openssh-keycat-7.4p1-23.el7_9>  HLk|dO $ƨ[ .Ŵ %ܦ$\ա}65cXݘ 71CY|&t Nʌ ΞvTwV*@SQ,6*I*\?'fmp'| ϩ y&W'k1Sjֲ&:>x#8L[FnR0<e0-eq4|skQ %FtP_2{J tF 4R~d<=9~g0g6]VSe[?iۇuK~X`j["pwN%}3:+U_YL2X3vJ\0˶ RzRոz^TJ\CAG% ݎ>^6asTе rmiR}DjD2 " bFOi_ߌ~f9Y? C'Jyш s_k3h9n3GZ)>H FG̵r356d1969427b9cd29ec490378ae9ff26bbe16ce98dO $ƨd [|)YSJD ʹ Ɂb*Qd \k$^FiunHb/CՍHP@ݨ &-Gm0Ŭi9E. 9su#0`SG%>}qS{ۇ!XKJ^s3p12@O9?裱R#d>낷 {U.ب8?|d  A 7=DT \ d t 8 <L`t0(M8T9 :hcG|HIXY\]^(bdefl t8uHvXw$x4yD xCopenssh-keycat7.4p123.el7_9A mls keycat backend for opensshOpenSSH mls keycat is backend for using the authorized keys in the openssh in the mls mode.d x86-01.bsys.centos.orgCentOSBSDCentOS BuildSystem System Environment/Daemonshttp://www.openssh.com/portable.htmllinuxx86_64UȁA큤d d d d `010e60034729e34223da00495b544c41d7fb7a6b75455bec748d7990afb8b090746cd8b99a1c6d5c7e0ff2a07fc6685d439eed85ce242d4536d8e4e377df1cf23dcb91e3e897c6675060638507344fe70603d164a7b2ace552aaf5d2c69d3f32rootrootrootrootrootrootrootrootopenssh-7.4p1-23.el7_9.src.rpmconfig(openssh-keycat)openssh-keycatopenssh-keycat(x86-64)@@@@@@@@@@@@   @ config(openssh-keycat)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.8)(64bit)libfipscheck.so.1()(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libselinux.so.1()(64bit)opensshrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rtld(GNU_HASH)rpmlib(PayloadIsXz)7.4p1-23.el7_97.4p1-23.el7_93.0.4-14.6.0-14.0-15.2-14.11.3d!aU] \@\}@\d\@N@NN=@NHN$@Nw.Np@NoENoENm@Nm@NiNh@Ng\NS@NA!@N?N?N?N-ZN(N@N @NM6@M@MM@Mߒ@M۝ML@M@MVM@MMmMmM@MM@MlMMx@M@MMx@Mv@MtMp@MoMlMk@MgMgMfH@M] M[@MY@MQ0@MOMIG@M>@M4/@M0:M-M@L@L[@L L LLNL@LLL@L*@L@L@L@L@L@LzL@L@L4l@L+1L$@L#HL!@L0KuK$@K;@KK@K@K @K޺KtKՀ@K͗@KQ@K,K,K8@KO@Ky7@KbK]K]KXAKV@KUKG@KC)K/c@KK@K KKJJJJTJ`@J@JJ_@J@J;JJ J J@JJ#J@Jq@JjJi@J`gJMJI@JHJF J@J2C@J Y@IIcI@IJII@I@IIo%@IAH~@H@H@H4H1kG GGG@G|@GUA@GUA@GB@Fl@FFFyEE{@E@E݅E@Ew@EnEl$ETiEIE @DC@D|Dp@D{D@D?D@C@CCtC@C:@CC@CqC@C}@C|pCqCbCTCNL@CFc@CC@Bw@B@B/@B:B@BQ,@BBB8B#B@B @BBcA3A@Aa;@AN@AF@AEA7 @A7 @A7 @A4h@A+-A @@@@@X@@o@o@V@@E@C%@=@=@9@@,@@@@@@/@?@? ?}?7?@???j?j?j?hL?hL?hL?hL?f@?f@?f@?f@?f@?Xz?Xz?KK?8?8?%@?'@?>@?>@>0>@>~@>L@>G@>.>@=@=@===n =ZF@=@=[@= =@=@ - 7.4p1-23 + 0.10.3-2Dmitry Belyavskiy - 7.4p1-22 + 0.10.3-2Jakub Jelen - 7.4p1-21 + 0.10.3-2Jakub Jelen - 7.4p1-20 + 0.10.3-2Jakub Jelen - 7.4p1-19 + 0.10.3-2Jakub Jelen - 7.4p1-18 + 0.10.3-2Jakub Jelen - 7.4p1-17 + 0.10.3-2Jakub Jelen - 7.4p1-16 + 0.10.3-2Jakub Jelen - 7.4p1-15 + 0.10.3-2Nikos Mavrogiannopoulos - 7.4p1-14 + 0.10.3-2Jakub Jelen - 7.4p1-13 + 0.10.3-1Jakub Jelen - 7.4p1-12 + 0.10.3-1Jakub Jelen - 7.4p1-11 + 0.10.3-1Jakub Jelen - 7.4p1-10 + 0.10.3-1Jakub Jelen - 7.4p1-9 + 0.10.3-1Jakub Jelen - 7.4p1-8 + 0.10.3-1Jakub Jelen - 7.4p1-6 + 0.10.3-1Jakub Jelen - 7.4p1-5 + 0.10.3-1Jakub Jelen - 7.4p1-4 + 0.10.3-1Jakub Jelen - 7.4p1-3 + 0.10.3-1Jakub Jelen - 7.4p1-2 + 0.10.3-1Jakub Jelen - 7.4p1-1 + 0.10.3-1Jakub Jelen - 6.6.1p1-35 + 0.9.3-9Jakub Jelen - 6.6.1p1-34 + 0.9.3-9Jakub Jelen - 6.6.1p1-33 + 0.9.3-9Jakub Jelen - 6.6.1p1-32 + 0.9.3-9Jakub Jelen - 6.6.1p1-31 + 0.9.3-9Jakub Jelen - 6.6.1p1-30 + 0.9.3-9Jakub Jelen - 6.6.1p1-29 + 0.9.3-9Jakub Jelen - 6.6.1p1-28 + 0.9.3-9Jakub Jelen - 6.6.1p1-27 + 0.9.3-9Jakub Jelen 6.6.1p1-26 + 0.9.3-9Jakub Jelen 6.6.1p1-25 + 0.9.3-9Jakub Jelen 6.6.1p1-24 + 0.9.3-9Jakub Jelen 6.6.1p1-23 + 0.9.3-9Jakub Jelen 6.6.1p1-22 + 0.9.3-9Jakub Jelen 6.6.1p1-21 + 0.9.3-9Jakub Jelen 6.6.1p1-20 + 0.9.3-9Jakub Jelen 6.6.1p1-19 + 0.9.3-9Jakub Jelen 6.6.1p1-18 + 0.9.3-9Jakub Jelen 6.6.1p1-17 + 0.9.3-9Jakub Jelen 6.6.1p1-16 + 0.9.3-9Jakub Jelen 6.6.1p1-15 + 0.9.3-9Jakub Jelen 6.6.1p1-14 + 0.9.3-9Jakub Jelen 6.6.1p1-13 + 0.9.3-9Jakub Jelen 6.6.1p1-12 + 0.9.3-9Petr Lautrbach 6.6.1p1-11 + 0.9.3-9Petr Lautrbach 6.6.1p1-10 + 0.9.3-9Petr Lautrbach 6.6.1p1-9 + 0.9.3-9Petr Lautrbach 6.6.1p1-8 + 0.9.3-9Petr Lautrbach 6.6.1p1-7 + 0.9.3-9Petr Lautrbach 6.6.1p1-6 + 0.9.3-9Petr Lautrbach 6.6.1p1-5 + 0.9.3-9Petr Lautrbach 6.6.1p1-4 + 0.9.3-9Petr Lautrbach 6.6.1p1-3 + 0.9.3-9Petr Lautrbach 6.6.1p1-2 + 0.9.3-9Petr Lautrbach 6.6.1p1-1 + 0.9.3-9Petr Lautrbach 6.4p1-8 + 0.9.3-8Petr Lautrbach 6.4p1-7 + 0.9.3-8Daniel Mach - 6.4p1-6Petr Lautrbach 6.4p1-5 + 0.9.3-8Daniel Mach - 6.4p1-4Petr Lautrbach 6.4p1-3 + 0.9.3-8Petr Lautrbach 6.4p1-2 + 0.9.3-1Petr Lautrbach 6.4p1-1 + 0.9.3-1Petr Lautrbach 6.3p1-4 + 0.9.3-7Petr Lautrbach 6.3p1-3 + 0.9.3-6Petr Lautrbach 6.3p1-2 + 0.9.3-6Petr Lautrbach 6.3p1-1 + 0.9.3-6Petr Lautrbach 6.2p2-9 + 0.9.3-5Petr Lautrbach 6.2p2-8 + 0.9.3-5Petr Lautrbach 6.2p2-7 + 0.9.3-5Petr Lautrbach 6.2p2-6.1 + 0.9.3-5Petr Lautrbach 6.2p2-5 + 0.9.3-5Petr Lautrbach 6.2p2-4 + 0.9.3-5Petr Lautrbach 6.2p2-3 + 0.9.3-5Petr Lautrbach 6.2p2-2 + 0.9.3-5Petr Lautrbach 6.2p2-1 + 0.9.3-5Petr Lautrbach 6.2p1-4 + 0.9.3-4Petr Lautrbach 6.2p1-3 + 0.9.3-4Petr Lautrbach 6.2p1-2 + 0.9.3-4Petr Lautrbach 6.2p1-1 + 0.9.3-4Petr Lautrbach 6.1p1-7 + 0.9.3-3Petr Lautrbach 6.1p1-6 + 0.9.3-3Petr Lautrbach 6.1p1-5 + 0.9.3-3Petr Lautrbach 6.1p1-4 + 0.9.3-3Petr Lautrbach 6.1p1-3 + 0.9.3-3Petr Lautrbach 6.1p1-2Petr Lautrbach 6.1p1-1 + 0.9.3-3Petr Lautrbach 6.0p1-1 + 0.9.3-2Petr Lautrbach 5.9p1-26 + 0.9.3-1Petr Lautrbach 5.9p1-25 + 0.9.3-1Tomas Mraz 5.9p1-24 + 0.9.3-1Tomas Mraz 5.9p1-23 + 0.9.3-1Petr Lautrbach 5.9p1-22 + 0.9.2-32Petr Lautrbach 5.9p1-21 + 0.9.2-32Petr Lautrbach 5.9p1-20 + 0.9.2-32Petr Lautrbach 5.9p1-19 + 0.9.2-32Petr Lautrbach 5.9p1-18 + 0.9.2-32Petr Lautrbach 5.9p1-17 + 0.9.2-32Tomas Mraz 5.9p1-16 + 0.9.2-32Tomas Mraz 5.9p1-15 + 0.9.2-32Petr Lautrbach 5.9p1-14 + 0.9.2-32Tomas Mraz - 5.9p1-13 + 0.9.2-32Tomas Mraz - 5.9p1-12 + 0.9.2-32Tomas Mraz - 5.9p1-11 + 0.9.2-32Jan F. Chadima - 5.9p1-10 + 0.9.2-32Jan F. Chadima - 5.9p1-9 + 0.9.2-32Jan F. Chadima - 5.9p1-8 + 0.9.2-32Jan F. Chadima - 5.9p1-7 + 0.9.2-32Jan F. Chadima - 5.9p1-6 + 0.9.2-32Jan F. Chadima - 5.9p1-5 + 0.9.2-32Jan F. Chadima - 5.9p1-3 + 0.9.2-32Jan F. Chadima - 5.9p1-2 + 0.9.2-32Jan F. Chadima - 5.9p1-1 + 0.9.2-32Jan F. Chadima - 5.8p2-21 + 0.9.2-31Jan F. Chadima - 5.8p2-20 + 0.9.2-31Jan F. Chadima - 5.8p2-19 + 0.9.2-31Jan F. Chadima - 5.8p2-18 + 0.9.2-31Jan F. Chadima - 5.8p2-17 + 0.9.2-31Jan F. Chadima - 5.8p2-16 + 0.9.2-31Jan F. Chadima - 5.8p2-15 + 0.9.2-31Jan F. Chadima - 5.8p2-14 + 0.9.2-31Jan F. Chadima - 5.8p2-12 + 0.9.2-31Jan F. Chadima - 5.8p2-10 + 0.9.2-31Jan F. Chadima - 5.8p2-9 + 0.9.2-31Jan F. Chadima - 5.8p2-7 + 0.9.2-31Jan F. Chadima - 5.8p2-6 + 0.9.2-31Jan F. Chadima - 5.8p2-5 + 0.9.2-31Jan F. Chadima - 5.8p2-4 + 0.9.2-31Jan F. Chadima - 5.8p2-3 + 0.9.2-31Jan F. Chadima - 5.8p2-2 + 0.9.2-31Jan F. Chadima - 5.8p2-1 + 0.9.2-31Jan F. Chadima - 5.8p1-34 + 0.9.2-30Jan F. Chadima - 5.8p1-33 + 0.9.2-30Jan F. Chadima - 5.8p1-32 + 0.9.2-30Jan F. Chadima - 5.8p1-30 + 0.9.2-30Jan F. Chadima - 5.8p1-28 + 0.9.2-30Jan F. Chadima - 5.8p1-27 + 0.9.2-30Jan F. Chadima - 5.8p1-26 + 0.9.2-30Jan F. Chadima - 5.8p1-25 + 0.9.2-30Jan F. Chadima - 5.8p1-24 + 0.9.2-30Jan F. Chadima - 5.8p1-23 + 0.9.2-30Jan F. Chadima - 5.8p1-22 + 0.9.2-30Jan F. Chadima - 5.8p1-20 + 0.9.2-30Jan F. Chadima - 5.8p1-18 + 0.9.2-30Jan F. Chadima - 5.8p1-17 + 0.9.2-30Jan F. Chadima - 5.8p1-16 + 0.9.2-30Jan F. Chadima - 5.8p1-15 + 0.9.2-30Jan F. Chadima - 5.8p1-14 + 0.9.2-30Jan F. Chadima - 5.8p1-13 + 0.9.2-30Jan F. Chadima - 5.8p1-12 + 0.9.2-30Jan F. Chadima - 5.8p1-11 + 0.9.2-30Jan F. Chadima - 5.8p1-10 + 0.9.2-30Jan F. Chadima - 5.8p1-9 + 0.9.2-30Jan F. Chadima - 5.8p1-8 + 0.9.2-30Jan F. Chadima - 5.8p1-4 + 0.9.2-30Jan F. Chadima - 5.8p1-3 + 0.9.2-30Jan F. Chadima - 5.8p1-1 + 0.9.2-30Fedora Release Engineering - 5.6p1-30.1Jan F. Chadima - 5.6p1-30 + 0.9.2-29Jan F. Chadima - 5.6p1-28 + 0.9.2-29Jan F. Chadima - 5.6p1-25 + 0.9.2-29Jan F. Chadima - 5.6p1-24 + 0.9.2-29Jan F. Chadima - 5.6p1-23 + 0.9.2-29Jan F. Chadima - 5.6p1-22 + 0.9.2-29Jan F. Chadima - 5.6p1-21 + 0.9.2-29Jan F. Chadima - 5.6p1-20 + 0.9.2-29Jan F. Chadima - 5.6p1-19 + 0.9.2-28Jan F. Chadima - 5.6p1-18 + 0.9.2-27Jan F. Chadima - 5.6p1-17 + 0.9.2-27Jan F. Chadima - 5.6p1-16 + 0.9.2-27Jan F. Chadima - 5.6p1-15 + 0.9.2-27Jan F. Chadima - 5.6p1-14 + 0.9.2-27Jan F. Chadima - 5.6p1-12 + 0.9.2-27Jan F. Chadima - 5.6p1-11 + 0.9.2-27Jan F. Chadima - 5.6p1-10 + 0.9.2-27Jan F. Chadima - 5.6p1-9 + 0.9.2-27Jan F. Chadima - 5.6p1-8 + 0.9.2-27Jan F. Chadima - 5.6p1-7 + 0.9.2-27Jan F. Chadima - 5.6p1-6 + 0.9.2-27Jan F. Chadima - 5.6p1-5 + 0.9.2-27Jan F. Chadima - 5.6p1-4 + 0.9.2-27Tomas Mraz - 5.6p1-3 + 0.9.2-27Jan F. Chadima - 5.6p1-2 + 0.9.2-27Jan F. Chadima - 5.6p1-1 + 0.9.2-27Jan F. Chadima - 5.5p1-18 + 0.9.2-26Jan F. Chadima - 5.5p1-17 + 0.9.2-26Jan F. Chadima - 5.5p1-16 + 0.9.2-26Jan F. Chadima - 5.5p1-15 + 0.9.2-26Jan F. Chadima - 5.5p1-14 + 0.9.2-26Jan F. Chadima - 5.5p1-13 + 0.9.2-26Jan F. Chadima - 5.5p1-12 + 0.9.2-26Jan F. Chadima - 5.5p1-11 + 0.9.2-26Jan F. Chadima - 5.5p1-10 + 0.9.2-26Jan F. Chadima - 5.5p1-9 + 0.9.2-26Jan F. Chadima - 5.5p1-8 + 0.9.2-26Jan F. Chadima - 5.5p1-7 + 0.9.2-26Jan F. Chadima - 5.5p1-6 + 0.9.2-26Jan F. Chadima - 5.5p1-5 + 0.9.2-26Jan F. Chadima - 5.5p1-4 + 0.9.2-26Jan F. Chadima - 5.5p1-3 + 0.9.2-26Jan F. Chadima - 5.5p1-2 + 0.9.2-26Jan F. Chadima - 5.5p1-1 + 0.9.2-26Jan F. Chadima - 5.4p1-3 + 0.9.2-25Jan F. Chadima - 5.4p1-2Jan F. Chadima - 5.4p1-1Jan F. Chadima - 5.4p1-0.snap20100302.1Jan F. Chadima - 5.3p1-22Jan F. Chadima - 5.3p1-21Jan F. Chadima - 5.3p1-20Tomas Mraz - 5.3p1-19Jan F. Chadima - 5.3p1-18Jan F. Chadima - 5.3p1-17Jan F. Chadima - 5.3p1-16Jan F. Chadima - 5.3p1-15Jan F. Chadima - 5.3p1-14Jan F. Chadima - 5.3p1-13Jan F. Chadima - 5.3p1-12Jan F. Chadima - 5.3p1-11Jan F. Chadima - 5.3p1-10Jan F. Chadima - 5.3p1-9Jan F. Chadima - 5.3p1-8Jan F. Chadima - 5.3p1-7Jan F. Chadima - 5.3p1-6Jan F. Chadima - 5.3p1-5Tomas Mraz - 5.3p1-4Jan F. Chadima - 5.3p1-3Jan F. Chadima - 5.3p1-2Jan F. Chadima - 5.2p1-29Jan F. Chadima - 5.2p1-28Jan F. Chadima - 5.2p1-26Jan F. Chadima - 5.2p1-25Jan F. Chadima - 5.2p1-24Jan F. Chadima - 5.2p1-23Jan F. Chadima - 5.2p1-22Jan F. Chadima - 5.2p1-21Jan F. Chadima - 5.2p1-20Jan F. Chadima - 5.2p1-19Tomas Mraz - 5.2p1-18Jan F. Chadima - 5.2p1-17Fedora Release Engineering - 5.2p1-16Jan F. Chadima - 5.2p1-15Jan F. Chadima - 5.2p1-14Jan F. Chadima - 5.2p1-13Jan F. Chadima - 5.2p1-12Jan F. Chadima - 5.2p1-11Jan F. Chadima - 5.2p1-10Jan F. Chadima - 5.2p1-9Jan F. Chadima - 5.2p1-8Tomas Mraz - 5.2p1-6Tomas Mraz - 5.2p1-5Tomas Mraz - 5.2p1-4Jan F. Chadima - 5.2p1-3Tomas Mraz - 5.2p1-2Jan F. Chadima - 5.2p1-1Fedora Release Engineering - 5.1p1-8Tomas Mraz - 5.1p1-7Tomas Mraz - 5.1p1-6Tomas Mraz - 5.1p1-5Tomas Mraz - 5.1p1-4Tomas Mraz - 5.1p1-3Tomas Mraz - 5.1p1-2Tomas Mraz - 5.1p1-1Tomas Mraz - 5.0p1-3Tomas Mraz - 5.0p1-2Tomas Mraz - 5.0p1-1Tomas Mraz - 4.7p1-10Tomas Mraz - 4.7p1-9Dennis Gilmore - 4.7p1-8Tomas Mraz - 4.7p1-7Tomas Mraz - 4.7p1-6Release Engineering - 4.7p1-5Tomas Mraz - 4.7p1-4Tomas Mraz - 4.7p1-2Tomas Mraz - 4.7p1-1Tomas Mraz - 4.5p1-8Tomas Mraz - 4.5p1-7Tomas Mraz - 4.5p1-6Tomas Mraz - 4.5p1-5Tomas Mraz - 4.5p1-4Tomas Mraz - 4.5p1-3Tomas Mraz - 4.5p1-2Tomas Mraz - 4.5p1-1Tomas Mraz - 4.3p2-14Tomas Mraz - 4.3p2-13Tomas Mraz - 4.3p2-12Tomas Mraz - 4.3p2-11Tomas Mraz - 4.3p2-10Tomas Mraz - 4.3p2-9Tomas Mraz - 4.3p2-8Tomas Mraz - 4.3p2-7Tomas Mraz - 4.3p2-6Jesse Keating - 4.3p2-5.1Tomas Mraz - 4.3p2-5Tomas Mraz - 4.3p2-4Tomas Mraz - 4.3p2-3Tomas Mraz - 4.3p2-2Tomas Mraz - 4.3p2-1Jesse Keating - 4.3p1-2.1Tomas Mraz - 4.3p1-2Tomas Mraz - 4.3p1-1Tomas Mraz - 4.2p1-10Jesse Keating Tomas Mraz - 4.2p1-9Nalin Dahyabhai - 4.2p1-8Warren Togami - 4.2p1-7Jeremy Katz - 4.2p1-6Tomas Mraz 4.2p1-5Dan Walsh 4.2p1-4Tomas Mraz 4.2p1-3Tomas Mraz 4.2p1-2Tomas Mraz 4.2p1-1Tomas Mraz 4.1p1-5Tomas Mraz 4.1p1-4Tomas Mraz 4.1p1-3Tomas Mraz 4.1p1-2Tomas Mraz 4.1p1-1Tomas Mraz 4.0p1-3Tomas Mraz 4.0p1-2Tomas Mraz 4.0p1-1Elliot Lee Nalin Dahyabhai 3.9p1-12Tomas Mraz 3.9p1-11Tomas Mraz Tomas Mraz 3.9p1-10Tomas Mraz Bill Nottingham 3.9p1-9Thomas Woerner 3.9p1-8.1Nalin Dahyabhai 3.9p1-8Bill Nottingham 3.9p1-7Nalin Dahyabhai 3.9p1-6Nalin Dahyabhai Daniel Walsh 3.9p1-5Daniel Walsh 3.9p1-4Daniel Walsh 3.9p1-3Daniel Walsh 3.9p1-2Daniel Walsh 3.9p1-1Alan Cox 3.8.1p1-5Daniel Walsh 3.8.1p1-4Elliot Lee Daniel Walsh 3.8.1p1-2Nalin Dahyabhai 3.8.1p1-1Daniel Walsh 3.6.1p2-36Nalin Dahyabhai 3.8.1p1-0Daniel Walsh 3.6.1p2-35Daniel Walsh 3.6.1p2-34Daniel Walsh 3.6.1p2-33Thomas Woerner 3.6.1p2-32Daniel Walsh 3.6.1p2-31Daniel Walsh 3.6.1p2-30Daniel Walsh 3.6.1p2-29Elliot Lee Daniel Walsh 3.6.1p2-27Daniel Walsh 3.6.1p2-26Daniel Walsh 3.6.1p2-25Daniel Walsh 3.6.1p2-24Nalin Dahyabhai Nalin Dahyabhai David Woodhouse 3.6.1p2-23Nalin Dahyabhai Daniel Walsh 3.6.1p2-22Daniel Walsh 3.6.1p2-21.selDaniel Walsh 3.6.1p2-21Daniel Walsh 3.6.1p2-20.selNalin Dahyabhai Nalin Dahyabhai 3.6.1p2-19Nalin Dahyabhai 3.6.1p2-18Daniel Walsh 3.6.1p2-17Daniel Walsh 3.6.1p2-16.selBill Nottingham 3.6.1p2-15Bill Nottingham 3.6.1p2-14Daniel Walsh 3.6.1p2-13.selNalin Dahyabhai 3.6.1p2-12Nalin Dahyabhai 3.6.1p2-11Daniel Walsh 3.6.1p2-10Daniel Walsh 3.6.1p2-9.selDaniel Walsh 3.6.1p2-8Nalin Dahyabhai 3.6.1p2-7Nalin Dahyabhai 3.6.1p2-6Daniel Walsh 3.6.1p2-5Nalin Dahyabhai 3.6.1p2-4Nalin Dahyabhai 3.6.1p2-3Nalin Dahyabhai 3.6.1p2-2Nalin Dahyabhai 3.6.1p2-1Elliot Lee Florian La Roche Nalin Dahyabhai 3.5p1-6Nalin Dahyabhai 3.5p1-5Tim Powers Nalin Dahyabhai 3.5p1-3Nalin Dahyabhai 3.5p1-2Nalin Dahyabhai 3.5p1-1Nalin Dahyabhai 3.4p1-3Than Ngo 3.4p1-2.1Curtis Zinzilieta 3.4p1-2gssNalin Dahyabhai 3.4p1-2Nalin Dahyabhai 3.4p1-1Nalin Dahyabhai 3.3p1-2Nalin Dahyabhai 3.3p1-1Tim Powers Nalin Dahyabhai 3.2.3p1-3Nalin Dahyabhai 3.2.3p1-2Nalin Dahyabhai 3.2.3p1-1Nalin Dahyabhai 3.2.2p1-1Nalin Dahyabhai 3.1p1-4Nalin Dahyabhai 3.1p1-3Nalin Dahyabhai 3.1p1-2gssNalin Dahyabhai 3.1p1-2Nalin Dahyabhai 3.1p1-1Nalin Dahyabhai 3.1p1-0Nalin Dahyabhai SNAP-20020305Nalin Dahyabhai SNAP-20020220Nalin Dahyabhai 3.0.2p1-3Nalin Dahyabhai 3.0.2p1-2Nalin Dahyabhai Nalin Dahyabhai 3.0.2p1-1Nalin Dahyabhai 3.0.1p1-1Nalin Dahyabhai Nalin Dahyabhai 3.0p1-1Nalin Dahyabhai Nalin Dahyabhai 2.9p2-9Bernhard Rosenkraenzer 2.9p2-8Nalin Dahyabhai 2.9p2-7Nalin Dahyabhai 2.9p2-6Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Preston Brown Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Trond Eivind Glomsrxd Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- avoid segfault in Kerberos cache cleanup (#1999263) - fix CVE-2021-41617 (#2008884)- Avoid double comma in the default cipher list in FIPS mode (#1722446)- Revert the updating of cached passwd structure (#1712053)- Update cached passwd structure after PAM authentication (#1674541)- invalidate supplemental group cache used by temporarily_use_uid() when the target uid differs (#1583735)- Fix for CVE-2018-15473 (#1619079) - Enable GCM mode for AES ciphers in FIPS mode (#1600869)- Fix for CVE-2017-15906 (#1517226)- Do not hang if SSH AuthorizedKeysCommand output is too large (#1496467) - Do not segfault pam_ssh_agent_auth if keyfile is missing (#1494268) - Do not segfault in audit code during cleanup (#1488083) - Add WinSCP 5.10+ compatibility (#1496808) - Clatch between ClientAlive and rekeying timeouts (#1480510) - Exclude dsa and ed25519 from default proposed keys in FIPS mode (#1456853) - Add enablement for openssl-ibmca and openssl-ibmpkcs11 (#1478035)- Rebuilt for RHEL-7.5- Revert default of GSSAPIStrictAcceptorCheck=no back to yes (#1488982)- Revert upstream change to UseDNS=no back to yes (#1478175)- Compiler warnings (#1341754)- Add missing messages in FIPS mode (#1341754)- Allow harmless syscalls for s390 crypto modules (#1451809)- Fix multilib issue in documentation (#1450361)- ControlPath too long should not be a fatal error (#1447561)- Fix the default key exchange proposal in FIPS mode (#1438414) - Remove another wrong coverity chunk to unbreak gsskex (#1438414)- Update seccomp filter to work on ppc64le (#1443916)- Do not completely disable SHA-1 key exchange methods in FIPS (#1324493) - Remove wrong coverity patches- Fix coverity scan results - Adjust FIPS algorithms list (#1420910) - Revert problematic feature for chroot(#1418062) - Fix CBC weakness in released OpenSSH 7.5- Rebase to openssh 7.4 and pam_ssh_agent_auth 0.10.3 (#1341754) - detach -cavs subpackage - enable seccomp filter for sandboxed child- Do not send SD_NOTIFY from forked childern (#1381997)- Add SD_NOTIFY code to help systemd to track running service (#1381997)- Restore login with large MOTD (#1404018)- Restore funcionality of chrooted envirotments (#1398569)- Do not depend on selinux-policy (#1373297)- Drop dependency on libcap-ng for ssh-keycat (#1357859)- Rework SELinux context handling with chroot using libcap-ng (#1357859)- SFTP force permission collision with umask (#1344614) - Make closefrom() ignore FD's to /dev/ devices on s390 (#1318760) - Create a default value for AuthenticationMethods any (#1237129) - Fix ssh-copy-id with LogLevel=quiet (#1349556) - Expose more information to PAM (#1312304) - Move MAX_DISPLAYS to a configuration option (#1341302) - Add a wildcard option to PermitOpen directive (host) (#1344106)- Coverity and RPMDiff build issues (#1334326) - CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (#1329191) - Check for real location of .k5login file (#1328243) - close ControlPersist background process stderr (#1335540)- Drop glob patch for sftp client preventing listing many files (#1310303) - Fix race condition between audit messages from different processes (#1310684) - Make systemd service forking to properly report state (#1291172) - Get rid of rpm triggers for openssh-5.x (#1312013) - Generate the host keys when the key files are empty (#1266043) - pam_ssh_agent_auth: authorized_keys_command option (#1317858) - Don't use MD5 digest from pam_ssh_agent_auth in FIPS mode (#1317952)- CVE-2016-1908: possible fallback from untrusted to trusted X11 forwarding (#1298741)- CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317819)- Disable undocumented feauture Roaming for good (#1298218) - prevents CVE-2016-0777 and CVE-2016-0778- Use the correct constant for glob limits (#1160377)- Extend memory limit for remote glob in sftp acc. to stat limit (#1160377)- Fix vulnerabilities published with openssh-7.0 (#1265807) - Privilege separation weakness related to PAM support - Use-after-free bug related to PAM support- Increase limit of files for glob match in sftp to 8192 (#1160377)- Add GSSAPIKexAlgorithms option for server and client application (#1253062)- Security fixes released with openssh-6.9 (CVE-2015-5352) (#1247864) - XSECURITY restrictions bypass under certain conditions in ssh(1) (#1238231) - weakness of agent locking (ssh-add -x) to password guessing (#1238238)- only query each keyboard-interactive device once (CVE-2015-5600) (#1245971)- One more typo in manual page documenting TERM variable (#1162683) - Fix race condition with auditing messages answers (#1240613)- Fix ldif schema to have correct spacing on newlines (#1184938) - Add missing values for sshd test mode (#1187597) - ssh-copy-id: tcsh doesnt work with multiline strings (#1201758) - Fix memory problems with newkeys and array transfers (#1223218) - Enhance AllowGroups documentation in man page (#1150007)- Increase limit of files for glob match in sftp (#1160377) - Add pam_reauthorize.so to /etc/pam.d/sshd (#1204233) - Show all config values in sshd test mode (#1187597) - Document required selinux boolean for working ssh-ldap-helper (#1178116) - Consistent usage of pam_namespace in sshd (#1125110) - Fix auditing when using combination of ForcedCommand and PTY (#1199112) - Add sftp option to force mode of created files (#1197989) - Ability to specify an arbitrary LDAP filter in ldap.conf for ssh-ldap-helper (#1201753) - Provide documentation line for systemd service and socket (#1181591) - Provide LDIF version of LPK schema (#1184938) - Document TERM environment variable (#1162683) - Fix ssh-copy-id on non-sh remote shells (#1201758) - Do not read RSA1 hostkeys for HostBased authentication in FIPS (#1197666)- Fix labeling in MLS according to selected sensitivity (#1202843)- fix direction in CRYPTO_SESSION audit message (#1171248)- add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1169843)- log via monitor in chroots without /dev/log (#1083482)- increase size of AUDIT_LOG_SIZE to 256 (#1171163) - record pfs= field in CRYPTO_SESSION audit event (#1171248)- fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005)- correct the calculation of bytes for authctxt->krb5_ccname (#1161073)- change audit trail for unknown users (#1158521)- revert the default of KerberosUseKuserok back to yes - fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly- fix parsing empty options in sshd_conf - ignore SIGXFSZ in postauth monitor- slightly change systemd units logic - use sshd-keygen.service (#1066615) - log when a client requests an interactive session and only sftp is allowed (#1130198) - sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode (#1143867)- new upstream release (#1059667) - prevent a server from skipping SSHFP lookup - CVE-2014-2653 (#1081338) - make /etc/ssh/moduli file public (#1134448) - test existence of /etc/ssh/ssh_host_ecdsa_key in sshd-keygen.service - don't clean up gssapi credentials by default (#1134447) - ssh-agent - try CLOCK_BOOTTIME with fallback (#1134449) - disable the curve25519 KEX when speaking to OpenSSH 6.5 or 6.6 - add support for ED25519 keys to sshd-keygen and sshd.sysconfig - standardise on NI_MAXHOST for gethostname() string lengths (#1097665) - set a client's address right after a connection is set (mindrot#2257) (#912792) - apply RFC3454 stringprep to banners when possible (mindrot#2058) (#1104662) - don't consider a partial success as a failure (mindrot#2270) (#1112972)- ignore environment variables with embedded '=' or '\0' characters (#1077843)- log fipscheck verification message into syslog authpriv - ssh-keygen - relative-specified certificate expiry time should be relative to current time and not the validity start time (#1058234) - use the size of security of 3des for DH (#1053107) - ssh-copy-id.1 man page fix (#1058792)- Mass rebuild 2014-01-24- use tty allocation for a remote scp (#985650) - run ssh-copy-id in the legacy mode when SSH_COPY_ID_LEGACY variable is set (#969375) - FIPS mode - adjust the key echange DH groups and ssh-keygen according toSP800-131A (#1001748)- Mass rebuild 2013-12-27- sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default- fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662)- new upstream release- adjust gss kex mechanism to the upstream changes (#1024004) - don't use xfree in pam_ssh_agent_auth sources (#1024965)- don't use SSH_FP_MD5 for fingerprints in FIPS mode (#1020948)- use default_ccache_name from /etc/krb5.conf for a kerberos cache (#991186) - increase the size of the Diffie-Hellman groups (#1010607) - sshd-keygen to generate ECDSA keys (#1019222)- new upstream release (#1013635)- use dracut-fips package to determine if a FIPS module is installed (#1001566) - revert -fips subpackages and hmac files suffixes- sshd-keygen: generate only RSA keys by default (#1010361) - use dist tag in suffixes for hmac checksum files- use hmac_suffix for ssh{,d} hmac checksums - bump the minimum value of SSH_USE_STRONG_RNG to 14 according to SP800-131A - automatically restart sshd.service on-failure after 42s interval- add -fips subpackages that contains the FIPS module files- gssapi credentials need to be stored before a pam session opened (#987792)- don't show Success for EAI_SYSTEM (#985964) - make sftp's libedit interface marginally multibyte aware (#841771)- move default gssapi cache to /run/user/ (#848228)- add socket activated sshd units to the package (#963268) - fix the example in the HOWTO.ldap-keys- new upstream release (#963582)- don't use export in sysconfig file (#953111)- sshd.service: use KillMode=process (#890376) - add latest config.{sub,guess} to support aarch64 (#926284)- keep track of which IndentityFile options were manually supplied and which were default options, and don't warn if the latter are missing. (mindrot#2084)- new upstream release (#924727)- use SELinux type sshd_net_t for [net] childs (#915085)- fix AuthorizedKeysCommand option- change default value of MaxStartups - CVE-2010-5107 (#908707)- fix segfault in openssh-5.8p2-force_krb.patch (#882541)- replace RequiredAuthentications2 with AuthenticationMethods based on upstream - obsolete RequiredAuthentications[12] options - fix openssh-6.1p1-privsep-selinux.patch- add SELinux comment to /etc/ssh/sshd_config about SELinux command to modify port (#861400) - drop required chkconfig (#865498) - drop openssh-5.9p1-sftp-chroot.patch (#830237)- new upstream release (#852651) - use DIR: kerberos type cache (#848228) - don't use chroot_user_t for chrooted users (#830237) - replace scriptlets with systemd macros (#850249) - don't use /bin and /sbin paths (#856590)- new upstream release- change SELinux context also for root user (#827109)- fix various issues in openssh-5.9p1-required-authentications.patch- allow sha256 and sha512 hmacs in the FIPS mode- fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent is not running, most probably not exploitable - update pam_ssh_agent_auth to 0.9.3 upstream version- don't create RSA1 key in FIPS mode - don't install sshd-keygen.service (#810419)- fix various issues in openssh-5.9p1-required-authentications.patch- Fix dependencies in systemd units, don't enable sshd-keygen.service (#805338)- Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)- replace TwoFactorAuth with RequiredAuthentications[12] https://bugzilla.mindrot.org/show_bug.cgi?id=983- run privsep slave process as the users SELinux context (#781634)- add CAVS test driver for the aes-ctr ciphers- enable aes-ctr ciphers use the EVP engines from OpenSSL such as the AES-NI- warn about unsupported option UsePAM=no (#757545)- add back the restorecon call to ssh-copy-id - it might be needed on older distributions (#739989)- still support /etc/sysconfig/sshd loading in sshd service (#754732) - fix incorrect key permissions generated by sshd-keygen script (#754779)- remove unnecessary requires on initscripts - set VerifyHostKeyDNS to ask in the default configuration (#739856)- selinux sandbox rewrite - two factor authentication tweaking- coverity upgrade - wipe off nonfunctional nss - selinux sandbox tweaking- coverity upgrade - experimental selinux sandbox- fully reanable auditing- repair signedness in akc patch- temporarily disable part of audit4 patch- Coverity second pass - Reenable akc patch- Coverity first pass- Rebase to 5.9p1 - Add chroot sftp patch - Add two factor auth patch- ignore SIGPIPE in ssh keyscan- save ssh-askpass's debuginfo- compile ssh-askpass with corect CFLAGS- improve selinux's change context log- repair broken man pages- rebuild due to broken rpmbiild- Do not change context when run under unconfined_t- Add postlogin to pam. (#718807)- Systemd compatibility according to Mathieu Bridon - Split out the host keygen into their own command, to ease future migration to systemd. Compatitbility with the init script was kept. - Migrate the package to full native systemd unit files, according to the Fedora packaging guidelines. - Prepate the unit files for running an ondemand server. (do not add it actually)- Mention IPv6 usage in man pages- Improve init script- Add possibility to compile openssh without downstream patches- remove stale control sockets (#706396)- improove entropy manuals- improove entropy handling - concat ldap patches- improove ldap manuals- add gssapi forced command- update the openssh version- temporarily disabling systemd units- add flags AI_V4MAPPED and AI_ADDRCONFIG to getaddrinfo- update scriptlets- add systemd units- improving sshd -> passwd transation - add template for .local domain to sshd_config- the private keys may be 640 root:ssh_keys ssh_keysign is sgid- improving sshd -> passwd transation- the intermediate context is set to sshd_sftpd_t - do not crash in packet.c if no connection- resolve warnings in port_linux.c- add /etc/sysconfig/sshd- improve reseeding and seed source (documentation)- use /dev/random or /dev/urandom for seeding prng - improve periodical reseeding of random generator- add periodical reseeding of random generator - change selinux contex for internal sftp in do_usercontext - exit(0) after sigterm- improove ssh-ldap (documentation)- improve session keys audit- CVE-2010-4755- improove ssh-keycat (documentation)- improve audit of logins and auths- improove ssk-keycat- add ssk-keycat- reenable auth-keys ldap backend- another audit improovements- another audit improovements - switchable fingerprint mode- improve audit of server key management- improve audit of logins and auths- bump openssh version to 5.8p1- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- clean the data structures in the non privileged process - clean the data structures when roaming- clean the data structures in the privileged process- clean the data structures before exit net process- make audit compatible with the fips mode- add audit of destruction the server keys- add audit of destruction the session keys- reenable run sshd as non root user - renable rekeying- reapair clientloop crash (#627332) - properly restore euid in case connect to the ssh-agent socket fails- striped read permissions from suid and sgid binaries- used upstream version of the biguid patch- improoved kuserok patch- add auditing the host based key ussage - repait X11 abstract layer socket (#648896)- add auditing the kex result- add auditing the key ussage- update gsskex patch (#645389)- rebase linux audit according to upstream- add missing headers to linux audit- audit module now uses openssh audit framevork- Add the GSSAPI kuserok switch to the kuserok patch- Repaired the kuserok patch- Repaired the problem with puting entries with very big uid into lastlog- Merging selabel patch with the upstream version. (#632914)- Tweaking selabel patch to work properly without selinux rules loaded. (#632914)- Make fipscheck hmacs compliant with FHS - requires new fipscheck- Added -z relro -z now to LDFLAGS- Rebased to openssh5.6p1- merged with newer bugzilla's version of authorized keys command patch- improved the x11 patch according to upstream (#598671)- improved the x11 patch (#598671)- changed _PATH_UNIX_X to unexistent file name (#598671)- sftp works in deviceless chroot again (broken from 5.5p1-3)- add option to switch out krb5_kuserok- synchronize uid and gid for the user sshd- Typo in ssh-ldap.conf(5) and ssh-ladap-helper(8)- Repair the reference in man ssh-ldap-helper(8) - Repair the PubkeyAgent section in sshd_config(5) - Provide example ldap.conf- Make the Ldap configuration widely compatible - create the aditional docs for LDAP support.- Make LDAP config elements TLS_CACERT and TLS_REQCERT compatiple with pam_ldap (#589360)- Make LDAP config element tls_checkpeer compatiple with nss_ldap (#589360)- Comment spec.file - Sync patches from upstream- Create separate ldap package - Tweak the ldap patch - Rename stderr patch properly- Added LDAP support- Ignore .bashrc output to stderr in the subsystems- Drop dependency on man- Update to 5.5p1- repair configure script of pam_ssh_agent - repair error mesage in ssh-keygen- source krb5-devel profile script only if exists- Update to 5.4p1 - discontinued support for nss-keys - discontinued support for scard- Prepare update to 5.4p1- ImplicitDSOLinking (#564824)- Allow to use hardware crypto if awailable (#559555)- optimized FD_CLOEXEC on accept socket (#541809)- updated pam_ssh_agent_auth to new version from upstream (just a licence change)- optimized RAND_cleanup patch (#557166)- add RAND_cleanup at the exit of each program using RAND (#557166)- set FD_CLOEXEC on accepted socket (#541809)- replaced define by global in macros- Update the pka patch- Update the audit patch- Add possibility to autocreate only RSA key into initscript (#533339)- Prepare NSS key patch for future SEC_ERROR_LOCKED_PASSWORD (#537411)- Update NSS key patch (#537411, #356451)- Add gssapi key exchange patch (#455351)- Add public key agent patch (#455350)- Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849)- Modify the init script to prevent it to hang during generating the keys (#515145)- Add README.nss- Add pam_ssh_agent_auth module to a subpackage.- Reenable audit.- Upgrade to new wersion 5.3p1- Resolve locking in ssh-add (#491312)- Repair initscript to be acord to guidelines (#521860) - Add bugzilla# to application of edns and xmodifiers patch- Changed pam stack to password-auth- Dropped homechroot patch- Add check for nosuid, nodev in homechroot- add correct patch for ip-opts- replace ip-opts patch by an upstream candidate version- rearange selinux patch to be acceptable for upstream - replace seftp patch by an upstream version- merged xmodifiers to redhat patch - merged gssapi-role to selinux patch - merged cve-2007_3102 to audit patch - sesftp patch only with WITH_SELINUX flag - rearange sesftp patch according to upstream request- minor change in sesftp patch- rebuilt with new openssl- Added dnssec support. (#205842)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- only INTERNAL_SFTP can be home-chrooted - save _u and _r parts of context changing to sftpd_t- changed internal-sftp context to sftpd_t- changed home length path patch to upstream version- create '~/.ssh/known_hosts' within proper context- length of home path in ssh now limited by PATH_MAX - correct timezone with daylight processing- final version chroot %h (sftp only)- repair broken ls in chroot %h- add XMODIFIERS to exported environment (#495690)- allow only protocol 2 in the FIPS mode- do integrity verification only on binaries which are part of the OpenSSH FIPS modules- log if FIPS mode is initialized - make aes-ctr cipher modes work in the FIPS mode- fix logging after chroot - enable non root users to use chroot %h in internal-sftp- add AES-CTR ciphers to the FIPS mode proposal- upgrade to new upstream release- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- drop obsolete triggers - add testing FIPS mode support - LSBize the initscript (#247014)- enable use of ssl engines (#481100)- remove obsolete --with-rsh (#478298) - add pam_sepermit to allow blocking confined users in permissive mode (#471746) - move system-auth after pam_selinux in the session stack- set FD_CLOEXEC on channel sockets (#475866) - adjust summary - adjust nss-keys patch so it is applicable without selinux patches (#470859)- fix compatibility with some servers (#466818)- fixed zero length banner problem (#457326)- upgrade to new upstream release - fixed a problem with public key authentication and explicitely specified SELinux role- pass the connection socket to ssh-keysign (#447680)- add LANGUAGE to accepted/sent environment variables (#443231) - use pam_selinux to obtain the user context instead of doing it itself - unbreak server keep alive settings (patch from upstream) - small addition to scp manpage- upgrade to new upstream (#441066) - prevent initscript from killing itself on halt with upstart (#438449) - initscript status should show that the daemon is running only when the main daemon is still alive (#430882)- fix race on control master and cleanup stale control socket (#436311) patches by David Woodhouse- set FD_CLOEXEC on client socket - apply real fix for window size problem (#286181) from upstream - apply fix for the spurious failed bind from upstream - apply open handle leak in sftp fix from upstream- we build for sparcv9 now and it needs -fPIE- fix gssapi auth with explicit selinux role requested (#427303) - patch by Nalin Dahyabhai- explicitly source krb5-devel profile script- Rebuild for openssl bump- do not copy /etc/localtime into the chroot as it is not necessary anymore (#193184) - call setkeycreatecon when selinux context is established - test for NULL privk when freeing key (#391871) - patch by Pierre Ossman- revert default window size adjustments (#286181)- upgrade to latest upstream - use libedit in sftp (#203009) - fixed audit log injection problem (CVE-2007-3102)- fix sftp client problems on write error (#247802) - allow disabling autocreation of server keys (#235466)- experimental NSS keys support - correctly setup context when empty level requested (#234951)- mls level check must be done with default role same as requested- make profile.d/gnome-ssh-askpass.* regular files (#226218)- reject connection if requested mls range is not obtained (#229278)- improve Buildroot - remove duplicate /etc/ssh from files- support mls on labeled networks (#220487) - support mls level selection on unlabeled networks - allow / in usernames in scp (only beginning /, ./, and ../ is special)- update to 4.5p1 (#212606)- fix gssapi with DNS loadbalanced clusters (#216857)- improved pam_session patch so it doesn't regress, the patch is necessary for the pam_session_close to be called correctly as uid 0- CVE-2006-5794 - properly detect failed key verify in monitor (#214641)- merge sshd initscript patches - kill all ssh sessions when stop is called in halt or reboot runlevel - remove -TERM option from killproc so we don't race on sshd restart- improve gssapi-no-spnego patch (#208102) - CVE-2006-4924 - prevent DoS on deattack detector (#207957) - CVE-2006-5051 - don't call cleanups from signal handler (#208459)- don't report duplicate syslog messages, use correct local time (#189158) - don't allow spnego as gssapi mechanism (from upstream) - fixed memleaks found by Coverity (from upstream) - allow ip options except source routing (#202856) (patch by HP)- drop the pam-session patch from the previous build (#201341) - don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594)- dropped old ssh obsoletes - call the pam_session_open/close from the monitor when privsep is enabled so it is always called as root (patch by Darren Tucker)- improve selinux patch (by Jan Kiszka) - upstream patch for buffer append space error (#191940) - fixed typo in configure.ac (#198986) - added pam_keyinit to pam configuration (#198628) - improved error message when askpass dialog cannot grab keyboard input (#198332) - buildrequires xauth instead of xorg-x11-xauth - fixed a few rpmlint warnings- rebuild- don't request pseudoterminal allocation if stdin is not tty (#188983)- allow access if audit is not compiled in kernel (#183243)- enable the subprocess in chroot to send messages to system log - sshd should prevent login if audit call fails- print error from scp if not remote (patch by Bjorn Augustsson #178923)- new version- bump again for double-long bug on ppc(64)- fixed another place where syslog was called in signal handler - pass locale environment variables to server, accept them there (#179851)- new version, dropped obsolete patches- hopefully make the askpass dialog less confusing (#174765)- rebuilt- drop x11-ssh-askpass from the package - drop old build_6x ifs from spec file - improve gnome-ssh-askpass so it doesn't reveal number of passphrase characters to person looking at the display - less hackish fix for the __USE_GNU problem- work around missing gccmakedep by wrapping makedepend in a local script - remove now-obsolete build dependency on "xauth"- xorg-x11-devel -> libXt-devel - rebuild for new xauth location so X forwarding works - buildreq audit-libs-devel - buildreq automake for aclocal - buildreq imake for xmkmf - -D_GNU_SOURCE in flags in order to get it to build Ugly hack to workaround openssh defining __USE_GNU which is not allowed and causes problems according to Ulrich Drepper fix this the correct way after FC5test1- rebuild against new openssl- put back the possibility to skip SELinux patch - add patch for user login auditing by Steve Grubb- Change selinux patch to use get_default_context_with_rolelevel in libselinux.- Update selinux patch to use getseuserbyname- use include instead of pam_stack in pam config - use fork+exec instead of system in scp - CVE-2006-0225 (#168167) - upstream patch for displaying authentication errors- upgrade to a new upstream version- use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207) - install ssh-copy-id from contrib (#88707)- don't deadlock on exit with multiple X forwarded channels (#152432) - don't use X11 port which can't be bound on all IP families (#163732)- fix small regression caused by the nologin patch (#161956) - fix race in getpeername error checking (mindrot #1054)- use only pam_nologin for nologin testing- upgrade to a new upstream version - call pam_loginuid as a pam session module- link libselinux only to sshd (#157678)- fixed Local/RemoteForward in ssh_config.5 manpage - fix fatal when Local/RemoteForward is used and scp run (#153258) - don't leak user validity when using krb5 authentication- upgrade to 4.0p1 - remove obsolete groups patch- rebuilt- rebuild so that configure can detect that krb5_init_ets is gone now- don't call syslog in signal handler - allow password authentication when copying from remote to remote machine (#103364)- add spaces to messages in initscript (#138508)- enable trusted forwarding by default if X11 forwarding is required by user (#137685 and duplicates) - disable protocol 1 support by default in sshd server config (#88329) - keep the gnome-askpass dialog above others (#69131)- change permissions on pam.d/sshd to 0644 (#64697) - patch initscript so it doesn't kill opened sessions if the sshd daemon isn't running anymore (#67624)- don't use initlog- fixed PIE build for all architectures- add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option to enable display of a vendor patch level during version exchange (#120285) - configure with --disable-strip to build useful debuginfo subpackages- when using gtk2 for askpass, don't buildprereq gnome-libs-devel- build- disable ACSS support- Change selinux patch to use get_default_context_with_role in libselinux.- Fix patch * Bad debug statement. * Handle root/sysadm_r:kerberos- Modify Colin Walter's patch to allow specifying rule during connection- Fix TTY handling for SELinux- Update to upstream- Apply buildreq fixup patch (#125296)- Clean up patch for upstream submission.- rebuilt- Remove use of pam_selinux and patch selinux in directly.- request gssapi-with-mic by default but not delegation (flag day for anyone who used previous gssapi patches) - no longer request x11 forwarding by default- Change pam file to use open and close with pam_selinux- update to 3.8.1p1 - add workaround from CVS to reintroduce passwordauth using pam- Remove CLOSEXEC on STDERR* Wed Mar 03 2004 Phil Knirsch 3.6.1p2-33.30.1 - Built RHLE3 U2 update package.- Close file descriptors on exec- fixed pie build- Add restorecon to startup scripts- Add multiple qualified to openssh- Eliminate selinux code and use pam_selinux- rebuilt- turn off pie on ppc- fix is_selinux_enabled- Rebuild to grab shared libselinux- turn on selinux- un#ifdef out code for reporting password expiration in non-privsep mode (#83585)- add machinery to build with/without -fpie/-pie, default to doing so- Don't whinge about getsockopt failing (#109161)- add missing buildprereq on zlib-devel (#104558)- turn selinux off- turn selinux on- turn selinux off- turn selinux on- additional fix for apparently-never-happens double-free in buffer_free() - extend fix for #103998 to cover SSH1- rebuild- additional buffer manipulation cleanups from Solar Designer- turn selinux off- turn selinux on- rebuild- additional buffer manipulation fixes (CAN-2003-0695)- turn selinux on- rebuild- apply patch to store the correct buffer size in allocated buffers (CAN-2003-0693) - skip the initial PAM authentication attempt with an empty password if empty passwords are not permitted in our configuration (#103998)- turn selinux off- turn selinux on- Add BuildPreReq gtk2-devel if gtk2- rebuild- modify patch which clears the supplemental group list at startup to only complain if setgroups() fails if sshd has euid == 0 - handle krb5 installed in %{_prefix} or elsewhere by using krb5-config- Add SELinux patch- rebuild- rebuild- rebuild- update to 3.6.1p26 rebuilt- add patch for getsockopt() call to work on bigendian 64bit archs- move scp to the -clients subpackage, because it directly depends on ssh which is also in -clients (#84329)- rebuild- rebuilt- rebuild- patch PAM configuration to use relative path names for the modules, allowing us to not worry about which arch the modules are built for on multilib systems- update to 3.5p1, merging in filelist/perm changes from the upstream spec- merge- fix to build on multilib systems- added gssapi patches and uncommented patch here- pull patch from CVS to fix too-early free in ssh-keysign (#70009)- 3.4p1 - drop anon mmap patch- rework the close-on-exit docs - include configuration file man pages - make use of nologin as the privsep shell optional- update to 3.3p1 - merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign) - disable gtk2 askpass - require pam-devel by filename rather than by package for erratum - include patch from Solar Designer to work around anonymous mmap failures- automated rebuild- don't require autoconf any more- build gnome-ssh-askpass with gtk2- update to 3.2.3p1 - merge in spec file changes from upstream- update to 3.2.2p1- drop buildreq on db1-devel - require pam-devel by package name - require autoconf instead of autoconf253 again- pull patch from CVS to avoid printing error messages when some of the default keys aren't available when running ssh-add - refresh to current revisions of Simon's patches- reintroduce Simon's gssapi patches - add buildprereq for autoconf253, which is needed to regenerate configure after applying the gssapi patches - refresh to the latest version of Markus's patch to build properly with older versions of OpenSSL- bump and grind (through the build system)- require sharutils for building (mindrot #137) - require db1-devel only when building for 6.x (#55105), which probably won't work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck - require pam-devel by file (not by package name) again - add Markus's patch to compile with OpenSSL 0.9.5a (from http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're building for 6.x- update to 3.1p1- update to SNAP-20020305 - drop debug patch, fixed upstream- update to SNAP-20020220 for testing purposes (you've been warned, if there's anything to be warned about, gss patches won't apply, I don't mind)- add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key exchange, authentication, and named key support- remove dependency on db1-devel, which has just been swallowed up whole by gnome-libs-devel- adjust build dependencies so that build6x actually works right (fix from Hugo van der Kooij)- update to 3.0.2p1- update to 3.0.1p1- update to current CVS (not for use in distribution)- merge some of Damien Miller changes from the upstream 3.0p1 spec file and init script- update to 3.0p1 - update to x11-ssh-askpass 1.2.4.1 - change build dependency on a file from pam-devel to the pam-devel package - replace primes with moduli- incorporate fix from Markus Friedl's advisory for IP-based authorization bugs- Merge changes to rescue build from current sysadmin survival cd- fix scp's server's reporting of file sizes, and build with the proper preprocessor define to get large-file capable open(), stat(), etc. (sftp has been doing this correctly all along) (#51827) - configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247) - pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298) - mark profile.d scriptlets as config files (#42337) - refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug - change a couple of log() statements to debug() statements (#50751) - pull cvs patch to add -t flag to sshd (#28611) - clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221)- add db1-devel as a BuildPrerequisite (noted by Hans Ecke)- pull cvs patch to fix remote port forwarding with protocol 2- pull cvs patch to add session initialization to no-pty sessions - pull cvs patch to not cut off challengeresponse auth needlessly - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed (#49263)- don't apply patches to code we don't intend to build (spotted by Matt Galgoci)- pass OPTIONS correctly to initlog (#50151)- switch to x11-ssh-askpass 1.2.2- rebuild in new environment- disable the gssapi patch- update to 2.9p2 - refresh to a new version of the gssapi patch- change Copyright: BSD to License: BSD - add Markus Friedl's unverified patch for the cookie file deletion problem so that we can verify it - drop patch to check if xauth is present (was folded into cookie patch) - don't apply gssapi patches for the errata candidate - clear supplemental groups list at startup- fix an error parsing the new default sshd_config - add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not dealing with comments right- add in Simon Wilkinson's GSSAPI patch to give it some testing in-house, to be removed before the next beta cycle because it's a big departure from the upstream version- finish marking strings in the init script for translation - modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd at startup (change merged from openssh.com init script, originally by Pekka Savola) - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed- update to 2.9 - drop various patches that came from or went upstream or to or from CVS- only require initscripts 5.00 on 6.2 (reported by Peter Bieringer)- remove explicit openssl requirement, fixes builddistro issue - make initscript stop() function wait until sshd really dead to avoid races in condrestart- mention that challengereponse supports PAM, so disabling password doesn't limit users to pubkey and rsa auth (#34378) - bypass the daemon() function in the init script and call initlog directly, because daemon() won't start a daemon it detects is already running (like open connections) - require the version of openssl we had when we were built- make do_pam_setcred() smart enough to know when to establish creds and when to reinitialize them - add in a couple of other fixes from Damien for inclusion in the errata- update to 2.5.2p2 - call setcred() again after initgroups, because the "creds" could actually be group memberships- update to 2.5.2p1 (includes endianness fixes in the rijndael implementation) - don't enable challenge-response by default until we find a way to not have too many userauth requests (we may make up to six pubkey and up to three password attempts as it is) - remove build dependency on rsh to match openssh.com's packages more closely- remove dependency on openssl -- would need to be too precise- rebuild in new environment- Revert the patch to move pam_open_session. - Init script and spec file changes from Pekka Savola. (#28750) - Patch sftp to recognize '-o protocol' arguments. (#29540)- Chuck the closing patch. - Add a trigger to add host keys for protocol 2 to the config file, now that configuration file syntax requires us to specify it with HostKey if we specify any other HostKey values, which we do.- Redo patch to move pam_open_session after the server setuid()s to the user. - Rework the nopam patch to use be picked up by autoconf.- Update for 2.5.1p1. - Add init script mods from Pekka Savola. - Tweak the init script to match the CVS contrib script more closely. - Redo patch to ssh-add to try to adding both identity and id_dsa to also try adding id_rsa.- Update for 2.5.0p1. - Use $RPM_OPT_FLAGS instead of -O when building gnome-ssh-askpass - Resync with parts of Damien Miller's openssh.spec from CVS, including update of x11 askpass to 1.2.0. - Only require openssl (don't prereq) because we generate keys in the init script now.- Don't open a PAM session until we've forked and become the user (#25690). - Apply Andrew Bartlett's patch for letting pam_authenticate() know which host the user is attempting a login from. - Resync with parts of Damien Miller's openssh.spec from CVS. - Don't expose KbdInt responses in debug messages (from CVS). - Detect and handle errors in rsa_{public,private}_decrypt (from CVS).- i18n-tweak to initscript.- More gettextizing. - Close all files after going into daemon mode (needs more testing). - Extract patch from CVS to handle auth banners (in the client). - Extract patch from CVS to handle compat weirdness.- Finish with the gettextizing.- Fix a bug in auth2-pam.c (#23877) - Gettextize the init script.- Incorporate a switch for using PAM configs for 6.x, just in case.- Incorporate Bero's changes for a build specifically for rescue CDs.- Don't treat pam_setcred() failure as fatal unless pam_authenticate() has succeeded, to allow public-key authentication after a failure with "none" authentication. (#21268)- Update to x11-askpass 1.1.1. (#21301) - Don't second-guess fixpaths, which causes paths to get fixed twice. (#21290)- Merge multiple PAM text messages into subsequent prompts when possible when doing keyboard-interactive authentication.- Disable the built-in MD5 password support. We're using PAM. - Take a crack at doing keyboard-interactive authentication with PAM, and enable use of it in the default client configuration so that the client will try it when the server disallows password authentication. - Build with debugging flags. Build root policies strip all binaries anyway.- Use DESTDIR instead of %makeinstall. - Remove /usr/X11R6/bin from the path-fixing patch.- Add the primes file from the latest snapshot to the main package (#20884). - Add the dev package to the prereq list (#19984). - Remove the default path and mimic login's behavior in the server itself.- Resync with conditional options in Damien Miller's .spec file for an errata. - Change libexecdir from %{_libexecdir}/ssh to %{_libexecdir}/openssh.- Update to OpenSSH 2.3.0p1. - Update to x11-askpass 1.1.0. - Enable keyboard-interactive authentication.- Update to ssh-askpass-x11 1.0.3. - Change authentication related messages to be private (#19966).- Patch ssh-keygen to be able to list signatures for DSA public key files it generates.- Add BuildPreReq on /usr/include/security/pam_appl.h to be sure we always build PAM authentication in. - Try setting SSH_ASKPASS if gnome-ssh-askpass is installed. - Clean out no-longer-used patches. - Patch ssh-add to try to add both identity and id_dsa, and to error only when neither exists.- Update x11-askpass to 1.0.2. (#17835) - Add BuildPreReqs for /bin/login and /usr/bin/rsh so that configure will always find them in the right place. (#17909) - Set the default path to be the same as the one supplied by /bin/login, but add /usr/X11R6/bin. (#17909) - Try to handle obsoletion of ssh-server more cleanly. Package names are different, but init script name isn't. (#17865)- Update to 2.2.0p1. (#17835) - Tweak the init script to allow proper restarting. (#18023)- Update to 20000823 snapshot. - Change subpackage requirements from %{version} to %{version}-%{release} - Back out the pipe patch.- Update to 2.1.1p4, which includes fixes for config file parsing problems. - Move the init script back. - Add Damien's quick fix for wackiness.- Update to 2.1.1p3, which includes fixes for X11 forwarding and strtok().- Move condrestart to server postun. - Move key generation to init script. - Actually use the right patch for moving the key generation to the init script. - Clean up the init script a bit.- Fix X11 forwarding, from mail post by Chan Shih-Ping Richard.- Update to 2.1.1p2. - Use of strtok() considered harmful.- Get the build root out of the man pages.- Add and use condrestart support in the init script. - Add newer initscripts as a prereq.- Build in new environment (release 2) - Move -clients subpackage to Applications/Internet group- Update to 2.2.1p1- Patch to build with neither RSA nor RSAref. - Miscellaneous FHS-compliance tweaks. - Fix for possibly-compressed man pages.- Updated for new location - Updated for new gnome-ssh-askpass build- Added Jim Knoble's askpass- Split subpackages further based on patch from jim knoble - Added 'Obsoletes' directives- Use make install - Subpackages- Added links for slogin - Fixed perms on manpages- Renamed init script- Back to old binary names- Use autoconf - New binary names- Initial RPMification, based on Jan "Yenya" Kasprzak's spec.7.4p1-23.el7_97.4p1-23.el7_97.4p1-23.el7_9ssh-keycatssh-keycatopenssh-keycat-7.4p1HOWTO.ssh-keycat/etc/pam.d//usr/libexec/openssh//usr/share/doc//usr/share/doc/openssh-keycat-7.4p1/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz2x86_64-redhat-linux-gnuASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, BuildID[sha1]=7d0cb69302828bb7e7ee611aab9b3cf72b8e05dd, strippeddirectory R RRRRRRRR R R RR?7zXZ !#, {g] b2u Q{LVC=qѓ1 { a48|m B;qj*yH[{yE#yYoOBs^y'}&\P|uOsQN`Ibe&̩GJܘT;9kbމ7:5HW^ƫw{Ӓs>뼽1C60zn$:ot$< {Yȳp9 ЁD}4T;9ғiUM`3 NgM O^ h.ċe]" V#ozn5֙saV~STIcȹ9-ی瑲~*Ƥ't`5.*F X$g`Z:=3־:9MT/ߋ[IXg<;bW9OR+k}!V\H=SΓ P&fT =c3ZƫPLz&.:Vvs3@Xk;4ܱLԘN8M\_LC9.u".x/~5sBڷ-w6*_*mNrPP{@Hx&6MOU?<y;z55{A3m V'-o̼g]Hx1X^58ہ+`r\%gh˨XRjLbLw5bD>.0yR6_=;xYh󳲇k9ͩQ~{<nιx>"&X4i_>hPMk62MFV|y#ꍙEך) !.$0kVV}yg2UH'JƜeE5v6ÂȞ[OvY3wؑ߿a?FM7-^DKsֿ(pڑʎ^S6i5qdmbZ:Q۠'U= ; !R]u/r˻K#:P‚ZWw?P Õq8M{)-2SC]ui.#5&`/?WL:@guVV[Z3 q5)AB'R+TTvR)%yShnd/ȵ7miUW;;()TzIU{u)fz/G%2$=)RML5_*k Az)UT,Q Fb3ʔ+{h( QA$'٭ Es6?*09Nb>oJWUcljy }{ͅ5#Kpuj6Zފ52`AY)m$!nLu 5]C=Xt$tQE4ʶ9Pi'z$p둟`-Pagz]ľlʝ6jіMDWWI!tmN ӂtӀ[nՇ[J}umÂoj`+jJS*lOaFBSYa]?u6ԦDZ:pf,Fb0Ve3Fm`7y  #KǑ<TAL3X_&'W :g0 ;yȦtm5 /=8NJ 7ZKhmA Oskyh?R8#!EF)}S}G Em:PpuH"KGgO:.Ɏ=q>1^08 8wc-lnvu+z]z! 6Uzu eۿ6fgm+mVԚLsJtE6R-Q"6HqY Jn&ϙ/j@FZdY&2 gQLՇ-I ڡx?hMT{9\AF#*;H8̐qa62op&Z#~=> ,u@GQ5zazOs2($_'#X1*n`MS 8N3+Ţ+}_$4eKFSa 2gӷrM-\ClI7GG~P7,a rD1F<pq*'.@;)'R<c}givm w്/9\V]C1C>`q)Zgw.lwpKa,=d0e+(Hp|݀F;ˡa0{Yo@5Ť X_F@/XqwwӢ%ԤQz4>zTo4vr : [G?Y*Krn_??~x̠/l~gI5|HIwRmqV,ܵ9 No0I$8U^ %-K`EQT#:?KQ=C5B%UzX{2p)o9д$DՏ^D/=RH y[CbʦIr[JoOl8UlO"| Z+] 1FO1uf]PG] &C Ï"_c>܇)="ȿl MȊSJ`ȑggɓ+3&=z̗ܵG4 D+Bdqr4(e"G%[ ʚg.G#FOmM`K/e'Nw&sa~} c"~jGw& 7yzcVmSbɧ64E婀㐇!JGVȅ>6yszlҢ|-k"ȷ)hǰWK}ٞ>(F ϷHb1x &L²{Tq/P56U/Tz`Boj+~QgGPSyӞ I.-g'■8d9vRC_8kXDGQ $w/i?YncZ֛_]ie Ib%F^[s9"(*fQF'ۄZJC9ⰺ .Wʁ_Ù2^ˉh X`ҡ&7r!eb$YfУuI~f~Y4Fq,$*H͟1}<_@/o>(${U-Ѥ^%eKiԙU}qmQ'*bI=~ #[dI@ӿPO\ ښGa,k~VKedބ@'^x_h }7>\j~Z>OjˆX]qm1 n<ڞoo9;ߙg izq@xt,'|u3v~ykiu1TK6V6w7R^lǥ+ AC!.z5MA#ta=k?`yZDtFijhs2=HMgGw#&5ɀ4`dXUMkm.ZܳһtZM-qUdû\@`'Cdv!yX7i2 E ^f85:øCdf#]XR&XWk%g7F:+[ |PlA#.P5'_{|! h1 BC}D{cJ.|շ+hy`.R`z5ǷUr~mG(URQյ-# 1@XR%)K_]e ^4\/X8f_Y< hVV[nu/@RrZOY|~ zKWU!^s_牞9V#, # k$=jcÉ4dU` Wb`&VUIݢpn1OID+W8,4MXrQYvc( fGpZ-W- 7 ԭ16LW].ޱGH^̓f1}MfrI:H3h H&B հPa!LuVF}*eQ'Mc$ݿySC`:DLoDZ?'iOBLwjf23! lZ;*ÈPJg6VgfS%SPdU ?bv9;)ՊT v?yЧ:8v6{GnknyaKr&:'* $ %3gpY9ZhKEB̽6Byh2# ʮHYj/8^3it3>+y1aupT\~3t&$hbvps9Xqtku}ͯ9Ѹ7bOQ+7{\_Ymא31Bc }ڞV Y ``F+OO{ 6 (IyW~O6bOJ1TF)\'XU& r;n1EՒZTUq=R5GH'j>H]nu`51qF|/x@yR&il֔Y&1^ɬ'-OC=nO4$TO 8\I6* D[=)sCS`՝ҁ]c P0l|:UG ᜵Z;FyҰԖX'Pͯ&j&@\6$=,Pe^!OL^73͝O '>B×( 7yϓpR<_Ĉ~ce Dzų4gbZUSVSU%ܷ ;%h=p6'^l9NWe2ſ<4nv8aNRM1*L0j.E؁Iu)of? f6+n $Rn ~{7ӅL0y$  }hbh?~=o []9tkC'd:s>& |i.ϾP3"^l@W5k#ڥJ0E, Ѻp~Q Kw XIiF { 5T:kK]9)+v/=YQb7M)ڥ;z /Xi'fӁ n1خlU 9w?11e{EgmdN%. e?xK@cxx#Flno; T;K 0ywMhs;$Ӌ2hП@Gt uodÑ "-M$N|mD'҇:9֏pK6φf Fy+'NXv, ,F]Ldۍ|iבC.@|CPO ȫ3Z*&&rBey٦ b=6/!@t"Ù5p$2DbҜShenA4#xդ3=P wr|_Ji]B5A VCECFV9= ǀȵNaϡnqc?/( bqlXٴ\T3`%uцUs LͲ"^BxGǯSu߬Y.<{yX'S{ ΐX:p 0DA~26|2f4U7]5c?]o+opsإ!K;?#U*= oBL9M !y0ނ y=޷~qe8I*@A,wR3ie2/k\sSpJqFi*оE AWQW[(2C1'rD\RTC؟kVEC} X:0%ÏK^ G:FҤ!~b\MÞ21#az{HWMN]#:QybҟYId⛎SrBL\rp/;S:8MR^ED A\Pfc$$?zف29ӬǢϡZE*si3H)M$HBb6[2t2 s>X#?; ,5 ֣M~_O"n,PB{zp 8GiTwH}e~(")~X*N"ۆ`Q ^Đ&?eYr b_GY󀂌']dVo6wSC/-pz=ކ);~MfESI7WbVUbtafl$v31[ށ |>]XYN`A R\%^Ԟ|39JeW?BV72m.Q* 7H LDFDlwܒRqY]5gwY$bp:BMXeZQoa# پ (64+eEςgç-x-SGbZ\9QZש2!YeDS΂ڻT9.;|“BRŁ8E_h{uf,ºy`<>N.8FYڤyԩьs2RRVZ\?:s`?2:;ozzXeo<%B0U+%kDr  h2|FU::>>A 3Yf%zH6O:].7dSzjs$E~ZfQш& f1[S+Og' -ƃ{IQkŀ#~Ό\NP'xƖ ?fmCSxtt͛<>㔝t>¥٪s߂.P֬ 3?dajd7dy$˹ۉ Qm,R5m.4\8Bn;@#Q[BX KSsQHm+=loqa]mQpQKb{`<{zۈG񥈈5J>~II@ؼM^H@ 46iԉr ί֘͟޽念Rl@ݩy i= ưǴBɲ]lTA/ bw'jywc:PfV*6ۮy7F@RCIPvISxGOa׍@r Bj~ "2 54YivP몉hvP 1geNOvlbܗ^AY@5Q+'9:&&$,1~ۦp`H^D6lfh7ydeٯ͹!2ù (]9< $RDB>>02 d]9<̰G*LOi: 90%ȝF1"xc-p h??;Q<`ah`0RD՜Uc&b,ʤTOÒ <OM] 5$g0L[37{uSFGQẞwg"(5ƫ//SKVU`\˰sCT)]I} $3-ۦ iI^wK73Wլec,ɮf|;VBb~&.tQaaύmɳZMG00[^\5ٜv!A/-X`\Q莏"97 FM5VN⏲FiIl*NU{WjVVme8B]J~fa~y;qj(3h XD`j;T~\^ w¦ u>ʟ*(~$4gݡ@|h;M^x |ۗhwceN<_ocKrIF _0J4|"5Ij˧>ٗ?AI"XXg[B%TáJqڶ#`啰oH $[1 #?:.ejcs^]2MܐSNy[}f`M?`rnb^-gTG΅:^`ͬ^p@ /,r-"ĥD6ӂ6 mQ2ZT =qc)#'V!`@0:D{cgҽ0*ṵ?Ps|uJAmqRx±# ̚S(" inc٠fNE ;]OШuݗ΀Xzgf'ݴUcS1Fyjp'8,U457Vd=ITT:ܹ_vNQKC{MV{-^>xyc;c 28 ȵEA nb3p#SQ`~ P@F1rQje)DSPCؙaz-\JEhPzQQzjtU)/WyV+ [T )k1*蹓_UG66K `4pID'zP6o~E+t3( |ZA& oQAl>veD0=-Xw=uSpu%8ʴR+7vA68ʥ/TK=r#% : 1}0/i *!i QIﮅ>;q$X[YݣR' LƆl2m=y5_ 5ukÚ)GЦ@đU9CD9ׂN<mr^<}xPy4):ᰱ>L ׉?$ Dj{fe8AާiQ?vXxFl{;@ t3o6Րd G d- R3(쏾Y~)we'ZI7~fu,Q-fNӇe&gEi@][8c;Z|qH浱fg.. i,oXw5\{,T^ﺷ TH c >!ނ;FWx\0[t$< ;+%Ii nm[Ʈ܁+@qۻ|ܻG'Fӌ8T0ݰ l9[NG}nrdF3;dWyeH^ }JQwoZ/Rヤsl A IӠ J%E:>} o&ʑ+0 4?iէ mgzvl^a"Kiۖ;STHh,K'o\G`~!r=́Hh!bBh2o뉣t`|*~SfK=lY~ăբS2|'q:-bRi>v3H; 2ybD/C<@6Fy⿄QP#Ūdf~{zG]]ov=lY? j-hefg,5ÈBq2>~`>~EJ0ǓV9}&S~6kF32$r:*yG!j;\h_] 6b6hE1kzc=BUH+!wpչ%uXz׆"[w39hWUmLUP>z'B=ho8$s5g/5=mj z̃H+ޢCOsv Yi.H3J< 0'?vde:Ԫ׺o c%}e{e?̥ʉDd3?{p>6ҨӔnV<#x:+uN?̋z/HOwW=vBMoo``$Gy|=fzK$Bݜ># n jN="2ǂ䎃,O2M㌊i8?MTyXa^Z jZZشsMV!i|o"<' dYm2X*ihqMuGcVԭaOP_JbUL9oc'd"x("|aEYrbM!.&z,bm1H]O ҅+t!é!v@x !Uޞگn_ 7gT<EY"#\SVMkPD T۷6t/G=Rwq*\>; 蒱8m]]I en$|: t*Do͛"rdžI;|RJHĨĂ}Q#]WYD1 P"eIjCEp/M5\NVLip#u)vR\.l 9MNC$ LowN";)m/ #qLi Ɗ%rR,\]QcBD귬%r$>gΎ3J 1r855{[JDќk>!u=L˟99@!u MG mYȌ2^pXp:_l_]~tñ3yK9kAV~Z  '&‚.0>/a.- K8ލN$mfܷs?> V9cbl΂ؙ5a_c Eԕp{˥l3Oh_xD۝x[uX0jP^qnt֛cjSҁ› ȤL@'m&sНȡPw=4 IU͛Re<[_L&/}hYY Ryyiyb?q`{()b.(mQ'k6Jm>U3$bUalūݦ5" \J$v:2Ƥw?>OpHM]ݖu%@ ~#jTwе>Vi숱1LYorTJّ~P2KhMJ NH,JǨIt!1yHAzǶ]_5-"Pp)B5\UKz!rPnF!N!q\Yg8+d#tw~Tg>pOإ]sX`:&Ke@-P2fyM RQ>DaE* -l_<ct}F7[{P]Ԇ*~em9fWKu3n&.+]u2+gsI/8-agrz&}dթ0Kg-X{xNki}._pL)F2?)і KH  Α)׆{I! fL'goNXʆ%C`g u7n[0w|y`VVzh]PqEՍZ>z< =X`cfvxkQa85A?#: د2h_$*+h踠u-ӗrYռ>+ָ߿<5RZ# IMmA Q!xϓw-89R[oeap'#"2A'Yy{Hy,x '4A"he=*Ǻ;FADZ/vmh=fLX_Yv~Y/d1g%t栾ި}w_;o3韛g `cjAEz:Jn!2~-ך Gjt1 AkΛ]&vU1噌 "柺%nUSЉ( аDoX+1vj;CH>-fRi_p/f)N< "rPwpPEGn׹by@,e2Q*],w"<^Y-P{7u[&0m5q yshsS0ǐYD{h& 0(˾' , Xpo8Ft+|bR^+"msX0̣ [X&ٻ✦ҁ"π|2P!8H]v2ȩs'D 7s OAy :II|q?_=^x~.-TL_Q#VEC(Z&=`BO ;֕`$ ƗnsnNTÍⱁ58UjZ|ggb,FsB`% dix/G4zYw1r?GGFtcg]ߋ['zP&GB[ۘ_MF0HX{Z<"VWnkH^=b32lpdKΟ,zګڿ>2 W M!}:`6BO^]ol@22Yz2EJ {8Aud6_fʮ~B5[u*gL#<i-D]^'M;-K53+8S.jtB(݄O6--wM'}K7L"}}H [cwMi!yM3!9+(%PЯdr˘ulZs饯Ay1l rJ?߰zF"ڼ{DOgXEh2hYp:(ePgD$9(K5~br` qLiJqUw{6U*;z>Kcd; vҩyFYJ o8g<̤y\PU@`!튻~DCEq݅'jm/PHMF[ɹP?JM{{^SRlZ4۞`aOpHվ(KJK\UZȄ8~M5a!1[Jӑɀ8WX ۠d3po8T/k|_cSeu3*2^M9]8?&V6wW&gcklz-$@hc*'v,dCJ7nM#b1\S6w5h~f/~F u4M^T DhMk#6^ ȀvP⸜ձR 5/<Dn~3H K8s3>yÜ3(, 7ǭ!ّ 9]IjD@,,UiL`c{7L2oAh6&;;Yo)N: !nP:κ:Xjθc\ ؝tύ[S0 M+6݁o\kAk`RlGA눉osVLSpE>@+]!QB{ `8~WMd>$/\_*̹MgMfQ:wK2WNzKV4)gKwt~avfvȲdOg[ljV_` a=FתN)DCЖƎƏw;#.F#_NVȧ%* kO\ŹI@z% yy|P/  $h*5V-( M&S5`Bڨ}RK9 Gٺw{y%S qkKL{FN vX<$u{H 亀D&zsMHH4U7fy{PyqqVrNÙHw\9`ow-Dpq̖f@e0gh.ر]vJj|}f>r%OEذwq $ ]М{̚xPV(1TC4r֝Bb55bL\ˑ; f 6QduB[? $F=2UY1jJd*ŏ3y̼ٵ'XIRqäƎ[z&w1. l,ǂX/ Z *,-'KWf\3O:ֻ ނQ٠Xc3;a9{5F6 XEAu3H?nhF7%pRrQi^Bc U{PM¯ƕ" <+ch03Ŷֻ)-FhQ zp8N&Q O 10[/OT佻T՘'S0Dur1/9Źl8Rry^XytdHR'bޘȗ*hW7'MPZF>?2> 1HxRÀA6WD>ͿѲ{btG݋ 3"gmA`M揩p>RM8bjQ)Nϫ, m@G`ql*l:TaQGY% {Xq(+23EGBnq{0pElCG euE6*:'a)AMJ2N@go5Fi9?7f5jRPosTlE|k9/^AshxGKV6g"q%c1`x95Dy#,n=7HD}fwE==6xw7ݹ(RLA +z<]fIxyxlƤ=3Tq7+6X8/"rl GLg7^B|0K F[ HϾ|ŕߐ9/8I RBz =Φo>p:y@Ux{_] PH:''2Kp7}ze0=nGC~Df/1 4/J4 Lꍀ8)7I>32w,] 'DE96BJ܌Kf%hq2=S9pJct?D¦T]Jځ?5D,Dd2jb*sUޠcNm؉O $nTl!3p|>k`|씙Oݓ+euޚr$c 3Z{ h+/JyBU4xxjʈo,wYLW.?z7\HUHn OO4w҅$i ,݊@\>Nz1BB>@jkC7cyp0 +cݫߤ%s3w-+a#XN0pԁkŋ"A ?G\vNPš֟w &㧍/ F{aw%'L7/izK%NbLeh=7ɗek21c &c ar8c*o.LԦVQh;7?$O*#ܲB!BiTo;]r3By;?r[ǽcMIyBM ޓ4+1e$H?3P.jC_NPW[:zW:\TgZ qIQ{2ωIƩ`59MhűgKNb,Oo(ΡЏ@5rDϤ&J2~++U dv~Â-ۋ{\?= ~5XzG3n8rUL|foGfrѺ^%% JZ6H'c lPPf̴cj [\ 4Ec)thRm-aC`H+0#F[SmdmVx7teKh3q ϶%1?mG- Ab/qjF,3{dL&фs5 4݅MDN\TBUlݧvI)l$ze^/f!/8D&Qsj6<𷂛Xa'Ow۷na[Oa@k!gBsƁ'|/q#1t29`YN[L.rZe Oѹw efOi)"v ~'2$յ(Yg@oRr <A1kDKzc(]qT/%Ԝ=ؖ7ObRR.,5mx.桪&U H\T'\c#YSJǫ>'b"pUVvֻh;W9Pfb{e*dm7uE& = ޴:t^OO+z͹_WjuE^o2_F!,R(_)yd<频9F)Z!Y@bTM1)KBdc[8:s!25UU^k(PE^kF6p}]\l^(e|s:G,Bh;|m뷢->܊FZ6 "ɥPg[@cS1c (N$.`eฝ^`ػSi: }3jw3`bSC}g~ .!M,< /gr\"X8d#?^De!Ul>-|sq5Yަ?OZ\ c{h5/PT5g ip%V֭9k90=6Ie:J&dm%"GXl꼟,v #KDȈqv.O?6:A; #N@hVd?-CZ1cr68+ȶE;X:%"ӟڃ%9M-jl2mˤ1ּ? hKjgsBxp x3LzD0f?J\ v`||ͧahl6kw$0LI1aS&54viT&-ű NX.o973s5o(3b isʦ-e]N|LY@mx/$N˯ y Sm9 r2!}c_h]. ;)L/+<=?˂ջ 10l,¸rWm͟FX2x 7S.PXBz閘IC;JBR1*54Oc,UX]]$wշȳ 4:ӤBtusB$݊\Q43t/u*&G÷"u4eJ1m)0.g^|eKUfR:6tHGAmĒ>iBţ ҆e <JɀwE7lֵ*?Ȃ08Ցq͘I M[@+c>_L/ L;@hrTaQMc6ʦ%ճ ./#߫3'C(*{Tk(zYmFfj_>ɥldDӒK'9 2N9j1Ơlr- LOD9 x2e卞 1YW?R͋w(~k4 V8a뜎! U))8@b{L`eqV_)Eܯ#4+gv{'OppٝqGC6r t%E4dұg}E/XD]" ḋ5rO\R›_VZP0p9g0"J5Qa߄ot)1@h`KjE7xLA^^GpuF!޷ּl3žee {*HFʔ,RahO"6C4>K.V]qqR=s<8lOJ?x/~Ui7YZ}ܩSPYj!vc+ː@l4!XGDyE~)d~czFiaM#&?׊!`Yз68:q6H\F2*F|*)K8 9~lC#Ě&*8ds# okje4rsmn#K\6IFs|s񚧐pJ^]'e[H#5,CmMSt)qrH0AG)Qs;<7 f!qv TMXxėfWXсOi* Y6c]`G8-x "rWWBZK Loo;+.q4fNZδ+9A)[f~yF<4 s5"b#9 N( -S\Xګc9Rz2"$ė _f7~2]Jiqxgva5~يڱX6ht6G*0 K:oEZfxJv5<):N&+Om%Mqb2c"-