Mention IPv6 usage in man pages- Improve init script- Add possibility to compile openssh without downstream patches- remove stale control sockets (#706396)- improove entropy manuals- improove entropy handling - concat ldap patches- improove ldap manuals- add gssapi forced command- update the openssh version- temporarily disabling systemd units- add flags AI_V4MAPPED and AI_ADDRCONFIG to getaddrinfo- update scriptlets- add systemd units- improving sshd -> passwd transation - add template for .local domain to sshd_config- the private keys may be 640 root:ssh_keys ssh_keysign is sgid- improving sshd -> passwd transation- the intermediate context is set to sshd_sftpd_t - do not crash in packet.c if no connection- resolve warnings in port_linux.c- add /etc/sysconfig/sshd- improve reseeding and seed source (documentation)- use /dev/random or /dev/urandom for seeding prng - improve periodical reseeding of random generator- add periodical reseeding of random generator - change selinux contex for internal sftp in do_usercontext - exit(0) after sigterm- improove ssh-ldap (documentation)- improve session keys audit- CVE-2010-4755- improove ssh-keycat (documentation)- improve audit of logins and auths- improove ssk-keycat- add ssk-keycat- reenable auth-keys ldap backend- another audit improovements- another audit improovements - switchable fingerprint mode- improve audit of server key management- improve audit of logins and auths- bump openssh version to 5.8p1- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- clean the data structures in the non privileged process - clean the data structures when roaming- clean the data structures in the privileged process- clean the data structures before exit net process- make audit compatible with the fips mode- add audit of destruction the server keys- add audit of destruction the session keys- reenable run sshd as non root user - renable rekeying- reapair clientloop crash (#627332) - properly restore euid in case connect to the ssh-agent socket fails- striped read permissions from suid and sgid binaries- used upstream version of the biguid patch- improoved kuserok patch- add auditing the host based key ussage - repait X11 abstract layer socket (#648896)- add auditing the kex result- add auditing the key ussage- update gsskex patch (#645389)- rebase linux audit according to upstream- add missing headers to linux audit- audit module now uses openssh audit framevork- Add the GSSAPI kuserok switch to the kuserok patch- Repaired the kuserok patch- Repaired the problem with puting entries with very big uid into lastlog- Merging selabel patch with the upstream version. (#632914)- Tweaking selabel patch to work properly without selinux rules loaded. (#632914)- Make fipscheck hmacs compliant with FHS - requires new fipscheck- Added -z relro -z now to LDFLAGS- Rebased to openssh5.6p1- merged with newer bugzilla's version of authorized keys command patch- improved the x11 patch according to upstream (#598671)- improved the x11 patch (#598671)- changed _PATH_UNIX_X to unexistent file name (#598671)- sftp works in deviceless chroot again (broken from 5.5p1-3)- add option to switch out krb5_kuserok- synchronize uid and gid for the user sshd- Typo in ssh-ldap.conf(5) and ssh-ladap-helper(8)- Repair the reference in man ssh-ldap-helper(8) - Repair the PubkeyAgent section in sshd_config(5) - Provide example ldap.conf- Make the Ldap configuration widely compatible - create the aditional docs for LDAP support.- Make LDAP config elements TLS_CACERT and TLS_REQCERT compatiple with pam_ldap (#589360)- Make LDAP config element tls_checkpeer compatiple with nss_ldap (#589360)- Comment spec.file - Sync patches from upstream- Create separate ldap package - Tweak the ldap patch - Rename stderr patch properly- Added LDAP support- Ignore .bashrc output to stderr in the subsystems- Drop dependency on man- Update to 5.5p1- repair configure script of pam_ssh_agent - repair error mesage in ssh-keygen- source krb5-devel profile script only if exists- Update to 5.4p1 - discontinued support for nss-keys - discontinued support for scard- Prepare update to 5.4p1- ImplicitDSOLinking (#564824)- Allow to use hardware crypto if awailable (#559555)- optimized FD_CLOEXEC on accept socket (#541809)- updated pam_ssh_agent_auth to new version from upstream (just a licence change)- optimized RAND_cleanup patch (#557166)- add RAND_cleanup at the exit of each program using RAND (#557166)- set FD_CLOEXEC on accepted socket (#541809)- replaced define by global in macros- Update the pka patch- Update the audit patch- Add possibility to autocreate only RSA key into initscript (#533339)- Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411)- Update NSS key patch (#537411, #356451)- Add gssapi key exchange patch (#455351)- Add public key agent patch (#455350)- Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849)- Modify the init script to prevent it to hang during generating the keys (#515145)- Add README.nss- Add pam_ssh_agent_auth module to a subpackage.- Reenable audit.- Upgrade to new wersion 5.3p1- Resolve locking in ssh-add (#491312)- Repair initscript to be acord to guidelines (#521860) - Add bugzilla# to application of edns and xmodifiers patch- Changed pam stack to password-auth- Dropped homechroot patch- Add check for nosuid, nodev in homechroot- add correct patch for ip-opts- replace ip-opts patch by an upstream candidate version- rearange selinux patch to be acceptable for upstream - replace seftp patch by an upstream version- merged xmodifiers to redhat patch - merged gssapi-role to selinux patch - merged cve-2007_3102 to audit patch - sesftp patch only with WITH_SELINUX flag - rearange sesftp patch according to upstream request- minor change in sesftp patch- rebuilt with new openssl- Added dnssec support. (#205842)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- only INTERNAL_SFTP can be home-chrooted - save _u and _r parts of context changing to sftpd_t- changed internal-sftp context to sftpd_t- changed home length path patch to upstream version- create '~/.ssh/known_hosts' within proper context- length of home path in ssh now limited by PATH_MAX - correct timezone with daylight processing- final version chroot %h (sftp only)- repair broken ls in chroot %h- add XMODIFIERS to exported environment (#495690)- allow only protocol 2 in the FIPS mode- do integrity verification only on binaries which are part of the OpenSSH FIPS modules- log if FIPS mode is initialized - make aes-ctr cipher modes work in the FIPS mode- fix logging after chroot - enable non root users to use chroot %h in internal-sftp- add AES-CTR ciphers to the FIPS mode proposal- upgrade to new upstream release- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- drop obsolete triggers - add testing FIPS mode support - LSBize the initscript (#247014)- enable use of ssl engines (#481100)- remove obsolete --with-rsh (#478298) - add pam_sepermit to allow blocking confined users in permissive mode (#471746) - move system-auth after pam_selinux in the session stack- set FD_CLOEXEC on channel sockets (#475866) - adjust summary - adjust nss-keys patch so it is applicable without selinux patches (#470859)- fix compatibility with some servers (#466818)- fixed zero length banner problem (#457326)- upgrade to new upstream release - fixed a problem with public key authentication and explicitely specified SELinux role- pass the connection socket to ssh-keysign (#447680)- add LANGUAGE to accepted/sent environment variables (#443231) - use pam_selinux to obtain the user context instead of doing it itself - unbreak server keep alive settings (patch from upstream) - small addition to scp manpage- upgrade to new upstream (#441066) - prevent initscript from killing itself on halt with upstart (#438449) - initscript status should show that the daemon is running only when the main daemon is still alive (#430882)- fix race on control master and cleanup stale control socket (#436311) patches by David Woodhouse- set FD_CLOEXEC on client socket - apply real fix for window size problem (#286181) from upstream - apply fix for the spurious failed bind from upstream - apply open handle leak in sftp fix from upstream- we build for sparcv9 now and it needs -fPIE- fix gssapi auth with explicit selinux role requested (#427303) - patch by Nalin Dahyabhai- explicitly source krb5-devel profile script- Rebuild for openssl bump- do not copy /etc/localtime into the chroot as it is not necessary anymore (#193184) - call setkeycreatecon when selinux context is established - test for NULL privk when freeing key (#391871) - patch by Pierre Ossman- revert default window size adjustments (#286181)- upgrade to latest upstream - use libedit in sftp (#203009) - fixed audit log injection problem (CVE-2007-3102)- fix sftp client problems on write error (#247802) - allow disabling autocreation of server keys (#235466)- experimental NSS keys support - correctly setup context when empty level requested (#234951)- mls level check must be done with default role same as requested- make profile.d/gnome-ssh-askpass.* regular files (#226218)- reject connection if requested mls range is not obtained (#229278)- improve Buildroot - remove duplicate /etc/ssh from files- support mls on labeled networks (#220487) - support mls level selection on unlabeled networks - allow / in usernames in scp (only beginning /, ./, and ../ is special)- update to 4.5p1 (#212606)- fix gssapi with DNS loadbalanced clusters (#216857)- improved pam_session patch so it doesn't regress, the patch is necessary for the pam_session_close to be called correctly as uid 0- CVE-2006-5794 - properly detect failed key verify in monitor (#214641)- merge sshd initscript patches - kill all ssh sessions when stop is called in halt or reboot runlevel - remove -TERM option from killproc so we don't race on sshd restart- improve gssapi-no-spnego patch (#208102) - CVE-2006-4924 - prevent DoS on deattack detector (#207957) - CVE-2006-5051 - don't call cleanups from signal handler (#208459)- don't report duplicate syslog messages, use correct local time (#189158) - don't allow spnego as gssapi mechanism (from upstream) - fixed memleaks found by Coverity (from upstream) - allow ip options except source routing (#202856) (patch by HP)- drop the pam-session patch from the previous build (#201341) - don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594)- dropped old ssh obsoletes - call the pam_session_open/close from the monitor when privsep is enabled so it is always called as root (patch by Darren Tucker)- improve selinux patch (by Jan Kiszka) - upstream patch for buffer append space error (#191940) - fixed typo in configure.ac (#198986) - added pam_keyinit to pam configuration (#198628) - improved error message when askpass dialog cannot grab keyboard input (#198332) - buildrequires xauth instead of xorg-x11-xauth - fixed a few rpmlint warnings- rebuild- don't request pseudoterminal allocation if stdin is not tty (#188983)- allow access if audit is not compiled in kernel (#183243)- enable the subprocess in chroot to send messages to system log - sshd should prevent login if audit call fails- print error from scp if not remote (patch by Bjorn Augustsson #178923)- new version- bump again for double-long bug on ppc(64)- fixed another place where syslog was called in signal handler - pass locale environment variables to server, accept them there (#179851)- new version, dropped obsolete patches- hopefully make the askpass dialog less confusing (#174765)- rebuilt- drop x11-ssh-askpass from the package - drop old build_6x ifs from spec file - improve gnome-ssh-askpass so it doesn't reveal number of passphrase characters to person looking at the display - less hackish fix for the __USE_GNU problem- work around missing gccmakedep by wrapping makedepend in a local script - remove now-obsolete build dependency on "xauth"- xorg-x11-devel -> libXt-devel - rebuild for new xauth location so X forwarding works - buildreq audit-libs-devel - buildreq automake for aclocal - buildreq imake for xmkmf - -D_GNU_SOURCE in flags in order to get it to build Ugly hack to workaround openssh defining __USE_GNU which is not allowed and causes problems according to Ulrich Drepper fix this the correct way after FC5test1- rebuild against new openssl- put back the possibility to skip SELinux patch - add patch for user login auditing by Steve Grubb- Change selinux patch to use get_default_context_with_rolelevel in libselinux.- Update selinux patch to use getseuserbyname- use include instead of pam_stack in pam config - use fork+exec instead of system in scp - CVE-2006-0225 (#168167) - upstream patch for displaying authentication errors- upgrade to a new upstream version- use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207) - install ssh-copy-id from contrib (#88707)- don't deadlock on exit with multiple X forwarded channels (#152432) - don't use X11 port which can't be bound on all IP families (#163732)- fix small regression caused by the nologin patch (#161956) - fix race in getpeername error checking (mindrot #1054)- use only pam_nologin for nologin testing- upgrade to a new upstream version - call pam_loginuid as a pam session module- link libselinux only to sshd (#157678)- fixed Local/RemoteForward in ssh_config.5 manpage - fix fatal when Local/RemoteForward is used and scp run (#153258) - don't leak user validity when using krb5 authentication- upgrade to 4.0p1 - remove obsolete groups patch- rebuilt- rebuild so that configure can detect that krb5_init_ets is gone now- don't call syslog in signal handler - allow password authentication when copying from remote to remote machine (#103364)- add spaces to messages in initscript (#138508)- enable trusted forwarding by default if X11 forwarding is required by user (#137685 and duplicates) - disable protocol 1 support by default in sshd server config (#88329) - keep the gnome-askpass dialog above others (#69131)- change permissions on pam.d/sshd to 0644 (#64697) - patch initscript so it doesn't kill opened sessions if the sshd daemon isn't running anymore (#67624)- don't use initlog- fixed PIE build for all architectures- add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option to enable display of a vendor patch level during version exchange (#120285) - configure with --disable-strip to build useful debuginfo subpackages- when using gtk2 for askpass, don't buildprereq gnome-libs-devel- build- disable ACSS support- Change selinux patch to use get_default_context_with_role in libselinux.- Fix patch * Bad debug statement. * Handle root/sysadm_r:kerberos- Modify Colin Walter's patch to allow specifying rule during connection- Fix TTY handling for SELinux- Update to upstream- Apply buildreq fixup patch (#125296)- Clean up patch for upstream submission.- rebuilt- Remove use of pam_selinux and patch selinux in directly.- request gssapi-with-mic by default but not delegation (flag day for anyone who used previous gssapi patches) - no longer request x11 forwarding by default- Change pam file to use open and close with pam_selinux- update to 3.8.1p1 - add workaround from CVS to reintroduce passwordauth using pam- Remove CLOSEXEC on STDERR* Wed Mar 03 2004 Phil Knirsch 3.6.1p2-33.30.1 - Built RHLE3 U2 update package.- Close file descriptors on exec- fixed pie build- Add restorecon to startup scripts- Add multiple qualified to openssh- Eliminate selinux code and use pam_selinux- rebuilt- turn off pie on ppc- fix is_selinux_enabled- Rebuild to grab shared libselinux- turn on selinux- un#ifdef out code for reporting password expiration in non-privsep mode (#83585)- add machinery to build with/without -fpie/-pie, default to doing so- Don't whinge about getsockopt failing (#109161)- add missing buildprereq on zlib-devel (#104558)- turn selinux off- turn selinux on- turn selinux off- turn selinux on- additional fix for apparently-never-happens double-free in buffer_free() - extend fix for #103998 to cover SSH1- rebuild- additional buffer manipulation cleanups from Solar Designer- turn selinux off- turn selinux on- rebuild- additional buffer manipulation fixes (CAN-2003-0695)- turn selinux on- rebuild- apply patch to store the correct buffer size in allocated buffers (CAN-2003-0693) - skip the initial PAM authentication attempt with an empty password if empty passwords are not permitted in our configuration (#103998)- turn selinux off- turn selinux on- Add BuildPreReq gtk2-devel if gtk2- rebuild- modify patch which clears the supplemental group list at startup to only complain if setgroups() fails if sshd has euid == 0 - handle krb5 installed in %{_prefix} or elsewhere by using krb5-config- Add SELinux patch- rebuild- rebuild- rebuild- update to 3.6.1p26 rebuilt- add patch for getsockopt() call to work on bigendian 64bit archs- move scp to the -clients subpackage, because it directly depends on ssh which is also in -clients (#84329)- rebuild- rebuilt- rebuild- patch PAM configuration to use relative path names for the modules, allowing us to not worry about which arch the modules are built for on multilib systems- update to 3.5p1, merging in filelist/perm changes from the upstream spec- merge- fix to build on multilib systems- added gssapi patches and uncommented patch here- pull patch from CVS to fix too-early free in ssh-keysign (#70009)- 3.4p1 - drop anon mmap patch- rework the close-on-exit docs - include configuration file man pages - make use of nologin as the privsep shell optional- update to 3.3p1 - merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign) - disable gtk2 askpass - require pam-devel by filename rather than by package for erratum - include patch from Solar Designer to work around anonymous mmap failures- automated rebuild- don't require autoconf any more- build gnome-ssh-askpass with gtk2- update to 3.2.3p1 - merge in spec file changes from upstream- update to 3.2.2p1- drop buildreq on db1-devel - require pam-devel by package name - require autoconf instead of autoconf253 again- pull patch from CVS to avoid printing error messages when some of the default keys aren't available when running ssh-add - refresh to current revisions of Simon's patches- reintroduce Simon's gssapi patches - add buildprereq for autoconf253, which is needed to regenerate configure after applying the gssapi patches - refresh to the latest version of Markus's patch to build properly with older versions of OpenSSL- bump and grind (through the build system)- require sharutils for building (mindrot #137) - require db1-devel only when building for 6.x (#55105), which probably won't work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck - require pam-devel by file (not by package name) again - add Markus's patch to compile with OpenSSL 0.9.5a (from http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're building for 6.x- update to 3.1p1- update to SNAP-20020305 - drop debug patch, fixed upstream- update to SNAP-20020220 for testing purposes (you've been warned, if there's anything to be warned about, gss patches won't apply, I don't mind)- add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key exchange, authentication, and named key support- remove dependency on db1-devel, which has just been swallowed up whole by gnome-libs-devel- adjust build dependencies so that build6x actually works right (fix from Hugo van der Kooij)- update to 3.0.2p1- update to 3.0.1p1- update to current CVS (not for use in distribution)- merge some of Damien Miller changes from the upstream 3.0p1 spec file and init script- update to 3.0p1 - update to x11-ssh-askpass 1.2.4.1 - change build dependency on a file from pam-devel to the pam-devel package - replace primes with moduli- incorporate fix from Markus Friedl's advisory for IP-based authorization bugs- Merge changes to rescue build from current sysadmin survival cd- fix scp's server's reporting of file sizes, and build with the proper preprocessor define to get large-file capable open(), stat(), etc. (sftp has been doing this correctly all along) (#51827) - configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247) - pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298) - mark profile.d scriptlets as config files (#42337) - refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug - change a couple of log() statements to debug() statements (#50751) - pull cvs patch to add -t flag to sshd (#28611) - clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221)- add db1-devel as a BuildPrerequisite (noted by Hans Ecke)- pull cvs patch to fix remote port forwarding with protocol 2- pull cvs patch to add session initialization to no-pty sessions - pull cvs patch to not cut off challengeresponse auth needlessly - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed (#49263)- don't apply patches to code we don't intend to build (spotted by Matt Galgoci)- pass OPTIONS correctly to initlog (#50151)- switch to x11-ssh-askpass 1.2.2- rebuild in new environment- disable the gssapi patch- update to 2.9p2 - refresh to a new version of the gssapi patch- change Copyright: BSD to License: BSD - add Markus Friedl's unverified patch for the cookie file deletion problem so that we can verify it - drop patch to check if xauth is present (was folded into cookie patch) - don't apply gssapi patches for the errata candidate - clear supplemental groups list at startup- fix an error parsing the new default sshd_config - add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not dealing with comments right- add in Simon Wilkinson's GSSAPI patch to give it some testing in-house, to be removed before the next beta cycle because it's a big departure from the upstream version- finish marking strings in the init script for translation - modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd at startup (change merged from openssh.com init script, originally by Pekka Savola) - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed- update to 2.9 - drop various patches that came from or went upstream or to or from CVS- only require initscripts 5.00 on 6.2 (reported by Peter Bieringer)- remove explicit openssl requirement, fixes builddistro issue - make initscript stop() function wait until sshd really dead to avoid races in condrestart- mention that challengereponse supports PAM, so disabling password doesn't limit users to pubkey and rsa auth (#34378) - bypass the daemon() function in the init script and call initlog directly, because daemon() won't start a daemon it detects is already running (like open connections) - require the version of openssl we had when we were built- make do_pam_setcred() smart enough to know when to establish creds and when to reinitialize them - add in a couple of other fixes from Damien for inclusion in the errata- update to 2.5.2p2 - call setcred() again after initgroups, because the "creds" could actually be group memberships- update to 2.5.2p1 (includes endianness fixes in the rijndael implementation) - don't enable challenge-response by default until we find a way to not have too many userauth requests (we may make up to six pubkey and up to three password attempts as it is) - remove build dependency on rsh to match openssh.com's packages more closely- remove dependency on openssl -- would need to be too precise- rebuild in new environment- Revert the patch to move pam_open_session. - Init script and spec file changes from Pekka Savola. (#28750) - Patch sftp to recognize '-o protocol' arguments. (#29540)- Chuck the closing patch. - Add a trigger to add host keys for protocol 2 to the config file, now that configuration file syntax requires us to specify it with HostKey if we specify any other HostKey values, which we do.- Redo patch to move pam_open_session after the server setuid()s to the user. - Rework the nopam patch to use be picked up by autoconf.- Update for 2.5.1p1. - Add init script mods from Pekka Savola. - Tweak the init script to match the CVS contrib script more closely. - Redo patch to ssh-add to try to adding both identity and id_dsa to also try adding id_rsa.- Update for 2.5.0p1. - Use $RPM_OPT_FLAGS instead of -O when building gnome-ssh-askpass - Resync with parts of Damien Miller's openssh.spec from CVS, including update of x11 askpass to 1.2.0. - Only require openssl (don't prereq) because we generate keys in the init script now.- Don't open a PAM session until we've forked and become the user (#25690). - Apply Andrew Bartlett's patch for letting pam_authenticate() know which host the user is attempting a login from. - Resync with parts of Damien Miller's openssh.spec from CVS. - Don't expose KbdInt responses in debug messages (from CVS). - Detect and handle errors in rsa_{public,private}_decrypt (from CVS).- i18n-tweak to initscript.- More gettextizing. - Close all files after going into daemon mode (needs more testing). - Extract patch from CVS to handle auth banners (in the client). - Extract patch from CVS to handle compat weirdness.- Finish with the gettextizing.- Fix a bug in auth2-pam.c (#23877) - Gettextize the init script.- Incorporate a switch for using PAM configs for 6.x, just in case.- Incorporate Bero's changes for a build specifically for rescue CDs.- Don't treat pam_setcred() failure as fatal unless pam_authenticate() has succeeded, to allow public-key authentication after a failure with "none" authentication. (#21268)- Update to x11-askpass 1.1.1. (#21301) - Don't second-guess fixpaths, which causes paths to get fixed twice. (#21290)- Merge multiple PAM text messages into subsequent prompts when possible when doing keyboard-interactive authentication.- Disable the built-in MD5 password support. We're using PAM. - Take a crack at doing keyboard-interactive authentication with PAM, and enable use of it in the default client configuration so that the client will try it when the server disallows password authentication. - Build with debugging flags. Build root policies strip all binaries anyway.- Use DESTDIR instead of %makeinstall. - Remove /usr/X11R6/bin from the path-fixing patch.- Add the primes file from the latest snapshot to the main package (#20884). - Add the dev package to the prereq list (#19984). - Remove the default path and mimic login's behavior in the server itself.- Resync with conditional options in Damien Miller's .spec file for an errata. - Change libexecdir from %{_libexecdir}/ssh to %{_libexecdir}/openssh.- Update to OpenSSH 2.3.0p1. - Update to x11-askpass 1.1.0. - Enable keyboard-interactive authentication.- Update to ssh-askpass-x11 1.0.3. - Change authentication related messages to be private (#19966).- Patch ssh-keygen to be able to list signatures for DSA public key files it generates.- Add BuildPreReq on /usr/include/security/pam_appl.h to be sure we always build PAM authentication in. - Try setting SSH_ASKPASS if gnome-ssh-askpass is installed. - Clean out no-longer-used patches. - Patch ssh-add to try to add both identity and id_dsa, and to error only when neither exists.- Update x11-askpass to 1.0.2. (#17835) - Add BuildPreReqs for /bin/login and /usr/bin/rsh so that configure will always find them in the right place. (#17909) - Set the default path to be the same as the one supplied by /bin/login, but add /usr/X11R6/bin. (#17909) - Try to handle obsoletion of ssh-server more cleanly. Package names are different, but init script name isn't. (#17865)- Update to 2.2.0p1. (#17835) - Tweak the init script to allow proper restarting. (#18023)- Update to 20000823 snapshot. - Change subpackage requirements from %{version} to %{version}-%{release} - Back out the pipe patch.- Update to 2.1.1p4, which includes fixes for config file parsing problems. - Move the init script back. - Add Damien's quick fix for wackiness.- Update to 2.1.1p3, which includes fixes for X11 forwarding and strtok().- Move condrestart to server postun. - Move key generation to init script. - Actually use the right patch for moving the key generation to the init script. - Clean up the init script a bit.- Fix X11 forwarding, from mail post by Chan Shih-Ping Richard.- Update to 2.1.1p2. - Use of strtok() considered harmful.- Get the build root out of the man pages.- Add and use condrestart support in the init script. - Add newer initscripts as a prereq.- Build in new environment (release 2) - Move -clients subpackage to Applications/Internet group- Update to 2.2.1p1- Patch to build with neither RSA nor RSAref. - Miscellaneous FHS-compliance tweaks. - Fix for possibly-compressed man pages.- Updated for new location - Updated for new gnome-ssh-askpass build- Added Jim Knoble's askpass- Split subpackages further based on patch from jim knoble - Added 'Obsoletes' directives- Use make install - Subpackages- Added links for slogin - Fixed perms on manpages- Renamed init script- Back to old binary names- Use autoconf - New binary names- Initial RPMification, based on Jan "Yenya" Kasprzak's spec. 14344fadac3e09a10873d9ff7d0f8af4441419478.0p1-25.el8_108.0p1-25.el8_10debug.build-id14344fadac3e09a10873d9ff7d0f8af444141947344fadac3e09a10873d9ff7d0f8af444141947.debugusrlibexecopensshssh-keycat-8.0p1-25.el8_10.x86_64.debug/usr/lib//usr/lib/debug//usr/lib/debug/.build-id//usr/lib/debug/.build-id/14//usr/lib/debug/usr//usr/lib/debug/usr/libexec//usr/lib/debug/usr/libexec/openssh/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2x86_64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter \004, for GNU/Linux 3.2.0, BuildID[sha1]=14344fadac3e09a10873d9ff7d0f8af444141947, with debug_info, not strippedPopenssh-debugsource(x86-64)8.0p1-25.el8_10utf-892aa35c10fe38b531e0d6f229f562bc46c5424b825ab8305c1d98faf03cfb480? 7zXZ !#,0S] b2u jӫ`(y0DT鶷)ս~#ѪpCÇOTOE=-=jh-*:]3I22ˮ&F-RLbАuF7Ej!I0+PZ՛Z 7*!GB#ɽ+W@EZ:k߃}>gdΑ{ᾛ<6wt"\:Qn)yhO0qGPi%d- !l )SZ<#yJ 4l=-xAC)Vg>=1L0Q [%+٠ >Y24܊pNJ{uvs y޿AuWDѭ#/Fm8&;Gk.d,0WRHsfo wO2R5Z4#A M"لRdkÜ୔8Z H&;6j*(ƙWH3'o?ٷK[9GI/.EZJypM`G%fLƚgXAzTB-'c4[R\PW~ks}_w+4=Zސ]HԷLOp O#]rdZ(F~3r ߟֳ>н.e$ZZ0sh_yîʹfHQ>3m)sBM }M{i1Կ8iM3Wna!ў"̍$P12lid Lzqo*vp;ᅦRy=օmuowŵe$ XV^O[Va@C3 , kܮr;&dKzj䔉)39 ElICpY0oI'!;9ߙ  5K:_e7 0Ef!uƾ =mhm2j8|yxt`3ܳjԎP`#P/צ2⾴Sp$Pqc2j^q*ϱڱњ$<6lv=$6ZXxa by#_!gm1J1ɚRCBQheW=- b@Rv{̕%jnP՗#"?ͨ&+y}BӹU"z3S%CrTZg,5c:nSDa.V.Yb,"couIs15&hޭڑ:ZEN'g\Kk!l" &W̰<|t]56K t.7g^_? >lm1=rN}kcb(~ R8W<^\l`f&&u2,CyŸ6*rn*``IGւnXyY69WIn⃙E%ɣ|+b#`bF*<[} -<'ÊAN[Y$AeM%hJ_V ‘wiqkc:5YTMʮ=(oq b"nq}靈nvdk|i:i-~[z;#<8o\;YqTt1ՉӈŨ3\+Ȧ <_-}ZZF4y|𾙂rUP!rbk4.7ஓվy@éy)*\\a{Bp^'Xo/lISAuDf&T-+{udMQj)%O(~u˟̷;$ X1.cXQ)xG"e^9J>rҒ X9լ@!^þq;@1)j\G3+DTtW_k܁?{MGA+ι7 >~-1hʧ/`3qݣԼݸ-65+ͥGKM伸&cA’Pj+fL|Pk]ܫS,g>ֻy#'QkzT}ʿtUݎ]|wrߎ3@ בg{R<E!k_Re*." -9{0 $MjKV,#~u=..K;Y> nMbK2Hݗ/s93;{1 b\q] 0&i(lZ Z 4'䫅[{TYFo.`l+Q0%_!gQka=s3RK*k{~]= =IśfAɕ`90>uTX&^g\}y筶v׻"'fڻ#=~ASI4_ k?u|5Iry}]ϣ/܌_á9Թ)'UֱJËR*h|/8&%I&vQqsu*-Qg/6H3xx)w1⇔\[9k}$ř+|ě`%iqlF(M9}7IzIu&dF 8fm/[Fh*$VZzE0_0Olˢ,h)zX hwv }Jq쩐G>AħVEYx3DR0m$5zʃ(L%_ ?xqިptUay4 dΊ2@V =c*Y@ ӧmϜ,mz$[j!2ҨB-.]Kmb14Bg'm%~ #W$CY0w,*Q+6Ǣ}gBd6̐`f'!pC<7^gsBHP,ڋn/϶=au:]5/Y]h}zAgJ.w'O5?KG3Ɯ98ncj*oBXBSo;zls暏Srmk*y ixfD(8N|e-픖(ՌꭢDhnwhzzPF碳=zHU8ʣv@F~AӴBڡ Py<{th,HL6OKIQ`XӨˏ/9\H+4/\ {#о+[DخTmBȋCDETӓ.S&s1yzscCx"=q;sXŕd\bF\&I#-ơ D;f]8;DM@A91뽢5oZre zb(q mJe}wܛCDq~!?,keu~, ވ6q2 հ`1 7k1%x$\y5N04/'>&[G6\=k@Qב]8o+m2dL8zƴ]lW˾!ѱw'wRo#/DO萫+b:J2=]=K$m}H]=c^.Ę~3`|@ɑZOo@E']xrI6 )D i8iv]6dYB' ml>զcwv zm|\kA AM'?}@fjTupC(.5ě{Nȃhtg ,eWTھbV'E/1_=Fzr&AuG-ޣQ鲄l|K> HJ(ɯO s8&gF. MLbCqCl&m]"&Tþfkzz^[KQbq&xU:<:qc ks\^2.%lt"ڷݢϩH(܍EQNՑk 1L^Z :WvpI%\뽷"2s1W:f*fs@߽V5gc := Iy.}$bd}J+]O~#lփ@ J1(q;r|ö F֡h3 i.x58ïDNrlIPWVw٬S=dNj3isYeQ9`8[_X4aUjq=KȉK{'D%@6Y,g|;+sƓYm ="Ңu)smVyvc(Vcl74g*Z㞥>hMJ'EqQKa&mnϷ+)3X }&p8:#} 'ergĮ C3}w9p _0Rk9~?ɱjd?ϵ}yh0Et喉*4@%[p#Mi~f`{xmĆ%~̺VyĄO>1^j?%X‘XsElJ`G@T0 `ɵxziVGic.ɉkr+ǼAONC ܰ%{-dFB(߶6yq+u;&vR#Oѩ"dKmyŚo\XbD!p{g/_'& yִX_%"[]!+`,ʹXiNdTm)eL>[ C1InNpWZbwE˝:*|'n@q5SV`w ?9ʦF6ח,#݁ݐ.Ѳ h|u;b,es>w/7zxCڎ,e?c*6^Y8طĠ[SNyNp4e~ hAulSh~)нc0n:Y\ 9E0ݴd{7#{h9J PvmVn,Yu9!ӹ(JHej{Yf-TG(GLi"g!*; '(كqRvhn{e75z7tPp%&̎f3Ȍq]Cd~qR"zQV$Q@Bi C:0 B4Vo >&X #J0cI; G4 <H~7FL .vf4Ր毧lK(pL*!n:;GG "(4RP7WDa>pTrs.f : jbY)P;ԤrSuL}0_?7EՐ2꥿'cn%9gV?d_90MulHF"kyv֛k'HxV 9nMw{v uLj8{re eܚqحi6kBlQT8iY_E2Ib }p{??^鿒O@,t+;GqaG )E||!iA>3Pݜ/)=PEa:9V{Y 6Toz5B|ta*ofpQogD mg!ńuBtT e{}h'!.@x;WMu9d9Y`N>?u "RW]3:.̈́}#ÄXooG[ Y!(ҙD|ZFh''2 >LHSB>*1|4#Y7kjEM%c+a^~( }58}}动S5?,ڡ.C]!`?o4=q ُݎceoMߴt~,.PǍk&ݾLu r(_dZZ& (Gj֊;NXЏCȱ ^) 4l n2byiqBw$[luh?-(idiLЖ&d,[s%mj{Ȕvٕ0"I`6ESf#LuzsCf- I) X{=D})Wg7{(rШ~ #qs}ɼ3ޫ;'J$Rc*T‡}AFKZj% / j2 < BԈ|?8PFN@Xp_ >nVByEzEuIϐÃ-ΐݽ5UL a؍䥇sih83LNt@ MIyCQs*fj+'9)&n.ڦGiV57P߇6Mz}| D{ RX(YN2z=yc 8ݗfZ{J^4IR{$UeG[hL%ks&yߢJ gҨ^l1Gy`PG#.ņ{.JՖQR_ 4`a,ZLq<5qmhYu>}@಄{61]Z"'#GhuVv޻={Ԯ]&7 VQq%qtTij%ZS϶ 3n$(_8J4r7EciI)ٵ~?b$n6=9i:Rd"s]ݐA"?+E\ x+ZSU=8m?fLifc_}3>3bf1iň8t,qeCU8븥P2L˷6G{I0$MPeՎ\{ѴYZxS3ϔM/ ) j1xg\ʩq!{ڽ,Imԛ@N/1˞p4 u\– M."ZL)V栆v!~U;5x"4 ܕ2C4PLPP#c MBR0aEg<>[Y3TtW46(3IvX;-ĉSm3PԺx@- .flX _SCd?5}Yc7gT*#ɏ^By:N21lEc~_ùؗn ٷt [:itl{!Vl6T[1&*ޗv^N/_X^O ȋ 3.@B)b& A 𼹻-5sr(骻-+~pkaB /c՘W(D `SSdtJ2]wŭ;Qk0J|nf%1}I.3r#PCli+0akkKej$etbyyv jT>,%V}wѷI1iu7F&7G)0dq(zI`3 `VQ]PO@͐QZ.,a[==X=~>x %qoT,Jfz CFXqWR_w֠O-8H򲝠<;UJEç&ԸRhV)i'`7F~lFًc$j$ވl 4>UQHF -T~d=l\(C!;RQHX7؈UՁ[4uTasҕ(&㯰_<4yi35w Ϋi=y\z_9P`BC=opdHT YOS oF>Xf;n3<^ ie^!<0ijloL.6uf.SNM:`7O5Ca_!66u{~7^TזIg:% dkrw٥NrJQ. ĕ&Q"0]}>ir6iZaDuOeM9F͙2m0ؒ* 79t2fl!'DPiSV+kw"y3j?)K3JFbcRϑ)ë.S\3W9Qv?<,?$m{f g (}Wba<h O}%ԈC}7>6 _4" 2xvB|]kn5A槏8 w»L]㏷4uqjϵ=vvցΙK%.86ߓ0!t4*N=Lb'^!*BUh(o]FQǶGߐų9N\ytY!> WsTҊΤYl2ih)CZ2B79 'v#hG-}:= R}F/cJAVh!>cHf TXGHl]^aH[C l .a-C91x0}6}1ꑆ*{L@Iz\?qP,7n zo+?~g>6Ħ`OsN"wpPC̳V }xzYUM/Ƒ˳=9],y@,i -/Ћl [M>-1Lvr0cS m D=egAU0k+cxAeh;<]ܗ SY5>1t|1ᯊlD+`joߪt ZzZF_9<߃YM i{F1vva^{F:HK ٞ `(4uxz|HчA} >Ȋ4+^iX}#yMa,X;Ϲ l { C#ڙBp`ؐw bw]y !AwFjRK?ֱI0 ) X@_6L|luRO v \oa~[fzf_q-):Zs3<[ܿg>˗^nIb2p-;TUz r=A \JdugDYQI|_9Ӧ5 y74NMq^J E;͇#VnG6/yVlڢ:Zqey6Gޘ.vf iTMMnKؖ;kPvxb52A2iA+@?C_,r0cuccA܊m%#R]aQErZs( x{T:o<%␯quqfڜ/aBGL֢ `1t8Ϸ(\?x1CS„{sKPN%p͂3f/Gk1L)VSYS*O9P:FDijeaօ>2DY~eƵqWV-2Qr5'1%N2K?%b \DA慨FI}Rcj)bKdA~ Zj#kT(lէ#UMRBHӰM>PR 6f_4HΒ/C;)P(J>suj;8ʞRĀxlTĚjafp8Qr|v@IW؀ۡDxb±OO\E!+^D5a&G5NZ0t $p)s‹Rp0PLg>#GQ ?w0 SX{rNmLc3.'B2 f)!Z ²!I*l7R#>FՀ*Л_F<)iEyX)jIx](NZb]G=gQH #7ᗁ}狗=UhȮG ݨ'Z7;Dx)_߬4Y гq|(0'E#?G5rG٣7fI@]GXrp!CD]H #2Sq0B)ĶGϬ/t@ w*g?҇  􁺶tQimCxtDU}[,At.w usE ^ʤ/% 9.];N'{YLfkp3UG,}%$ƗNs1I`4H(0o$*GZ-ORs\1u둆1jË U 蓜-9ǤfپfQWJvU/ূCQS" 6bء?ڑ9)ijcJțâ'rqC : Uf>d<" 0Gځ&5ߎɉ`@uL!(eUqH޺Igi0 !~@ɦ[$ @(9dLA*#k2LSڅXv"}]b(ZU,>.C " Q׉ !oI%ǔ0Õzg ƟCeA,/v<]b s)y1 M7!3 HRVNM= Lj&![(Ne^\#DG#2)&5 2hSQ^=zVa?[jC&0|ge~T$bF1֙]h ̒n3N#ŢOC퀪~C`ExF 0_S݂5m \ }FlHͧ@+Xݥ"7$~믇QFV: V \Sn`^8of_5ov b'pv_꿏;akvAcJcD}4%\Xol9qQ%Q-E Ʃu*|v407;C!,hlB1 d,$/owNX{'Ж 6Ss'q=cMc6u^\+] D@tf7Qrm086,% ^Z, fR | XԡZba9.YNr[MrfAyyٌ3%HY-ɭT nNN 4Ɔa۽,~|‰g͊is'| vDrb]26wιvg; Zͬi8K-&Z 14Z^A1ACMRSRϗNSmr-ԈOguz( ;>51)y^ZG++Ρ /JZ/CRfb ۶FX:ja;z:w :V+KKɦ{kQ9}_sO79NØp˸LO*/ǁ?l%닅Nݿ=&W'CC#C:DLʬ0iYl @x(Q:[wyvwYaj( ͌YA-L=M!R:pl9c=lUU'.]Ӵ8w+h/)@do(]o-Jпߓ "+=CSgv`$7_ &{볟g9fx 9 _XHߔ}B9PDd!"PNC9ʈγN|BfɦӮU. k_NZ~dBX6mc[WQmOA:cZ'H3/Rv;9R5X2cl!ffscX2鞒1´Di "Pic%ݵATm߉|auDQxr5pޔD z+\2lL5{,ʊxpEʕ!mo d]4Q~!V| .lJ\٢ǁ[t= D~3*Br7QR=CӆhgC:gG1_R_nj.5!}vݸD5k}'t ݲDHۥm5cUT)h;S[?g}įYU m˷ 7_ rK:|=-l!X%_j ZX B -)\] lMN&LN wg' *%4KLe_ %D"G%A!x漼 DӔ>ݿtVQJLBBAbɼ[ťIHǮNzuon*K骭-.Uf ܂ Hpx71OjY͔|x=yD۟ ףT%O6]p%i餋 [֨&CTNK mhDaj#*'KB 'n@!"pյr=M!K;fzK+!jh sb ׺$qq^Г~ޓ2m ud.@Erx=<*Q05oy܃9ヹY2"鴙܇ XtͽdDr572'Ed3Ꮇ0Ӥt _7)@їTg& _#26g|vffn7LJWۤ~u*xT15%QiSB"'>N-,_b5׍},A@\jŤP]E_zcn$i(`԰(D_Ai 4!=PnRa ~W "gTG[6B3['lN /3g++yC2T`̨aDj6" ."P詾&Ǘ? A)l]FWJ" .xz*Y vU`mh֫!B4.gGR8Ve~c]R=x]O}JE׉LV&Cs&e_Q/vʻǗr& c0"@ˍ!p\M+d v NCYOd$V(E&}I 0ÅN*Yl6 \:\RA$KF:pU#`GI?#}-6I:(>f(0,*;=bS4t=3))cn._v^;JXSf(u;妋+߅/Exл9BXaPD7jWЍDzp4`Ԇc,pSgo\m?S`d3%1X3-в52vku6з:(*6iяТ>&e8oښL*6QȐqKT ʾcc2<3Br1)bm4.ɘDj:GP\T3u2)oORZhts k֘^[/Sv5 G J.">H봅Wbn'jf0m*Gb4u(SI&` O\J{ WB9wsoߝ2bZ[qfQN\>|l g>jg9Sfz,$dM*e-ŋvi&$@qI+,Ri*ͦPP~dlpCp~lCJ`uC ڒ=p${˝ <[mH\l+dDIסښ}\'yH VA40\SlekvRdKk|b$,VT3?'e"hϩ!_NĻ>(xY0NtesoJf*@Αrz-av qWFO]8PÇ{| #E}NqqW J}B7tޏ"R3 O(O `TöSO8pb62>zVEtjDNrRѼL+ҍ}-"Uoѭ(cAi(K#Y/Ð8!g=EPUňۍX<1ɡT|6wEj3(#'1ֿ g8ui6.~ǣoO0V~7b[KG~[9V3`|s{n%Y b<Ʌ6]3p7J`LC[yuJgk!slc SW8f hYN!_9!l<FU$OrzlT> j6V)] I_T>+Ƕ^)qP0baŶ{Il03N"QéB(^lp@fH$fa nw&DM2Bap k TL`d# K'H,:|0_7v,ɠ1W =Ղ++oHt d1JV6߄v;wav`-tRЗK[^inD$(olI m>Dfk "3^g]UC'WΈB?6,M8f_U]=MFO_}[PZ2@fMSp6|~93Cunj܅>q$\vwFe6 WgjZ9- F(omSzchdKų ְ we/=,fSq@J Moզե3V –I-߀?1%k1f_wbEf?(飶ϸ⊨D1LijsR+ @e-X6b?F9IcWUhsI<~=!2֥E}*@.tl@tK"?$=6EP64q2P ^GQ~iƾuqdMMT*Nw%\%-S" ?Я}Q&Kj*6 #ĢqֵVo;'/7Uj'đZ*pߴ] Xñvf3g)R| %>Dbr4mR~y (5━J·W1[Ͻň/O|plDzcŲigXBwZL @ÿN#~)6VgKL5ZaU)sL<|FXh8 MÚўhQѵYO6P!6utGx8y;o}eגpFkunaBNthLh>Efjl?҇g"/O?ތ`K<ł)5 ;׭ݚ3S;VN!lj)N fv]"DTD|׫d;+Xۆ#*06CQFL?t{ DzseV_NtpO'1U*dƦW':O;Z;_BV9trME |/wp= dV_И_*L}?8*zmԽo bнSg[zy.\[g\$)1c_^Jq 7y`ʳRr`-'0Z"ƔNA{SQ\ڶE# <![MTUPT]73?bExe I;QƮxNFrGmsWMiVCzz^jE#$;H̄x:Hk.eŶⲦ$TǨ2 ХT7K݂:2=` OmmlF o 6{r'jzLJ'"R ,B=j5SXWy>)!JˤOOD#o<#ȵCnAO5HIOc u5WΩȕ)Z'#` ];pe!O+SQfOT}3QQq>Uofi$.) x_l96}WI1S&@`d.XjC"RNë%}+PHZF'G!GpG\$Zg-Ծ5#{FٟQ!OD9l(WEqբx<ȷ&,4b)Jl݈IoT@3ea}40j>'<(RvY=ԟI\WphmՁ}6^8\Tk$%NC >tYUZ`Q/,lP?qu`pB7Ud 'ErJ(!:. %~t"8otd4mz?EO!7D,d/ N;V{h A'Vv<،N?.<nܐƷj7h/c:ĠtɴE[~ȶJ,&OT 9k&>}bH@k2a+9oWfU-]0Ge޳S,W=Vo:14#^#&ld *j\ 1XeqT N8 H|FbE_* lOLc8m#.>·LpvJC$o(,w),ע5+vx/-jY:Zr~f:@iQ ?m0T sH(š܄,8gVU6MN7^/>[s$ML':Ir%Y7ý8 rv)QHOPڵ<)q7VՄl1zo Kqg8D BPtyMc 3ap&H/è\:O`R"z֥>7"L1W5nL:3q:is1Ԋ\o! {y6ZVok\?N.wFy\ :dٵb7>V̦ș o?X/^0&"䠃 ;{$bXֻ%;:pZ<;{Qn656%kL%uZ"B^bƮeTORb M|i"hC5ػ7,V9M)ʎ i0[EGv1SsӍ%ާzB(]8yLVAcT[5QH6LW\9stw' G;CMA}$Խ/Fon.<וREkuۣ!H S#ou@ />CAcrΡxLSBWoj/ [DMI3 qp@q ~半GS%$m١/93Fx}^Y 薖n).kf~\+O,= RQ1Dƶ̊e"izTbYq}$o|CóV%Qky࢘ԉFW1:K .UPpZfR PX:[NiL@GVo0(ø*d~2UɉQ1oZ4> Wc"^pМpb*ɵ ĥ[UB}Zޯ'QV]-Rg .t;nAfZs~\qO%cΤ+I.L0w5S Ly:]C:gzX)nޟwPuQ; c@mUolWa~OQ [kzHE?3.0dEW,Tefx/P<80fW"Tܨ]G kLp[ki K[H( 0\:46tK_`!I"Ta.iD(S;c)#NMĎUT8c-q Q,7~].Ɵ~jv!HnKqf2!~zՓl663qFXz>wwp!ÛLЄ`;S&o!QM %(cj/&j)>`؅XP݀;g$D嵎XW߁NS='G%3"@9d+Fѧr/L!9a Fr}3ccaJ%qtV!T%:/YX^'-x<oe9 P獘bjN^e_a+\r\Nke4v27 ٰ&.p~\hukspP35Z2b}!IӬs.rcٴᒰ:8gͬpW\K q{R۷&(^׮rC TA V"ayw:eh i./F&!RqHmpȵ8EEvmTmvIH#j;XfuK\Rx{t?p*3QS*^6MN/ 5Ce@Հ2/taܞ;&bo였=0'9bc׭ťɾN0pJA~?Qf  Ѭ -#TÂ);P䍓"-ZabǔS|@dx?M,ȑT(@5-I I.st4`O)7VEMNC9(|rl%¥$ QFILqc__ޱk |a5k0`$$EE|OĬ֣f 6|:#/LMF'fM~02lxKA΄(c]cHez2cKugfeeW'X57j"Fe!“~ԗ!풀k5*FoKq[wCq&--5 -o7c@ FMh'"4i%>U̓|MFo:ّz;$)W6KBJ$&GX/]N ,9 W&Ӄ"؟:12AX)e`/=`.`_}5$uSg;k^FIQJSk+ajj<@2Ҋ.3amPFu_JD߻ F|[1)>iSo ,sUJi6їBT?a۲\HOxP,hV ;sӽFԾ 1p'n_,,(_aԢD-4|8\atљWKw 诌"y^^E$[w1fQ9GD1NOa(\,8M -uC3ptݍyLɀqYD^ NQa n'V1tlMq*ܤ.9t}={b!'/?_4"TqC+.K"s͞UaN[IU洽0 MUp?m .MG)JP & wh/}]ZC&Zdez)SOi\롽(NI^lu*AC͊KKN~ iWlG\9oo*Ѯxs=H?D1gkn]"FU};ڃ:gW6K-i*V0^H$Vr Ų'd0"KSK 07uID6վIo~>Qf A}33]&CfOλjո{X#8/L9cKw\8p< \>xt:}k= q jA+Ж!yƇ1@ 963a]0-kil1kjO n"5_Q"LZ SGNe";b 2+f^Q 2γTDaw]bQ5[BfwGW~x0|fZ0>OLF}u$m}ث51__|5ȋƏsG~&&gOI:ك/崱iIx:2--~s|^*7ay-`o:gPu"2BI 'EwX6 pLAQJ8{ZM(RQK=|vzTPt6&~JC1-wwA9Qk\W"Nً>Aڂs' Rqu%xc9xW35?m"l1Pؐ5##. oӍ?o87Dm)o4rXcA\` Ig㟌05Ln&2pVyWV2D`URXr7%nfsIzo_u1!e.#J\<٪&ˋ_jzO==Wn׻4&ҩ}e |9_E-6%}/ /aGrˎ!8(>{L܅ubm Ҡ(Q@rbXW:)`4{"ιpu?TRp0mGfG Qt! dio-¬--~;AL("%̶/H>9,IpZan!)&,T/5e^("Ɍ?v@ȉ#/ ez~~"v[Ez^ƽsfB]nmDj)F )i0MYl*]<: tS \U?ͅ+g,2z,9F[bC?Q K0^v`[5kjCvA!(/ÿIs!^$wa#ƉND`;;xϦc`Wg^#"jqNNU?moh܅Ve2dȊ>䔶Rxy(Tp2r-V%- [@Ր|ob5,4 j$C. =[q؃}uHwT`ZWޥ]o#6e.qÙTAi2N7w$ܩd7rMM u5@$/MVxΐ4 lLf g,)ؖR/!|ąqbd6D̝QB [j6'ڜ=Ƈ'RQj~SXƒX#S`Zyd*íq?+?`dzHk߰"=b}-o3*yWo@[~PʊʥH"pAaeow=3!t{ 76bǻX6oPƌ0PjP4g )?bBΜX[|`y@\rH2%AYR{jniQB})?l.T;mpTqīkTP$0"kD UC{j9ao\iûmY):H5Q*7M&q P:ɄŇfp2 џm l=al#t>`|RG[9Jެ4˛߈]#֤T{Om6Mⱋ{7FWiŐ8#RhX.QK<>e{;v>>5X9v֞<`;C6nY,cH{J'Q`ģFL]$]X݉]Za->3ysBʹG!5Ĕ4~,:} r{ht:Vwƞϛ8ăcW9 NMu v&#$. .[$LCB0j+-{[CehMGOߟ+$VLLj!x$L1d/wNGɜZ"mecahhvx, zvھvTQw1XO:iV #BԖ#2,`:_ cYruRjB8}h?MobeHt_GsHdX$};ݟ BD DH\i׮XƪMeO9~~z}r53 Ej!eKҧ0\\EgЖHj9<  DQy.[jj~ 'ay=`yR.ۋ5p7+Zq $-0%Z@,]li?uE!_nMN"c.,ūN 2ۋc\ 3s/N ~f?3͙VBE{ |K-թ׊(F)K!"1Aa%ڔJ浠\UaT$ ]9o%`қ!@8uqw]nÈdN|2JK:uۭ_OV X:i/ J ZZw.vȈɀXR8]aˑ!%&:KBd{]-N#[:mBQh(xhO}\]3ա#|v5gҽȶJ?ɪ(MO#>i'ȏ_#|P Lj.x`ڱ87c$R.,H 9IoQ"EYY&H,/ܽǑj~?~$'{LQo+0I1@~~E,9Qj;{=gk3vnVufPK"$;ZK~&"ap$_PY hdF7ؚ$FJ,>\a\sޭXP;)Yj>vK+5gVg![b)L_-&pUS!dԬT`=LtŁ9ok{m(a}y,c>)h'qi A֚N[*qwi\kvrrRڕZKϧ߸ϹwTX-ϻ$5Nqm7 ny:2v?.Tk$b^ p1Rs`Ĵ܂'*@{:0/hK4H ,rLJe/C;=(TcFM>APJs[fs$f)wJ$/)9n҅vJ# ,em’G/=:p3*ۙ< dA6E_Ouv?(_UkG.Ν~b2y4 _:"'DshZ|PxW=5RIY^f|<j02|CKnqÊ-&"O:'&ֱEMR~S;S$ K۶_{Dby)WC u ܍ M#gMQ{I}Ρ]z6 rx%~hfYY c4bcQ+~ =-wO&L]-M\G H_'xg.ژxK 9bs8Psl yf' 2N@;g{|Cs@\38'_JݮϺ@>X`௯g)IË 9Jv1;dK `OJeND6SpfcUh%}`T`AՖ=eIQbZuzyi ^BqmɘR8:Iouln26pQz> + ^-_dZ%#ŧ'6{zfR;D~%/XzTi̦}jNwieb*h%fek%q浨eͭ.Ԭ=5< Ь~]: ϊ ZHvk u'j~/I~Qđ%zV!;ŀJ6xKH;0 (=xÚ9'?j-pƬWw&R9.C>4: # ܦ&qW+ZFE=ŷp5 JRpdz , f "DYN` l'^㩂1Gb8_yʵh4k";u"2hub:.(K]_@D脧. 'G%|Zȣ=>Sgvp˭PpRYGѕ?Z=^( sMl*W"kQ/<80s/"[1Ї屯 jgp hBj 4 ^b҇'i0TJY)mq) W…f1v :rQ.Ĕ @6V=xP0$LL=h_ŢU!O0&w0N:g; `]cd,z 6:A%8;o- 9g[mK(#\y?&o2vmP{E ڸٲ&c uy7j"P@a6'b,ŜRBޘF{\G'D(cy)&vMƊJiNx {X>cްbԟdSW1@;LKZajq팣H $靗9¹paMNw|pC1 rRLmE&b}Nyıq-%7XIE?~nm\9#o=ݴHu h-蕜&:#gfWB+Hc(zHBZG~v绘<(oZ@ ] P*> tzu1 `RMrLYޒX:|ȊhTqdNfpZJ{fTK܅Q޶Wu|A"պ˱V^9؂,;39f -i.24@[y5`ڨ7ȧUW@Жå  Έ7L'<о^+s!Ն 4e#6N}dZgԷ r=dƗ} yS,-|6tW\EA )K-ĸo\hK K !Was/a{=Y Hp\\K.S />"B;F`_ }}EtDT r03bH!ήd$yoEɷMKJX̼5 2qd-)4?L| .{Zڌ:SI:?ʃf Pn㦴p hf ^#gVVFQf zkB383 Q̾_8%Xh0(sUc_?֩⹧? $/F,ǀYv&r} ur(uէT9k;34kH2\*MЉJVaZ΃TR gy6s8j~a&*ik#i[:?V04 'KHS^b82BgZa!pf+PqL=bQXa#APQmh\yv{λ%#[9U0C?=Cgb|v j”"!%1&m.YSZTc:f9 RLv򉲆|ں.|aIEH 'fދ6́a=Gd4X O9 ЄE Jzj5;CzbJҷ%5L;:'JSE<2=z ~;Lf]]!Ub PHZh)d\XYy`=.7 DV'Mu4Ҙȴ ;M%Dh*rJ^6OvVdFh0 l~nTZ;Ybǘk)TfUr\hOlf9KFs]W I=U"q蜻Qv: {Jq0iQGxo:]tb[Fhҧ]j8Ⱦ/s!"az<3g%˭)_b5 6IĺtG[%c&nIX複v}k2VKNh匫o[ycsVԣ|죕l{(^{[!$w"^>sCsH;%BU?xy+/DŽ^A_.&~3#(JeL.+]/=yhx$Qk8bPނy|J^~I{w䌙Ϙaj*9dnnYrRo:FE8d :7n[zTnK줵ڡ= n= bLf_o.Z*QUx)vmrnP԰~H wrtOmpaݹ4:teXC9?d5N\VZaQ 60IFZzBdPz]qi.hGG|]/u^/<M̃R$PP TZFϦS?h9"|:VUB9Aӭ$m햴*)mت_cv$8+, )݀eXo-ѷ"_e{'!Rt4Xa+hOk#2 gT]hW}xeZ5B*dNY%O% X`ZLT Ȑa uH0.JmTxltl˔Sܞَ1[8u*aq_(]ȧ*r5GrVJqi7/3$+tcNî-a- }M!GNdIi`CWC k j'Qu9Œ"VJG1}%ܲ^n"J5G(?re7FR{#pz1XY)R0h8:*OtbHԩoZ׀I( Vqz˅PDE>Z`Cg3XFPI%e,;o~#b&S=nQbq~BA򣽘W}CZUg ֍~X#ϾyM^) U 0/.P*(M9n!ݝP+(Xpnaߟ];K[x's 7i#R > +eu#8a(9tz7+q{Lyͤ`&k$o߇Mm(LS.b㈘ʋݧETE{>W!T_$'Fto1X gga؞윉CC=߮'=2As"ԑEm+YF>*NOU+[εapzqL?;DUn?3b$\]!sQ;:AܣlCިq&4LDi.c7%MB#1-Mj_eB9R_J,>A<4A_xE62[\TU{FHHjx&\JXjA$=UiY7ccZ88*w0lLd|ы"XĜ3mrE1~MT}ǟӢOqQg8 ޥ(2;dHJE-t[d8 2) p }u;j0G[8?>܄ 8a;A p"^Dt QY ]ΒvD\2+wˍ*,%m ~8TFGўآK Ɖ:Gmٗ0S˸QphYl֔3PgY^dw!+2DxO+۷ŀr;RYrXdh%[$kgxF5!f@\=jwV43qiIAHG1һ_*)*j4\ wޥr֪,V̎Mx1΂ļ?:H%<3,R+< ŎQ4QW.cwPwqLWɈ7RXݲ ~C pDiS3BM?L4f}i$2S2Su*,rAa 8#Yayʲ*9 O'l 3j ZDǹ2rISn`!W(r e w[_vu?EߒrL%.14&m5kۈr`@?zvZ*q&?;V7 Q~c{l/B`Ecwa=LxЍ Kk:]F99@JD^zO|К 4zWVŸD=-_82/۽<"b[>AW ۰ۿuf~.6? XbJq~| i@ɴz@]Ԙ`{^BJ:әJVR/64~-A*͙eR Y:ehKgyAY2טׁ aj(g70Y4K<ac;ⱷR o1pgYVkD TL8b{c=F ~m;Oycs}\"|c$0xvTprJ\ݒ|2/v2j^VQ7lp4ZM15gŸ A? _4tq9IZG=@4^|Pgf9+O*H !wZIkPV 7iLeYŴhŪ("P.S8芈ͯ i6Q8*[Ͱ?cp#e\u-OEyDlD[Dҹ?5Pmg&g5&Y!}2]vW6veaj! F]{?!=mt4&4ʹ\_INn%f?\,s@4& \zׄC;bؐshjҶ9*/C.EkOxXRq5&>R"d= łCU+!IxܖfĀ­5MA[ |F0l◕7-!YOF8TxU] h.f؇g(H-,X`t-`_2Uz!&eVtk@ǽ6(`&gZ#IͻN.#azIö~9)f"c~CvTF솹 (Ex}OR2mUUi}mrKU)sk}bdݽws!8g{!zxls'<ن"Iu*}/@dr=+; lؼ#ѬA% FkS^|2o1;xearD蕜'xFz >Ö$G}=E}=1 +!3{6L 7DYkVLX_rn7C Ǜ:LBYB˱96Xtyш=GfSxkޅS"/qg:P}~njR3)ٰECZv+9^_NɆVZ֍Mkpz8eғהP#;,n%k;8|ȡCi=_~ CԹ< ;.b\9k&<[D+'qԴh8'\&Jط:ŊVuDJ䬡(jԒY1^jW.M=l,2rk׶ʫ0 ,H:ߵ+>>%%$qBm 5RVm'l+Dӗ$Wc|W]x g7&}0dh2RNZ 8ky*M6fp\:, yƳx&`;^i?G슆ГIn_g+L:uP֮YKIqR9]c۝8 Gyewሧ Odv^ cV0S}7 Uɨ]NRcG q}l-uzvr+V|O%N9zamAД@ Q_ܭ@Q%>`.Phz_?H"J:P3gswwUS\ڨ6ײg~ O,}3Gz/QFġ:Χ'Ӽ4\3^;F r|y3tV< c|q p| n}6162 (}9]sr>ny5b^r+oL;xif(4\(pm'Xљ!Ț>oSS,YNOմa!.C.3S2$P@ 09ɘ{RQor1H)se3"اXZN"x<7u4 q ײZ֖Ia|8 SӒ A9$V:ǡ(R (uE^X3p=Piy8䪧0C?8cMϮo"bzos>a(l1bN`zN^DgP4!R ݆yx0{$q+/@a@Vflڏ;WiɆ=_NH[PwѢ$BE<@ kF]$/#I@.k&b-hd5λ9w!_v?KS֮>p(z'K]l[!:>}! Z~7&FtJdKwjnew|qpp5ޗs%e=˺PrIE P?-o&U/XZG:( hlީ0g5,C\$WT z&|tpܵec{B?=&c5OE b5Z$3 /CЖ _ Pp;!pv#'2f'g#'ZpԀQu}ba+Ŝ#s}iӟr~ꢍ}Rڈi^ ų_=IYRm(6brQC vTz29F~^ܭؖJ8LIb\;ȋn4M} gM617:Y E$:w:%~Y-MhG {G_)[|`܈®HkЁk^1+mL!)Qvt*Udoj$2' tM~XX8o+gT/qٲ7WX ;_sQ$$-Q%a )Mr]L Oe{5GMS1` 'nls5uKGe^_53Psmr b|$1x|'ڮ#jd9wBAB/e5 c w,rN^ fbyJ(hK^ QRLԙIi;abbWq0T aEfeL2lVSM9Piu hF^0~ j^e֏NZ;9uul#FGh^dZ$RLz%7{z5+ RߕE3R)~~bm?骮J'dȯվ{Krlt]ZP2SJ[2-Q*!/]T*ϠuN%u_G[ϊ}C\8SWʽˠC.qvߣ/@\-:6kkd£\4I&}m$z"t5?ب ױl 嬍Z=czl7vP8oϖ~m K@%"J_-d ]V-TCx`%Ic\mkoKC]^"6z_)yE_gG93_ R)xf5y૩AeWsJOekƄJHR+o fLDFBtfV ZAQ^L.Q"2(vyE !^,:ƶSpʠPZj+uR}Bcm S,%5G9r+Gzr; oNaZsD?g~z:PwyG褮Xa돐SñXX$P *X|;9:U=g7n.}Uv&͝g'RQдˍ˶xXBnꑁF={| ?Sn酱N̸&'e &Y:XhӋ~P6r #jc*֌ ~hD8aT*p9uKQ:S9ZJ:Kb(팔NCέ)z 7nb}aBQEpS2Q S MIo Sb ETϴ0&8#ie 6ǰ4 x^[O<}m &XM2ʕ`'ZЃ Jf$KM!1j>\Pyvx¡F#vӾV0D~%5Y27gt?,V{a OI"A2ufv#J\u)fˀi%n*Y[C)'}C lU[1@Ҍq209m$|" St~~)f*e5~NԔ*Rᗴ#{;s 5ـTrЩ0R~$<vD%Vyw7KcPvKڡ` ,JpHd^fViO3Iseh%RyX@Z@ څ<*ӲR'kZTW#V.Q iTj+$DCZ:0e]ѡ @,S q4 5eJs1`O0"eO? 7x:v(| Xd{Zlv[{;@WtlaӀ]k 1"*zVy6br0O='Nb%ٕ_kҭ5]} \IIw|ڝO<>ųɷ΀2;M7WV/nO))nY)H&u-lxU]hEjK=>FQ ~&9Ά_gp7]n&jgcDuChž%ZN!n/mID͹ygPkak4V&i "ޘ,Ѣ,7GVZ0LRw&)ˮdM~M xuҘRԅ-aA`&[v8ݱTRZmgyS}Rʆk0 uQigoJE,5duIzQORf7bI(1Y5$ Q^%/dnrsOD|-(pv2;gЪ$%d,p@ e@U0+҇j0Ue :%ڄEl__P~ U" ]FQu}{EA3zߎd*rƩieYPv/h^PER& n@Cd/,Ygb_MY9HX[ҽ<ZW,`1qje\Q**j2N!DqXs/0nL-C$u4pJr<9ǵhAG2Na]|_φxRwZL)fLsy, 5uT[8O"uM|/,4֑[[%BETB_sk.FtGԧsy?V1dJPȖ&cc<Mx@F PAa2VlgzʁGޑ(Aro)jGE-sMwdPq(\ 났w=Κ') bD2@ 'aY$'*?8catMΉəJ Xw[zt.EG0q8#]u| =f`-v&YwZF,RU.sVXCrO:[̀ub'k,=fpuIۗ`BZ(1hPɨ}"u r:@j9 Kf7`+mDtse_Rտ8.ߌD&BhRY)ʷ qM@ԺWJyٝ2qZ27~f缼hY y>-wgc{=a}R^ Bgzq8ޫw&,@4tkFtAkUX r>K㎪G_ Mgm@)vek'~ڏ64<3hM99pBwuh)Ecb*{J:?PCKj62M)U!WĽ\>@c"',liyOo9lJ_G׹ϡ\۽<uՖHuBJX@LrO}6SoH Z7>.9hTѦOQ zj}FzLL˨dve?_WAs}WuCΆ^Yc[ 8Ln `M`"heBz)læYb̽O?$3nQ: i>_c#tTJ0j3b9\q$]}{B*nC$af"gB843$ih}B+Y:gs`4`~-l»x!Gz㵗Fyʳ֯oTϵ;uEh"obHhR4_vq(_#bXʩ)s+yg )(N,G[p}'N:`x"Ì hh 5|t;?ޫU։#"Vq%<_ATg[IW>(,Ȍ.L2mfO@ćҭD"$IXU$n ZS%hR[xIvW6?n8q 4)9n)"5'S~)ĥCS6\j溻Xp3 j%a&(:鬼<1=j'RO5^H9H+ҹC ΊnbAS[,͒9bEa'*RMk!lA ^o ?cRYڟHמfw0)uw\  dR#ZFS Fb,M&^`ZŬzNfS) e__krWHe9 MX[ eGM7$dC:cO)ʡ{"0BtAeާ嶇a})Fpe㕨.] nPf\í1D-ŒUzAF}W' "o.JGe zw,;IJJXԍ.X!ű+ Pk:c2ѥ+,B؎wՂjYַTf+ٻ88n6-=ݝ{O$4 S0~$pKt2.fn2 Q`wܙHmph[X2UZ'od` 5COu;lqrx%C#xK Q\C~ϊF1^YͿ6g#NjRєfCpE2˹'\\3x:c([Lꑠ(EV?|ZOaP>>2 |OB[ 3vk"k3zK bWR8ξd m{[Lѐ Ύ A*,tQ_`dN? a:iVP໯sі,hl0 >Ѩ^ʒ2\j7լ50 MMd#ųָ$ !|AkitqpOt+@㼧fKLdƙ mySO%X~F6 sf<'x]9案ν?jё~0svp#MVWnωMDX.򤓆18VȐ(]7JfӳA_u8=](;Nk㍊Jsv!tjŎ{/i,鎟$koܝ\`nEf\8zDCK"ICI&G0Oڷsօs᝗hi=;^f O<WSBh: lp%q<;XJ {__9‹MFtYSoR"rM:R//!⺎qA!a.U{_32X@Ao{a,WF, Of%E0 #洝q@xAm&b h!@3H/I~/cA #davnRCBwnjO&s1ZvGXo:ݕj +fe o/"EȺ&ƀ{P(36W=r8)mML (4b`\v]v8Kq[KjLw-U2!~5Ah*ڦgz 8Dr87iONt2$/I|zK8s&*6?;u h.- Y]6M`F[=48t- #I72kLVⰇ^c@3U*lYpMMN/6!~/Y+utE"D/PC&P28, :Y7<| 33W!I+C$H ZP:K3)RdnV26cF"nj-̑|A|:1DۘA^˘\%|XWVۙwd%8@4n3ƱvgoG\f*KBȾ6R' ȧ4x"pc.PħO+dҳpZ>0riS*q|~׫xCG=fwCu#aWVըU(<) {䦹iEe4=: w|y[E'}S"7upz) u&Fc (|aMD^ #ݏݓEn62 ka>S cڲ]v1\ߏÚ8fU&=hw΁< Жc:D'U%@Yn% Pkl{*oZMAr/.%j^svEy&^ /ÇÞ5siQ?DXTXb>T=mZTCA8:;[ue!J`XE˜+2aÂy!I їk= qП>OEn`!m k@ ; q SgW1^*\Lļ6kLƦ"<_9>"khmFY~o~?kϞݰ\'f>yrtw=tW] R <{`dV#Xc}(;D*&yN~Ӱt[Ève @ NRDdN5z^F wgތ?x*Ȥ .oP3[o8}46^F" dtvy7^_ k9j2,-E9r'ߵI>Fe!Um\=zGqhŨ_D,?ovz,F;mȊZB39/:.IM;E8. #\h<읗tOOm'rge>6߳_.,$fg/n&1A`yf_C @HgŞ""|G~J[}<^whlQoz:2` WV; A/=Hg1y{ݪh?aNW'Ns\g6m>ۖC@O 0 ?Ϛq*-Ȑv죥΄ dpHeY [}1DJB`ep^vN,1O,-qXB epˎ{y,`NCIJtԼ75T?y3=!b:<7a{ʎH58-!DW dW6y٣`F1/ AH~Y=Ӯ3{ s˗t1'u[2v^2I7ti@ !-ACV4DN&וݠIjKa]M@@'QJxy Ģjۻ/>Z,Ɂ]U$YSFmOD-2TQ}ѓysbf $9' g ?|rkT"/6iWG^E{jGbR[rՃ U.D%Zk{}V!u&kfoq'kKVmɎf܇34T%v lb" I-kroSwg+i3 ak\}vqOS4NhW~|_ܟik"3lgL^>Au#>:9\k'vM#Gi/KQe ๸n44,:I7rN7*lvi@gEUC%J]!%&VEj.,;툧Nlw ctV+6ѝFyeFP3@9~S2|%8t/ 4~Ci,(ЀD,5ӜMÀE]ԟ,x? "6S$+_sgcdbR쟾ogL_K@/5zr돟Z'@WiXk¸(9%YCඬe$1HBf*q[&&mnUP+S2ٌk>9;ؼ# ( mpܢW'3.y'HN;uVF ^7J1br1]@MvV]g$R.XDw;\|5di 0^ Ow8]Q PgGݙ0sD7lVyTp^H4Tʩdj"$&&mϫhS+{&6j9}vM3>%Fb>߿l«-x80Ab۸Rh EFgP'yY⡏^uOz[1Ds ZG. +[MPg rx HY W5n aN\Kj)THTt d”Ǹt25x=d2w&IbI23Ma*KѧpaU ×TSU]c`4Ȍ5PWX 5Q_`IPesNj7ݴT>u$UrA FO[][vfkB, ;o"ˏ0s 9Cz`IMi .cy?Pq⠌U>̐Ky%^~w0b*QẆ+Sb ;NQ$tBzO[%'7]t˼["#$%'Ҭ! y)ʌ>){qfPҿ$O C4Ф:c "֮Zv$XmnN胮/CzqPDXBz\ ^P]sFvr]ln<7_.5v\NmOHfD][s <ߪ)YYM,_~RϮKhy#\3ܛLM3=v/FlM`_q-}Ǥj\Cg`oyS&ADSTDUjhJrG!EqƳ|Tp$;Ykq;Uzz)2}!:ֲYhP઒ ;m}^4|,L]oh$Kў(À1a9IfIw`έ; %):^y|%#=(7R׿a(lf/sI2쯚Yk8HnĀavYK.%2^T#p[.&& $NA1"5^t0u$IA\(*-Hm_<^G 00dV'jR5Iߤ!Uӻ`Z{<@<٩'&vҰnn N^+`oGOt&7+꡻O *]ˍWĠT#Ƀ73{t)o#D_b9E֮*z+@R UEGvdzIcX 8Rr~wg477AvJ6+K&XwI:'.<2_Ϥ2{eoLW<8h|3!aufk~gH>g0#!- f%a#qwG"L2yv4ڍ=o,[\p$fT߉J)tN4ZZvz2zcvY|.l4p6-LamU:~%K+,*cwhvb.*(3ɶjyUJ_28ii|)pE2V媅̿'VLi,۳yDLyY|i,hqԷ"Ky-ʈhsh(3]5v MLN6&8^z|7/*| ϰ}nMioyLJÚ=_+'5 7Ri`rskoKFʝ^/wG=[9eji$h Ű#}Ӹt@ZRgn~GʶHsӺ,H$bڟb̥tA S|s1FÝEJ*m6=;9,wn;r(j}0nI.VoRX@UFbꃮҩ痀5Z>afLeB^O-c5[GR'*;e}Ggv.|QaĕmN8҂"_IO '^!DUaee,"ٶ/cAuIr(0r<&8 k w_}eL˃ںُe4d%D0;X9sR͓d,ahP.1oѮ ,3*-2U۰$ޘ(nblrf+`?1&XicJ֚ %isLN"ޤQITo*UHa4O#vO|V詥|ieg Iw~GS4niDŽ QRD<3ۀF*;G@WL8p Lvx)|ʞq.Kv#(EvvB.FW. rz}A_u|tsD8VޛޠZxC/s;qmzF. aů_<ƊHo b-!{6ޥ*|]3 '?;R"l,W- k\-^ } &~V^~/iyuTeǕ]gJuv:XyMש!^o2ǿ=Wn28iYFod-t|A {H;@PlCMClI=j]Bp ϼps4#!ITit x~  ٲ.?K0{T՝%J s wNX޹{\/^Errw&goTc3pn3=~.4#׃57VBT}( fe[fА {Ī=鍹`Ȫ a2i_ws[呝/`,6d2-%9}®?+Q?D8}VTH.ۂ=tnv4ͼ%do=ddǕU5(P+׍:,,Bڹ\6CZP9] *F;4K\yUn +Fʅ'&(ʹhX“BfQ8!˓Ien84Q2|֞V[%V/`T ʐ*{Z,@^E _;3-k>gCok<<#V298UuqXwɧjzFېG4 W#jCa6&}Zq`N[2n}^$l莜`刅~v!@?v䧈];/d+Fѩ/.F#|19vPE_ ]ʫXU~WڀqwLNԽ|16~p!)|=tU5u(Xvr5+wg[f:10םX:0wFuϚWo^>j=W{~eWr@6[s IP+̎HF#IM_@dԁӕHt=7aG"îhJ%%O29ySGDRT$T"1¶ΒgZ_u(f|LɵR6LPq6Um[0Ɍ.HZ7S晡64^ O~Jy0@ #m>a)W *fLx?^>$Q+ >`7wգ_~ Ʒlp341C__AzaT%C#GWoϕ+a*L>hX7E]'_0&Z;<ࠝUX DC0}$])"r u>.UJ 81K]({WKNLǛ[ IG@ cݮw"wAH]ܵ"b2MR] )+k)zqB9"&=s+.4UTRߖ-+n<}P\PC)Kz{^YMZ۳Anq\q o j1/>r%t.$ s[&eqtfc<6V5#ʹ\q*4ۦklTt}^!*-4:V+yl6Rp 3bq=l: }u)2ߋ"G9I6C tTr8 mƌUe{0;WLsx%`O*8SLT=v {.FW #+qьZTfYeBhB}ш'5z q{^jZ4KyB}"Tk퀔 iykz SQytT NZfCތtH$>dcGW3V^WK$Y.a=x@+AqMaKX8(Y 'Q"пޏ|0ۍ-s[㓘&gxŭ/EEсĊMb휚) {<څsHztibb<)NH2nG+X#+6ȇ$ֿ} X ƜǮy([&޺7 1)v*_!"C45?7rز"jMv)mQ)Yk~8̑k W-邟I֝c̜|jwLevF = =c+5^9[s(=YM Zծ1tW|qfI3}utxpQS.u~歡q_?~ٷ4B#ΜߑHLY^6ŭ>I7Bsmm@7T)M7T>|m:^d>b"YGۇ6ޥ\}~R[O%  go6S!g SU@ &ߝ8}}Ig'ڠͨTlttaRЮ"QM;!{ZJ:|I{|%};ؾՏ}?RYk|`+d$܈3JY|܄7`x`FeGQ]h)aQtvǥ c|+q4Mq76M;)9 ױ]樧Y"OpڹMZ?v*d&?P&["’#+D :kuuNnmsN[.U5"&xJJ# Mimx5(SJ@pk^+rݾؗRClަ!(]7a:qh։gzv=MwO^plAĂj6 ޗWe/YV_2Lvv=^C$`ٝIH$euL$"`-uh(>`k-l `գm/ ;S).9Ff4F''T]HEcoEA}_\}j9-륎JF@T`]$?t0FdRziO_Y~ɸ֟HqLAA<SdI.mNFT[ܟH>?DQov]A4n_GDTॹY~MCnq=X$F ɋ7'@A]/j9)oUXLN'ٲ_><*iM\VA 6X3ss]?O+D:zIeReK(J?sR 1Їc L툡2Sf߱ҲgnCg1dܵĀh^aanf NɶqmER `RW>>m曾Sw0Z\Ty1u?MfjԤ:X"*c:O  PW2¹բ$t*F^ 03U"|Ԏ֬LǓ {+_p^ y6ѷ\nլM"ֆ!o6˶o zкQc& Hj=h=T 3oևt2If!kIu L})ww-=^ys|`C+ pw.C:`}'zʙPv6y,:$T{szfdAzIM; x(Ya*cF\p:uU Dwø1y >TϽEщ<*oܐWheOHz$1ݡ3 /d@9{7PM%t*L*{`&=|[Z@ED_ ,7tqH}ixrD},q!|7qF.AY.9?r ݸ$ŏ…Mf{x(;t1C݀,u$IR",vF6`,0nT 'ՖN 03 ?':3z*$(˅N0ug\@5^!@M0O_Ql t$'#Ep*3Ԍ b&t;aWt!R!nRt8S1aL7Xg1EФ"HVL}08ĺ)IV?^dK[X~+{q,OqluwĽ9@YJ],qXj̼hm9i-ecSj'V&e^A( sT 8tKɸW t[ˆ?u*!q0w845ז`-R{ĿUbbǒ~#nA2]5VZ[DQy2**MK n=ĘDzr>4 ec_BAO2 1w:cML^,lcJiyed٥ߝ%G, &W؏P?Auh*}|IvJ.f9y"9Zb.ݺ'%dك !AzǠ$6JnF vOSiGT&yhOuG)ܶ==.$vqaVpo+m =g4GRWZ j($cQRBQS7P |4f- e~}eltDٹPq/ Xjl2 &MI5;Fx!Ɲ=%X7/e Ӻ6|a=V^DOzj]%h9MA2,ςsO=\"{@"Rfݦn> 6R{l{ii V}cZP: ЦnV*OpOdd9 e7nQR Η"7ҸdUeѤ֬cw٪75t5a'wh&Us3ы.KmhxgU185Ԝz.e{~E3Y_^WM/D d~}O"hIѯeUpwfkń4=og[_̆9+/i;w29 sjM["C!(5<ՍP6 6PU)wU^c1~":zdA{ot+f/`"Bn{)Vx.dV D$s]7A*VzQvTDCaYY`DNz <³/(_ª Ӷw;uU(rߺzrmy>MfҒUBJܪjrbSߴ({:>e9=g!r)L{V9~U;X>a))Xzƒߡ㖡tn!Awk(lDV# cYRڔfyR_R׊_͗q;{{ -F\K ew mXZCf>(TӪZ)7% 4FI į2J}aTwe}@洩rΆz2 l.(3Ƞ*&T!@_іGr)Qsjxj " XRNȍK}!gl&ۯmy*B,5?Pr0lBQ|&J~Oщg0=Cyd)4Kdd*"YE,}YL(.="^. qt#-d۝]J r{I{9+!3mxCЪ+99t> ܱLGinEG@0C4fht+JB5kuTI6 2ᑾI 1x-$];b{*< ):r/oI#V Mԓ8i&jNMl5fh6ZBt.NGlYJtZ۩;(& SQ;Q~6U{5۔n聨6Tv P}cTjD(͟nBπ:0mSF#uwaY\ރG`~ YZ