bind-devel-9.16.6-lp152.14.25.1<>,4ao/=„*e|!<'*KKP]Qu)OyTw38Ifٻyo.]{9aS(i~eư )7S A~+cajyOxIB-Ƕһ =E&'kO\q_&/,Hnk!_u`>(} oKx䡱a"Rr40tƚAw,`~nF$!V!e*-ʍvcb-^U%$f5CKeHh w1a>>'?'d  " Q<@LPclt $ L  t  PX QV0[`aele e f (f8f`9h\`:q`BFG,H |IXYZ[$\4]^ b!Ac!d"~e"f"l"u"v&z'''8'<'B'Cbind-devel9.16.6lp152.14.25.1Development Libraries and Header Files of BINDThis package contains the header files, libraries, and documentation for building programs using the libraries of the Berkeley Internet Name Domain (BIND) Domain Name System implementation of the Domain Name System (DNS) protocols.aoobs-arm-112openSUSE Leap 15.2openSUSEMPL-2.0http://bugs.opensuse.orgDevelopment/Libraries/C and C++http://isc.org/sw/bind/linuxaarch64LV : .tTi ^I<*|*W .(R% ls % *z e"Q(s_ rZK4 V GO^#N"2z/|-7  e 3 !9S8sc9 @p1wn  8p 5d 0<wy  y-Pp = D&: [cgBR&'!s[+B 8 v  +R< xVd%"#o>RJNo&5#}<-Q m n$, S @C?_8o m-($pAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤adadadadadababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababababadadadadadadadadaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabababababababababababababacacacacacacacacacacacacacacacacacacacacacacacacacaaaaaaaaaaaaaaaaahahadacaaabadac4b0978174ea9f94b8a03a91c34a6516c431a1c90aec92c478a20a8eedb89a0c8ae5b30912b9e1b11cdfaffc0586bc1217dcdc10888ca5522aeff2c4999a5c587fbbb8985da0ca750a06f9bc36e487dc5b5af464f4c869e63874e19af7bda22c32108993051d2be77f08b3c1311c1d80f016c4310d4c7aae1636c8087e34229abc6e4ecd7d5f775fadea6ff8f8b15c7998d3a4dd4680d6bebe94434d512bde5a868fa9c2203f062beb593a8c5ad61e315788977ad2678d183f89f7cce7b3693abeee827bb10ce8647b772c7ee8c1fe31f1e760a54a4cb32777eafdb7bd94da6008ff4eac51858b6c9061dbe9ac7568ebf2c32bf227ea10c2e27eca183e316b41361235efb31121e54c88c33be49f465371a3aa0df5083fe20be47f7ae7ac8af0180feb3ab04d12d546945077211f915bce09cd4a0def33612fb2a8e9709cb746db8c08c1f39e76b3f1eeab0b24047128236579aae248b1e17042a8be96cc4a73ef0901a376515cc17e2dce487bdd38ee4e7372440e33fe46bef9f7388540fe63661363f771b6a3fb678250c63720578e078310809bf2925867ee4e82be1533f371fa8be84de8beeabe22a44327ae3f8777bcee611600f8f05ac1d60025eb519a13844f53c0e5c3b2b02412c016bcff45280218a95102c898d8a49cbfd7306e9770c20d080b0d1d640aea7ec5db98c835c0aca4c0de3eb9fd494be4628d8f3cb5c0e900c09d294bc183d8700defe9c10afeb696e1ac6328d73063680b971381bae5da5b26ecf6ac18371a69dee1af05e5660ca3c67e16309105a84799913dd0ad41fa1b49e61139dff81a7aea0b2266b97113e1b5b9bace5b8d86fa05ce373be701d5958bcf7b70a013cfee8f9242572afee10d8ce189a7c7148993cdb9f1d56195010fc0ddc328d8d9d6616a55b7d5557179598d9b920d8471e210d4d94eb1c0bb66a4222bbbcca9a5244aa54f99f44b4c2b31a91fcad3d94b2b07587c0b23486b9868a59d9c05f656f6e5e9e48d6e0bba28da2f5e20c84b8caee8f277e94c73f99fbec3c54387a8cb2a5450554211c53c0f45f595dc2292af2365592dc5d02a366781265e01a231424dd17fd94476c3bd36aa52318ca89e72feb7d92c30bca07250040baf5ac86b84a150b7836825eb9b52e0b6c42b57a024337faa79f9e86ba945b5b9d6ac2cb7f8ad73887fb3ba19901b396e1df8ece25c7dac45058f934afbc3ac10d86659d2f488510bfd09814a59c1f97e7e00595435006132aa18beba9341118343f2bd6d777653e2ae590d81450c4b6946e95a9f30a66383689a7371012237e18bfa65aa1cfde3f25fafd27d71971fb37ae98a378d158618cf26b043142e1f1620bff8d59f3c7f6c3ad6ccde0ff5416603c1a16ba96e4712cceaafbeed8c0bc194d5a5d38bffc6c7dd77f296ee25fdfce66e628a6b5c1e928e1a710e4f35ba7b8245feb7aed9bf2798bb2bc26e48d02e7bb41e8cac218af533534d6b6b60e9fdc1adcbf0a22abcea4e401c294ec1c37b2d266228901ebef1ecd0adb35699720f69b9439ddac3f8f3f57b666c9fa37e08f5997175494ec6189bf54f4675036ccecacac5de970337f87e3d6497f013a2345601707f8e56851a6679645b999fe098c776766cfe7bce2f019aacd8d92612eded90ac819acffa3e0bc108f24d9c74b138a092031167d5d5cbfe41fd8e519b88f235f758a910228d504939285be10bc9afe854f415c6837af9d3336422f180f658ca9473456107a0784382fc4652365a00b136e4822b402541176d7f9c50c47f684a7e06e2847710b0d85cff333c626e9e51387f0d058580aa0dfb1a747a32395a3d6d4445f1909bc95193acb219e07cc385948d5ca0da1818e1767992d3ef3c0ee85626cc4ea3401986a77a93de47cef011a54e20fe05d11a86d3efb85f808574e6970d52f01e884caf807102d820db42f59266c6f1d6f0cd348affea7fd2c2ad4f06479511043ee6d33c8a26cc7a2608970f4b445ab17d85e4fcd449fbbb38c93ecede841615910c2e955ec113ec352895a5c066547879ea55b7805cadd59c77cefc28995075d1fbe140eec2e845953fc333eada9c0495e053e6433b980b53729446d2a9c578cc879c344b83f8d5defa705181b06d71584b443c3189f43612d984cade0dc48e710397c2caa5c7fbc9f9ab4ff6134cc23320595c892f02d6397ab0e8d743035c7088ec8cd636574d7cd2ddaa077a38d1ea7c90f78adc4484be5b7ad7d26941b46fdc5ae1235f0aafd85b1ae00e254e3939c45b734e24f1f90eb271918cc11427b7cf14fae8f53772d78af8b4a872b140d2931f77293071c5d80f3a089f52228680a3bd734eee5adb53f2256cb6461d47d901b87ad863270bb2f8174b1ad50cb3b166ae5fdc3f46b0b56ec75ebc5a23b10cc1c34e46c68a29ed2bea3bb46fce497902e030ceb672d671da3d96f78f196111e56b7446b733097dc83b06ba856e7fd8c25e72988a2531d84c4c26467a16f52002b1a34749d44216c39b18c1c6d046d5d7e8656884c67493a678c9c50020e6ae3f37f84dbe4c96ac50521aa5942f663257bf675fdcf122c6a0bac53c9feb525fdb81c15e63c894fa7de40dc29ebeadf42d94c197c4b3b3f110e306cd523913781eedffa00a7c578ffcc1461811be67ae73a98476175c355a4d69cfb8b079583756ad196bf56db00fccc1599d691b7cb970c67f4c2740b9869fed6f57df0f2a3285b08df97975b45fcd43186db06917d00c4a972c730722d2a32ec0675000e97285e86a76265aaad65b00b2abd49e0737461ca2dfc740d0dabe7484655482d00247dcba2281285b6383c49b6273ac192e859820abecd1d1a485dc67aa5657e4776316ffdf4e2b70859a632097ce4faa20dbb7aee01657f900e78548c9773de4413d9473bc64f137e4abf91b3b98dddbfcdb32367d7eb80a6f8a68cf565260f6cecca3a743fc2ad57568d9337a2f758e9fc872bbe9bd47a807496d23b070fc73d6db7ef2ed0f16a0729c41cd2475feb835c1dbc6e1695723eb3db16df4046c15d3b6e1999b2409536667b76f9cb6b026c6bbd11680cc7d1d675bd6c027ddf6e11dcf9a546734a048b68d03ece8514eeef9ea4a99138d02fa4662ab42ceca00414306b180cacffc95103bdc40d242125f645f053e1f8da071e1ba26f3b958c2eb70301e2dd3bdacc8e0e5a7a1a0e5ca62ea53b4ee9ead1259619dd2bcd8f101a1a68ecca7bd5b99d9a0ffc03fdfeef2dcd505e9a53d2428e4414022c32b24c8cdc4c93a54124de9d6f94a39dcb08856bfc7d09ae3c12e7a8f256b85fba5e027c45fcf5a60376b392097fc5b8e6e1b87c6c3fd1855d899ba4769edf29a870cde1ec9c7177faeb887adec061d8828b2d3c79b1e4445e8e0ec7932444428a6ae78654bc536d6dee353c26e7eb3a24040422efc8042aea99d0a2bd57019f33b687fb80942a1e4d26d17d774cb8d6d227aabea4ab6330fe13bcdfb3d65e841aec6bf76ce761d2ee25e14c598a5d5d4f612e347f9b3dfbf74a54ee9d3784f00d5be7cad75df4c3ec3a3761ead9ddd2387d5d8c228c2595e1adf9578ea5f9d5dafee1bce53d8f945046a023f48a8f545fdc0cecfd66f657b828bf1d9cfe4f10161f864c978baea56023014c6ffa77c97eb63fc951b3c00a72e10f989f834a8400dacabd9893b7bf17d19b2c2fa48b5e884ab0e5a9d67d17827209980af83170749e56aa281061d6c83b9d3c85fec40f61b19c18053e5296278e1b535ba440fa3b19cac99de99868025d3e6951482bbee9d5d5acae46c9391bbfe8986a6600c9b8f1a6d1ba1352fb52e4131cb3e492fa45e8467d05f7521cfc58c2a42f41e0637daeafbe267cbbba1b5c0f655a74a8be14dd321a34da9bebdf5c7f55b536fac6864933807a70b75f4bf8321fedb5a52d64bbbcfa05e24022f03e8a3f5fb081117c069fef0add692cfc5b7ab5f6dc14cf6bf7577acaf7fff08fda0d2b2bd0d17e396928755cc36987763155eab5ef5cac93198396a95903c432e84e54b80302e828099953a9d53153ef44e270a7f774c3c920e0c95601c0261d677ebd5eb2690dbd4fdd775759af7e31068120236f26908dc26f351f3475c2bfdb80852c829846a5dd3df0c9783fbb92100ab68f838c3d3cd98e1d63e31595a23cf67e3f5f5a8899c8bc943a49f3bb7fffea848407e5ba8a1cd17a341f357f371751b572925d6769148381363f38b5c6c8885252026aff2bc49f964960dffaf8ef2993848f97256d3915d7d3fc3f69637f5f02c24c9b543e4e4edc50a5a1584ca798a7de10acd5855f77acae2656bac2773cae4f91ead21954fda1acc3b8bb83d3ba4231a72397bd0e4ecc0da2f29a1a6b84641526d3e7816a392ac3b096348e3a2107bf0ef79a01765c750a15ead696297408a2faa2aeecf7f116854a8f4611d7890d9c37e3e91d238cc8eae7f9d325bef91bc12fcb8e0b1af683883d556e69d66adc52e2622a3c12f14afd3284f8e37d76b5cee11a3bcca17c61c99aab063392a6cb501a7b5bd70f9c639aec78918525f7c076a7ad5e9965b2779b7f45cab2ac4b669f95a4a25e8b5e9933e433643553dac701e73671d026604cbb8adb3659e41ddfe45945a48e545c880bde6702103f5a3cc71be13845410622d3792f6b61c9e9d15abf228783482d139ff478aa3efc15bd2471252dda8e11148b94a77ea53c34cab8c5db8bd4bf885dd186b756bf1086b72546b895b22b0bcc2e1e8043e0adc7e3df30e21aeb123641172dc0465643bc2581929f551700a8811ad1ed8185774f7ff1a3e6e1ce3a4037f6124109afbd09bcb8ac85e93c6ba04c9e1508b0bd78c4b4649973e774fb871650be4b64a1c2d6781e12b721b0623d2661d1d7864eae3a5a2576daa7f4785d0305260feac15d94c492c0ae1bfa4e037bdf972089780cd73d9a24bc81a3c3cace13b352a623e52e477c87012a4c2e11c69d81659283f6e6b1ff6d9a5b34a0309f340cd4fa4245f1dfce363a902e3a6676c9fd7a8f1f6d6793ebcf126091532ddeee7305d36d7d85ee23442869bc347cf3b91874a5d21fef696eb6f9953f72a077a79055fabd30864a8c68b1e2d54d3cd06ccbd6e40e648e5efcf3e5773ff850a2b342c4d049f2b015e532d3b887d436ebeccdb7005e4ee470e6c0f2c2009ea8188019dbffbd239e261e5bef655a6619c7c3d7f0020cbe4728f0c93407b63a30c1bc7945f332664f869feec18b35446074cce3d247f846e1512da6463ead90a49eb82562c2ceb6733ec82effe3a2dbda04a7b5acb1c77947852f219cd8ed8a42c135ca6c93c385894dcb96be45e70653a1716bf2706a212a9c88eb47f32bb227289980c456f0d60b8d753b77deff73ce99a714949a466a4b1b455f785d2e507c28d29e9463f3a86c106272980b5bc5c7f15180a12b4a36d5be67f545bd482a176e3f057dca98e07fd37d1f9d23adbb5128f1fb6d53e516a8246472cfaf9d4843abbbe856c8619a3e999912e8dabc67803ecf9242932441db31c0cf1230ed31af3fa3124390c1869c9bdbf79f031dbeb1c47f2d3394ad32d02db76122b843417115de2ea377a61301ded97749eb3f75f2f3d48f86c975096fe39eeca431c7feb85c55301fe42d3b28f673befb8dd2b1be1dc8e3e80c3eba6d9b9b543f6ddaa7446682315ecb45da53b58fdaf1e655300419e3baec387e1f051cd9942fc91d113b10a4b0a886fd52292e3c110569e399e4f3135f41ea171b1dabee9f1824e6fc4dd0b50442e67589a70fb4213d1c6d0c4d67b7c97e35cc4fb7a944ef6c3dfdda9f9060329b757e26ed69a650b8a805c9e6721c9335a7d25df162ecbb700f648a1ac04b8ef15a2c9479d70e4cd2913833d023aecb2505d6e3b0b02ccd9458c8c23111cd418bf159408f58c22eff083b93b936a84e20cff381ecaf8483394bfc54a9f4964c5f3f1d449d443df496c22ce06b59f8e9d99e24a445dc1fad01b75e8f8f51b353b0898c5c8a6746723d74155873a9d4f3b0021942e4298d9e6a5e6ce62e393227eaf0fe5411e70f2476d160fee0d54731eaa6220d77bcbc72a9b6b113f73cdf575938a21be40620a8d5aa0fd8a5f4dd612c5d6b9c2c2e8831d057887fadd3c742922f238f3683d7658a5e9df3bdfa14020bbab8b7e3e07c5a421e7deafc8e32bedf151bd68f3b93183af6d99c6a0c47099a737b6f309a648aad6aecaf994b0b411c89127909f9b3a3999c769ff6a3412796475a55382dc89614e3490bcf38a9e7a032fc031ea96fefc0ec9dce669aec51ee919f8327f73a8c37a6d06a4896febcdad58ce7220bc75c89a7f55b61dcd368d567688e33280115b82c40dc7d5fcfda8f79f28b25b9fb97f7a18d2796cfc2c83462dcd2c79e417eb6fa49f61a37be8fc70194b8bde13ea6f5a39388a7dc581a294904c5131b9d2a9042c355114b603d439cfb4b2642e9b9f5134a997fdf5d2f34bcc96af7b449f0a1914c2e5ff19cfa3ae07905df02c4ff34dc0a0e11387c0c1d57fc904393e95262ae81b4501eb009fe7e59aa256101258c5174485abf6c512bfe7f8e54349b591debbd34ff15e769dd9c24e89506ff89f3f524eed601107a05cb0655a983ea1e9cc75b75f08a407b7eb4b3732994ae8cc75946bc70f4f32beac6104f15274eca6ddf5653e4eb924d09a13156caa070550de8d55cc68432640baf7cce2404b63c960c528a4dd89a9121606ab9844a9097e18fd41f83f2e73c665a8b89d15afb1096e19937defb57520f36a4a44ddd38217e7f04a5cdf0e335baa7227be9b1effc21f0fc8f75f67a3687aa293850da00c670e9b32cf0994cf19b1f3281829fe1c0e54d6a864313a0a3a1fee283b9d760a45ae678fdc3d567fcfab4bea0cd0c536f0141e5d4d2a592cb3a88a647a14127bb4db5eb4945652455f1c2bef36449f36bf863f05e40eca48dc58367597813374a7ff27b8e44f14896c738e6474e7187c597f0fa0b5304fea473171ca36b27dd0df9c6e78bcf724a86b45720949aaf1ecda3dc468da120d8527220ac96eccfaf472dcfafa6025ea10f11f04087da740b45c1b21efd1e75e239c9c26bc46997d110280c63764e9e522df4e7ec3637d268cd2bb729c2047654fc11b1642c16ef6c3ab573e67533ffba8c3a48f0570204a5086fa6d89526cd175f3e55bf502f1d3b66a6221ab65b45277c7f529aa25709f328084a72838437090e59426666bdc400d949ed0d251b6255461f10ebe1ead67b7a0d5e3d4cbee1db0d42afac84aca2d038d0c6add75266a9fbec8e158db77cac19a65ebc3ec5dcaaa269570fcf5df783aee65605f454b288e6c0331cb2fcf31bdf93a972d55603f4e140d6b781820d4be8315f7e2c6a54e3b0b08e378be6ed82379706b52a77e75d29ac41beb9b39ef474b693c34402b4f9eb68e93f80c5dad9b4880619c1fb532b1bdb957db7d5dbd5c0f13ca9ee6be09e5a0557a74030f473bb5c882b67f9095194464ca86594e8c14f9e2e0746c6c52159e6be08c9ced31632c13705b8b4e2bb7533e25ba0d2755eea9e8aa0456b5297d86a034234a8450770be73b7d44934ab2d39928dabfa086848d441af0be9d3e0e60fdd74ddff18a5287c6ed477098f8091e127decfeb1964704ce0650a3f15b38de7e8c6ead1344d96684b1591bd7c9ee8b0e42f87799863d37692c85c09067024de1cd22fadd1176b410719a67d57847a87c8079027c8f77d001df846697f617c7914bd436c0f6233418e4c9165cfeb5d1aa16dd578c73d945516a6986aaa96c78563fa70d80d529d983660ae3217b02d4e048ecddce617eb15f0db063c6f9980e08a6ec60ae6382cf1eb0b61ef266c9472ed261683aef2e9582778159d41c57d545b26c9751a18f5ee3176594a9977ff1bd5c9b8404f91f340b8bc32b79955b5bbf4bed78344431d2c3912a162bb8bf0a3c6a91998ef7a135592b73a889539fb2505ea3ba267e1958d75f5a200d0829f84b62819de55aae53177cf16f53540de7fcc1b86798712fdfbc388fe593ead04bd64cf00a6c1c248377dc5d5c5fb4ed643408a8e3f72c0c5406ed296973c366ec60e5ee8d73afa1702cf7976fb896e1968340b73e26fc85b534d0e133fc9321e666c0699805c733b2ef50af98bfb7c4c2d46aac9646a022685f148c2d9be9e9b3615e1f8bc9901986f35f7bc210f139075d86959bf3b1907cc4553794a6ec49b19db5df5640020f161161fa0166317dfe61d18796bb83aea76526cf39d9528cb77a8d5bbb138a2d612be4e8c80d97dd7eb058b6fd604955b0456f4cf1d008b4d555e274a1f2448931589680470453c9a29cdacd46da063ea32fa976b5b1df85f5cc607a512b09bf33f843a2741302a5744c2f3799244e51c1d4534ff0d2095a0c400d19d9258a4e3ce54b69b820fa076307abbed021914efa848862de5a06c5e64624fbbe303c0bf1c27025c72153bb7528ac574e8a737bb0b60a7f9dfa33d65407f90c2f13549ab6b7326b4998b90702454a17d6945980e3c036cd2b7ec1c692e55feababdbdd17b50b1d06884b0dea5855ec0a5a5222424fdcabd781702aa45862dbcd9dd3620ae73697a58254359a524b99bd4d9c42a492fab511aa145cce5d5ef139e57b2455e5b3abc951b2bdbdb875a89244e9c3e24f29e5f63f9ee348a19e2471d48ab4f6a826fe1e58010f19028ade04f263cf52ee978bb9e4789884a1f00167cf8ccb2b7c705adc83dc9d440f23f84061fd4bc7723499ebe1b1814ee35bae2c76e8a2e1b147b5d28c511f3eb56f3b3e96a75878fa90a940ea1867d3bd3d3c4c05724d8e7c2fa8bcfde554d21d091829ad79f45aff5dd4e900a2ac78e659d63519f532678bad579a449f06e65552df1e6d71718c688d2f323baa1792234598f2c28fd23213996993a603f7a0eeeade6b8310fd83c0d0a6399853c7a5851df7df6052d4e458cd95be3f4a6c3ab388c6cee9c179c4bf450bf94bd922cc920fb9a058c5f139180a51ee482adbbde4f61f7227e73baab2ca0bfaf8766490fc543c5986d66c6bfee0fdb8cebe2e50e4a5c0cee55d510a4556676568e1b7b616b5a5c6018d9ffdcd571ffb0b856d7f4bfbfba3d22be42ab30d4b85433a721747e66c0e4a9f825083224a6682695c9d0f88fde3dd5345f9cd4a45ec8278bbb0a5c1f9fdacca7b25ba83919f62ed37d3074146d2ad176b8e1d79e1cad71cbc1829174165f39558155d8f9fe516e3075d0d978c61312f656234eeb8ed267bebae0dbe25a3319a3b041297f7150e1f5dfd73fa6c4cebab01610458b1faeb80835bdfba30dad9ecb963b2e14f93590f82d2c556c1d1a0ce1fecadaba159fb375f21eb4a4551c9253a48b368e072c22e8773d14e844b506548c7d8352e5c9eaa4b583b46115f211c465feac47ce33c7526bff6282f2d05c0b728868d977d32a255381e5eaa43b45949144f9bb6f38ddbc33d660fa1e52d13f0638dd97f90f73fb284a10851ecbe800e34b0bcf286b58a89a4f5af961bd94d95d94d3aa8277a9778a7899331c01d134017d8f3b6ebc81e4f397eedb2b3765dcc9d08a93673ea0a02ea2f06ec2cca802e459ca610bc13b55f5e32b7099b816d519a9afef28fd7dd13d6e20624e27bbe6079b6913bd80bba6adc00c935b6a5b02e9e550e00bd3c666b7aec642a101c8937fb457154aee1a8d4308e1e20dec707e6f03c8fa53639509fb2555fd572a736bc56509699cf43399603fadc9ec7caaef4c38ffe4f5ea7c12b857f04cdb633454b241c47b46b814fd62282121d8a4dae06217917a01adb5d26f1967d2b24abb4c19bd25b50dd8462d7d4dd9427a48d4c6827b7957aecf2a2dc2224a48d675744c9f1b996ba47e8ad70b5bfc9bbb3a1bbbfb3e20b376360c992d8e08c9f118e2fb8464f9664f95ec2c8d6af5d66506fe3088b1bfc64d45acf03513d7e7270c06dd86b707cc2a9781df1d3e4dd2ab1602bf340a33699f2db17ee48ad9b946f72136e624bccf403cedaaf1431d91c7556375d857fe3cb58f18bc7f5d2992c20f006a20ca70f95cde0d152a99293281e56ff589d3bda19f98d1091a150c48864cd088be3f6c103a818552175f57d4a4808e99439be5ea165b3799705eeb930feefc8dbdbdefae15654358b4d7049a9840134e0676d9714b925858e4ffc8750d0a462af920cbbb0a55b358e8a2fc241f2fdd2157d54a074a6142f81fca1e3e704a47e6a1b6c3619e7910589274db5e0b855083a92ea4fd5ce650ef53348c098ef4e196e2ebd3d255663720c874d21c6611c3f732f51c73838f35a9d12c112d8191d43f82de1303b75491bd286c6619685b83aa719f5aa89c3bc7e0a02ceb6e3ca0eecdd7d4c0548eb488569b36374e74e19a38738ec63710def943a8277c65ed2eba0cce265e698972a9ea6f015d1b9e74bbd048d32a0e86b3f3922db5d761272a7aeffa0cad80921aa13355ff5e8f682530b6c90fd80745c5d4f9d6412c2c49484ec24569d2109e0e3def38a83d51f77c9635e48365387c7cb33ee4bc601b4c99099b9df8082895fde5e0a85f7afbd57e3edbab5366d206ecc3decf7368a3eb3173552a12b14de0c922b6c4d8b88a5d9e1268a5789f82e7178718d106d65c0eea672ca37b933cb80d27b8231cbdc874b323a9ff6b78c3dea4fdbb0c5faea806a8195b2afe91759269054c5a2b246ad399d1d2b81d509b1cbe7d4033bfa80cd68dfafd5e675401e9c4600d4e37ed69d01cf58e3eb3864e1cbe2aa06ce37b26795fcc17dd380de969079dec6fe79a8ede9e385ff17c70b36256751eedcccd9dbc235c2d0d8367ac80d3b2168c4d3433274f5e68deb6e9cf9a000db48fa03445afc60bc4a6bd40214aefd500eee7deb542e1d5db7808e4cc8a9f6230af1d73d12828d4e4c51e478f0eecaecb168caaa3dac747b0910520879703ca0ec9b84ff33fa7b198c668fa8c9ebf8f383a8486ec5829474e7bf78dd628901e5f8a12de3c0778d5fcfa5d829f806f842d36121f0fcc63ead0c0f8ca7573cb39c8b8b448ef7410085b724b36ef0f64f197817400371aa3d1fdd3a72f853db70aabacc894ee19de7db71e914af1045af971b71155f44e12d7a4bbc5cddcb31ff0bbb586c9edd99edafbb67b644cee551238918a1185a9dfcdbf92953f801ea6e985fcb81215b3057be91bab8c585d0b32c1acd3ab6bb55e45c0fedaf8de08ab47edde5997cf9121f1c4d13b0382af45cb55773844e0cbf4e3c1f6eced569ca12cfa9d05deeb03e2eae940e07a2d76cf2ba5ea726a4908a3619e643520ad696432abae72baacea691d87d4d675e17edc50d30670eb07e0a2807bf8db0012d9e8e8da61875f26a3e47b84668d3c1719d50a7c881980464316e6f244abc4cd19115a3eb053b8cc5649e19527e26838c2289b5d1571f4e9d1d10f80cb1d49aacfd1f68efbf8889e127f438650e5c2197a19babb5036eb4a3479e84117db1616b02f2aefc89711f8d571e52e9f5260ea4842e9da29f8cd115339b838def5144da5063b061951521a9326375ff49e4c8438d87285af93eab07bbeaf32590d37e19a137e7d0ec80bfd59dde0e6ccceef20ea3fe071ba5eae9282eeba9cd7cba5df55b21d39bb88c88dc2e25a8f96f370bb1b45abec26b6224764498724a153fb7d66c9d49fa438dd6540f07c45e3bf1a24fd0cfa220a9b38b2ea6libbind9.so.1600.0.5libdns.so.1605.1.0libisc.so.1606.0.0libisccc.so.1600.0.2libisccfg.so.1600.0.4libns.so.1604.0.1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootbind-9.16.6-lp152.14.25.1.src.rpmbind-develbind-devel(aarch-64)bind8-develbind9-devel    libbind9-1600libdns1605libirs1601libisc1606libisccc1600libisccfg1600libns1604rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)9.16.69.16.69.16.69.16.69.16.69.16.69.16.63.0.4-14.6.0-14.0-15.2-14.14.1aya /` @`N@`}p`-@`*b@_:_ _d@_`_R,@_H_;_+_^)@^W@^@^I^v^t@^t@^Q^Nt^@]@]X](v@\\U@[#@[?Y[,[[{@[{@[ZnZ@ZZZz@Zg#Z'Z[@Z@ZfZ@Z@Z@Z@Z@Z ,@Z Z @YzYm@Yh@YZ1YV=@Y /X@X7@XBXwoXW_@WbW@V@VV@VvVwVVBU@UUSJosef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Reinhard Max Dominique Leuenberger Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Josef Möllers Thorsten Kukuk Thorsten Kukuk Josef Möllers Tomáš Chvátal Josef Möllers Josef Möllers Josef Möllers Josef Möllers matthias.gerstner@suse.comNavin Kukreja Franck Bui Christophe Giboudeaux kukuk@suse.dekukuk@suse.denavin.kukreja@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.comscabrero@suse.denavin.kukreja@suse.comnavin.kukreja@suse.comsweet_f_a@gmx.debwiedemann@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.comvcizek@suse.commeissner@suse.comrbrown@suse.comvcizek@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.comvcizek@suse.comtchvatal@suse.commpluskal@suse.commeissner@suse.comjcnengel@gmail.commeissner@suse.comdimstar@opensuse.orgsflees@suse.dedimstar@opensuse.orgkukuk@suse.dekukuk@suse.comnavin.kukreja@suse.comsflees@suse.depsimons@suse.compsimons@suse.commax@suse.comlnussel@suse.demax@suse.combwiedemann@suse.comcrrodriguez@opensuse.orgmax@suse.commax@suse.comjengelh@inai.demeissner@suse.comlmuelle@suse.comlmuelle@suse.comhguo@suse.comlmuelle@suse.comlmuelle@suse.comhguo@suse.comdvaleev@suse.comjengelh@inai.dejengelh@inai.delmuelle@suse.comjengelh@inai.deLed lmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comdimstar@opensuse.org- Fixed CVE-2021-25219: The lame-ttl option controls how long named caches certain types of broken responses from authoritative servers (see the security advisory for details). This caching mechanism could be abused by an attacker to significantly degrade resolver performance. The vulnerability has been mitigated by changing the default value of lame-ttl to 0 and overriding any explicitly set value with 0, effectively disabling this mechanism altogether. ISC's testing has determined that doing that has a negligible impact on resolver performance while also preventing abuse. Administrators may observe more traffic towards servers issuing certain types of broken responses than in previous BIND 9 releases. [bsc#1192146, CVE-2021-25219, bind-CVE-2021-25219.patch]- Fix off-by-one error when calculating new hashtable size When calculating the new hashtable bitsize, there was an off-by-one error that would allow the new bitsize to be larger than maximum allowed causing assertion failure in the rehash() function. [bsc#1188763, 0001-Fix-off-by-one-error-when-calculating-new-hashtable.patch]- Since BIND 9.9, it has been easier to use tsig-keygen and ddns-confgen to generare TSIG keys. In 9.13, TSIG support was removed from dnssec-keygen, so now it is just for DNSKEY (and KEY for obscure cases). tsig-keygen is now used to generate DDNS keys. [bsc#1187921, vendor-files.tar.bz2]- * A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly [CVE-2021-25214, bind-CVE-2021-25214.patch] * An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself [CVE-2021-25215, bind-CVE-2021-25215.patch] * A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack This does not affect this package as the affected code is disabled. [CVE-2021-25216] [bsc#1185345]- pass PIE compiler and linker flags via environment variables to make /usr/bin/delv in bind-tools also position independent (bsc#1183453). - drop pie_compile.diff: no longer needed, this patch is difficult to maintain, the environment variable approach is less error prone. [bsc#1183453, bind.spec, pie_compile.diff]- dnssec-keygen can no longer generate HMAC keys. Use tsig-keygen instead. modified genDDNSkey script to reflect this. [vendor-files/tools/bind.genDDNSkey, bsc#1180933]- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack [bsc#1182246, CVE-2020-8625, bind-CVE-2020-8625.patch]- Added special make instruction for the "Administrator Reference Manual" which is built using python3-Sphinx [bsc#1177983, bind.spec]- Add /usr/lib64/named to the files and directories in bind-chrootenv.conf. This directory contains plugins loaded after the chroot(). - Replaced named's dependency on time-sync with a dependency on time-set in named.service. The former leads to a dependency-loop. - Removed "dnssec-enable" from named.conf as it has been obsoleted. Added a comment for reference which should be removed in the future. - Added a comment to the "dnssec-validation" in named.conf with a reference to forwarders which do not return signed responses. - Replaced an INSIST macro which calls abort with a test and a diagnostic output. [bsc#1177913,bsc#1178078,bsc#1177790,bsc#1177603,bsc#1175894, bsc#1177915, bind-Print-diagnostics-on-dns_name_issubdomain-failure-in.patch, bind-chrootenv.conf,vendor-files.tar.bz2]- Removed "-r /dev/urandom" from all invocations of rndc-confgen (init/named system/lwresd.init system/named.init in vendor-files) as this option is deprecated and causes rndc-confgen to fail. [bsc#1173311, bsc#1176674, bsc#1170713, vendor-files.tar.bz2]- /usr/bin/genDDNSkey: Removing the use of the -r option in the call of /usr/sbin/dnssec-keygen as BIND now uses the random number functions provided by the crypto library (i.e., OpenSSL or a PKCS#11 provider) as a source of randomness rather than /dev/random. Therefore the -r command line option no longer has any effect on dnssec-keygen. Leaving the option in genDDNSkey as to not break compatibility. Patch provided by Stefan Eisenwiener. [bsc#1171313, vendor-files.tar.bz2]- Put libns into a separate subpackage to avoid file conflicts in the libisc subpackage due to different sonums (bsc#1176092).- Require /sbin/start_daemon: both init scripts, the one used in systemd context as well as legacy sysv, make use of start_daemon.- Upgrade to version 9.16.6 Fixes five vilnerabilities: 5481. [security] "update-policy" rules of type "subdomain" were incorrectly treated as "zonesub" rules, which allowed keys used in "subdomain" rules to update names outside of the specified subdomains. The problem was fixed by making sure "subdomain" rules are again processed as described in the ARM. (CVE-2020-8624) [GL #2055] 5480. [security] When BIND 9 was compiled with native PKCS#11 support, it was possible to trigger an assertion failure in code determining the number of bits in the PKCS#11 RSA public key with a specially crafted packet. (CVE-2020-8623) [GL #2037] 5479. [security] named could crash in certain query resolution scenarios where QNAME minimization and forwarding were both enabled. (CVE-2020-8621) [GL #1997] 5478. [security] It was possible to trigger an assertion failure by sending a specially crafted large TCP DNS message. (CVE-2020-8620) [GL #1996] 5476. [security] It was possible to trigger an assertion failure when verifying the response to a TSIG-signed request. (CVE-2020-8622) [GL #2028] For the less severe bugs fixed, see the CHANGES file. [bsc#1175443, CVE-2020-8624, CVE-2020-8623, CVE-2020-8621, CVE-2020-8620, CVE-2020-8622]- Added "/etc/bind.keys" to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file. [vendor-files.tar.bz2, bsc#1173983]- Upgrade to version bind-9.16.5 * The "primary" and "secondary" keywords, when used as parameters for "check-names", were not processed correctly and were being ignored. * 'rndc dnstap -roll ' did not limit the number of saved files to . * Add 'rndc dnssec -status' command. * Addressed a couple of situations where named could crash For the full list, see the CHANGES file in the source RPM.- Changed /var/lib/named to owner root:named and perms rwxrwxr-t so that named, being a/the only member of the "named" group has full r/w access yet cannot change directories owned by root in the case of a compromized named. [bsc#1173307, bind-chrootenv.conf]- Upgrade to version bind-9.16.4 Fixing two security problems: * It was possible to trigger an INSIST when determining whether a record would fit into a TCP message buffer. (CVE-2020-8618) * It was possible to trigger an INSIST in lib/dns/rbtdb.c:new_reference() with a particular zone content and query patterns. (CVE-2020-8619) Also the following functional changes: * Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE. * The default value of "max-stale-ttl" has been changed from 1 week to 12 hours. * Zone timers are now exported via statistics channel. Thanks to Paul Frieden, Verizon Media. Added support for idn2 to spec file (Thanks to Holger Bruenjes ). More internal changes see the CHANGES file in the source RPM This update obsoletes Makefile.in.diff [bsc#1172958, CVE-2020-8618, CVE-2020-8619, Makefile.in.diff bind.spec]- Upgrade to version bind-9.16.3 Fixing two security problems: * Further limit the number of queries that can be triggered from a request. Root and TLD servers are no longer exempt from max-recursion-queries. Fetches for missing name server address records are limited to 4 for any domain. (CVE-2020-8616) * Replaying a TSIG BADTIME response as a request could trigger an assertion failure. (CVE-2020-8617) Also * Add engine support to OpenSSL EdDSA implementation. * Add engine support to OpenSSL ECDSA implementation. * Update PKCS#11 EdDSA implementation to PKCS#11 v3.0. * Warn about AXFR streams with inconsistent message IDs. * Make ISC rwlock implementation the default again. For more see CHANGS file in source RPM. [CVE-2020-8616, CVE-2020-8617, bsc#1171740, bind-9.16.3.tar.xz]- bind needs an accurate clock, so wait for the time-sync.target to be reached before starting bind. [bsc#1170667, bsc#1170713, vendor-files.tar.bz2]- Use sysusers.d to create named user - Have only one package creating the user- coreutils are not used in %post, remove Requires. - Use systemd_ordering instead of hard requiring systemd- Upgrade to version 9.16.1 * UDP network ports used for listening can no longer simultaneously be used for sending traffic. * The system-provided POSIX Threads read-write lock implementation is now used by default instead of the native BIND 9 implementation. * Fixed re-signing issues with inline zones which resulted in records being re-signed late or not at all. [bind-9.16.1.tar.xz]- Update download urls - Do not enable geoip on old distros, the geoip db was shut down so we need to use geoip2 everywhere- Upgrade to version 9.16.0 Major upgrade, see https://downloads.isc.org/isc/bind9/9.16.0/RELEASE-NOTES-bind-9.16.0.html and CHANGES file in the source tree. Major functional change: * What was set with --with-tuning=large option in older BIND9 versions is now a default, and a --with-tuning=small option was added for small (e.g. OpenWRT) systems. * A new "dnssec-policy" option has been added to named.conf to implement a key and signing policy (KASP) for zones. * The command (and manpage) bind9-config have been dropped as the BIND 9 libraries are now purely internal. No patches became obsolete through the upgrade. [bind-9.16.0.tar.xz]- Upgrade to bind-9.14.9 bug fixes and feature improvements- Upgrade to version 9.14.8: * Set a limit on the number of concurrently served pipelined TCP queries. * Some other bug fixing, see CHANGES file. [CVE-2019-6477, bsc#1157051]- Upgrade to version 9.14.7 * removed dnsperf, idn, nslint, perftcpdns, query-loc-0.4.0, queryperf, sdb, zkt from contrib as they are not supported any more * Added support for the GeoIP2 API from MaxMind * See CHANGES file in the source RPM. * obsoletes bind-CVE-2018-5745.patch (bsc#1126068) * obsoletes bind-CVE-2019-6465.patch (bsc#1126069) * obsoletes bind-CVE-2018-5743.patch (bsc#1133185) * obsoletes bind-CVE-2019-6471.patch (bsc#1138687) [bsc#1111722, bsc#1156205, bsc#1126068, bsc#1126069, bsc#1133185, bsc#1138687, CVE-2019-6476, CVE-2019-6475, CVE-2019-6471, CVE-2018-5743, CVE-2019-6467, CVE-2019-6465, CVE-2018-5745, CVE-2018-5744, CVE-2018-5740, CVE-2018-5738, CVE-2018-5737, CVE-2018-5736, CVE-2017-3145, CVE-2017-3136, configure.in.diff, bind-99-libidn.patch, perl-path.diff, bind-sdb-ldap.patch, bind-CVE-2017-3145.patch, bug-4697-Restore-workaro]und-for-Microsoft-Windows-T.patch, bind-fix-fips.patch, bind-CVE-2018-5745.patch, bind-CVE-2019-6465.patch, bind-CVE-2018-5743.patch, bind-CVE-2019-6471.patch, CVE-2016-6170, bsc#1018700, bsc#1018701, bsc#1018702, bsc#1033466, bsc#1033467, bsc#1033468, bsc#1040039, bsc#1047184, bsc#1104129, bsc#906079, bsc#918330, bsc#936476, bsc#937028, bsc#939567, bsc#977657, bsc#983505, bsc#987866, bsc#989528, fate#320694, fate#324357, bnc#1127583, bnc#1127583, bnc#1109160]- removal of SuSEfirewall2 service from Factory, since SuSEfirewall2 has been replaced by firewalld, see [1]. [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html- Add FIPS patch back into bind (bsc#1128220) - File: bind-fix-fips.patch- Don't rely on /etc/insserv.conf anymore for proper dependencies against nss-lookup.target in named.service and lwresd.service (bsc#1118367 bsc#1118368)- Update named.root. One of the root servers IP has changed. - Install the LICENSE file.- Add bind.conf and bind-chrootenv.conf to install the default files in /var/lib/named and create chroot environment on systems using transactional-updates [bsc#1100369] [FATE#325524].- Cleanup pre/post install: remove all old code which was needed to update to SLES8.- Fix a patch error in dnszone-schema file (bsc#901577)- Add SPF records in dnszone-schema file (bsc#901577)- Fix the hostname in ldapdump to be valid (bsc#965748) - Patch file - bind-ldapdump-use-valid-host.patch- Add bug-4697-Restore-workaround-for-Microsoft-Windows-T.patch Fixes dynamic DNS updates against samba and Microsoft DNS servers (bsc#1094236).- Move chroot related files from bind to bind-chrootenv (bsc#1093338)- Remove rndc.key generation from bind.spec file because bind should create it on first boot (bsc#1092283) - Add misisng rndc.key check and generation code is lwresd.init script- build with --enable-filter-aaaa to make it possible to use config option "filter-aaaa-on-v4 yes". Useful to workaround broken websites like netflix which block traffic from certain IPv6 tunnel providers. (bsc#1069633)- Add /dev/urandom to chroot env- Implement systemd init scripts for bind and lwresd (fate#323155)- Apply bind-CVE-2017-3145.patch to fix CVE-2017-3145 (bsc#1076118)- Use getent when adding user/group - update changelog to mention removed options- license changed to MPL-2.0 according to legal.- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Add back init scripts, systemd units aren't ready yet- Add python3-bind subpackage to allow python bind interactions- Sync configure options with RH package and remove unused ones * Enable python3 * Enable gssapi * Enable dnssec scripts * Remove no longer recognized --enable-rrl- Drop idnkit from the build, the bind uses libidn since 2007 to run all the resolutions in dig/etc. bsc#1030306 - Add patch to make sure we build against system idn: * bind-99-libidn.patch - Refresh patch: * pie_compile.diff - Remove patches that are unused due to above: * idnkit-powerpc-ltconfig.patch * runidn.diff- drop bind-openssl11.patch (merged upstream)- Remove systemd conditionals as we are not building on sle11 anyway - Force the systemd to be base for the initscript deployment- Bump up version of most of the libraries - Rename the subpackages to match the version updates - Add macros for easier handling of the library package names - Drop more unneeded patches * dns_dynamic_db.patch (upstream)- Update to 9.11.2 release: * Many changes compared to 9.10 see the README file for in-depth listing * For detailed changes with issues see CHANGES file * Fixes for CVE-2017-3141 CVE-2017-3140 CVE-2017-3138 CVE-2017-3137 CVE-3136 CVE-2016-9778 * OpenSSL 1.1 support - Remove support for some old distributions and cleanup the spec file to require only what is really needed - Switch to systemd (bsc#1053808) - Remove german from the postinst messages - Remove patches merged upstream: * bind-CVE-2017-3135.patch * bind-CVE-2017-3142-and-3143.patch - Refresh named.root with another update- Use python3 by default (fate#323526)- bind-openssl11.patch: add a patch for enabling openssl 1.1 support (builds for 1.0 and 1.1 openssl). (bsc#1042635)- Enable JSON statistics- named.root: refreshed from internic to 2017060102 (bsc#1048729)- Run systemctl daemon-reload even when this is not build with systemd support: if installing bind on a systemd service and not reloading systemd daemon, then the service 'named' is not known right after package installation, causing confusion.- Added bind-CVE-2017-3142-and-3143.patch to fix a security issue where an attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]- Fix named init script to dynamically find the location of the openssl engines (boo#1040027).- Add with_systemd define with default off, since we still use init scripts and no systemd units.- Don't require and call insserv if we use systemd- Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ * CVE-2017-3135, bsc#1024130 * bind-CVE-2017-3135.patch- Update to latest release in the 9.10.X series * Security fixes in 9.10.4 * Duplicate EDNS COOKIE options in a response could trigger an assertion failure. CVE-2016-2088. [RT #41809] * The resolver could abort with an assertion failure due to improper DNAME handling when parsing fetch reply messages. CVE-2016-1286. [RT #41753] * Malformed control messages can trigger assertions in named and rndc. CVE-2016-1285. [RT #41666] * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure. CVE-2015-8705. [RT #41397] * Specific APL data could trigger an INSIST. CVE-2015-8704. [RT #41396] * Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing a lookup. CVE-2015-8461. [RT#40945] * Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. CVE-2015-8000. [RT #40987] * For Features and other fixes in 9.10.4 see https://kb.isc.org/article/AA-01380/0/BIND-9.10.4-Release-Notes.html * Description of patch changes * BIND 9.10.4-P5 addresses the security issues described in CVE-2016-9131, CVE-2016-9147 and CVE-2016-9444. [bsc#1018699] * BIND 9.10.4-P4 addresses the security issue described in CVE-2016-8864. * BIND 9.10.4-P3 addresses the security issue described in CVE-2016-2776 and addresses an interoperability issue with ECS clients. * BIND 9.10.4-P2 addresses the security issue described in CVE-2016-2775. * BIND 9.10.4-P1 addresses Windows installation issues, the %z modifier is not supported under Windows and a race condition in the rbt/rbtdb implementation resulting in named exiting due to assertion failures being detected. * Following patches removed, fixed upstream * cve-2016-2776.patch * cve-2016-8864.patch- Apply cve-2016-8864.patch to fix CVE-2016-8864 (bsc#1007829).- Apply cve-2016-2776.patch to fix CVE-2016-2776 (bsc#1000362).- Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483, bsc#963971). - Make /var/lib/named owned by the named user (bsc#908850, bsc#875691). - Call systemd service macros with the full service name.- remove BuildRequire libcap. That is only a legacy library, not actually used for building. libcap-devel pulls in the right one.- Security update 9.10.3-P4: * CVE-2016-1285, bsc#970072: assert failure on input parsing can cause premature exit. * CVE-2016-1286, bsc#970073: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. * CVE-2016-2088, bsc#970074: a deliberately misconstructed packet containing multiple cookie options to cause named to terminate with an assertion failure.- drop a changing timestamp making build reproducible- Build with --with-randomdev=/dev/urandom otherwise libisc will use /dev/random to gather entropy and that might block, short read etc..- Security update 9.10.3-P3: * Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189). * Certain errors that could be encountered when printing out or logging an OPT record containing a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure (CVE-2015-8705, bsc#962190). * Authoritative servers that were marked as bogus (e.g. blackholed in configuration or with invalid addresses) were being queried anyway.- Update to version 9.10.3-P2 to fix a remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861).- Avoid double %setup, it confuses some versions of quilt. - Summary/description update- Update to version 9.10.2-P4 * An incorrect boundary boundary check in the OPENPGPKEY rdatatype could trigger an assertion failure. (CVE-2015-5986) [RT #40286] (bsc#944107) * A buffer accounting error could trigger an assertion failure when parsing certain malformed DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)- Update to version 9.10.2-P3 Security Fixes * A specially crafted query could trigger an assertion failure in message.c. This flaw was discovered by Jonathan Foote, and is disclosed in CVE-2015-5477. [RT #39795] * On servers configured to perform DNSSEC validation, an assertion failure could be triggered on answers from a specially configured server. This flaw was discovered by Breno Silveira Soares, and is disclosed in CVE-2015-4620. [RT #39795] Bug Fixes * Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] * Several bugs have been fixed in the RPZ implementation: + Policy zones that did not specifically require recursion could be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. This has been corrected. In most configurations, behavioral changes due to this fix will not be noticeable. [RT #39229] + The server could crash if policy zones were updated (e.g. via rndc reload or an incoming zone transfer) while RPZ processing was still ongoing for an active query. [RT #39415] + On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] + The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] + The server could crash if a reload of an RPZ zone was initiated while another reload of the same zone was already in progress. [RT #39649]- Update to version 9.10.2-P2 - An uninitialized value in validator.c could result in an assertion failure. (CVE-2015-4620) [RT #39795] - Update to version 9.10.2-P1 - Include client-ip rules when logging the number of RPZ rules of each type. [RT #39670] - Addressed further problems with reloading RPZ zones. [RT #39649] - Addressed a regression introduced in change #4121. [RT #39611] - The server could match a shorter prefix than what was available in CLIENT-IP policy triggers, and so, an unexpected action could be taken. This has been corrected. [RT #39481] - On servers with one or more policy zones configured as slaves, if a policy zone updated during regular operation (rather than at startup) using a full zone reload, such as via AXFR, a bug could allow the RPZ summary data to fall out of sync, potentially leading to an assertion failure in rpz.c when further incremental updates were made to the zone, such as via IXFR. [RT #39567] - A bug in RPZ could cause the server to crash if policy zones were updated while recursion was pending for RPZ processing of an active query. [RT #39415] - Fix a bug in RPZ that could cause some policy zones that did not specifically require recursion to be treated as if they did; consequently, setting qname-wait-recurse no; was sometimes ineffective. [RT #39229] - Asynchronous zone loads were not handled correctly when the zone load was already in progress; this could trigger a crash in zt.c. [RT #37573] - Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn't result in a bug during operation. If the read failed, named could segfault. [RT #38559]- Fix inappropriate use of /var/lib/named for locating dynamic-DB plugins. Dynamic-DB plugins are now loaded from %{_libexecdir}/bind, consistent with openSUSE packaging guideline. - Install additional header files which are helpful to the development of dynamic-DB plugins.- Depend on systemd macros and sysvinit on post-12.3 only. - Create empty lwresd.conf at build time. - Reduce file list pre-13.1.- Update to version 9.10.2 - Handle timeout in legacy system test. [RT #38573] - dns_rdata_freestruct could be called on a uninitialised structure when handling a error. [RT #38568] - Addressed valgrind warnings. [RT #38549] - UDP dispatches could use the wrong pseudorandom number generator context. [RT #38578] - Fixed several small bugs in automatic trust anchor management, including a memory leak and a possible loss of key state information. [RT #38458] - 'dnssec-dsfromkey -T 0' failed to add ttl field. [RT #38565] - Revoking a managed trust anchor and supplying an untrusted replacement could cause named to crash with an assertion failure. (CVE-2015-1349) [RT #38344] - Fix a leak of query fetchlock. [RT #38454] - Fix a leak of pthread_mutexattr_t. [RT #38454] - RPZ could send spurious SERVFAILs in response to duplicate queries. [RT #38510] - CDS and CDNSKEY had the wrong attributes. [RT #38491] - adb hash table was not being grown. [RT #38470] - Update bind.keyring - Update baselibs.conf due to updates to libdns160 and libisc148- Enable export libraries to support plugin development. Install DNSSEC root key. Expose new interface for developing dynamic zone database. + dns_dynamic_db.patch- PowerPC can build shared libraries for sure. idnkit-powerpc-ltconfig.patch- Explicitly BuildRequire systemd-rpm-macros since it is used for lwresd %post etc. Then drop pre-12.x material. Remove configure.in.diff2.- Corrections to baselibs.conf- Update to version 9.10.1-P1 - A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500); (bnc#908994). The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. [RT #37580] - When geoip-directory was reconfigured during named run-time, the previously loaded GeoIP data could remain, potentially causing wrong ACLs to be used or wrong results to be served based on geolocation (CVE-2014-8680). [RT #37720]; (bnc#908995). - Lookups in GeoIP databases that were not loaded could cause an assertion failure (CVE-2014-8680). [RT #37679]; (bnc#908995). - The caching of GeoIP lookups did not always handle address families correctly, potentially resulting in an assertion failure (CVE-2014-8680). [RT #37672]; (bnc#908995).- Convert some hard PreReq to leaner Requires(pre). - Typographical and orthographic fixes to description texts.- Fix bashisms in the createNamedConfInclude script. - Post scripts: remove '-e' option of 'echo' that may be unsupported in some POSIX-compliant shells.- Add openssl engines to the lwresd chroot. - Add /etc/lwresd.conf with attribute ghost to the list of files. - Add /run/lwresd to the list of files of the lwresd package. - Shift /run/named from the chroot sub to the main bind package. - Drop /proc from the chroot as multi CPU systems work fine even without it.- Add a versioned dependency when obsoleting packages.- Remove superfluous obsoletes *-64bit in the ifarch ppc64 case; (bnc#437293).- Fix gssapi_krb configure time header detection.- Update root zone (dated Nov 5, 2014).- Update to version 9.10.1 - This release addresses the security flaws described in CVE-2014-3214 and CVE-2014-3859. - Update to version 9.10.0 - DNS Response-rate limiting (DNS RRL), which blunts the impact of reflection and amplification attacks, is always compiled in and no longer requires a compile-time option to enable it. - An experimental "Source Identity Token" (SIT) EDNS option is now available. - A new zone file format, "map", stores zone data in a format that can be mapped directly into memory, allowing significantly faster zone loading. - "delv" (domain entity lookup and validation) is a new tool with dig-like semantics for looking up DNS data and performing internal DNSSEC validation. - Improved EDNS(0) processing for better resolver performance and reliability over slow or lossy connections. - Substantial improvement in response-policy zone (RPZ) performance. Up to 32 response-policy zones can be configured with minimal performance loss. - To improve recursive resolver performance, cache records which are still being requested by clients can now be automatically refreshed from the authoritative server before they expire, reducing or eliminating the time window in which no answer is available in the cache. - New "rpz-client-ip" triggers and drop policies allowing response policies based on the IP address of the client. - ACLs can now be specified based on geographic location using the MaxMind GeoIP databases. Use "configure --with-geoip" to enable. - Zone data can now be shared between views, allowing multiple views to serve the same zones authoritatively without storing multiple copies in memory. - New XML schema (version 3) for the statistics channel includes many new statistics and uses a flattened XML tree for faster parsing. The older schema is now deprecated. - A new stylesheet, based on the Google Charts API, displays XML statistics in charts and graphs on javascript-enabled browsers. - The statistics channel can now provide data in JSON format as well as XML. - New stats counters track TCP and UDP queries received per zone, and EDNS options received in total. - The internal and export versions of the BIND libraries (libisc, libdns, etc) have been unified so that external library clients can use the same libraries as BIND itself. - A new compile-time option, "configure --enable-native-pkcs11", allows BIND 9 cryptography functions to use the PKCS#11 API natively, so that BIND can drive a cryptographic hardware service module (HSM) directly instead of using a modified OpenSSL as an intermediary. - The new "max-zone-ttl" option enforces maximum TTLs for zones. This can simplify the process of rolling DNSSEC keys by guaranteeing that cached signatures will have expired within the specified amount of time. - "dig +subnet" sends an EDNS CLIENT-SUBNET option when querying. - "dig +expire" sends an EDNS EXPIRE option when querying. - New "dnssec-coverage" tool to check DNSSEC key coverage for a zone and report if a lapse in signing coverage has been inadvertently scheduled. - Signing algorithm flexibility and other improvements for the "rndc" control channel. - "named-checkzone" and "named-compilezone" can now read journal files, allowing them to process dynamic zones. - Multiple DLZ databases can now be configured. Individual zones can be configured to be served from a specific DLZ database. DLZ databases now serve zones of type "master" and "redirect". - "rndc zonestatus" reports information about a specified zone. - "named" now listens on IPv6 as well as IPv4 interfaces by default. - "named" now preserves the capitalization of names when responding to queries. - new "dnssec-importkey" command allows the use of offline DNSSEC keys with automatic DNSKEY management. - New "named-rrchecker" tool to verify the syntactic correctness of individual resource records. - When re-signing a zone, the new "dnssec-signzone -Q" option drops signatures from keys that are still published but are no longer active. - "named-checkconf -px" will print the contents of configuration files with the shared secrets obscured, making it easier to share configuration (e.g. when submitting a bug report) without revealing private information. - "rndc scan" causes named to re-scan network interfaces for changes in local addresses. - On operating systems with support for routing sockets, network interfaces are re-scanned automatically whenever they change. - "tsig-keygen" is now available as an alternate command name to use for "ddns-confgen". - Update to version 9.9.6 New Features - Support for CAA record types, as described in RFC 6844 "DNS Certification Authority Authorization (CAA) Resource Record", was added. [RT#36625] [RT #36737] - Disallow "request-ixfr" from being specified in zone statements where it is not valid (it is only valid for slave and redirect zones) [RT #36608] - Support for CDS and CDNSKEY resource record types was added. For details see the proposed Informational Internet-Draft "Automating DNSSEC Delegation Trust Maintenance" at http://tools.ietf.org/html/draft-ietf-dnsop-delegation-trust-maintainance-14. [RT #36333] - Added version printing options to various BIND utilities. [RT #26057] [RT #10686] - Added a "no-case-compress" ACL, which causes named to use case-insensitive compression (disabling change #3645) for specified clients. (This is useful when dealing with broken client implementations that use case-sensitive name comparisons, rejecting responses that fail to match the capitalization of the query that was sent.) [RT #35300] Feature Changes - Adds RPZ SOA to the additional section of responses to clearly indicate the use of RPZ in a manner that is intended to avoid causing issues for downstream resolvers and forwarders [RT #36507] - rndc now gives distinct error messages when an unqualified zone name matches multiple views vs. matching no views [RT #36691] - Improves the accuracy of dig's reported round trip times. [RT #36611] - When an SPF record exists in a zone but no equivalent TXT record does, a warning will be issued. The warning for the reverse condition is no longer issued. See the check-spf option in the documentation for details. [RT #36210] - "named" will now log explicitly when using rndc.key to configure command channel. [RT #35316] - The default setting for the -U option (setting the number of UDP listeners per interface) has been adjusted to improve performance. [RT #35417] - Aging of smoothed round-trip time measurements is now limited to no more than once per second, to improve accuracy in selecting the best name server. [RT #32909] - DNSSEC keys that have been marked active but have no publication date are no longer presumed to be publishable. [RT #35063] Bug Fixes - The Makefile in bin/python was changed to work around a bmake bug in FreeBSD 10 and NetBSD 6. [RT #36993] (**) - Corrected bugs in the handling of wildcard records by the DNSSEC validator: invalid wildcard expansions could be treated as valid if signed, and valid wildcard expansions in NSEC3 opt-out ranges had the AD bit set incorrectly in responses. [RT #37093] [RT #37072] - When resigning, dnssec-signzone was removing all signatures from delegation nodes. It now retains DS and (if applicable) NSEC signatures. [RT #36946] - The AD flag was being set inappopriately on RPZ responses. [RT #36833] - Updates the URI record type to current draft standard, draft-faltstrom-uri-08, and allows the value field to be zero length [RT #36642] [RT #36737] - RRSIG sets that were not loaded in a single transaction at start up were not being correctly added to re-signing heaps. [RT #36302] - Setting '-t aaaa' in .digrc had unintended side-effects. [RT #36452] - A race condition could cause a crash in isc_event_free during shutdown. [RT #36720] - Addresses a race condition issue in dispatch. [RT #36731] - acl elements could be miscounted, causing a crash while loading a config [RT #36675] - Corrects a deadlock between view.c and adb.c. [RT #36341] - liblwres wasn't properly handling link-local addresses in nameserver clauses in resolv.conf. [RT #36039] - Buffers in isc_print_vsnprintf were not properly initialized leading to potential overflows when printing out quad values. [RT #36505] - Don't call qsort() with a null pointer, and disable the GCC 4.9 "delete null pointer check" optimizer option. This fixes problems when using GNU GCC 4.9.0 where its compiler code optimizations may cause crashes in BIND. For more information, see the operational advisory at https://kb.isc.org/article/AA-01167/. [RT #35968] - Fixed a bug that could cause repeated resigning of records in dynamically signed zones. [RT #35273] - Fixed a bug that could cause an assertion failure after forwarding was disabled. [RT #35979] - Fixed a bug that caused SERVFAILs when using RPZ on a system configured as a forwarder. [RT #36060] - Worked around a limitation in Solaris's /dev/poll implementation that could cause named to fail to start when configured to use more sockets than the system could accomodate. [RT #35878] - Remove merged rpz2+rl-9.9.5.patch and obsoleted rpz2+rl-9.9.5.patch - Removed pid-path.diff patch as /run/{named,lwresd}/ are used by default. - Update baselibs.conf (added libirs and library interface version updates).- No longer perform gpg validation; osc source_validator does it implicit: + Drop gpg-offline BuildRequires. + No longer execute gpg_verify.bind8-develbind9-develobs-arm-11 1637680495  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~     9.16.6-lp152.14.25.19.16.6-lp152.14.25.19.16.69.16.6   bindbind9check.hgetaddresses.hversion.hdnsacl.hadb.hbadcache.hbit.hbyaddr.hcache.hcallbacks.hcatz.hcert.hclient.hclientinfo.hcompress.hdb.hdbiterator.hdbtable.hdiff.hdispatch.hdlz.hdlz_dlopen.hdns64.hdnsrps.hdnssec.hdnstap.hds.hdsdigest.hdyndb.hecdb.hecs.hedns.henumclass.henumtype.hevents.hfixedname.hforward.hgeoip.hipkeylist.hiptable.hjournal.hkasp.hkeydata.hkeyflags.hkeymgr.hkeytable.hkeyvalues.hlib.hlibrpz.hlmdb.hlog.hlookup.hmaster.hmasterdump.hmessage.hname.hncache.hnsec.hnsec3.hnta.hopcode.horder.hpeer.hportlist.hprivate.hrbt.hrcode.hrdata.hrdataclass.hrdatalist.hrdataset.hrdatasetiter.hrdataslab.hrdatastruct.hrdatatype.hrequest.hresolver.hresult.hrootns.hrpz.hrriterator.hrrl.hsdb.hsdlz.hsecalg.hsecproto.hsoa.hssu.hstats.htcpmsg.htime.htimer.htkey.htsec.htsig.httl.htypes.hupdate.hvalidator.hversion.hview.hxfrin.hzone.hzonekey.hzoneverify.hzt.hdstdst.hgssapi.hresult.hirscontext.hdnsconf.hnetdb.hplatform.hresconf.htypes.hversion.hiscaes.halign.happ.hassertions.hastack.hatomic.hbacktrace.hbase32.hbase64.hbind9.hbuffer.hbufferlist.hcommandline.hcondition.hcounter.hcrc64.hdeprecated.hdir.hendian.herrno.herror.hevent.heventclass.hfile.hformatcheck.hfsaccess.hfuzz.hhash.hheap.hhex.hhmac.hhp.hht.hhttpd.hinterfaceiter.hiterated_hash.hlang.hlex.hlfsr.hlib.hlikely.hlist.hlog.hmagic.hmd.hmem.hmeminfo.hmutex.hmutexatomic.hmutexblock.hnet.hnetaddr.hnetdb.hnetmgr.hnetscope.hnonce.hoffset.honce.hos.hparseint.hplatform.hpool.hportset.hprint.hqueue.hquota.hradix.hrandom.hratelimiter.hrefcount.hregex.hregion.hresource.hresult.hresultclass.hrwlock.hsafe.hserial.hsiphash.hsockaddr.hsocket.hstat.hstats.hstdatomic.hstdio.hstdtime.hstrerr.hstring.hsymtab.hsyslog.htask.htaskpool.hthread.htime.htimer.htm.htypes.hutf8.hutil.hversion.hiscccalist.hbase64.hcc.hccmsg.hevents.hresult.hsexpr.hsymtab.hsymtype.htypes.hutil.hversion.hisccfgaclconf.hcfg.hdnsconf.hgrammar.hkaspconf.hlog.hnamedconf.hversion.hnsclient.hhooks.hinterfacemgr.hlib.hlistenlist.hlog.hnotify.hquery.hserver.hsortlist.hstats.htypes.hupdate.hversion.hxfrout.hpk11constants.hinternal.hpk11.hresult.hsite.hpkcs11pkcs11.hiscerrno2result.hlibbind9.solibdns.solibisc.solibisccc.solibisccfg.solibns.so/usr/include//usr/include/bind//usr/include/bind/bind9//usr/include/bind/dns//usr/include/bind/dst//usr/include/bind/irs//usr/include/bind/isc//usr/include/bind/isccc//usr/include/bind/isccfg//usr/include/bind/ns//usr/include/bind/pk11//usr/include/bind/pkcs11//usr/include/isc//usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:17187/openSUSE_Leap_15.2_Update_ports/ffe1201b28304f0fc537b9c03d57c1d5-bind.openSUSE_Leap_15.2_Updatedrpmxz5aarch64-suse-linuxdirectoryC source, ASCII textLaTeX document, ASCII textAcG]5c}utf-85eb0464713036d054fc2af5c4cb9fde5aae078081a46272519ff6f20f6a60cea? 7zXZ !t/j]"k%,+/j\lX'OF Y, v!e%¯~sJ}8ەZHL$X|#1)JPmbM4"h쟜*<(R}ȼY޸=sO.ڋvSol*?RUT$A[iЯKkt斐A^ Jt2q%3+%O+d*d5CWBޛuFWs?ȣSl c@~W@](m^,:>C%rl% wzSM7_d"r;ofI ~pl DXS}p+3Sy#jTZ-@.:5zI:R7s Q`VLӷ xvPYr6p`[YI43?Ϲ \8pǝxL e|r*MT6%ߏn1:0 8Xs*ARҕyM~[Ѭj`@Qٳqj/X߄h 8EkEkv=+N,L;~ʐ8IՔBܞH0k֖ %*ia1lM@H* W[ۤ§uU YGN'E+QBAo, $R700]ثVHŁﺀvxN5+鮯9(3d8_ QCNa Ky7/y5ťi^[ɤz$Q\tTDodk n.h'H6` ؟ J\v 1u} 9OnkNN'!BCW-tSQm(#ﱇ,|Y|=@XUK*5:ڒȁtkѭR_Yr:c6ݎ;=P0˜yB xcvҰȨEŎp0/2FՃzC˒12iD8Ҝzb<DTeEi*(.f^HRȒ*JB5i#,P:}FИ ZVP,NAAT 脮lxJY4<ET\sfd53l=] wD,O=[jLvl0=d_jXf:Xo<䥈LL+Q\xquJ[71ZYR0 WHVŨ l|ճ&N:b+2SjFjVcH\t ݦA*ZY#Oȯ6/t:>ֲ \o`ك"L| h JRq&"T̼:*:jO&bu!56WLަ3 V+Tqb *UI&ƥи,G󫡜fâpwiˮ[Y?ɦOfhPmj0S3'_S h:5&:PՋ7)/Ұaosp #y;AYUI! !+Ր4Ob[p;(pdѦh$Ze)v 1tf补 #~DRc*Ɂ9"&vjnZ @fuA 9Lq3iq x8rt<>{k0j|QNM[GAGIw%kS3'<(PFE[h4[7 3- (,<@Ci4ۻIڋYIyй5iqfͧeF;LiY[f %$=/ޡE93]ɷQaaȕ&x1mS`n"V":5q?-)V?7)CPR."(t3SW9 kˁdGD^6y3>h5͟Uޫ L\vTB~97s] qwuЊFIZS-toXQMQB2\oSOZ4]V6 )/@*I՜IP^w8׶ YZ