bind-9.9.9P1-56.1<>,X\)θ/=„[a):?TK6qūB_DXiRW?D쪖Xbw3le-}娭9$[.X uc.fba ҽ#!̀#M:&kVa"ʎNdύ|P},jG? C_o?B&C_2Zo=b#@ >4oX G96QەI֭|YԻٔAߛo=L^+}.KT21U=xҪSY>E?d  <TXdh{  ')+,( ,f , -  0 0t012.2H23 ;3;8g;(888a9:La:?a=">*?2@:BBFNGdHI\X|Y֘Z[\]L^bcyde flu(vۤ wxߔy.zCbind9.9.9P156.1Domain Name System (DNS) Server (named)Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server.\)cumulus2 DopenSUSE Leap 42.3openSUSEISChttp://bugs.opensuse.orgProductivity/Networking/DNS/Servershttp://isc.org/sw/bind/linuxx86_64 test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in named.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in named.service ; do # The tag file might have been left by a preceding # update (see bsc#1059627) rm -f "/run/rpm-bind-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-bind-update-$service-new-in-upgrade" fi done for service in named.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi # Are we updating from a package named bind9? if test -d usr/share/doc/packages/bind9 && sbin/chkconfig -c named; then NAMED_ACTIVE_FILE="var/adm/named.was.active" test -f ${NAMED_ACTIVE_FILE} && old ${NAMED_ACTIVE_FILE} ACTIVE_DIR=$( dirname ${NAMED_ACTIVE_FILE}) test -d ${ACTIVE_DIR} || mkdir -p ${ACTIVE_DIR} touch ${NAMED_ACTIVE_FILE} fi /usr/sbin/groupadd -g 44 -o -r named 2> /dev/null || : /usr/sbin/useradd -r -o -g named -u 44 -s /bin/false -c "Name server daemon" -d /var/lib/named named 2> /dev/null || : # Might be an update. /usr/sbin/usermod -s /bin/false -d /var/lib/named named 2>/dev/null || : # var/run/named is now a sym link pointing to the chroot jail test -L var/run/named || rm -rf var/run/named test -f etc/sysconfig/named && \ . etc/sysconfig/named # Store NAMED_RUN_CHROOTED setting to a temp file. TEMP_SYSCONFIG_FILE="var/adm/named-chroot" TEMP_DIR=$( dirname ${TEMP_SYSCONFIG_FILE}) test -d ${TEMP_DIR} || \ mkdir -p ${TEMP_DIR} test -e ${TEMP_SYSCONFIG_FILE} && \ old ${TEMP_SYSCONFIG_FILE} echo "NAMED_RUN_CHROOTED=\"${NAMED_RUN_CHROOTED}\"" >${TEMP_SYSCONFIG_FILE} test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset named.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in named.service ; do if [ ! -e "/run/rpm-bind-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-bind-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in named.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG=$1 FORCE_YES=0 set -- named PNAME=$1 ; shift INSSRV_ARRAY="" while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 shift SV_B='^### BEGIN INIT INFO' SV_E='^### END INIT INFO' SV_KW=Default-Enabled SV_VALUE=`sed -n -e "/$SV_B/,/$SV_E/{/^# [^[:space:]]*$SV_KW:[[:space:]]*\([^[:space:]]*\).*/s//\1/p;}" < /etc/init.d/$SCRIPTNAME` test "$FORCE_YES" = "1" && SV_VALUE="yes" test -n "$SV_VALUE" || SV_VALUE="no" INSSRV_ARRAY="$INSSRV_ARRAY $SCRIPTNAME $SV_VALUE" done set -- $INSSRV_ARRAY while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 SV_VALUE=$2 shift 2 test -n "$SCRIPTNAME" -a -n "$SV_VALUE" || { echo "SCRIPTNAME or SV_VALUE unknown"; exit 1;} if test "$FIRST_ARG" = "1" -a "$SV_VALUE" = "no" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} -r /etc/init.d/$SCRIPTNAME elif test "$FIRST_ARG" = "1" -o "$FORCE_YES" = "1" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} /etc/init.d/$SCRIPTNAME fi done PNAME=named SUBPNAME=-named TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi if [ ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi TEMP_SYSCONFIG_FILE="var/adm/named-chroot" # Are we in update mode? if [ ${FIRST_ARG:-0} -gt 1 ]; then # Is named.conf an old, /var/named configuration? if [ -f etc/named.conf ] && grep -qi '^[[:space:]]*directory[[:space:]]*"/var/named"[[:space:]]*;' etc/named.conf; then test -d var/log || \ mkdir -p var/log CONVLOG="/var/log/named-move-to-var-lib" # move zone files to new location echo "Moving zone files to new location /var/lib/named" | tee ${CONVLOG} IFS=" " for dir in var/named var/named/slave; do for source in $( find ${dir} -maxdepth 1 ); do case "${source#var/named/}" in localhost.zone|127.0.0.zone|root.hint|slave|var/named) continue ;; esac sourcedir=$( echo "${source%/*}") destdir=$( echo "${sourcedir#var/named}") if [ -e "var/lib/named/${destdir}/${source##*/}" ]; then echo "Warning: /var/lib/named${destdir}/${source##*/} already exists; skipped." | tee -a ${CONVLOG} else echo "${source#var/named/}" | tee -a ${CONVLOG} mv "${source}" "var/lib/named/${destdir}" fi done done # updating named.conf echo -n "Backup old /etc/named.conf to " | tee -a ${CONVLOG} oldconfig=$( old etc/named.conf) 2>/dev/null oldconfig=${oldconfig##*/} echo -en "/etc/${oldconfig}. Conversion " | tee -a ${CONVLOG} sed -e "s@\"/var/named\"@\"/var/lib/named\"@" "etc/${oldconfig}" > etc/named.conf 2>/dev/null conv_rc=$? if [ ${conv_rc} -eq 0 ]; then echo "succeded." | tee -a ${CONVLOG} chmod --reference="etc/${oldconfig}" etc/named.conf chown --reference="etc/${oldconfig}" etc/named.conf else echo "failed." | tee -a ${CONVLOG} fi if [ ${conv_rc} -eq 0 ]; then cat << EOF >>${CONVLOG} Result: named.conf conversion succeded. For details check the following diff of the the old and new configuration. Ergebnis: Die named.conf-Konvertierung war erfolgreich. Details finden Sie in der nachfolgenden Differenz der alten und neuen Konfiguration. EOF diff -u etc/${oldconfig} etc/named.conf >>${CONVLOG} else cat << EOF >>${CONVLOG} Result: Conversion failed. You must check your /etc/named.conf Ergebnis: Die Konvertierung ist fehlgeschlagen. Sie müssen Ihre /etc/named.conf überprüfen. EOF fi else rm -f var/lib/update-messages/bind.1 fi # End of 'Is named.conf an old, /var/named configuration?'. # Add include files to NAMED_CONF_INCLUDE_FILES if we have already a include # file (SL Standard Server 8) and NAMED_RUN_CHROOTED from the # TEMP_SYSCONFIG_FILE is empty. if [ -f ${TEMP_SYSCONFIG_FILE} ]; then . ${TEMP_SYSCONFIG_FILE} fi if [ -s etc/named.conf.include -a -z "${NAMED_RUN_CHROOTED}" ]; then test -f etc/sysconfig/named && . etc/sysconfig/named if [ "${NAMED_INITIALIZE_SCRIPTS}" = "createNamedConfInclude" -a \ -z "${NAMED_CONF_INCLUDE_FILES}" ]; then # Get the included files from an existing meta include file. INCLUDE_LINES=$( grep -e '^[[:space:]]*include' etc/named.conf.include | cut -f 2 -d '"') if [ "${INCLUDE_LINES}" -a -z "${NAMED_CONF_INCLUDE_FILES}" ]; then for file in ${INCLUDE_LINES}; do # don't add a file a second time echo "${INCLUDE_FILES}" | grep -qe "\<${file#/etc/named.d/}\>" && continue # don't add the meta include file as the init script copy it anyway # to the chroot jail test "${file}" = "/etc/named.conf.include" && continue test "${INCLUDE_FILES}" && INCLUDE_FILES="${INCLUDE_FILES} " # strip off any leading /etc/named.d/ as the init script takes care # of relative file names INCLUDE_FILES="${INCLUDE_FILES}${file#/etc/named.d/}" done TMPFILE=$( mktemp /var/tmp/named.sysconfig.XXXXXX) if [ $? -ne 0 ]; then echo -e "Can't create temp file. Please add your included files from /etc/named.conf to\nNAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named manually." return fi chmod --reference=etc/sysconfig/named ${TMPFILE} if sed "s+^NAMED_CONF_INCLUDE_FILES.*$+NAMED_CONF_INCLUDE_FILES=\"${INCLUDE_FILES}\"+" etc/sysconfig/named > "${TMPFILE}"; then mv "${TMPFILE}" etc/sysconfig/named else echo "Can't set NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named to \"${INCLUDE_FILES}\"." fi fi fi else rm -f touch var/lib/update-messages/bind.3 fi # End of 'Add include files to NAMED_CONF_INCLUDE_FILES' fi # End of 'Are we in update mode?' # Remove TEMP_SYSCONFIG_FILE in any case. rm -f ${TEMP_SYSCONFIG_FILE} NAMED_ACTIVE_FILE="var/adm/named.was.active" if [ -f ${NAMED_ACTIVE_FILE} ]; then sbin/insserv named test ! -s ${NAMED_ACTIVE_FILE} && rm -f ${NAMED_ACTIVE_FILE} fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" = "0" ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_STOP_ON_REMOVAL" != yes ; then for service in named ; do test -x /bin/systemctl && /bin/systemctl stop $service >/dev/null 2>&1 || : done fi fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" -ge 1 ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_RESTART_ON_UPDATE" != yes ; then test -x /bin/systemctl && /bin/systemctl daemon-reload >/dev/null 2>&1 || : for service in named ; do test -x /bin/systemctl && /bin/systemctl try-restart $service >/dev/null 2>&1 || : done fi fi /sbin/insserv /etc/init.d)^Ef I |l`BC  쁤A큤A쁤A큤A큤A\)\)\)\)\)B] /\)\)\)\)\)\)\)\)\)\)\)\)\)\)\)\)\)KlO\)\)\)Kc?\)\)\)3c7399ceb657467d867b028976a1a4768724acaa7039a8d1442e090679cdede4d41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427e2cc235be0ba45e0e47161775527da37fca34eb5b2148f60996248d084f145cd1430c89d32eb706cdf374c16a07394de571c11cb9d8f77f369045e226b219fe283609b7abb88a9d41e68c9cee0f14c9024389f2359479f2689d956ed82ba619c0ad0650b1c2263689ac07a2a2b3b3b5c1e1ec130c52caa0480bebad957f7ef291d1ecc639f1681fa5d3f12db36da71cd5bd8d6622a4f9bd06a833063fce65743d2ef84a715896ef32e40929364d9b7c1cf8da69db67723d13c0c2ea9368d2062e3738dad99c1697e7cdd8d23a6a90a49957ab3eab834a5b4d72936ec85ff113da25486e73c43bee32668c21a248dd9cecd41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427ecc2edaf563bc6b424e61033451de725b153ae04e1f10021385681f44a6ebc0f7named-checkzone/etc/init.d/namednamed-checkzone.8.gz@Q@@rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamednamedrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootnamedrootrootrootnamedbind-9.9.9P1-56.1.src.rpmbindbind(x86-64)bind8bind9config(bind)dns_daemonsysvinit(named)  @ @  @@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/cat/bin/chmod/bin/chown/bin/grep/bin/mkdir/bin/mv/bin/sed/bin/sh/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/diff/usr/bin/dirname/usr/bin/old/usr/bin/perl/usr/bin/tee/usr/sbin/groupadd/usr/sbin/useradd/usr/sbin/usermodbind-chrootenvbind-utilsbind-utilsconfig(bind)coreutilsdiffutilsfillupgrepinsservlibbind9.so.90()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcap.so.2()(64bit)libcrypto.so.1.0.0()(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libdns.so.172()(64bit)libisc.so.106()(64bit)libisccc.so.90()(64bit)libisccfg.so.90()(64bit)liblber-2.4.so.2()(64bit)libldap-2.4.so.2()(64bit)liblwres.so.91()(64bit)libmysqlclient.so.18()(64bit)libmysqlclient.so.18(libmysqlclient_18)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.3)(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)sedrpmlib(PayloadIsLzma)9.9.9P1-56.13.0.4-14.0-14.4.6-14.11.2\t@\Zk@Zk@Zhu@YTX@XBXp@X2@W@WN@V@VVqR@V +UUnU@Uy@U'T@TxcTS/S/SS@SkqS5d@RURa@RR6R@QQQ@Q4Q>@QR@PPPP@PTmP1@O@OỌ@OOOO8@N@Nܲ@Nܲ@NˎN@N@N@NtNs:@NdNdN^"@NMML@M@M‘@MfH@M$]@ML!L@LLMLMxLT@K$@KKK{@KV@KA@K'z@K @KKJ@JH@J JI@J7@I@IReinhard Max Reinhard Max navin.kukreja@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.compsimons@suse.comnavin.kukreja@suse.comnavin.kukreja@suse.compsimons@suse.comsflees@suse.desflees@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commeissner@suse.commax@suse.comlmuelle@suse.comlmuelle@suse.comchris@computersalat.decrrodriguez@opensuse.orgro@suse.delchiquitto@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commls@suse.demeissner@suse.comschwab@suse.demeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comug@suse.decfarrell@suse.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.decoolo@suse.comlars@samba.orgug@suse.deug@suse.deug@suse.defteodori@suse.deug@suse.decoolo@suse.comjengelh@medozas.deug@suse.deug@suse.deug@suse.derhafer@suse.deug@suse.deug@suse.decrrodriguez@opensuse.orgmeissner@suse.deug@suse.deug@suse.demeissner@suse.demvyskocil@suse.czcoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deaj@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.decoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.de- CVE-2018-5745, bsc#1126068, bind-CVE-2018-5745.patch: An assertion failure can occur if a trust anchor rolls over to an unsupported key algorithm when using managed-keys. - CVE-2018-5743, bsc#1133185, bind-CVE-2018-5743.patch: Limiting simultaneous TCP clients is ineffective.- CVE-2018-5740, bsc#1104129, bind-CVE-2018-5740.patch: A flaw in the "deny-answer-aliases" feature can cause an INSIST assertion failure in named. - CVE-2019-6465, bsc#1126069, bind-CVE-2019-6465.patch: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable.- Update bind.keys for DNSSEC root KSK rollover (bsc#1047184)- Update named.root file (bsc#1040039)- Apply bind-CVE-2017-3145.patch to fix CVE-2017-3145 (bsc#1076118)- Added bind-CVE-2017-3142-and-3143.patch to fix a security issue where an attacker with the ability to send and receive messages to an authoritative DNS server was able to circumvent TSIG authentication of AXFR requests. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into (1) providing an AXFR of a zone to an unauthorized recipient and (2) accepting bogus Notify packets. [bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]- Fix for Bug 1020983 - root umask 077 screws up the /etc/init.d/named init script - Fix a segmentation fault for long query name * CVE-2016-2775, bsc#989528 * bind-CVE-2016-2775.patch - Fix a crash of secondaries from a malicious primary DNS servers * CVE-2016-6170, bsc#987866 * bind-CVE-2016-6170.patch - Fix multiple assertion failures * CVE-2017-3136, bsc#1033466 * CVE-2017-3137, bsc#1033467 * CVE-2017-3138, bsc#1033468 * bind-CVE-2017-3136.patch * bind-CVE-2017-3137.patch * bind-CVE-2017-3138.patch- Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ * CVE-2017-3135, bsc#1024130 * bind-CVE-2017-3135.patch- Apply "bind-CVE-2016-9131.patch" to fix a potential assertion failure that could have been triggered by a malformed response to an ANY query. [CVE-2016-9131, bsc#1018700, bsc#1018699] - Apply "bind-CVE-2016-9147.patch" to fix a potential assertion failure that could have been triggered by responding to a query with inconsistent DNSSEC information. [CVE-2016-9147, bsc#1018701, bsc#1018699] - Apply "bind-CVE-2016-9444.patch" to fix potential assertion failure that could have been triggered by DNS responses that contain unusually-formed DS resource records. [CVE-2016-9444, bsc#1018702, bsc#1018699]- Fix an assertion failure that can lead to remote DoS: * CVE-2016-8864, bsc#1007829 * bind-CVE-2016-8864.patch - Fix the hostname in ldapdump to be valid. bsc#965748 * bind-ldapdump-use-valid-host.patch- Fix an assertion failure that can lead to remote DoS: * CVE-2016-2776, bsc#1000362 * bind-CVE-2016-2776.patch- Update to 9.9.9-P1: * Adds quotas to be used in recursive resolvers that are under high query load for names in zones whose authoritative servers are nonresponsive or are experiencing a denial of service attack (fate#320694). * Obsoletes all CVE patches that were added to 9.9.6 over time. - Make /var/lib/named owned by the named user (bsc#908850). - Fetch the latest source signing key from upstream. - Add systemd service macros (bsc#977657). - --enable-fetchlimit (fate#320694 bsc#983505)- Fix two assertion failures that can lead to remote DoS: * CVE-2016-1285, bsc#970072 * CVE-2016-1286, bsc#970073 * bind-CVE-2016-1285.patch contains both fixes.- Fix Specific APL data could trigger an INSIST (CVE-2015-8704, bsc#962189).- Fix remote denial of service by misparsing incoming responses (CVE-2015-8000, bsc#958861).- Remove the start/stop dependency of named and lwresd on remote-fs to break a service dependency cycle (bsc#947483).- Fix DoS against servers performing validation on DNSSEC-signed records (CVE-2015-5722, bsc#944066).- Fix bind-CVE-2015-5477.patch.- Fix DoS against authoritative and recursive servers. bnc#939567, CVE-2015-5477- Make sure %version and %pkg_vers are in sync (bnc#937028).- A problem with trust anchor management can cause named to crash (CVE-2015-1349, bsc#918330) - Fix resolver crash when validating (CVE-2015-4620, bsc#936476).- Security update 9.9.6P1: * A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500, bnc#908994). * The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. - Remove rpz2+rl-9.9.5.patch, because no rpz2 patch for 9.9.6 is available from the author and rl support already went upstream in 9.9.3.- bind-fix-fips.patch: The GOST engine will not load in FIPS mode, make this non-fatal. bnc#906079- Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511).- Package dnssec-checkds and dnssec-coverage binaries and man pages only on post-11.1 systems.- Update to version 9.9.5P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [bug] Don't call qsort with a null pointer. [RT #35968] - [bug] Disable GCC 4.9 "delete null pointer check". [RT #35968] - [port] linux: libcap support: declare curval at start of block. [RT #35387] - Update to version 9.9.5 - [bug] Address double dns_zone_detach when switching to using automatic empty zones from regular zones. [RT #35177] - [port] Use built-in versions of strptime() and timegm() on all platforms to avoid portability issues. [RT #35183] - [bug] Address a portentry locking issue in dispatch.c. [RT #35128] - [bug] irs_resconf_load now returns ISC_R_FILENOTFOUND on a missing resolv.conf file and initializes the structure as if it had been configured with nameserver ::1 nameserver 127.0.0.1 [RT #35194] - [contrib] queryperf: Fixed a possible integer overflow when printing results. [RT #35182] - [protocol] Accept integer timestamps in RRSIG records. [RT #35185] - [func] named-checkconf can now obscure shared secrets when printing by specifying '-x'. [RT #34465] - [bug] Improvements to statistics channel XSL stylesheet: the stylesheet can now be cached by the browser; section headers are omitted from the stats display when there is no data in those sections to be displayed; counters are now right-justified for easier readability. (Only available with configure --enable-newstats.) [RT #35117] - [cleanup] Replaced all uses of memcpy() with memmove(). [RT #35120] - [bug] Handle "." as a search list element when IDN support is enabled. [RT #35133] - [bug] dig failed to handle AXFR style IXFR responses which span multiple messages. [RT #35137] - [bug] Address a possible race in dispatch.c. [RT #35107] - [bug] Warn when a key-directory is configured for a zone, but does not exist or is not a directory. [RT #35108] - [security] memcpy was incorrectly called with overlapping ranges resulting in malformed names being generated on some platforms. This could cause INSIST failures when serving NSEC3 signed zones (CVE-2014-0591). [RT #35120] - [bug] Two calls to dns_db_getoriginnode were fatal if there was no data at the node. [RT #35080] - [bug] Iterative responses could be missed when the source port for an upstream query was the same as the listener port (53). [RT #34925] - [bug] Fixed a bug causing an insecure delegation from one static-stub zone to another to fail with a broken trust chain. [RT #35081] - [bug] loadnode could return a freed node on out of memory. [RT #35106] - [bug] Address null pointer dereference in zone_xfrdone. [RT #35042] - [func] "dnssec-signzone -Q" drops signatures from keys that are still published but no longer active. [RT #34990] - [bug] "rndc refresh" didn't work correctly with slave zones usingi inline-signing. [RT #35105] - [cleanup] Add a more detailed "not found" message to rndc commands which specify a zone name. [RT #35059] - [bug] Correct the behavior of rndc retransfer to allow inline-signing slave zones to retain NSEC3 parameters instead of reverting to NSEC. [RT #34745] - [port] Update the Windows build system to support feature selection and WIN64 builds. This is a work in progress. [RT #34160] - [bug] dig could fail to clean up TCP sockets still waiting on connect(). [RT #35074] - [port] Update config.guess and config.sub. [RT #35060] - [bug] 'nsupdate' leaked memory if 'realm' was used multiple times. [RT #35073] - [bug] "named-checkconf -z" now checks zones of type hint and redirect as well as master. [RT #35046] - [misc] Provide a place for third parties to add version information for their extensions in the version file by setting the EXTENSIONS variable. - [bug] RPZ zeroed ttls if the query type was '*'. [RT #35026] - [func] Local address can now be specified when using dns_client API. [RT #34811] - [bug] Don't allow dnssec-importkey overwrite a existing non-imported private key. - [bug] Address read after free in server side of lwres_getrrsetbyname. [RT #29075] - [bug] Fix cast in lex.c which could see 0xff treated as eof. [RT #34993] - [bug] Failure to release lock on error in receive_secure_db. [RT #34944] - [bug] Updated OpenSSL PKCS#11 patches to fix active list locking and other bugs. [RT #34855] - [bug] Address bugs in dns_rdata_fromstruct and dns_rdata_tostruct for WKS and ISDN types. [RT #34910] - [bug] 'host' could die if a UDP query timed out. [RT #34870] - [bug] Address lock order reversal deadlock with inline zones. [RT #34856] - [cleanup] Changed the name of "isc-config.sh" to "bind9-config". [RT #23825] - [port] linux: Address platform specific compilation issue when libcap-devel is installed. [RT #34838] - [port] Some readline clones don't accept NULL pointers when calling add_history. [RT #34842] - [cleanup] Simplify TCP message processing when requesting a zone transfer. [RT #34825] - [bug] Address race condition with manual notify requests. [RT #34806] - [func] Create delegations for all "children" of empty zones except "forward first". [RT #34826] - [tuning] Adjust when a master server is deemed unreachable. [RT #27075] - [tuning] Use separate rate limiting queues for refresh and notify requests. [RT #30589] - [cleanup] Include a comment in .nzf files, giving the name of the associated view. [RT #34765] - [bug] Address a race condition when shutting down a zone. [RT #34750] - [bug] Journal filename string could be set incorrectly, causing garbage in log messages. [RT #34738] - [protocol] Use case sensitive compression when responding to queries. [RT #34737] - [protocol] Check that EDNS subnet client options are well formed. [RT #34718] - [func] Allow externally generated DNSKEY to be imported into the DNSKEY management framework. A new tool dnssec-importkey is used to do this. [RT #34698] - [bug] Handle changes to sig-validity-interval settings better. [RT #34625] - [bug] ndots was not being checked when searching. Only continue searching on NXDOMAIN responses. Add the ability to specify ndots to nslookup. [RT #34711] - [bug] Treat type 65533 (KEYDATA) as opaque except when used in a key zone. [RT #34238] - Updated to current rpz patch from·http://ss.vix.su/~vjs/rrlrpz.html - rpz2-9.9.4.patch + rpz2+rl-9.9.5.patch- add stuff for DNSSEC validation to named.conf * dnssec-enable, dnssec-validation- Build with LFS_CFLAGS in 32 bit systems.- use %_rundir macro- Remove obsolete patch "workaround-compile-problem.diff"- Add the sdb-ldap backend module (fate#313216). - Details can be found here: * http://bind9-ldap.bayour.com/ * http://bind9-ldap.bayour.com/dnszonehowto.html- Update to version 9.9.4P2 * Fixes named crash when handling malformed NSEC3-signed zones (CVE-2014-0591, bnc#858639) * Obsoletes workaround-compile-problem.diff - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now supported upstream (--enable-rrl).- Fix generation of /etc/named.conf.include (bnc#828678, bnc#848777, bnc#814978).- Systemd doesn't set $TERM, and hence breaks tput (bnc#823175).- Improve pie_compile.diff (bnc#828874). - dnssec-checkds and dnssec-coverage need python-base. - disable rpath in libtool.- Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899. * Incorrect bounds checking on private type 'keydata' can lead to a remotely triggerable REQUIRE failure.- Remove non-working apparmor profiles (bnc#740327).- the README file is not a directory, drop the dir attribute- Updated to 9.9.3-P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [security] Caching data from an incompletely signed zone could trigger an assertion failure in resolver.c [RT #33690] - [security] Support NAPTR regular expression validation on all platforms without using libregex, which can be vulnerable to memory exhaustion attack (CVE-2013-2266). [RT #32688] - [security] RPZ rules to generate A records (but not AAAA records) could trigger an assertion failure when used in conjunction with DNS64 (CVE-2012-5689). [RT #32141] - [bug] Fixed several Coverity warnings. Note: This change includes a fix for a bug that was subsequently determined to be an exploitable security vulnerability, CVE-2012-5688: named could die on specific queries with dns64 enabled. [RT #30996] - [maint] Added AAAA for D.ROOT-SERVERS.NET. - [maint] D.ROOT-SERVERS.NET is now 199.7.91.13. - Updated to current rate limiting + rpz patch from http://ss.vix.su/~vjs/rrlrpz.html - moved dnssec-* helpers to bind-utils package. bnc#813911- Use updated config.guess/sub in the embedded idnkit sources- Updated to 9.9.2-P2 (bnc#811876) Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266 * Security Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [RT #32688] - added gpg key source verification- Updated to 9.9.2-P1 (bnc#792926) https://kb.isc.org/article/AA-00828 * Security Fixes Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] Adds configuration option "max-rsa-exponent-size ;" that can be used to specify the maximum rsa exponent size that will be accepted when validating [RT #29228] Feature Changes Improves OpenSSL error logging [RT #29932] nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492] Bug Fixes Uses binary mode to open raw files on Windows. [RT #30944] When using DNSSEC inline signing with "rndc signing -nsec3param", a salt value of "-" can now be used to indicate 'no salt'. [RT #30099] Prevents race conditions (address use after free) that could be encountered when named is shutting down and releasing structures used to manage recursive clients. [RT #30241] Static-stub zones now accept "forward" and "fowarders" options (often needed for subdomains of the zone referenced to override global forwarding options). These options are already available with traditional stub zones and their omission from zones of type "static-stub" was an inadvertent oversight. [RT #30482] Limits the TTL of signed RRsets in cache when their RRSIGs are approaching expiry. This prevents the persistence in cache of invalid RRSIGs in order to assist recovery from a situation where zone re-signing doesn't occur in a timely manner. With this change, named will attempt to obtain new RRSIGs from the authoritative server once the original ones have expired, and even if the TTL of the old records would in other circumstances cause them to be kept in cache for longer. [RT #26429] Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg() which are employed on Itanium systems to speed up lock management by making use of atomic operations. Without the syntax correction it is possible that concurrent access to the same structures could accidentally occur with unpredictable results. [RT #25181] Improves OpenSSL error logging [RT #29932] The configure script now supports and detects libxml2-2.8.x correctly [RT #30440] The host command should no longer assert on some architectures and builds while handling the time values used with the -w (wait forever) option. [RT #18723] Invalid zero settings for max-retry-time, min-retry-time, max-refresh-time, min-refresh-time will now be detected during parsing of named.conf and an error emitted instead of triggering an assertion failure on startup. [RT #27730] Removes spurious newlines from log messages in zone.c [RT #30675] When built with readline support (i.e. on a system with readline installed) nsupdate no longer terminates unexpectedly in interactive mode. [RT #29550] All named tasks that perform task-exclusive operations now share the same single task. Prior to this change, there was the possibility of a race condition between rndc operations and other functions such as re-sizing the adb hash table. If the race condition was encountered, named would in most cases terminate unexpectedly with an assert. [RT #29872] Ensures that servers are expired from the ADB cache when the timeout limit is reached so that their learned attributes can be refreshed. Prior to this change, servers that were frequently queried might never have their entries removed and reinitialized. This is of particular importance to DNSSEC-validating recursive servers that might erroneously set "no-edns" for an authoritative server following a period of intermittent connectivity. [RT #29856] Adds additional resilience to a previous security change (3218) by preventing RRSIG data from being added to cache when a pseudo-record matching the covering type and proving non-existence exists at a higher trust level. The earlier change prevented this inconsistent data from being retrieved from cache in response to client queries - with this additional change, the RRSIG records are no longer inserted into cache at all. [RT #26809] dnssec-settime will now issue a warning when the writing of a new private key file would cause a change in the permissions of the existing file. [RT #27724] Fixes the defect introduced by change #3314 that was causing failures when saving stub zones to disk (resulting in excessive CPU usage in some cases). [RT #29952] Address race condition in units tests: asyncload_zone and asyncload_zt. [RT #26100] It is now possible to using multiple control keys again - this functionality was inadvertently broken by change #3924 (RT #28265) which addressed a memory leak. [RT #29694] Named now holds a zone table reference while performing an asynchronous load of a zone. This removes a race condition that could cause named to crash when zones are added using rndc addzone or by manually editing named's configuration file followed by rndc reconfig/reload. [RT #28326] Setting resolver-query-timeout too low could cause named problems recovering after a loss of connectivity. [RT #29623] Reduces the potential build-up of stale RRsets in cache on a busy recursive nameserver by re-using cached DS and RRSIG rrsets when possible [RT #29446] Corrects a failure to authenticate non-existence of resource records in some circumstances when RPZ has been configured. Also: adds an optional "recursive-only yes|no" to the response-policy statement adds an optional "max-policy-ttl" to the response-policy statement to limit the false data that "recursive-only no" can introduce into resolvers' caches introduces a predefined encoding of PASSTHRU policy by adding "rpz-passthru" to be used as the target of CNAME policy records (the old encoding is still accepted.) adds a RPZ performance test to bin/tests/system/rpz when queryperf is available. [RT #26172] Upper-case/lower-case handling of RRSIG signer-names is now handled consistently: RRSIG records are generated with the signer-name in lower case. They are accepted with any case, but if they fail to validate, we try again in lower case. [RT #27451]- added a ratelimiting (draft RFC) patch from Paul Vixie. see http://www.redbarn.org/dns/ratelimits suggested by Stefan Schaefer - updated to 9.9.2 https://kb.isc.org/article/AA-00798 Security: * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] * Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * Adds configuration option "max-rsa-exponent-size ;" that can be used to specify the maximum rsa exponent size that will be accepted when validating [RT #29228] Feature Changes * Improves OpenSSL error logging [RT #29932] * nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492] Lots of bugfixes. - unfuzzed patches: perl-path.diff pie_compile.diff workaround-compile-problem.diff- Specially crafted DNS data can cause a lockup in named. CVE-2012-5166, bnc#784602. - 9.9.1-P4- Named could die on specially crafted record. [RT #30416] (bnc#780157) CVE-2012-4244 - 9.9.1-P3 - updated dnszone-schema.txt from upstream.- Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [RT #30025] (bnc#772945) - ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [RT #29539 & #30233] - Under heavy incoming TCP query loads named could experience a memory leak which could lead to significant reductions in query response or cause the server to be terminated on systems with "out of memory" killers. [RT #29539] (bnc#772946) - A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [RT #29644] - 9.9.1-P2- license update: ISC ISC is generally seen as the correct license for bind- updated dnszone-schema.txt- VUL-0: bind remote DoS via zero length rdata field CVE-2012-1667 bnc#765315 - 9.9.1-P1- this version has no new features but only bugfixes - Addresses a race condition that can cause named to to crash when the masters list for a zone is updated via rndc reload/reconfig - Fixes a race condition in zone.c that can cause named to crash during the processing of rndc delzone - Prevents a named segfault from resolver.c due to procedure fctx_finddone() not being thread-safe - SDB now handles unexpected errors from back-end database drivers gracefully instead of exiting on an assert. - Prevents named crashes as a result of dereferencing a NULL pointer in zmgr_start_xfrin_ifquota if the zone was being removed while there were zone transfers still pending - Corrects a parser bug that could cause named to crash while reading a malformed zone file - many more smaller fixes - version 9.9.1- added patch to fix an assertion failure- many dnssec fixes and features (too many to list them here, check the changelog) - improved startup time - improved scalability - Added support for Uniform Resource Identifier (URI) resource records - Local copies of slave zones are now saved in raw format by default to improve startup performance BIND 9.9 changes the default storage format for slave zone files from text to raw. Because named's behavior when a slave server cannot read or parse a zone file is to move the offending file out of the way and retransfer the zone, slave servers that are updated from a pre-9.9.0 version of BIND and which have existing copies of slave zone data may wind up with extraneous copies of zone data stored, as the existing text-format zone file copies will be moved aside to filenames of the format db-###### and journal files to the format jn-###### (where # represents a hexadecimal digit.) - many many bugfixes. Please read changelog for details - fixed handling of TXT records in ldapdump (bnc#743758) - 9.9.0- patch license to follow spdx.org standard- Ensure to create the required dir or sym link in /var/run; (bnc#738156).- root nameserver updated (root.hint file)- added managed-keys-directory to named.conf- fixed apparmor profile for lib and lib64 in chroot (bnc#716745)- Cache lookup could return RRSIG data associated with nonexistent records, leading to an assertion failure. CVE-2011-4313; (bnc#730995).- on a 64bit system a chrooted bind failed to start if 32bit libs were installed (bnc#716745)- add libtool as buildrequire to make the spec file more reliable- Remove redundant tags/sections from specfile - Use %_smp_mflags for parallel build- very first restart can create broken chroot (bnc#718441)* fixed SSL in chroot environment (bnc#715881)* Added a new include file with function typedefs for the DLZ "dlopen" driver. [RT #23629] * Added a tool able to generate malformed packets to allow testing of how named handles them. [RT #24096] * The root key is now provided in the file bind.keys allowing DNSSEC validation to be switched on at start up by adding "dnssec-validation auto;" to named.conf. If the root key provided has expired, named will log the expiration and validation will not work. More information and the most current copy of bind.keys can be found at http://www.isc.org/bind-keys. *Please note this feature was actually added in 9.8.0 but was not included in the 9.8.0 release notes. [RT #21727] * If named is configured with a response policy zone (RPZ) and a query of type RRSIG is received for a name configured for RRset replacement in that RPZ, it will trigger an INSIST and crash the server. RRSIG. [RT #24280] * named, set up to be a caching resolver, is vulnerable to a user querying a domain with very large resource record sets (RRSets) when trying to negatively cache the response. Due to an off-by-one error, caching the response could cause named to crash. [RT #24650] [CVE-2011-1910] * Using Response Policy Zone (RPZ) to query a wildcard CNAME label with QUERY type SIG/RRSIG, it can cause named to crash. Fix is query type independant. [RT #24715] * Using Response Policy Zone (RPZ) with DNAME records and querying the subdomain of that label can cause named to crash. Now logs that DNAME is not supported. [RT #24766] * Change #2912 populated the message section in replies to UPDATE requests, which some Windows clients wanted. This exposed a latent bug that allowed the response message to crash named. With this fix, change 2912 has been reduced to copy only the zone section to the reply. A more complete fix for the latent bug will be released later. [RT #24777] * many bugfixes (see CHANGELOG) * 9.8.1- Fixed the ldapdump tool to also respect the "uri" setting in /etc/openldap/ldap.conf (bnc#710430)* Using Response Policy Zone (RPZ) with DNAME records and querying the subdomain of that label can cause named to crash. Now logs that DNAME is not supported. [RT #24766] * If named is configured to be both authoritative and resursive and receives a recursive query for a CNAME in a zone that it is authoritative for, if that CNAME also points to a zone the server is authoritative for, the recursive part of name will not follow the CNAME change and the response will not be a complete CNAME chain. [RT #24455] * Using Response Policy Zone (RPZ) to query a wildcard CNAME label with QUERY type SIG/RRSIG, it can cause named to crash. Fix is query type independant. [RT #24715] [CVE-2011-1907] * Change #2912 (see CHANGES) exposed a latent bug in the DNS message processing code that could allow certain UPDATE requests to crash named. This was fixed by disambiguating internal database representation vs DNS wire format data. [RT #24777] [CVE-2011-2464] * 9.8.0-P4- A large RRSET from a remote authoritative server that results in the recursive resolver trying to negatively cache the response can hit an off by one code error in named, resulting in named crashing. [RT #24650] [CVE-2011-1910] - Zones that have a DS record in the parent zone but are also listed in a DLV and won't validate without DLV could fail to validate. [RT [#24631]]- Build with -DNO_VERSION_DATE to avoid timestamps in binaries.- buildreq update-desktop-files for newer rpms- The ADB hash table stores informations about which authoritative servers to query about particular domains - BIND now supports a new zone type, static-stub - BIND now supports Response Policy Zones - BIND 9.8.0 now has DNS64 support - Dynamically Loadable Zones (DLZ) now support dynamic updates. - Added a "dlopen" DLZ driver, allowing the creation of external DLZ drivers that can be loaded as shared objects at runtime rather than having to be linked with named - named now retains GSS-TSIG keys across restarts - There is a new update-policy match type "external". - bugfixes - version to 9.8.0- fixed security issue VUL-0: bind: IXFR or DDNS update combined with high query rate DoS vulnerability (CVE-2011-0414 bnc#674431) - version to 9.7.3- ifdef the sysvinit specific prereqs for openSUSE 11.4 and later- fix bnc#656509 - direct mount of /proc in chroot- prereq init scripts syslog and network- fixed VUL-0: bind: Key algorithm rollover bug bnc#657102, CVE-2010-3614 - fixed VUL-0: bind: allow-query processed incorrectly bnc#657120, CVE-2010-3615 - fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type bnc#657129, CVE-2010-3613- fixed return code of "rcnamed status" - added gssapi support- Zones may be dynamically added and removed with the "rndc addzone" and "rndc delzone" commands. These dynamically added zones are written to a per-view configuration file. Do not rely on the configuration file name nor contents as this will change in a future release. This is an experimental feature at this time. - Added new "filter-aaaa-on-v4" access control list to select which IPv4 clients have AAAA record filtering applied. - A new command "rndc secroots" was added to dump a combined summary of the currently managed keys combined with statically configured trust anchors. - Added support to load new keys into managed zones without signing immediately with "rndc loadkeys". Added support to link keys with "dnssec-keygen -S" and "dnssec-settime -S". - Documentation improvements - ORCHID prefixes were removed from the automatic empty zone list. - Improved handling of GSSAPI security contexts. Specifically, better memory management of cached contexts, limited lifetime of a context to 1 hour, and added a "realm" command to nsupdate to allow selection of a non-default realm name. - The contributed tool "ztk" was updated to version 1.0. - version 9.7.1 to 9.7.2-P2- chrooted bind failed to start (bnc#625019)- genrandom: add support for the generation of multiple files. - Update empty-zones list to match draft-ietf-dnsop-default-local-zones-13. - Incrementally write the master file after performing a AXFR. - Add AAAA address for L.ROOT-SERVERS.NET. - around 50 bugs fixed (see CHANGELOG for details) - version 9.7.1- Handle broken DNSSEC trust chains better. [RT #15619] - Named could return SERVFAIL for negative responses from unsigned zones. [RT #21131 - version 9.7.0-P2- Handle /var/run on tmpfs. - do not use run_ldconfig.- Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch- Fully automatic signing of zones by "named". - Simplified configuration of DNSSEC Lookaside Validation (DLV). - Simplified configuration of Dynamic DNS, using the "ddns-confgen" command line tool or the "local" update-policy option. (As a side effect, this also makes it easier to configure automatic zone re-signing.) - New named option "attach-cache" that allows multiple views to share a single cache. - DNS rebinding attack prevention. - New default values for dnssec-keygen parameters. - Support for RFC 5011 automated trust anchor maintenance - Smart signing: simplified tools for zone signing and key maintenance. - The "statistics-channels" option is now available on Windows. - A new DNSSEC-aware libdns API for use by non-BIND9 applications - On some platforms, named and other binaries can now print out a stack backtrace on assertion failure, to aid in debugging. - A "tools only" installation mode on Windows, which only installs dig, host, nslookup and nsupdate. - Improved PKCS#11 support, including Keyper support and explicit OpenSSL engine selection. - version 9.7.0- [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] - [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] - [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] - version 9.6.1-P3- removed the syntax check for include files (bnc#567593)- add baselibs.conf as a source - enable parallel building - add baselibs for SPARC - package documentation as noarch- Security fix When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] CVE-2009-4022 bnc#558260 - update from P1 to P2- added localhost for ipv6 to default config (bnc#539529)- fixed apparmor profile (bnc#544181)- updated patches to apply with fuzz=0- using start_daemon instead of startproc (bnc#539532)- version update to 9.6.1-P1 (security fix CVE-2009-0696) bnc#526185- enabled MySQL DLZ (Dynamically Loadable Zones)- around 50 bugfixes against 9.6.0p1 See changelog for details - version 9.6.1- not all include files were copied into chroot (bnc#466800)- /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334)/bin/sh/bin/sh/bin/sh/bin/shbind8bind9cumulus2 1559570894 9.9.9P1-56.19.9.9P1-56.19.9.9P1-56.1 namednamed.confnamed.conf.includerndc.keyslp.reg.dbind.regbindbind9-confignamednamed-checkconfnamed-checkzonenamed-compilezonercnamedbindcreateNamedConfIncludeldapdumpbind9-config.1.gznamed.conf.5.gznamed-checkconf.8.gznamed-checkzone.8.gznamed-compilezone.8.gznamed.8.gzsysconfig.named-named127.0.0.zonedynlocaltimenamed.conf.includelocalhost.zonemasterroot.hintslave/etc/init.d//etc//etc/slp.reg.d//etc/sysconfig/SuSEfirewall2.d/services//usr/bin//usr/sbin//usr/share//usr/share/bind//usr/share/man/man1//usr/share/man/man5//usr/share/man/man8//var/adm/fillup-templates//var/lib/named//var/lib/named/etc/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10347/openSUSE_Leap_42.3_Update/7c3f5816ce7dccf378ff46c0f167675b-bind.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux  POSIX shell script, ASCII text executableASCII textemptydirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=eb3fa6fd823e3b4f2f745c7803fd2d99f329ca7d, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=ab60a0dca5583981c8bdc1919f6e16f6dc29decf, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=873f548137ed868d2c8a2f02fbd3d9a73d9a8b83, strippeda /usr/bin/perl -w script, UTF-8 Unicode text executabletroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)%,-R PR R'R0R4R6R5R2R#RR!R R"R.R(RR+R*R%R)R/R-R,R$R1R3R&RR#R R"RR+R(R)RR#R R"R+R(R)RR RXe#/p?]"k%Pt4L5ˉF|uw _5'cF/'[{ z%@F @!׵y= 0뷦@*zl3˫L5OZ|  r1Ut uG6D SIY6*5!W+`Uɽw $Yצiۑ{R6r$LhT‘kg˰Cn ۪xMT`*Y$ϮT*A,\؁(A7;G2FAՄ 6tͺIݒldĿ^7PUtn$S,_(+u/p686UiN 3Wk:9WO^z:I炡k<dc,a|KE~YDkC3$*m{nyz~5+i D!Ep'OܕwDg5eٿq5SV`;KiB[)L|tjPrW`tw|>-G6_MydL73\$/o  sГd`#|ݾ t7rn@p&Ϳc12tvw=1- tHF+5T<" EG2l|/׶m1'԰ N3YP2h$HUZm10;qTou ]BσYfɜ's[ޖ*OAǤwet{W#1(,deg=ft x34'֮D*%:M>UZ#ofJ)5)T $U[B\[@Rq*\%x_ҋyu*"*moSHHةS_0gB݈[xDŕ M<-.8{bt*<٬sJǣJ|1fa &p>)ႌgǔVsn_ #l4v籛U喱'xC;Fh1;nFzDʋd2sZm|D _4AfyҠpwH/OCYڠ.gjӐ,k}Ƹ\^+pgTFT̯a||8LAŕd eKMRC 5v/Ext!{ Yj 它.n)mGS &.zΙy(}_i }aԸCmw"T|xêdk. RyXqlo4`]1S0A AVRTmId\Ŀ{'0dXH[ymL{قxG9)'S=Iyu$ S_@-C(Km#Q`15 qzc ̟ ,A"괷Vl-bsoMƗeI@/}XN@af\j @+Lw➈'iəBN @v{_Ɲĝc> -&n.c^}AkXFv_ȫӌ2R0StwX 2ĉDÃm.Xm6ZX̓drW\Š&+׼M)b_8܍C6eQvh1AMbaMq mE<ג Vyrӎ̥OC?Sj9 9. Ȁ-h3=lsGM+s̀JT@%n p٤ #<>PSVx %@33ErIAq m仫iAͽ=Em5 o >r;2WO=11WU<'I'" o%'[Ivv5%y%9(di0[mUG8U*e33/g|xCu*5gʩݵࡈT 7ҵ5k:^I x9^n,5%Ň2fyl%|_ G׹m7wafR(\uL`[˚$";,~Qve4]1utj& x-eWgk~::A.W۸2Q1jR1ȧ -JNj'=tDFҨEިYa@̖CbxX8ȭVRHBQO\&d(,!V_@cCn;IR TezX?_. Q*X cmCF3>ҠGT +YE!mTLN4 ;Y &d0!߀5⩨-(^Sψpѥo"ښۙcO l$ "6P$ais;]Rg>".>處AAø$]{2GxT2й9ͮ`&><%.N:?Ho-q߭ΐ2J8U.[*(.s7f*DUg-a(tBM)GmUn3d8lWݑQEv"vr:d{2 Xhz6u:M;DK:VV Ĩ[ 1:|ÊQ?Vʾ-$ b;4߉u 篜oULUκUŴ`Ox.q|4rz;x F7|8ba-Ű%U͙ӗ1cizS)ݻQǓfjCጟziPJszPqTvl9Ù>ښǭiay:m|Ƚ8*]'r甚9Q.@$/ꗎLC/]*^K)YuM·K2eѫrL6I="|1V =7MJ0RN,-xtBc# _|No1-$‹B:^#c;Lj\g GZʒ\-Zym+(V(lj8`Nr3:wpS!1˾lC?aK[u# ixc4+(ոʒJ~9* Hv J{1lzqq786:H"6h+ՋCqr.׆B;;dE~r;أ x|Z(j-S;:_-G zMz; $_tY-dj,LwOϢ #I,U)? Smp"bW//L}2?3d/!at2T34{/KewAT f Nb] K%k0&ǽ`q}W7o.,ڸ|>^y>0_A&ܓQ?p4ļe6f>E.fOh6דn-'2uNl  9(LLXh \~pK_D3&@)<%OA%  HXލX*&r L@Hd{ֵ KKM}Bzޕ_ T,EbxE"LH#Rⅼ&p=<Lh(|^&o"`[*8GKe:oWۛj/xS.g :rθ?V owj;RuAC FD#/6fL%f(ِ׬e8ҀGdDn*h/"i!ɔڀxtKۦ9  *$zoS#5;gqpu] 1BUN|DOfA~d %p`23k oEN~̬X(B* suZ7odPJY o~ aX?rBa9+<|`4BC6I`T?vhKWg@U;cF2pD(^K,0VnSsEM_5狊$BmX^=p@J}Q2oh>C FEH>ڤ)%Y۳/eϮ▩MaŤԦ5t&h}%0uX%ʘ婃ADeu{ԭ4 Pޟ-W[P|gR?szU̝WkDX&Lqk@o.!R:?\r^vlGOx׆ q9t8H_d'_,]I9$'fphpEife}&ѣ25Ckحx Npb}y2AW$Q8@oD3⎯lmSH꯮SՒ CKR%Q)HYLk|z$? Y;~RG &U9|\vcZz܉d[_4VeifCL~}mHWY)1bWjN鄢1FL!PmT`BS`p@-ciVFА\BxʡyKyGIwL-riZd vyB8ﳙ?4Ykp'b1f p(\6ŤNrsʞʧ-$ ᧋7:FsrHR nqExߕIU!cvg0Y2M,jo`&f&I o2G&p%#CĨ,}4ôI]kq3DzUHiϴ|0uX|ץg3b/`͒RlZXB><0l%8km9DS=1(D)V"ǹ A>1@YIA4 C{Ct4|Ik`rտo\>>3I$$nV[*f0]F(.D7d貵_gNhGG&g If[<1rì (1_ O4Qɥ&GtF N:vqe]ܼ?ͫ&K,[VP~Dc{2R n{ p@4Wtj̞3 in%-LϋhڜB+8wZSRe|Ie_|û -e=$8fN# p`3y9n@!_Zh3<1#[8w22mo^"`i*CiP3ypUrr2 Ȭ4ы28)GS7&3lAˬ1lx<ٗօVI(04=>ܗĮS&b7љn&򱑆UX) QEFPFiA9iZ>o)q)aV MQޅے5NSwN4h;Ļ+.k'qlkt33Nmta.`S94wK~W1Xc4䭸024)tV e>/4Ww(+e#tܭ;rs֢!r"HN;Rފwc%\D:zv~%e{2x>^ dT.S/ux]S,dclTDͼJ){1}V<[fgCWKIODen#f$8gǞ6߷Lc*p63 ͭͦj7T)R[+5崀.g^uw/-rhŃT/ǽ}^> +%co>OZHxOf%kciIJJZAeL&HTMjޤc@~fꓠUF]! @@I{&|EtQ8r>Z1\LH[3\{-ޱA-_Ќ oz3ƑWYjrPOZ1fW/SuP x"ֆ(’.d^ , &[%yܜ,ԍUv`fS*:x-i+, qNgc'1-d$B>|E7АÝ#V4/7KGLK0iKj<':y։;,Q#[* lmAhh _8$ ] Dԃ{"Kq][9̧^4ؕuARcRo yOM;8{iJjαTr@PWw3'JuqKͰ|׳+hÚE${6C0yI5;bؼԵOhϱXE,1-ܭ\=3Hn%JKCc%mWtW[tT"RMpaB_>G PVIa\b$EG-A?<ՃU6t]7Uz㙬;1g #=JO$ꨚ%Ve1DpB/EѠb[8eȵ6s@9"Lx'~uZa 6|M,RCtVna5bᨩ فWҜ.B_Jk1}gvPBJΟ R|} YRF2 ?_*Hr8җTETj_oW%Ňg\zr5XkWt"N䘠C'覹9aɮ(3 >CNwϫ~(x[8ڍ ^gh[3GfMSت*r $i4$+G0LUVx1L$՞aA #;%ԁׂPœsM&$&8.R V+kBx{57MzGtp;2c> o '#tbI_ynԪ?5~jQ\!yC(1xsQ'׉sΪ*ݱ.]" XI.&vZ0ը|)]p8hfL,t/Dr0Rd"*%rC%LQ';NR- Bk$~@3oZc;w5&抹LNhxnbϧRR6j5m (8uH8lBUm%$=ch2;diMI+y\sT{B/(z.M~Ƒi |*RKΙzwb5H$WubɴZ|7S„s+o`Y?-MGX oTLr;HtRڤl ){KkS}횒.ᤗ`W`tĜ(Ӎv@gA ģ-NVrֲN`=ؒ^o<U5ծ Ž@ H-ê@Zg|tiշY4hP݋.s@[DLr|4;!gn[3p9H%SkK/x*جN/q%fk|aj~^okP\JŢ'XW~DROTrӔ)[d<{$~^dun)H8N#k^b\pNh{"f"sPm Pq0 j5H@M%FœV)"%'~ oR#>{|\Z@Rt*&R|D/Z?56K BH9``o9l T6*<,WPD z]jן K3YE;%Y$(Ԏr4чbL!r,RlK޾gAGŵj[ 1ZpcZ&faowWdPF 99+u# iz&3ZabhKߜz܄CMmivy4es飡Ɉ)51lDl;ɟ޷{:p5:z3|wHPƫ,5^]" ,Z"v4XqL[JP:o$Yb"ww&̩<+k+A]=$7 Y /UcJRG=) yp]1"4%V ]Fm*9f+VWiF+݀~k"^aRdF6Y>cɎm8 a/E(~w!λc3d`}iΠ*M$!xTZ>[B븛TG=_I:? %lqQGLbfW:RIW,0C5jR׬{@rD"B ށkΊ涏p}%, c8I0GBrq'vL K&|7EWJPrrCAU YO(#!&I(vmF[S*)LQFQbud% p9 ;6X7z_O%݆ӬU/0tE(,O$G:lix#i#`!)LgPEfK}ɳ#{ ZX4+5gWX >Cb 0'@;rYBx ,m9dRד`P.0I7ގ(yT;iHLe37b;\ o Kyek­6(peOty]n3CN_GjΟ={}&0BOcIH@C| բcR|Y)lX>^:nj%':8'hPwvQcΖ=-S\JЄL)ҋ)V> 1U}-H7K}?je#D-/FQ$iƀ4&>#rл^+K<7ړNouH JYWC-4Ira{+tXZ=UR4%g<+pK h)"(*L+\֗/9PJf݀E 9lLς¡iFp7,M( MIMv4NL{nɉ `RQ2YKYD8UZŸٙ9\$Sed|3C=,. DLMv% @'ͱ&.gq&? lY.|(uR34u8Zm:&oaY5&N]c14MƦ6՛7|Lyɇ6P>3TwXZG#C,Β$L!D[F\s7M.H+d@W;+=3[$Ap@U^[Fc>f$m6!rܮ<`f-+'ZtU #('`LJ $ѷ[GC*kxS8⫝̸\_m(]ZWVuf]{1pqp5Z!w:{AȤ?&AVƯFC |<?6_*DBE-˃tT)i!\Yhǻr2e oA(t{]H{N^F3ʯF ;js|X!}MYY4KH̽Tg3 tH l0Ɲ!{k.JZ>Jd˘F ]h!-VD[QZ÷|w9U94OQcLb6 4ؚKtvğqTʳ2i@r8|3фhgv}\,#d`{:)# ML*y3/ɛܒ6 &d9e*ǟ$l_%MD m Ԇ}+W@DcV\T䋑%\;H*$H+B\cs[_T@$Ǟk;*QND|jtI8ZpҊ(E &˻?O豍ܲhD{8%qܝ!W\MG& 17c6)w!mS[Bx@"mw z1 \8%?:w*: #/ohw{l {xvM5s&h/35\0n05Da{BY.778^M5;q75J&AuNTeEQ)q7xxFE!!!oրfӽqD%zxM>21)$cKaYQ^J3)Tez Uh~[,)+)>UQJHw i 屫P()p/0%l%^g!Bya]+=s }corjRzT cMtM$^Qܫ56Z.ޅFb/kKnT|>T*_`GtPu|Uee3.§cw]dE5^q+q8+Rn* n׳;|V֫P<|%Rr$DI^z[GI7ǔJ$䋦^p6窳]<H0sh4/] w30@՝13 Bw(v=_=!v^lFLO5H#(5.FDlYkg7ΩEi2n\MW#`0g omn1x(Q#M+ZGֈvyݐ|RR'PO&溙HDXXs (?aB(Xi|R-@T 7" hbd120en 8`Bͅ+&^i}Ӎ` R Eu /茞7)iZv6Q<.9Ggh743O Mߣo9DI6g-]I_MۘJ%K2!8'V b?@კ8(ZĐi' xf4(7:eO[s|UF\IKYhQ NW8\o*Ve\Է(W:Ÿ`SO4t$~[!s^ҿk~P(RBpcz5Wm X pNNy!d\XCb=0p /B>r#{b)Vr.q\i( vWpةEj1 r U4HprEG?2֢KXdæфm"s]} wի-Cn1T:+eAU:0ɻb)ҝ3[XqvwF_ʻm)l4jWR5WT66đ.{YW yy'm3~^jʨ71TTs+NZ6Sy:ۻU~cr[FX%ʈ n3q)zXJ@sj^87C>SZԪBD"X\7@i;"u~AE?攜gzm,;$WUe]ҧH ]ͭ}zWӑ5H"~rl{PGu',{b,: ]z%'q,r]>5-"uP/>5qo!KяjM~WKD=Qt>טذoCAe )ό@O̕bk2;%BY{'8D> CìZoQ,Ni]V^z׋5=l%/d!'fm}BQL RJ۸R3@X.N8Jy$P|eV^ereK 1>jq3>Xʫ#H˽!g)v/CK*SHlqyv*!zF72ERqsN@׫ѐ#ڠ$^gwPo]LQcH†dG; ,A2&uHgƊ5Ffgd4zS{%}.jcЮ$BN?&Zp L:́T)8ay\rQe.i렠_5K)KR~}@w/De[DhS4aHgX2A oKڠh{<:F94߲5BM mWե([߳7 >Gvy6Csx2esMUV8嚅d&@Lh53)߫2x]5S`TO4GJWH,IžAeS9SYL3"zISlVNTk۟Gn(W8W"l{n{./,tS'Lc[;UHh ap 7A:H :$6&"+j?;jUb}V0PM44^%-uK0h%9`jXt/v}nL*;j YC#j/S!pHl"NIЃ]I-z8JVI_$edDև]b\{-=xgݸĚبz?E>psC740L5#`ߖD3‚fvKA: by%M* 5`"gx>Gf}k(9ta2njhbc۷#i?Kqʟ4o2N1.1"LE.P0 M81@#[9+\:i䌬n-CWvnB`dGuG9Х?ޣGCr:Y`|@@ cM~1#`5 vfP!6륽/#R4Y$'R+иբOx* MOZnʹն-JHNY̸ݍ;ra,9-zVX*%(4?W&D@E~hiAAc82Jd .ڂ(G d9 [r6"'ҕIzz 2!w܊(W"3E,9Y&ofC߲L%EպYm>w 3Ajg>cFg+@/KL5xԕosgY#gɖ4i|$7Wi5nԗ+⤚O6- q:|z*|pS2!+"ijR|Va+_XXj<" wjXswH)ʧvE6!b*Ha؇,|:v*:#n$vKe|W}r*CNьzr@_gqHkxBel K5]⳧˓:" =i!GY ǐCt'I8.=mkn(=4 )h&Z*j6.ƙ05[x^%kw61ӶMF1H0.l5ܫjG?D|3"#rcO3 9%ylV$qRI7iPWC# qY'\_z͆UA3mJt.Ktӏ+Yo2\\Ac]e/P.G7uz5Ye ڞP%Ly_P?>" U gd2D|`Gaܺ?V!i I=un_L+ Yճ>#^gi҂z649y;s tnQ~;}ڕgwc }J*drk2op^@GF'`*:8 > MPe3eE}~)7nEh)ǦRsBZQ<6\(7{_~߻\u;E{fQxeAJ{K*HG>#R+ $n3k(oV=nY^oLU ״m>I^y{%FAm&gL_#Fr8&:! p{~X&˭ʒVV/~Y$ mtG @RQY-g}*Ĩʍ":F>6&'D^lf)#yfp.8sGF y ^wHC4*YIs}q/&'}2$"S8f;?m_<BrZhIFxdFcvTw-Zyuf/iSl)PF<&1w-@5Х`*`G)/s /^O!CUBFvj{IPa)Qb,jV^*#Pq,4L85[DQq5CQ~A|fn]e3ެ\8?ϱ:4/t#pˌBil_Wa[l%7&i\6AQUSȔ&U@me QI&G@#S'm\@+YHS:PS)i0uXm(f˨YzH5;*[ W\7lo?x~p\PКkQ`xjX㤙q^+ڻIUa{z}w2ZCYF*ާ a>ˡ Kȴn`xq3o_|w_@A o'飵:NKeϲLsrǼa$F 2W6 `0"J749Ye9_븆 N4su2oϨ,8(}u(t= {a%$l|K~rj!< hf@6d⚳GD=<J@pPNAۜ \.lq~#AN^u؜bO^}/ACXMDŽ%ϒ`)IF R1$G o?4]R$q鱑 `vdH/pA-E=qgiqT9O QE.GOLT_ts^w,Tk4iGQX4d٫R0fEA0`#{MҨsUgUYnov&iIQfd M3NXc^^i.۽^"U XE EI9keړȉkc=RzChQ8Є8KfJ" =gb׺k;~>]GxNtj`-1B'4ۣ剹Oz55Qmx=4/Ⲽ96fW:Q)PL%g{G_աSge#ASW>M؉3C8,[j$FmO fC9sq@`҃@z>o AdnR{-oa(kYp7h'F]O٬TjAcOywm ^mWW!xKA?j䧒GivHњ}3%mFe0&Pw~ͮ\:GWb_V6ev6¼%)+:$t= j C\~lP/E?<=h~mjGMzNޥ : {G&l*k-挝3mOɄQY I~H댟d,vm{3F%rj t] Mf_r`d bLsWFq3VzjeEUPtQ~(X 0|[lH;řdR@_V'y.oҙ}em\/vzE-b4 Y1XXjsG O"8؅b}c*]C|1\a-EӆCADWQz%:۹/L/2Yzu3̣ͪ$Xdɪa!geK#0ud:gr<p12{:{ 0p`w:h 1%%V3c?'wV9flp{x |%;GA$ޔDynz11/A& 1#AO_Hq(7c4޴Iq=yfYmCP>}<^++*uAGfAJ}C.-q ? ?J bi@v*P .E"1y &{ h1rV32%eJ2+Tzh\֖Y<ş (F;[(?B.nwŠZY,Zá@df1&R7տ_\:=8(]h摿e;-ʭWwyEH-4| ,)m5x'+o2y+Q2Ǯnj 4&no/ƚih-FB}26hGZȍ6g?u9.V58b6qx_r:y 0|ocAv3̣Qep{vX;5+/tU$Kn j *͖P$KӕSl} ǯqwXVi_ 7z(g$ ~3VǢ"v>]^^4}AxP4SCAg'6 cHHB!8=RE҆ia/1M6Łb~ZK{Nwa b0VȂ񐒶l1Q< pb^f1]BŘ$]IfTg.;j ԏǢ0(9B!&XăAҮd KfWX9L!:p8C_k,f] kCan@aAT T r^k=8˭5EY"RpQl![D_+Jzg*L<@c f[Rou!H4Aso Н$DcNSj\ĦZmsxy;bIH ܹ76@cRR4SnG-ǏhF6IoJxgx'DaiZkQEz^j2qqln&0d/F^;fle`ㆰS(n/:*{sIq1ND8XIHW | L`,7?y֢:  4[yola"qZy۹X?>YQoeħe\c!MIĆFZ{J.u#p[p [Nٴ )%0sêj%`}iDX?X+,7p޿ʹjoZ}5J&1Cx" gԳgx!5,LZ}P*CÉLXGHFzΥPh_/SEvT%t~ )3mo_yԚi򀟊n=˴@0LgCnDyr'1`뷨["P[g !1{ āYjݖ%<}Io ijw~=4.Y9s9Qt(CױΎ7o>X̓xmlUʰ?'u),ڧn <~q &|g<"3G0i) }*nU.t~CN9Cgv ڂ?}((27״t)դik2_5Cj5uvR?G`ЀO5"s>XUVS>R! yJkQ>X}EE{t( (=]HFf55t޵^=%{Ry*]ךͺ0FZTO7C\vM̍ Xzl$_]wu &- Զ :bY#-z #9m&5fB7*{KM=(k K/$͕ Nכ.+Re[ O{)>; Zw(m7Ԃv_Mg9~#D+ÐegLknP^&A4l7u5",nbՃNz6%haZ^j48%iyکͮiaieY)wW4zu.͊PE{*M"bc*T:7͑8˘ok_Ȝ5=bC=lRArƯ{P~>lZW;9wrx@I$h ЅyOSBvV~X"oMkkFXsԳwp?mގ&`p#\5Uk+!'SyM(mӷ*Ft-V8:3iF\.K7}$dwc1[_W\A2%8.'sb7@dYx5%!Hxj 4gu{0:Qy۽ `Af劺~"Oʵ62ynJꐈI 8s[Xkānޯ/WlDQg:ȸVlX o @؁(2 Ih?$%4of3_o,ɱelOC~Hf'/$Cf>jU+ttfnpD'\T9vXpgbB6Pk~s|1d$~Ih1-!A[)7lJ4Iu{ $HB]7* uNIR * oU~Nk .Jh^q4_Ir޸PVDvbڢSi$DJ2\e?щ*PoK7b*8BؘokA+f(C+T{v/AjQu| [# E,ghx9gOύ/)`wNbxhd!+M.Z, -m8}EM8I=Qĸ`%W\:vU+41 o:JZt3j3:z :Oh ")2ϑ +* 8F8kXcfTj_xl V1gv 'o ɉ̠&jFn'CIi!ǚ=y޴\t1B{ j=|j}|l3Lc&k& J L~"j|E-Y 䌋t%?3Ӷvy?cr%[xO2;>J=K%`1yd3; K\jprhK1̗lUWll=-h\F%< 4p%jJN2Psy6]S#: D{M@/kY3q*蕼;Qsǜ ҜS 7`via y~[gS63fK(q0E]K:4n>(%)ˤz6"v|c, dɕ0wv8-Q'ғwXpq]TjPi:+HFYqvRI!3\t'iߟn*p r /G ?*".x4?\gO‘ j$)+ hiQ2V)i׍T }䍁`᪞sOgq;IQXj }cF"[Q˓u.Ҍ@o)Mvw:7LE;NR7XP.\(RV,@xƅeVA6_~gKU;&EL.dde<9dBh$/uu/{@V\WPbA;BzT&'3 q Gn7y!v6&Æ%cVR>e@fKlЎmSPsEQÎ:5E2;~[5CǣBJʁ*(guڋn-6g_eERk|`rm݃T񃙇 V}h>}.vP'R颊i4gGZWɠ\W9.]Ktes~<;ܢAʕ,y/.g/8)`FA AXS%d& Hߴ"׼1U/wSE_įfE9$1NXU`#}?'O;s᰼;)Y7^AiғtMǔz^jY!Pдhe\"~ $Tt21of͇ Ix<-{!:$6lSS4<38e9'60*Agn*]3mdaje@ af{; ΍kaߟ#8參0Ӹi?eF7/rMOb愙),$"H͟MYQ|+3 /A^lD*dPt0qGiaF:,I wWG*ooU9 gU ,@K>vR$w2K>@n!v~o:R{3DLL pa{9~8$Хx/'K&~POi(]Hn9ȷ_s;\ 3@j!MHJ`5az"Ⱥ / L RGll2{JqDEjͨl~\lfNmL`3&K0} #/k,(6%lNs&Z [_ b)כUH'opd@{ڌHCGG\%W5Hg}ԞoX?1@Zh>K8 :83RBIVj-d9yT<"U*TR"w ếϕHfS_/˼S*nq *} V0}6m yxN{Cp,-V3YLDtwoȸOیy3ek.  5LHB0F¨:Aȇ]5׀԰kF:l}_kvJO]n'4ˣ>jr5JXM,Y91l]P8#;ޜYu`mVq#$"Npсpn^rHugv+Lī}~8U4oYF#66I]!ޗm@f/9/_rcd)Fuu*Y}# 5s8%wu667ޅHD-J|Sy# K,L#n/lʑzAXƛmo?ZL;y0yŧ\1VRb'y/ WǐtF|T[?ut_umVU \RibYҵN+?:b>.P\5L{:h țr)%J 4{Ql sbf?huc0zC OPΌqHklf}mA$TZ؉s΢Yv5w]Z3j̑>>ip1K8u?-5WJ9ő`?+: w+O!k\ Yxv!.hn($ԀHXEͫoíZN⹈(AFo!`VOv,i8_Ŧ;RclV0X'ܬ HiC8,}rT ݈ͳqa. אDV~& nbw/^ab,˂JͧNe[*Y4w?cْ̾bP[m:}6>t q#59X@SGzbfs/ɩ^o-fc>@^.? BEȃ3p6]ya tm &6]ؐ S߃QvQ8c~4O} 6bL5/9Okx{m?ٙYcw8ґ[!\'/}Xsw@orw<0|aDǮ MfIHa ZKt5SaC *E jK cgـkӠ)D__6b$L 3\{¨(r$@ ѳl2n vta0DGioe5,~2[ ԍ=o= & k~??.gt/b$֌`H*kx.k:1-AgI!*3Πt)G פ>2;9EtمTӷrZV̈́U]+ey5hCe᪻4^M;hIag#ҡfVn{3OIסAX0KaϙUO\r5fU0R*<v0*;rf p<S<?C.Dw$1htԌ&0A9@ lLcadm'W PnMX|cۨ{+ѣ.GqHcʔ(@*%cOeO>f}LI"_/Ұr3=,F zԋ N|hoUB%7I٨c|Q=8e?2@_QT]K}%tE\;ڽ G'i^&)!_;lM&^{΃ L '.?zZ]qL DMfP7|UR"'.*P}W0*S36hF]xےl,n gPB }A6u(5Mi hvp` 1>{sv 0yڐ@mBfhк!"A|eԨɀ3w;ؑ~v- $`L&h)&-% k衿dʘ2gYdG'DĻ[n%bExR3 0dنWW ė">#3vqC=yY ^"HU%/" Ic*# u*>kBfYt襧_~t f=.wʾIݝηo4?+o<]*@bNv8ۺ_ H;/7!+FqW$,^M`'7"s$w{wbd,/U=+6c*Z!D 8tea >Sy|0 CRobT ghO;w197Q+0mNx@aJ]y1ubϣQ;tB ŸjMUʕVI ݖ}Qt))yɪđ.=Ҫ|e͋O{8*hя8͍0 MdIPPW66nl4U XՋ>~T+͒ð(K= @^t?Ѳ+-p?-YGtmt7GuUf2PG&~Y.L̕Xzkh*Oe+?Zb$|[q[!~0[1= X2lN=7hc$kR&yc&DoB%Xr<@y o[khB.ώHx8m)}_n9&te(>ich髰z=0\}A%imTvi \$μ~C@zXKG nDA%\b OZʓk ~x.8nLruwSlPMc ) \<4C.W0g$ůYM4w"8(wtЈ,FX`J:cDe`_pG݀qw[t3c5hhHZuQ,o\IgMm-', 8pYN~z1BEsqh~kDjdYCW U{+jJ4r,'uUXDv,) *g_s ]ްz\5g u{ [۠|Efk2C0XUܳV԰d(SO}FcW֜ dGBFei"%(1l2Sv؟&^v۹:z\ y9[&oőis+X-+FgVglv15ĺ ,2:桼T6/ټD93=bJRĦwZ_}ȻhCAXvԁ{(BL M`7\%.%WcD yn4!ap6e)m LSk@!ALJn|."I2j*eCXqeo}H׿g\לJk"=GDLn&gDT7 BFzcPɍ\A/W E1u +/&iOSղ|ٗ8~K 6mg/t2g^\:}_Eϫ*2p*u;h[WxEUt>akeRC@揻G$ T}΀[}h>q˚<ɊT7D(eU.{!a+\s ~?SFL]⬷G"By}̱_;rsO#U/WyRJ JVk ɣG뮙5mEv.G 7vv9H!*o(LώRzcR#e蒪NH1\ Y8C~͙76UN?;zwm-,_Uab6h}lP.ΰWo{ [p昴ʉ_Uud{[ fFf= z reio/,-fGsUQWú8QU !nl}wrymjGsx0>oXW*jO 42Pn%hBqM|kGDW$,̕4Q+HJXk(;QxԀ Pv7愫Q&w`e^-;"Q&+C4pgNvt}mJu1OQDII'W$ZXPM /,O)k˴[q|RaFĴ(@X&hΓ Pj;xK繽lj@{d$F[G)k7Ѝf0lyE5D-P}==?}$|"BkKCoGwc;)T1)V?dc:/Ұ`sT[my9 j~ sxh܊$ Zj|* "K$ ']xڈ_8sidymmN̉Tmqّ6g]c7;*"u jţKF}>;#mo`Pi?H~hдܟt^7J櫖,_MK]^8d*/2b{$Yn {X&VQ dkOi\ NޘZi.SbΉM`wxX&Y㿠p)+(8e-pd"s~yAe0j{(v#96dSVdS gу8_:_w9ԉ\Pm`?e튻e Z!R@̙͹K-+ \ɏ* -sV!-)mۚKv`7%g.&*BtG?;oI,Яae"~OωbIscᦀk<,!pjRqUo&9;\6A=T5nBRZSw z%׏*> &ǀTӭY9 ifm{&Xyo)#O W|/%_FjV#@GiY쭐Q%x+YI`eM;B_6 /wÇRiP *p.qaM38$?Ýe3NŽ2n?H~_@8g6u|VuW6v%  7$NLz{caktqom*?ӵjPS]_!=g% N.݄!Eh4hfUQ0@r|}ίOU3[t{ԤE5.'1= w9*[ yoW4J:r(縻mړcʀs 5kkU_5Tپ?"buT-u giP׉7H-Jҁ>0C͝=TLK=k2f lGmًcdUxH ڝw"}a >tk?Zҕ> 1'B{p 1J0-4P]a KO+ݟV&8CD+쥹\|6b# )ːvN: R.Z&/̰asʭ rv) y>X% Mc;=i9뵼 N[Eeii ]^}U=Kk>3 Sq1{*{plDnjm>E5cz˂냥{|Wu/ANDoq l:;$ | ?$o Al./ΞvݢutV) N%ݏjk *wTP\6"|nI8~2\ԝ@U>bF=k;s#qQ( w52 k[@ʗq>qbLÀ91kayB @US9̀N$j-fԡ̏,B!"UPXKD[` iJ\՜~z5=A!M^ˁTʿҼ~sIbW)mSY|n{j48+ۃs:87 MP372r݀DT&bABw#.d 9)t<r!&w킘Tit'&oZ7wB o|Ϧݮ14L"d ӳq1iZ:bTf_0۾|vn