bind-9.7.3P3-0.2.1<>,nN/=„zS߷x _6y7{(Tש4֣57"#΢~0Q8`N.d@E]R2RIeLritB|"j껋lRӿhzZM jq/v8 Fa#& {%$64P%;o *b:nM('Vʄx# ._\A$GϢnAH`aa L׭tqiQ$Xm`>@L?L{d  = 17<* "d%"% #B% #% $ % '% ( %(%)o%*.*L%*+5+5/ 5(/Q8/X9/:1+=F>F?F@F'BF/FF;GFP%HF%IGx%XGYGZG[G\G%]Hx%^Jw bKecKdLOeLTfLYlL[zLkCbind9.7.3P30.2.1Domain Name System (DNS) Server (named)Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server. Authors: -------- ISC Software NZbuild41 ĵopenSUSE 11.4openSUSEBSD3c(or similar) ; MIT License (or similar)http://bugs.opensuse.orgProductivity/Networking/DNS/Servershttp://isc.org/sw/bind/linuxi586# Are we updating from a package named bind9? if test -d usr/share/doc/packages/bind9 && sbin/chkconfig -c named; then NAMED_ACTIVE_FILE="var/adm/named.was.active" test -f ${NAMED_ACTIVE_FILE} && old ${NAMED_ACTIVE_FILE} ACTIVE_DIR=$( dirname ${NAMED_ACTIVE_FILE}) test -d ${ACTIVE_DIR} || mkdir -p ${ACTIVE_DIR} touch ${NAMED_ACTIVE_FILE} fi /usr/sbin/groupadd -g 44 -o -r named 2> /dev/null || : /usr/sbin/useradd -r -o -g named -u 44 -s /bin/false -c "Name server daemon" -d /var/lib/named named 2> /dev/null || : # Might be an update. /usr/sbin/usermod -s /bin/false -d /var/lib/named named 2>/dev/null || : # var/run/named is now a sym link pointing to the chroot jail test -L var/run/named || rm -rf var/run/named test -f etc/sysconfig/named && \ . etc/sysconfig/named # Store NAMED_RUN_CHROOTED setting to a temp file. TEMP_SYSCONFIG_FILE="var/adm/named-chroot" TEMP_DIR=$( dirname ${TEMP_SYSCONFIG_FILE}) test -d ${TEMP_DIR} || \ mkdir -p ${TEMP_DIR} test -e ${TEMP_SYSCONFIG_FILE} && \ old ${TEMP_SYSCONFIG_FILE} echo "NAMED_RUN_CHROOTED=\"${NAMED_RUN_CHROOTED}\"" >${TEMP_SYSCONFIG_FILE} test -n "$FIRST_ARG" || FIRST_ARG=$1 FORCE_YES=0 set -- named PNAME=$1 ; shift INSSRV_ARRAY="" while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 shift SV_B='^### BEGIN INIT INFO' SV_E='^### END INIT INFO' SV_KW=Default-Enabled SV_VALUE=`sed -n -e "/$SV_B/,/$SV_E/{/^# [^[:space:]]*$SV_KW:[[:space:]]*\([^[:space:]]*\).*/s//\1/p;}" < /etc/init.d/$SCRIPTNAME` test "$FORCE_YES" = "1" && SV_VALUE="yes" test -n "$SV_VALUE" || SV_VALUE="no" INSSRV_ARRAY="$INSSRV_ARRAY $SCRIPTNAME $SV_VALUE" done set -- $INSSRV_ARRAY while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 SV_VALUE=$2 shift 2 test -n "$SCRIPTNAME" -a -n "$SV_VALUE" || { echo "SCRIPTNAME or SV_VALUE unknown"; exit 1;} if test "$FIRST_ARG" = "1" -a "$SV_VALUE" = "no" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} -r /etc/init.d/$SCRIPTNAME elif test "$FIRST_ARG" = "1" -o "$FORCE_YES" = "1" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} /etc/init.d/$SCRIPTNAME fi done PNAME=named SUBPNAME=-named TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi if [ ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi TEMP_SYSCONFIG_FILE="var/adm/named-chroot" # Are we in update mode? if [ ${FIRST_ARG:-0} -gt 1 ]; then # Is named.conf an old, /var/named configuration? if [ -f etc/named.conf ] && grep -qi '^[[:space:]]*directory[[:space:]]*"/var/named"[[:space:]]*;' etc/named.conf; then test -d var/log || \ mkdir -p var/log CONVLOG="/var/log/named-move-to-var-lib" # move zone files to new location echo "Moving zone files to new location /var/lib/named" | tee ${CONVLOG} IFS=" " for dir in var/named var/named/slave; do for source in $( find ${dir} -maxdepth 1 ); do case "${source#var/named/}" in localhost.zone|127.0.0.zone|root.hint|slave|var/named) continue ;; esac sourcedir=$( echo "${source%/*}") destdir=$( echo "${sourcedir#var/named}") if [ -e "var/lib/named/${destdir}/${source##*/}" ]; then echo "Warning: /var/lib/named${destdir}/${source##*/} already exists; skipped." | tee -a ${CONVLOG} else echo "${source#var/named/}" | tee -a ${CONVLOG} mv "${source}" "var/lib/named/${destdir}" fi done done # updating named.conf echo -n "Backup old /etc/named.conf to " | tee -a ${CONVLOG} oldconfig=$( old etc/named.conf) 2>/dev/null oldconfig=${oldconfig##*/} echo -en "/etc/${oldconfig}. Conversion " | tee -a ${CONVLOG} sed -e "s@\"/var/named\"@\"/var/lib/named\"@" "etc/${oldconfig}" > etc/named.conf 2>/dev/null conv_rc=$? if [ ${conv_rc} -eq 0 ]; then echo "succeded." | tee -a ${CONVLOG} chmod --reference="etc/${oldconfig}" etc/named.conf chown --reference="etc/${oldconfig}" etc/named.conf else echo "failed." | tee -a ${CONVLOG} fi if [ ${conv_rc} -eq 0 ]; then cat << EOF >>${CONVLOG} Result: named.conf conversion succeded. For details check the following diff of the the old and new configuration. Ergebnis: Die named.conf-Konvertierung war erfolgreich. Details finden Sie in der nachfolgenden Differenz der alten und neuen Konfiguration. EOF diff -u etc/${oldconfig} etc/named.conf >>${CONVLOG} else cat << EOF >>${CONVLOG} Result: Conversion failed. You must check your /etc/named.conf Ergebnis: Die Konvertierung ist fehlgeschlagen. Sie müssen Ihre /etc/named.conf überprüfen. EOF fi else rm -f var/lib/update-messages/bind.1 fi # End of 'Is named.conf an old, /var/named configuration?'. # Add include files to NAMED_CONF_INCLUDE_FILES if we have already a include # file (SL Standard Server 8) and NAMED_RUN_CHROOTED from the # TEMP_SYSCONFIG_FILE is empty. if [ -f ${TEMP_SYSCONFIG_FILE} ]; then . ${TEMP_SYSCONFIG_FILE} fi if [ -s etc/named.conf.include -a -z "${NAMED_RUN_CHROOTED}" ]; then test -f etc/sysconfig/named && . etc/sysconfig/named if [ "${NAMED_INITIALIZE_SCRIPTS}" = "createNamedConfInclude" -a \ -z "${NAMED_CONF_INCLUDE_FILES}" ]; then # Get the included files from an existing meta include file. INCLUDE_LINES=$( grep -e '^[[:space:]]*include' etc/named.conf.include | cut -f 2 -d '"') if [ "${INCLUDE_LINES}" -a -z "${NAMED_CONF_INCLUDE_FILES}" ]; then for file in ${INCLUDE_LINES}; do # don't add a file a second time echo "${INCLUDE_FILES}" | grep -qe "\<${file#/etc/named.d/}\>" && continue # don't add the meta include file as the init script copy it anyway # to the chroot jail test "${file}" = "/etc/named.conf.include" && continue test "${INCLUDE_FILES}" && INCLUDE_FILES="${INCLUDE_FILES} " # strip off any leading /etc/named.d/ as the init script takes care # of relative file names INCLUDE_FILES="${INCLUDE_FILES}${file#/etc/named.d/}" done TMPFILE=$( mktemp /var/tmp/named.sysconfig.XXXXXX) if [ $? -ne 0 ]; then echo -e "Can't create temp file. Please add your included files from /etc/named.conf to\nNAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named manually." return fi chmod --reference=etc/sysconfig/named ${TMPFILE} if sed "s+^NAMED_CONF_INCLUDE_FILES.*$+NAMED_CONF_INCLUDE_FILES=\"${INCLUDE_FILES}\"+" etc/sysconfig/named > "${TMPFILE}"; then mv "${TMPFILE}" etc/sysconfig/named else echo "Can't set NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named to \"${INCLUDE_FILES}\"." fi fi fi else rm -f touch var/lib/update-messages/bind.3 fi # End of 'Add include files to NAMED_CONF_INCLUDE_FILES' fi # End of 'Are we in update mode?' # Remove TEMP_SYSCONFIG_FILE in any case. rm -f ${TEMP_SYSCONFIG_FILE} NAMED_ACTIVE_FILE="var/adm/named.was.active" if [ -f ${NAMED_ACTIVE_FILE} ]; then sbin/insserv named test ! -s ${NAMED_ACTIVE_FILE} && rm -f ${NAMED_ACTIVE_FILE} fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" = "0" ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_STOP_ON_REMOVAL" != yes ; then for service in named ; do /etc/init.d/$service stop > /dev/null done fi fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" -ge 1 ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_RESTART_ON_UPDATE" != yes ; then for service in named ; do /etc/init.d/$service try-restart > /dev/null || : done fi fi /sbin/insserv /etc/init.de+]Ef`IhgL_1 x1  ] A큤쁤A큤A쁤A큤A큤ANJKNJNsNJNJNJB] /NKNLNLNLNMNMNINJNJNJNJNHNININININININNNHNKKlONCNJNJKc?NCNJNC3653c1b2636de6564503b150157d8fc2468b2eacf4941d2c0da5ff07ccd72e320769198ec39266b8a1845aaf6c103524d41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427e2cc235be0ba45e0e47161775527da37fca34eb5b2148f60996248d084f145cd16289c2ad6349bf09afb5d2ef7c22690812b8471de0a05fd70ce6b4597efa17985e97b32a33aeb636eda013d4c805a8de3a3ad8c9b3545e1af300a7f4319d3734669ad9b977dcca96d1674d32a726de25180a0d0e075790824a6494a68c0ec4ded30067a844d360982b7204f75f59b07766f86dfb1eefb29b1766ba3b1d96aaefa62ac5926c940e3790e89cdc9e384c2ef290956720e479e392b4018ab11bccde694bf1658d9d35bb9dd2f0e29ec8037986c1d3a2c3e9c9d5ab0eb370ffd8753690b34031192dc5d3290f8739f2b20304182fbf14e5f82dea218872320c4ba91587b61c91837c455a5ad3cf31ae1f08d557ab3eab834a5b4d72936ec85ff113da25486e73c43bee32668c21a248dd9cecd41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427ecc2edaf563bc6b424e61033451de725b013336e29e65923682f7bce094bb3e5cnamed-checkzone/etc/init.d/namednamed-checkzone.8.gz@Q@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootrootrootnamednamednamedrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootnamedrootrootrootnamedbind-9.7.3P3-0.2.1.src.rpmdns_daemonbind8bind9sysvinit(named)bindbind(x86-32)    @@@@@@@@@@@@@@@@@@@@@@@ bind-utilsbind-chrootenvfillupcoreutilsgrepdiffutilsinsservsedbind-utils/bin/grep/bin/sed/bin/mkdir/usr/bin/tee/bin/chmod/bin/chown/bin/mv/bin/cat/usr/bin/dirname/usr/bin/diff/usr/bin/old/usr/sbin/groupadd/usr/sbin/useradd/usr/sbin/usermod/bin/sh/bin/sh/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/bin/sh/usr/bin/perllibbind9.so.60libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcap.so.2libdns.so.69libisc.so.62libisccc.so.60libisccfg.so.62libldap-2.4.so.2liblwres.so.60libmysqlclient.so.16libmysqlclient.so.16(libmysqlclient_16)libpthread.so.0libpthread.so.0(GLIBC_2.0)libxml2.so.2rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.8.0NM@MfH@M$]@MLs@L@LLMLMxLT@K$@KKK{@KV@KA@K'z@K @KKJ@JH@J JI@J7@I@Iug@suse.demeissner@suse.deug@suse.demeissner@suse.demvyskocil@suse.czcoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deaj@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.decoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.de- Change #2912 (see CHANGES) exposed a latent bug in the DNS message processing code that could allow certain UPDATE requests to crash named. This was fixed by disambiguating internal database representation vs DNS wire format data. [RT #24777] [CVE-2011-2464] (bnc#703907)- Security update to 9.7.3-P1 - fixed a denial of service in RRSIG (CVE-2011-1910 / bnc#696585) - Updated named.root from internic- fixed security issue VUL-0: bind: IXFR or DDNS update combined with high query rate DoS vulnerability (CVE-2011-0414 bnc#674431) - version to 9.7.3- ifdef the sysvinit specific prereqs for openSUSE 11.4 and later- fix bnc#656509 - direct mount of /proc in chroot- prereq init scripts syslog and network- fixed VUL-0: bind: Key algorithm rollover bug bnc#657102, CVE-2010-3614 - fixed VUL-0: bind: allow-query processed incorrectly bnc#657120, CVE-2010-3615 - fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type bnc#657129, CVE-2010-3613- fixed return code of "rcnamed status" - added gssapi support- Zones may be dynamically added and removed with the "rndc addzone" and "rndc delzone" commands. These dynamically added zones are written to a per-view configuration file. Do not rely on the configuration file name nor contents as this will change in a future release. This is an experimental feature at this time. - Added new "filter-aaaa-on-v4" access control list to select which IPv4 clients have AAAA record filtering applied. - A new command "rndc secroots" was added to dump a combined summary of the currently managed keys combined with statically configured trust anchors. - Added support to load new keys into managed zones without signing immediately with "rndc loadkeys". Added support to link keys with "dnssec-keygen -S" and "dnssec-settime -S". - Documentation improvements - ORCHID prefixes were removed from the automatic empty zone list. - Improved handling of GSSAPI security contexts. Specifically, better memory management of cached contexts, limited lifetime of a context to 1 hour, and added a "realm" command to nsupdate to allow selection of a non-default realm name. - The contributed tool "ztk" was updated to version 1.0. - version 9.7.1 to 9.7.2-P2- chrooted bind failed to start (bnc#625019)- genrandom: add support for the generation of multiple files. - Update empty-zones list to match draft-ietf-dnsop-default-local-zones-13. - Incrementally write the master file after performing a AXFR. - Add AAAA address for L.ROOT-SERVERS.NET. - around 50 bugs fixed (see CHANGELOG for details) - version 9.7.1- Handle broken DNSSEC trust chains better. [RT #15619] - Named could return SERVFAIL for negative responses from unsigned zones. [RT #21131 - version 9.7.0-P2- Handle /var/run on tmpfs. - do not use run_ldconfig.- Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch- Fully automatic signing of zones by "named". - Simplified configuration of DNSSEC Lookaside Validation (DLV). - Simplified configuration of Dynamic DNS, using the "ddns-confgen" command line tool or the "local" update-policy option. (As a side effect, this also makes it easier to configure automatic zone re-signing.) - New named option "attach-cache" that allows multiple views to share a single cache. - DNS rebinding attack prevention. - New default values for dnssec-keygen parameters. - Support for RFC 5011 automated trust anchor maintenance - Smart signing: simplified tools for zone signing and key maintenance. - The "statistics-channels" option is now available on Windows. - A new DNSSEC-aware libdns API for use by non-BIND9 applications - On some platforms, named and other binaries can now print out a stack backtrace on assertion failure, to aid in debugging. - A "tools only" installation mode on Windows, which only installs dig, host, nslookup and nsupdate. - Improved PKCS#11 support, including Keyper support and explicit OpenSSL engine selection. - version 9.7.0- [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] - [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] - [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] - version 9.6.1-P3- removed the syntax check for include files (bnc#567593)- add baselibs.conf as a source - enable parallel building - add baselibs for SPARC - package documentation as noarch- Security fix When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] CVE-2009-4022 bnc#558260 - update from P1 to P2- added localhost for ipv6 to default config (bnc#539529)- fixed apparmor profile (bnc#544181)- updated patches to apply with fuzz=0- using start_daemon instead of startproc (bnc#539532)- version update to 9.6.1-P1 (security fix CVE-2009-0696) bnc#526185- enabled MySQL DLZ (Dynamically Loadable Zones)- around 50 bugfixes against 9.6.0p1 See changelog for details - version 9.6.1- not all include files were copied into chroot (bnc#466800)- /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334)/bin/sh/bin/sh/bin/sh/bin/shbind8bind9build41 1309970778bH!bbJb\a mc^ddbddcbabc>bcc cJbcbbbc\ nacFcG oaba9.7.3P3-0.2.19.7.3P3-0.2.1 apparmor.dusr.sbin.namednamednamed.confnamed.conf.includerndc.keyslp.reg.dbind.regbinddnssec-keygendnssec-signzonenamednamed-checkconfnamed-checkzonenamed-compilezonercnamedbindcreateNamedConfIncludeldapdumpnamed.conf.5.gzdnssec-dsfromkey.8.gzdnssec-keyfromlabel.8.gzdnssec-keygen.8.gzdnssec-signzone.8.gznamed-checkconf.8.gznamed-checkzone.8.gznamed-compilezone.8.gznamed.8.gzsysconfig.named-named127.0.0.zonedynlocaltimenamed.conf.includelocalhost.zonemasterroot.hintslave/etc//etc/apparmor.d//etc/init.d//etc/slp.reg.d//etc/sysconfig/SuSEfirewall2.d/services//usr/sbin//usr/share//usr/share/bind//usr/share/man/man5//usr/share/man/man8//var/adm/fillup-templates//var/lib/named//var/lib/named/etc/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/2a0294e3e6405bdc08f0b17cb35273ed-bindcpiolzma5i586-suse-linuxϩj{`=d?] "k%U04L["8Y1'v;(UV5FQ%A&!q ۻ]) jc ҳz|_`{ZC߇`m&TTt I]Y/gh:AT/4'/ 'gwצ5ӹ? dbXq<<Cė+8&-5fLqiih 'xM;; `1oqXvR{e#86zq&;D;.i7U~"U[\ ]]G/vyVoْi:Lg}%Qc ¾""O܏kIS%3NXɉfcWK++ZUt{"mJq;"hrm+1bO7xOֈ޵SVrq/lZEpt\xEM{sh7rE9qVuu  [Y1t?#=K ͅ8^)/~b5s&mBD~;/+MBx( jJP/͠%ĵó@g5 RKȀqε6U2B  3w.aAkueXP^F&&):ˊ;ה De4hOΫ%Acĥ%ڱbW;`%cEjYmE'}pVb>J*+Jo\e,DL1{ _ljc49[>8AOhĽxтH!7 "=筷6˚=8x O29hԳ]Ш6e O'>bI@Pq@@)daBkog=+Ut9JE*!c|;`,($!lG t:j{N^+uCԳKjzRWƼ wlDX 46o6v7^w#o/i[UĊg6q!;p1=h/{ĝa19o ȡ0+ׄyW3G?z-';9j$r=4-u}vM&*J6xNVAbC w% (FaFT# J t.i-6֟uA}hiZ8t#BASnCyU<`wkrp=WEb< #l2|n݉W0`["6lx)Q8gbKẜP;>Z_v-vmcx)vWЅ\*=b:X%Y7DtJ%"8o=cc-J+)T% -zh߭Skp9) Gx%&Y}ZX.5"? -s3JHؗ)̨G! Dx iLE/>x~1X=:՝N$J&pBDtI  Kًhd_5|_ nM^}p@o06r l]bKm7~^_]*`!zS1]2(#"oS =amu:QA86 z%VB`\ɸ "Wv`P"Lܓ=s]--|.S{afM^7$/=qqiF(n(NB˺^·BF0,F'F78nX3 ?/=ǡeЫ( oNwRa>r Y^px$ ?]n{&,;( Hஹ!;7x.y$*JY돈zvcXV\*E iAOR0bAK#:!e~sp(XbԘޔ'+†g&ce2QВnaMoq]Vyn˪bR]EK,6=fhy K-1e^; T |TG[l(oᨷQ Qٹȇ܎uO$ ‡ctx^#Q:e[(SO3Icz khI7UyZ27}( {㿬G$nWӀM)$̍2~t2}RG0 Z['R2E{_hݼ3}kY4%`ƕ!vS[QN}AXhLFg*\Xi7!#=fވζH=k7=ge/8d\dQ:jy^V׮m 3)o)d`劇KT]Y6}9*c}{Z?;1x9'[l9TQ)S*I!j9D(6䱳=,.Z̍>wC1[V/L%\|].NgoF^ -wm  ^:>3|YN \+vfh׆TL/PgVwrUHL/ y)1y yM5e<5kK``9~ UR qľUժ@r7[/$fG[nj"ϐd +o&g eVf}aB.idjNr R|5^=R43C:z:wX{C7< 8WCrWwF@1T+cǃs\~vjtmc,M~eWi  X^ =3f%3{G.'{%iÒC^Rs}e|,QhLv{3HǶHױϱ+I:j,S73[<[!M@^ ]JdHk7D+ӟYi 8 񸜹9eg6e|Cg"Y\[]qXPvi^m]yZoM Ej  A$n6@(x_O]!J[v[в@7G~xOCֳ,RD/Ŝ .J݌e^6ƕ[+eێ99I_zひ 7Wވ+ xh)qXvgSw|G>3K/ڹcRq^]5 /F.P)Ś?!xD~D|_S7 ̄#&PL{}zw|XrC1ÌQz\&E{$WHG,< P8PջAb7eϙx$Uv*eKh$b,w! ydbY,M 'U==#.4D@Cr({Ba 62%$!@B bm{|E h4: ;zô9o^nSn"sp#LYu܄jGecٽS{#bPqK(~mj(XS VBRsgBqeFQ^ .pE FC)J6 b81h4]Z6bhP i*G7 ~7 s?s:xGWD:WvYb`Q4]Q1T[)I$x323CB@I]A";7P4k AefN'):UyU3u7Ң>Kx^p?[XcJI^k F1_w&'bˇ(tj0>JnD dYqjݧm q[ i 9iiaMDr.4..pV#F1pJdp-tJpu?Tjm/_0j$|U :zȰNL6hR([£*TZ YX&>cѥ8'2t_j0_X;.;mA=1!sǀzXC(`LJQвiS7JwH`וwZ0dIMɷHH|w#)z ҪwkME[ ߘT/#CWB`2?LP`N$שн@ \{J7[[RɭËVy.blPfa.|NRpsD+lϲjԣ'EV9 =9FLʲg+}~"g_qu0y*FXe(`4Ԋ^ΐ4y[ Sᯭ퓪2Vbh¦vMCW"g\OAR-zHͰF_p01wx $NdtGc7u7/1z8bp?֩ k#v{wTu:CG2^t1S-LR cZ+]G^;{ $׷w˫Jnj>xlG?yb& .,T=FZ06 GD*4O3])hee陯cfYL/RF_4ŘlQE`F [ݼn+ZрӗDo™%H"5ҋHX>ݿO OB4ޯvh UȾz>Y%+Al45_ E-:HnA?Z8<<ձՙo.ABk:M ᬎ9Jj눅vߎךҹs}EE $dOj2Z12R>6u͔VxG,c544dj2QLǮI q &:+T! Eޠ>Mg%Xh%RqىKY ca)>(F V"9ڊFR>HrJY{4!?ѠN4\\*3=|4Z|N} wpd *j¸.^[~,7a1`6k|H )lC<,6YPME$) jzVTzK` @=jυֺZ GUoRƂ>zL1~wo\17'+Xa0N6f2~_zq4?ROp9S%h SFx$ - {qAzUo~_כi蔍)“B_ed2ST UlpӁה3`4!v%Bk'sgn#MJMc+JʩylinzZ^2BXM9XRd>q $ Fog T0|!PfB,]8Kт79X ]WÆbA7gHsy׮8t^W>踚`56}wߚm!kkchZXlᅩ$PG\\