sssd-krb5-common-1.13.3-56.el6$>r,xTrB'Y6ǾJ>5?d ! \ *>\bh|    i pDHM(\8d9 l:`VGH(I<XDYL\h]|^b"deflCsssd-krb5-common1.13.356.el6SSSD helpers needed for Kerberos and GSSAPI authenticationProvides helper processes that the LDAP and Kerberos back ends can use for Kerberos user or host authentication.Xҿc1bm.rdu2.centos.orgUCentOSGPLv3+CentOS BuildSystem Applications/Systemhttp://fedorahosted.org/sssd/linuxi686 lKA큤AXҿXҿXҿVpnXҿ9cb87a44e749263711acbac08b95d14e878b05d68771b87c91224625897d3a23f0c71defcb6fb39b81c73d537f6295941c9f0453699603bbab3a437df9c771168ceb4b9ee5adedde47b31e975c1d90c73ad27b6b165a1dcd80c7c545eb65b903rootrootrootrootrootrootrootrootrootrootsssd-1.13.3-56.el6.src.rpmsssd-krb5-commonsssd-krb5-common(x86-32)   @@@@@@@@@@@@@@@@@@@@@@@@@ cyrus-sasl-gssapi(x86-32)sssd-commonrpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libcom_err.so.2libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdhash.so.1libdhash.so.1(DHASH_0.4.3)libdl.so.2libk5crypto.so.3libkrb5.so.3libkrb5.so.3(krb5_3_MIT)libpcre.so.0libpopt.so.0libpopt.so.0(LIBPOPT_0)libpthread.so.0libpthread.so.0(GLIBC_2.0)libpthread.so.0(GLIBC_2.12)libpthread.so.0(GLIBC_2.2)libsss_debug.solibtalloc.so.2libtalloc.so.2(TALLOC_2.0.2)rtld(GNU_HASH)rpmlib(PayloadIsXz)1.13.3-56.el64.6.0-14.0-13.0.4-15.2-1sssd1.10.0-8.beta24.8.0X6@X6@XS@XOXJXGXF@X@X6@X6@X-X!@X!@X&X X X WWWW@W@W_@W_@WWW@W@W@W@Wi,@WYZ@WPWPV@VJVJVV@VՄ@VՄ@V@V&@V=@V=@V@V@V@VvV%@V%@V%@VVVVVpVii@V\:@VXEVV@VV@VV@VMV2 @Vf@Vf@Vf@UAUUuUn@UmUjUcUcUUUUUJ@UB@UB@U@U?v@U>$U8U.RU.RU-@U-@U-@U-@UF@UF@UUUUUU U U U@U@U@U@T9TTTTTTT@T@T~T~Tk4Tk4T$TTT@SvSvSvS%@S0S<@S<@S<@SSSSSSS/S/S;@SFS@S@S@S@S@S@Si@S@SSS!@SsZSpSNpS 4@S 4@RRRRRRfhRD!R1R%@R @R @RR|R|R|R|R|RRRRRRRRRRRRR@R@R@R@R@R@R@R@R@R@Q@Q@QQ*@Q?@QQvwQkQIQ5@Q0@Q']Q @PPPP@P@P@P-P@P@P@PDPDPDPDP[PPPPP@P@P@P@PPPPPPPP @P @P @P @P @P @Pf@PPPPP @P @P @P @P@P@P@PPPPPPPP@P@P@PpPpPpP@P@P@P@P@P@P@PP@PP@P@P@P@P@PPXPP{P{P{Pz@PqnPl(PaP`K@P#@Oĺ@O"O"OOO@OO~O@OOO@O@Ou@Ou@Oc+@O]@OYOOdON@OLOLOLOLOLO;@O5O1@ObN@NNNN@NNNj@NN$@N$@NN@N@Nx@Nm@Ng\N[@NTN?N:N:N:NNN|@M{@M{@Mߒ@M@M۝M۝M@MM@M@M3@MM>M>M@MM@M@Mx@MM=M=MwkMwkMv@MtMtMc@Mc@MbSM_MQ0@MJMGMA^@MA^@MA^@M.@M9L!L@L@L@L@LNLNL@L@LA@L@Lk@LYV@LRLI@L7@L(L_LLGKj@KK@KK@KK[K@KK~}@K]KY@KO@KKK/c@K+nK"4@KJJ@JJJkJJ@JJp9JlE@J?r@J0J,@IcIcIzI)@I)@I)@IV@IV@I@I@III@Lukas Slebodnik - 1.13.3-56Lukas Slebodnik - 1.13.3-55Jakub Hrozek - 1.13.3-54Jakub Hrozek - 1.13.3-53Jakub Hrozek - 1.13.3-52Jakub Hrozek - 1.13.3-51Jakub Hrozek - 1.13.3-50Jakub Hrozek - 1.13.3-49Jakub Hrozek - 1.13.3-48Jakub Hrozek - 1.13.3-47Jakub Hrozek - 1.13.3-46Jakub Hrozek - 1.13.3-45Jakub Hrozek - 1.13.3-44Jakub Hrozek - 1.13.3-43Jakub Hrozek - 1.13.3-42Jakub Hrozek - 1.13.3-41Jakub Hrozek - 1.13.3-40Jakub Hrozek - 1.13.3-39Jakub Hrozek - 1.13.3-38Jakub Hrozek - 1.13.3-37Jakub Hrozek - 1.13.3-36Jakub Hrozek - 1.13.3-35Jakub Hrozek - 1.13.3-34Jakub Hrozek - 1.13.3-33Jakub Hrozek - 1.13.3-32Jakub Hrozek - 1.13.3-31Jakub Hrozek - 1.13.3-30Jakub Hrozek - 1.13.3-29Jakub Hrozek - 1.13.3-28Jakub Hrozek - 1.13.3-27Jakub Hrozek - 1.13.3-26Jakub Hrozek - 1.13.3-25Jakub Hrozek - 1.13.3-24Jakub Hrozek - 1.13.3-23Jakub Hrozek - 1.13.3-22Jakub Hrozek - 1.13.3-21Jakub Hrozek - 1.13.3-20Jakub Hrozek - 1.13.3-19Jakub Hrozek - 1.13.3-18Jakub Hrozek - 1.13.3-17Jakub Hrozek - 1.13.3-16Jakub Hrozek - 1.13.3-15Jakub Hrozek - 1.13.3-14Jakub Hrozek - 1.13.3-14Jakub Hrozek - 1.13.3-13Jakub Hrozek - 1.13.3-12Jakub Hrozek - 1.13.3-11Jakub Hrozek - 1.13.3-10Jakub Hrozek - 1.13.3-9Jakub Hrozek - 1.13.3-8Jakub Hrozek - 1.13.3-7Jakub Hrozek - 1.13.3-6Jakub Hrozek - 1.13.3-5Jakub Hrozek - 1.13.3-4Jakub Hrozek - 1.13.3-3Jakub Hrozek - 1.13.3-2Jakub Hrozek - 1.13.3-1Jakub Hrozek - 1.13.2-7Jakub Hrozek - 1.13.2-6Jakub Hrozek - 1.13.2-5Jakub Hrozek - 1.13.2-4Jakub Hrozek - 1.13.2-3Jakub Hrozek - 1.13.2-2Jakub Hrozek - 1.13.2-1Jakub Hrozek - 1.13.1-1Jakub Hrozek - 1.12.4-51Jakub Hrozek - 1.12.4-50Jakub Hrozek - 1.12.4-49Jakub Hrozek - 1.12.4-48Jakub Hrozek - 1.12.4-47Jakub Hrozek - 1.12.4-46Jakub Hrozek - 1.12.4-45Jakub Hrozek - 1.12.4-44Jakub Hrozek - 1.12.4-43Jakub Hrozek - 1.12.4-42Jakub Hrozek - 1.12.4-41Jakub Hrozek - 1.12.4-40Jakub Hrozek - 1.12.4-39Jakub Hrozek - 1.12.4-38Jakub Hrozek - 1.12.4-37Jakub Hrozek - 1.12.4-36Jakub Hrozek - 1.12.4-35Jakub Hrozek - 1.12.4-34Jakub Hrozek - 1.12.4-33Jakub Hrozek - 1.12.4-32Jakub Hrozek - 1.12.4-31Jakub Hrozek - 1.12.4-30Jakub Hrozek - 1.12.4-29Jakub Hrozek - 1.12.4-28Jakub Hrozek - 1.12.4-27Jakub Hrozek - 1.12.4-26Jakub Hrozek - 1.12.4-25Jakub Hrozek - 1.12.4-24Jakub Hrozek - 1.12.4-23Jakub Hrozek - 1.12.4-22Jakub Hrozek - 1.12.4-21Jakub Hrozek - 1.12.4-20Jakub Hrozek - 1.12.4-19Jakub Hrozek - 1.12.4-18Jakub Hrozek - 1.12.4-17Jakub Hrozek - 1.12.4-16Jakub Hrozek - 1.12.4-15Jakub Hrozek - 1.12.4-14Jakub Hrozek - 1.12.4-13Jakub Hrozek - 1.12.4-12Jakub Hrozek - 1.12.4-11Jakub Hrozek - 1.12.4-10Jakub Hrozek - 1.12.4-9Jakub Hrozek - 1.12.4-8Jakub Hrozek - 1.12.4-7Jakub Hrozek - 1.12.4-6Jakub Hrozek - 1.12.4-5Jakub Hrozek - 1.12.4-4Jakub Hrozek - 1.12.4-3Jakub Hrozek - 1.12.4-2Jakub Hrozek - 1.12.4-1Jakub Hrozek - 1.11.6-33Jakub Hrozek - 1.11.6-32Jakub Hrozek - 1.11.6-31Jakub Hrozek - 1.11.6-30Jakub Hrozek - 1.11.6-29Jakub Hrozek - 1.11.6-28Jakub Hrozek - 1.11.6-27Jakub Hrozek - 1.11.6-26Jakub Hrozek - 1.11.6-25Jakub Hrozek - 1.11.6-24Jakub Hrozek - 1.11.6-23Jakub Hrozek - 1.11.6-22Jakub Hrozek - 1.11.6-21Jakub Hrozek - 1.11.6-20Jakub Hrozek - 1.11.6-19Jakub Hrozek - 1.11.6-18Jakub Hrozek - 1.11.6-17Jakub Hrozek - 1.11.6-16Jakub Hrozek - 1.11.6-15Jakub Hrozek - 1.11.6-14Jakub Hrozek - 1.11.6-13Jakub Hrozek - 1.11.6-12Jakub Hrozek - 1.11.6-11Jakub Hrozek - 1.11.6-10Jakub Hrozek - 1.11.6-9Jakub Hrozek - 1.11.6-8Jakub Hrozek - 1.11.6-7Jakub Hrozek - 1.11.6-6Jakub Hrozek - 1.11.6-5Jakub Hrozek - 1.11.6-4Jakub Hrozek - 1.11.6-3Jakub Hrozek - 1.11.6-2Jakub Hrozek - 1.11.6-1Jakub Hrozek - 1.11.5.1-4Jakub Hrozek - 1.11.5.1-3Jakub Hrozek - 1.11.5.1-2Jakub Hrozek - 1.11.5.1-1Jakub Hrozek - 1.9.2-134Jakub Hrozek - 1.9.2-133Jakub Hrozek - 1.9.2-132Jakub Hrozek - 1.9.2-131Jakub Hrozek - 1.9.2-130Jakub Hrozek - 1.9.2-129Jakub Hrozek - 1.9.2-128Jakub Hrozek - 1.9.2-127Jakub Hrozek - 1.9.2-126Jakub Hrozek - 1.9.2-125Jakub Hrozek - 1.9.2-124Jakub Hrozek - 1.9.2-123Jakub Hrozek - 1.9.2-122Jakub Hrozek - 1.9.2-121Jakub Hrozek - 1.9.2-120Jakub Hrozek - 1.9.2-119Jakub Hrozek - 1.9.2-118Jakub Hrozek - 1.9.2-117Jakub Hrozek - 1.9.2-116Jakub Hrozek - 1.9.2-115Jakub Hrozek - 1.9.2-114Jakub Hrozek - 1.9.2-113Jakub Hrozek - 1.9.2-112Jakub Hrozek - 1.9.2-111Jakub Hrozek - 1.9.2-110Jakub Hrozek - 1.9.2-109Jakub Hrozek - 1.9.2-108Jakub Hrozek - 1.9.2-107Jakub Hrozek - 1.9.2-106Jakub Hrozek - 1.9.2-105Jakub Hrozek - 1.9.2-104Jakub Hrozek - 1.9.2-103Jakub Hrozek - 1.9.2-102Jakub Hrozek - 1.9.2-101Jakub Hrozek - 1.9.2-100Jakub Hrozek - 1.9.2-99Jakub Hrozek - 1.9.2-98Jakub Hrozek - 1.9.2-97Jakub Hrozek - 1.9.2-96Jakub Hrozek - 1.9.2-95Jakub Hrozek - 1.9.2-94Jakub Hrozek - 1.9.2-93Jakub Hrozek - 1.9.2-92Jakub Hrozek - 1.9.2-91Jakub Hrozek - 1.9.2-90Jakub Hrozek - 1.9.2-89Jakub Hrozek - 1.9.2-88Jakub Hrozek - 1.9.2-87Jakub Hrozek - 1.9.2-86Jakub Hrozek - 1.9.2-85Jakub Hrozek - 1.9.2-84Jakub Hrozek - 1.9.2-83Jakub Hrozek - 1.9.2-82Jakub Hrozek - 1.9.2-81Jakub Hrozek - 1.9.2-80Jakub Hrozek - 1.9.2-79Jakub Hrozek - 1.9.2-78Jakub Hrozek - 1.9.2-77Jakub Hrozek - 1.9.2-76Jakub Hrozek - 1.9.2-75Jakub Hrozek - 1.9.2-74Jakub Hrozek - 1.9.2-73Jakub Hrozek - 1.9.2-72Jakub Hrozek - 1.9.2-71Jakub Hrozek - 1.9.2-70Jakub Hrozek - 1.9.2-69Jakub Hrozek - 1.9.2-68Jakub Hrozek - 1.9.2-67Jakub Hrozek - 1.9.2-66Jakub Hrozek - 1.9.2-65Jakub Hrozek - 1.9.2-64Jakub Hrozek - 1.9.2-63Jakub Hrozek - 1.9.2-62Jakub Hrozek - 1.9.2-61Jakub Hrozek - 1.9.2-60Jakub Hrozek - 1.9.2-59Jakub Hrozek - 1.9.2-58Jakub Hrozek - 1.9.2-57Jakub Hrozek - 1.9.2-56Jakub Hrozek - 1.9.2-55Jakub Hrozek - 1.9.2-54Jakub Hrozek - 1.9.2-53Jakub Hrozek - 1.9.2-52Jakub Hrozek - 1.9.2-51Jakub Hrozek - 1.9.2-50Jakub Hrozek - 1.9.2-49Jakub Hrozek - 1.9.2-48Jakub Hrozek - 1.9.2-47Jakub Hrozek - 1.9.2-46Jakub Hrozek - 1.9.2-45Jakub Hrozek - 1.9.2-44Jakub Hrozek - 1.9.2-43Jakub Hrozek - 1.9.2-42Jakub Hrozek - 1.9.2-41Jakub Hrozek - 1.9.2-40Jakub Hrozek - 1.9.2-39Jakub Hrozek - 1.9.2-38Jakub Hrozek - 1.9.2-37Jakub Hrozek - 1.9.2-36Jakub Hrozek - 1.9.2-35Jakub Hrozek - 1.9.2-34Jakub Hrozek - 1.9.2-33Jakub Hrozek - 1.9.2-32Jakub Hrozek - 1.9.2-31Jakub Hrozek - 1.9.2-30Jakub Hrozek - 1.9.2-29Jakub Hrozek - 1.9.2-28Jakub Hrozek - 1.9.2-27Jakub Hrozek - 1.9.2-26Jakub Hrozek - 1.9.2-25Jakub Hrozek - 1.9.2-24Jakub Hrozek - 1.9.2-23Jakub Hrozek - 1.9.2-22Jakub Hrozek - 1.9.2-21Jakub Hrozek - 1.9.2-20Jakub Hrozek - 1.9.2-20Jakub Hrozek - 1.9.2-19Jakub Hrozek - 1.9.2-18Jakub Hrozek - 1.9.2-17Jakub Hrozek - 1.9.2-16Jakub Hrozek - 1.9.2-15Jakub Hrozek - 1.9.2-14Jakub Hrozek - 1.9.2-13Jakub Hrozek - 1.9.2-12Jakub Hrozek - 1.9.2-11Jakub Hrozek - 1.9.2-10Jakub Hrozek - 1.9.2-9Jakub Hrozek - 1.9.2-8Jakub Hrozek - 1.9.2-7Jakub Hrozek - 1.9.2-6Jakub Hrozek - 1.9.2-5Jakub Hrozek - 1.9.2-4Jakub Hrozek - 1.9.2-3Jakub Hrozek - 1.9.2-2Jakub Hrozek - 1.9.2-1Jakub Hrozek - 1.9.1-1Jakub Hrozek - 1.9.0-3Jakub Hrozek - 1.9.0-2Jakub Hrozek - 1.9.0-1.rc1Jakub Hrozek - 1.8.0-33Stephen Gallagher - 1.8.0-32Stephen Gallagher - 1.8.0-31Stephen Gallagher - 1.8.0-30Stephen Gallagher - 1.8.0-29Stephen Gallagher - 1.8.0-28Stephen Gallagher - 1.8.0-27Stephen Gallagher - 1.8.0-26Stephen Gallagher - 1.8.0-25Stephen Gallagher - 1.8.0-24Stephen Gallagher - 1.8.0-23Stephen Gallagher - 1.8.0-22Stephen Gallagher - 1.8.0-21Stephen Gallagher - 1.8.0-20Stephen Gallagher - 1.8.0-18Stephen Gallagher - 1.8.0-17Stephen Gallagher - 1.8.0-15Stephen Gallagher - 1.8.0-12Stephen Gallagher - 1.8.0-11Stephen Gallagher - 1.8.0-10Stephen Gallagher - 1.8.0-9Stephen Gallagher - 1.8.0-8Stephen Gallagher - 1.8.0-7Stephen Gallagher - 1.8.0-6Stephen Gallagher - 1.8.0-5Stephen Gallagher - 1.8.0-4.beta3Stephen Gallagher - 1.8.0-3.beta2Stephen Gallagher - 1.8.0-2.beta2Stephen Gallagher - 1.5.1-68Stephen Gallagher - 1.5.1-67Stephen Gallagher - 1.5.1-66Stephen Gallagher - 1.5.1-65Stephen Gallagher - 1.5.1-64Stephen Gallagher - 1.5.1-63Stephen Gallagher - 1.5.1-62Stephen Gallagher - 1.5.1-61Stephen Gallagher - 1.5.1-60Stephen Gallagher - 1.5.1-59Stephen Gallagher - 1.5.1-58Stephen Gallagher - 1.5.1-57Stephen Gallagher - 1.5.1-56Stephen Gallagher - 1.5.1-55Stephen Gallagher - 1.5.1-53Stephen Gallagher - 1.5.1-52Stephen Gallagher - 1.5.1-51Stephen Gallagher - 1.5.1-50Stephen Gallagher - 1.5.1-49Stephen Gallagher - 1.5.1-48Stephen Gallagher - 1.5.1-47Stephen Gallagher - 1.5.1-46Stephen Gallagher - 1.5.1-45Stephen Gallagher - 1.5.1-44Stephen Gallagher - 1.5.1-43Stephen Gallagher - 1.5.1-42Stephen Gallagher - 1.5.1-41Stephen Gallagher - 1.5.1-40Stephen Gallagher - 1.5.1-39Stephen Gallagher - 1.5.1-38Stephen Gallagher - 1.5.1-37Stephen Gallagher - 1.5.1-36Stephen Gallagher - 1.5.1-35Stephen Gallagher - 1.5.1-34Stephen Gallagher - 1.5.1-33Stephen Gallagher - 1.5.1-32Stephen Gallagher - 1.5.1-31Stephen Gallagher - 1.5.1-30Stephen Gallagher - 1.5.1-29Stephen Gallagher - 1.5.1-28Stephen Gallagher - 1.5.1-27Stephen Gallagher - 1.5.1-26Stephen Gallagher - 1.5.1-25Stephen Gallagher - 1.5.1-24Stephen Gallagher - 1.5.1-23Stephen Gallagher - 1.5.1-21Stephen Gallagher - 1.5.1-20Stephen Gallagher - 1.5.1-17Stephen Gallagher - 1.5.1-16Stephen Gallagher - 1.5.1-15Stephen Gallagher - 1.5.1-14Stephen Gallagher - 1.5.1-13Stephen Gallagher - 1.5.1-12Stephen Gallagher - 1.5.1-11Stephen Gallagher - 1.5.1-10Stephen Gallagher - 1.5.1-9Stephen Gallagher - 1.5.1-8Stephen Gallagher - 1.5.1-7Stephen Gallagher - 1.5.1-6Stephen Gallagher - 1.5.1-5Stephen Gallagher - 1.5.1-4Stephen Gallagher - 1.5.1-3Stephen Gallagher - 1.5.1-2Stephen Gallagher - 1.5.1-1Stephen Gallagher - 1.5.0-2Stephen Gallagher - 1.5.0-1Stephen Gallagher - 1.2.1-28.4Stephen Gallagher - 1.2.1-36Stephen Gallagher - 1.2.1-35Stephen Gallagher - 1.2.1-28.3Stephen Gallagher - 1.2.1-34Stephen Gallagher - 1.2.1-28.2Stephen Gallagher - 1.2.1-33Stephen Gallagher - 1.2.1-28.1Stephen Gallagher - 1.2.1-32Stephen Gallagher - 1.2.1-29Stephen Gallagher - 1.2.1-28Stephen Gallagher - 1.2.1-27Stephen Gallagher - 1.2.1-26Stephen Gallagher - 1.2.1-23Stephen Gallagher - 1.2.1-21Stephen Gallagher - 1.2.1-20Stephen Gallagher - 1.2.1-19Stephen Gallagher - 1.2.1-15Stephen Gallagher - 1.2.0-14Stephen Gallagher - 1.2.0-13Stephen Gallagher - 1.2.0-12Stephen Gallagher - 1.1.92-11.1Stephen Gallagher - 1.1.92-11Stephen Gallagher - 1.1.91-10Simo Sorce - 1.1.1-3Stephen Gallagher - 1.1.1-1Stephen Gallagher - 1.1.0-2Stephen Gallagher - 1.1.0-1.pre20100317git0ea7f19Stephen Gallagehr - 1.0.5-2Stephen Gallagher - 1.0.5-1Stephen Gallagher - 1.0.4-1Stephen Gallagher - 1.0.3-1Stephen Gallagher - 1.0.2-1Stephen Gallagher - 1.0.1-1Stephen Gallagher - 1.0.0-2Stephen Gallagher - 1.0.0-1Stephen Gallagher - 0.99.1-1Stephen Gallagher - 0.99.0-1Stephen Gallagher - 0.7.1-1Stephen Gallagher - 0.7.0-2Stephen Gallagher - 0.7.0-1Stephen Gallagher - 0.6.1-2Stephen Gallagher - 0.6.1-1Stephen Gallagher - 0.6.0-1Sumit Bose - 0.6.0-0Simo Sorce - 0.5.0-0Jakub Hrozek - 0.4.1-4Fedora Release Engineering - 0.4.1-3Simo Sorce - 0.4.1-2Simo Sorce - 0.4.1-1Simo Sorce - 0.4.1-0Simo Sorce - 0.3.2-2Jakub Hrozek - 0.3.2-1Simo Sorce - 0.3.1-2Simo Sorce - 0.3.1-1Simo Sorce - 0.3.0-2Simo Sorce - 0.3.0-1Simo Sorce - 0.2.1-1Simo Sorce - 0.2.0-1Jakub Hrozek - 0.1.0-5.20090309git691c9b3Jakub Hrozek - 0.1.0-4Sumit Bose - 0.1.0-3Jakub Hrozek - 0.1.0-2Stephen Gallagher - 0.1.0-1- Resolves: rhbz#1404697 - SSSD does not skip GPO if no gpcFunctionalityVersion present - Resolves: rhbz#1374813 - SSSD fails to process GPO from Active Directory- Resolves: rhbz#1415785 - ldap_child does not remove temporary files when it's killed with SIGTERM- Apply several more smartcard-related patches. - Related: rhbz#1300421 - Screen locks and smart card is removed - must show a message to insert the correct smartcard- Resolves: rhbz#1400643 - sssd prevents sudo from getting data from LDAP- Resolves: rhbz#1393592 - SSH-CERT: always initialize cert_verify_opts- Revert the ding-libs requirement - Related: rhbz#1374813 - SSSD fails to process GPO from Active Directory.- Related: rhbz#1369921 - Members of nested netgroups configured in IdM cannot be seen by getent on clients- Require the matching version of ding-libs - Related: rhbz#1374813 - SSSD fails to process GPO from Active Directory.- Fix a coverity warning - Related: rhbz#1382395 - sudo: ignore case on case insensitive domains- Resolves: rhbz#1382395 - sudo: ignore case on case insensitive domains- Resolves: rhbz#1369921 - Members of nested netgroups configured in IdM cannot be seen by getent on clients- Resolves: rhbz#1324428 - [RFE] Discover forest's root SID even if subdomains_provider = none- Resolves: rhbz#1367802 - using overides causes segfault in libldb- Resolves: rhbz#1329378 - pam_sss set KRB5CCNAME with sudo logins- Resolves: rhbz#1382603 - autofs map resolution doesn't work offline- Resolves: rhbz#1339986 - [sssd-ldap] man page needs attention- Resolves: rhbz#1321884 - IPA sudo: support the externalUser attribute- Resolves: rhbz#1299994 - ssh client checks only the first certificate on a smartcard when the card has multiple certs - Resolves: rhbz#1300421 - Screen locks and smart card is removed - must show a message to insert the correct smartcard - Resolves: rhbz#1372681 - ssh with Smartcards - skip invalid certificates- Resolves: rhbz#1329648 - Protocol error with IPA on RHEL-6 - Resolves: rhbz#1329647 - IPA view: view name not stored properly with default FreeIPA installation- Resolves: rhbz#1339986 - [sssd-ldap] man page needs attention- Resolves: rhbz#1327272 - local overrides: issues with sub-domain users and mixed case names- Resolves: rhbz#1293168 - Inconsistent user synching between IPA and AD- Resolves: rhbz#1374813 - SSSD fails to process GPO from Active Directory.- Resolves: rhbz#1377782 - sssd is looking at a server in the GC of a subdomain, not the root domain.- Resolves: rhbz#1365218 - SSSD does not fail over to next GC- Resolves: rhbz#1367435 - Intermittent sssd auth failures- Resolves: rhbz#1369079 - sssd runs out of available child slots and starts queuing requests in proxy mode- Resolves: rhbz#1338619 - segmentation fault in sssd after upgrade to sssd-1.13.3-22.el6.x86_64 when upgrading cache- Resolves: rhbz#1324107 - GPO: Access denied after blocking connection to AD.- Resolves: rhbz#1293168 - Inconsistent user synching between IPA and AD- Resolves: rhbz#1340927 - sssd-common requires libnfsidmap- Resolves: rhbz#1340176 - The AD keytab renewal task leaks a file descriptor- Resolves: rhbz#1335400 - In IPA-AD trust environment access is granted to AD user even if the user is disabled on AD.- Resolves: rhbz#1336453 - sssd_be doesn't terminate forked child process if adcli is not installed- Resolves: rhbz#1312062 - sssd does not pass LDAP rules to sudo- Resolves: rhbz#1313940 - SSSD PAM module does not support multiple password prompts (e.g. Password + Token) with sudo- Actually apply patches from previous build - Resolves: rhbz#1313940 - sudorule not working with ipa sudo_provider- Resolves: rhbz#1313940 - sudorule not working with ipa sudo_provider- Resolves: rhbz#1209600 - Getting ERROR (getpwnam() failed): Broken pipe with 1.11.6- Backport of a more minimal dependency patch to avoid changes to AD provider behaviour - Related: rhbz#1264705 - Allow SSSD to notify user of denial due to AD account lockout- Resolves: rhbz#1308939 - After removing certificate from user in IPA and even after sss_cache, FindByCertificate still finds the user- Require a newer selinux-policy to avoid issues when prompting for SC PIN - Related: rhbz#1299066 - smartcard login does not prompt for pin when ocsp checking is enabled (default config)- Resolves: rhbz#1264705 - Allow SSSD to notify user of denial due to AD account lockout- Resolves: rhbz#1259687 - sssd_nss memory usage keeps growing on sssd-1.12.4-47.el6.x86_64 (RHEL6.7) when trying to retrieve non-existing netgroups- Update sssd-ldap man page for the recent ID mapping changes - Related: rhbz#1268902 - SSSD doesn't set the ID mapping range automatically- Resolves: rhbz#1295883 - refresh_expired_interval stops sss_cache from working- Resolves: rhbz#1268902 - SSSD doesn't set the ID mapping range automatically- Resolves: rhbz#1298253 - Screen lock prompts for smartcard user password and not smartcard pin when logged in using smartcard pin- Resolves: rhbz#1292458 - sssd_be AD segfaults on missing A record- Resolves: rhbz#1262981 - sssd dereference processing failed : Input/output error- Resolves: rhbz#1290761 - [RFE] Support Automatic Renewing of Kerberos Host Keytabs- Resolves: rhbz#1244957 - [RFE] SUDO: Support the IPA schema- Resolves: rhbz#1298634 - Cannot retrieve users after upgrade from 1.12 to 1.13- Resolves: rhbz#1287807 - SRV lookup for KDC servers doesn't work- Resolves: rhbz#1273802 - ad_site parameter does not work- Fix memory leak in the NFS plugin - Related: rhbz#1269820 - Rebase SSSD to 1.13.x in RHEL-6.8 - Resolves: rhbz#1296620 - Properly remove OriginalMemberOf attribute in SSSD cache if user has no secondary groups anymore - Resolves: rhbz#1283898 - MAN: Clarify that subdomains always use service discovery- Rebase to 1.13.3 - Remove setuid bit from proxy_child, RHEL-6 doesn't support running SSSD as a non-privileged user - Resolves: rhbz#1269820 - Rebase SSSD to 1.13.x in RHEL-6.8- Don't own files as the SSSD user - Resolves: rhbz#1289482 - warning: user sssd does not exist - using root- Resolves: rhbz#1279971 - groups get deleted from the cache- The p11_child doesn't have to run privileged anymore, remove the setuid bit - Related: rhbz#1270027 - [RFE] Support for smart cards- Resolves: rhbz#1266108 - Check next certificate on smart card if first is not valid - Also enable OCSP checks- Resolves: rhbz#1285852 - sssd: [sysdb_add_user] (0x0400): Error: 17 (File exists)- Silence compilation warnings and Coverity issues - Related: rhbz#1269820 - Rebase SSSD to 1.13.x in RHEL-6.8- Resolves: rhbz#1269820 - Rebase SSSD to 1.13.x in RHEL-6.8 - Squash in packaging review changes by lslebodn@redhat.com- Resolves: rhbz#1269820 - Rebase SSSD to 1.13.x in RHEL-6.8 - The rebase also resolves the following bugzillas: - Resolves: rhbz#1270029 - [RFE] Add a way to lookup users based on CAC identity certificates - Resolves: rhbz#1270027 - [RFE] Support for smart cards - Resolves: rhbz#1269422 - [FEAT] UID and GID mapping on individual clients - Resolves: rhbz#1269421 - [RFE] The fast memory cache should cache initgroups - Resolves: rhbz#1265429 - If the site discovery fails, ad-site option is not taken into account. - Resolves: rhbz#1254193 - Fix for cyclic dependencies between sssd-{krb5,}-common - Resolves: rhbz#1247997 - [IPA/IdM] sudoOrder not honored as expected - Resolves: rhbz#1237142 - [RFE] authenticate against cache in SSSD - Resolves: rhbz#1232632 - Kerberos-based providers other than krb5 do not queue requests - Resolves: rhbz#1227804 - Group members are not turned into ghost entries when the user is purged from the SSSD cache - Resolves: rhbz#1227685 - sssd with ldap backend throws error domain log - Resolves: rhbz#1221365 - [RFE] Support GPOs from different domain controllers - Resolves: rhbz#1215195 - Override for IPA users with login does not list user all groups - Resolves: rhbz#1196204 - sssd cache holding gid values for nss, but not the alpha group name representation - Resolves: rhbz#1194039 - [RFE] User's home directories are not taken from AD when there is an IPA trust with AD- Resolves: rhbz#1266404 - Memory leak / possible DoS with krb auth.- Resolves: rhbz#1264524 - SSSD POSIX attribute check is too strict- Resolves: rhbz#1255285 - cleanup_groups should sanitize dn of groups- Resolves: rhbz#1251349 - sysdb sudo search doesn't escape special characters- Resolves: rhbz#1232738 - Cache is not updated after user is deleted from ldap server- Resolves: rhbz#1227860 - Provide a way to disable the cleanup task - Resolves: rhbz#1227863 - ignore_group_members doesn't work for subdomains- Resolves: rhbz#1226834 - id lookup for non-root domain users doesn't return all groups on first attempt- Resolves: rhbz#1225614 - IPA enumeration provider crashes- Resolves: rhbz#1212610 - sssd ad groups work intermittently- Resolves: rhbz#1215765 - sssd nss responder gets wrong number of secondary groups- Resolves: rhbz#1221358 - SSSD doesn't work with ID mapping and disabled subdomains- Resolves: rhbz#1219844 - Unable to resolve group memberships for AD users when using sssd-1.12.2-58.el7_1.6.x86_64 client in combination with ipa-server-3.0.0-42.el6.x86_64 with AD Trust- Resolves: rhbz#1216094 - /usr/libexec/sssd/selinux_child crashes and gets avc denial when ssh- Include several upstream fixes related to ID views - Resolves: rhbz#1215195 - Override for IPA users with login does not list user all groups - Resolves: rhbz#1213947 - Group resolution is inconsistent with group overrides - Resolves: rhbz#1213822 - Overrides with --login work in second attempt- Resolves: rhbz#1217328 - autofs provider fails when default_domain_suffix and use_fully_qualified_names set- Resolves: rhbz#1212387 - sssd_be segfault id_provider = ad src/providers/ad/ad_gpo.c:843- Resolves: rhbz#1213940 - Overridde with --login fails trusted adusers group membership resolution- Resolves: rhbz#1170910 - SSSD should not fail authentication when only allow rules are used- Resolves: rhbz#1213716 - idoverridegroup for ipa group with --group-name does not work - Resolves: rhbz#1213822 - Overrides with --login work in second attempt- Resolves: rhbz#1212017 - Sudo responder does not respect filter_users and filter_groups- Resolves: rhbz#1203642 - GPO access control looks for computer object in user's domain only- Related: rhbz#1211728 - Only set the selinux context if the context differs from the local one- Package the localauth plugin - Related: rhbz#1168357 - [RFE] Implement localauth plugin for MIT krb5 1.12- Resolves: rhbz#1207720 - id lookup resolves "Domain Local" group and errors appear in domain log- BuildRequire the proper libkrb5 version for correct localauth plugin build - Related: rhbz#1168357 - [RFE] Implement localauth plugin for MIT krb5 1.12- Resolves: rhbz#1194367 - sssd_be dumping core- Resolves: rhbz#1206121 - ldap_access_order=ppolicy: Explicitly mention in manpage that unsupported time specification will lead to sssd denying access- Resolves: rhbz#1205382 - Properly handle AD's binary objectGUID- Resolves: rhbz#1205716 - Installing sssd-common-1.12.4-18.el6 might install with wrong user account (root)- Fix a typo in DEBUG message - Related: rhbz#1173198 - [RFE] Have OpenLDAP lock out ssh keys when account naturally expires- Handle TTL=0 in SRV queries correctly - Resolves: rhbz#1171378 - Read and use the TTL value when resolving a SRV query- Cherry-pick unit test changes from upstream to allow cherry-picking sssd-1-12 patches - Remove unused LDAP provider code to avoid static analyser warnings - Related: rhbz#1168347 - Rebase sssd to 1.12.x- Resolves: rhbz#1206092 - sssd crashes intermittently in GPO code- Resolves: rhbz#1202728 - sssd-ad requires samba3, but ipa-server-trust-ad requires samba4- Resolves: rhbz#1203630 - SSSD doesn't own the GPO cache directory- Fix warning in SELinux code - Handle setups with empty default and no SELinux maps - Related: rhbz#1194302 - With empty ipaselinuxusermapdefault security context on client is staff_u - Resolves: rhbz#1202305 - sssd_be segfault on IPA(when auth with AD trusted domain) client at src/providers/ipa/ipa_s2n_exop.c:1605 - Resolves: rhbz#1201847 - SSSD downloads too much information when fetching information about groups- Fix PAM responder initgroups cache for subdomain users - Log extop failures better - Related: rhbz#1168344 - [RFE] ID Views: Support migration from the sync solution to the trust solution- Fix internal error codes broken when fixing rhbz#1036745 - Related: rhbz#1036745 - [RFE] Allow SSSD to issue shadow expiration warning even if alternate authentication method is used- Resolves: rhbz#1200093 - sssd_nss segfaults if initgroups request is by UPN and doesn't find anything- Fix Coverity warning in ldap_child - Add better debugging - Related: rhbz#1198478 - ccname_file_dummy is not unlinked on error- Resolves: rhbz#1098147 - [RFE] Implement background refresh for users, groups or other cache objects- Resolves: rhbz#1173198 - [RFE] Have OpenLDAP lock out ssh keys when account naturally expires- Initialize a pointer in ldap_child to NULL - Resolves: rhbz#1198478 - ccname_file_dummy is not unlinked on error- Relax the ldb requirement - Related: rhbz#1168347 - Rebase sssd to 1.12.x- Resolves: rhbz#1194302 - With empty ipaselinuxusermapdefault security context on client is staff_u- Resolves: rhbz#1198478 - ccname_file_dummy is not unlinked on error- Resolves: rhbz#1171378 - Read and use the TTL value when resolving a SRV query- Resolves: rhbz#1171378 - Read and use the TTL value when resolving a SRV query - Rebuild against latest krb5, add a versioned BuildRequires - Resolves: rhbz#1168357 - [RFE] Implement localauth plugin for MIT krb5 1.12- Related: rhbz#1036745 - [RFE] Allow SSSD to issue shadow expiration warning even if alternate authentication method is used- Do not mark the selinux_child helper as setuid, we don't support rootless SSSD in 6.7 - Related: rhbz#1168347 - Rebase sssd to 1.12.x- Resolves: rhbz#1168347 - Rebase sssd to 1.12.x - The rebase resolves the following RHEL bugzillas - Resolves: rhbz#1172865 - sssd.conf(5) man page gives bad advice about domains parameter - Resolves: rhbz#1172494 - PAC: krb5_pac_verify failures should not be fatal (backport fix from upstream) - Resolves: rhbz#1171782 - [RFE]: SSSD should preserve case for user uid field - Resolves: rhbz#1170910 - SSSD should not fail authentication when only allow rules are used - Resolves: rhbz#1168377 - [RFE] User's home directories and shells are not taken from AD when there is an IPA trust with AD - Resolves: rhbz#1168363 - [RFE] Add domains= option to pam_sss - Resolves: rhbz#1168344 - [RFE] ID Views: Support migration from the sync solution to the trust solution - Resolves: rhbz#1161564 - [RFE]ad provider dns_discovery_domain option: kerberos discovery is not using this option - Resolves: rhbz#1148582 - inconsistent group information when multiple ad domain sections are configured in sssd - Resolves: rhbz#1140909 - sssd.conf man page missing subdomains_provider ad support - Resolves: rhbz#1139878 - SSSD connection terminated after failing anonymous bind to IBM Tivoli Directory Server - Resolves: rhbz#1135838 - Man sssd-ldap shows parameter ldap_purge_cache_timeout with "Default: 10800 (12 hours)" - Resolves: rhbz#1135432 - Dereference code errors out when dereferencing entries protected by ACIs - Resolves: rhbz#1134942 - sssd does not recognize Windows server 2012 R2's LDAP as AD - Resolves: rhbz#1123291 - automount segfaults in sss_nss_check_header - Resolves: rhbz#1088402 - [RFE] Allow login through SSSD using multiple attributes- Resolves: rhbz#1154042 - RHEL6.6 sssd (1.11) doesn't return all group memberships against an IPA server- Resolves: rhbz#1160713 - TokenGroups for LDAP provider breaks in corner cases- Resolves: rhbz#1141814 - Password expiration policies are not being enforced by SSSD- Resolves: rhbz#1139044 - RHEL6.6 ipa user private group not found- Resolves: rhbz#1103487 - CVE-2014-0249 - sssd: incorrect expansion of group membership when encountering a non-POSIX group- Resolves: rhbz#1125187 - simple_allow_groups does not lookup groups from other AD domains- Resolves: rhbz#1127270 - sssd connect to ipa-server is long- Resolves: rhbz#1130017 - Saving group membership fails if provider is AD, POSIX attributes are used and primary group contains the user as a member- Resolves: rhbz#1111528 - Expired shadow policy user(shadowLastChange=0) is not prompted for password change- Resolves: rhbz#1132361 - use-after-free in dyndns code- Resolves: rhbz#1099290: RFE: Be able to configure sssd to honor openldap account lock to restrict access via ssh key- Use the correct sudo iterator - Related: rhbz#1118336 - sudo: invalid sudoHost filter with asterisk- Add notes about offline mode to sssd.conf - Related: rhbz#1110226 - Requests queued during transition from offline to online mode- Resolves: rhbz#1127278 - Auth fails when space in username is replaced with character set by override_default_whitespace- Resolves: rhbz#1127757 - sssd can't retrieve sudo rules when using the "default_domain_suffix" option- Resolves: rhbz#1127265 - Problems with tokengroups and ldap_group_search_base- Resolves: rhbz#1126636 - RHEL6.6 sssd not running after upgrade- Resolves: rhbz#1128612 - IFP: FQDN lookups are broken- Resolves: rhbz#1118336 - sudo: invalid sudoHost filter with asterisk- Resolves: rhbz#1110226 - Requests queued during transition from offline to online mode- Resolves: rhbz#1122873 - Failover does not always happen from SRV to hostname resolution(via /etc/hosts) - Remove spurious systemctl call on %postun- Resolves: rhbz#1111317 - [RFE] Add option for sssd to replace space with specified character in LDAP group- Resolves: rhbz#1109188 - dereferencing control failure against openldap server- Resolves: rhbz#1084532 - sssd_sudo process segfaults- Resolves: rhbz#1122158 - ad: group membership is empty when id mapping is off and tokengroups are enabled- Resolves: rhbz#1118541 - Floating point exception using ldap- Resolves: rhbz#1042922 - [RFE] Add fallback to sudoRunAs when sudoRunAsUser is not defined and no ldap_sudorule_runasuser mapping has been defined in SSSD- Resolves: rhbz#1120508 - tokengroups do not work with id_provider=ldap- Fix potential NULL dereference in IFP code - Related: rhbz#1110369 - sssd is started before messagebus, making sssd-ifp fail- BuildRequire the latest libini_config - Related: #1051164 - Rebase SSSD to 1.11+ in RHEL6- Resolves: rhbz#1110369 - sssd is started before messagebus, making sssd-ifp fail- Resolves: rhbz#1104145 - public key validator is too strict and does not allow newlines anywhere in the public key string, not even at the end- Rebase to 1.11.6 - Resolves: #1051164 - Rebase SSSD to 1.11+ in RHEL6- Rebuild against new ding-libs - Related: #1051164 - Rebase SSSD to 1.11+ in RHEL6- Backport the InfoPipe patches needed for Sat6 integration - Related: #1051164 - Rebase SSSD to 1.11+ in RHEL6- Resolves: #1085412 - SSSD Crashes when storage experiences high latency- Resolves: #1051164 - Rebase SSSD to 1.11+ in RHEL6Resolves: #1036168 - sssd can't retrieve auto.master when using the "default_domain_suffix"- Resolves: #1065534 - SSSD pam module accepts usernames with leading spaces- Resolves: #1038098 - sssd_nss grows memory footprint when netgroups are requested- Allow combination of proxy id backend and LDAP auth backend - Resolves: #1025813 - SSSD: Allow for custom attributes in RDN when using id_provider = proxy- Inherit UID limits for subdomains - Resolves: #1020905 - Creating system accounts on a IdM client takes up to 10 minutes when AD trust is configured in the IdM.- Do not crash when LDAP disconnects while a search is still in progress - Resolves: #1019979 - sssd_be segfault when authenticating against active directory- More upstream fixes to prevent memcache crashes - Related: #997406 - sssd_nss core dumps under load- Resolves: #1002929 - sssd_be segfaults if IPA dynamic DNS update times out- Make IPA SELinux provider aware of subdomain users - A better version of already committed patch - Resolves: #954342 - In IPA AD trust setup, the sssd logs throws 'sysdb_search_user_by_name failed' error when AD user tries to login via ipa client.- Resolves: #997406 - sssd_nss core dumps under load - Resolves: #984814 - sssd_nss terminated with segmentation fault- Resolves: #1002161 - large number of sudo rules results in error - Unable to create response: Invalid argument- Silence restorecon on clean install - Resolves: #987456 - RHEL6 sssd upgrade restorecon workaround for /var/lib/sss/mc context- Make IPA SELinux provider aware of subdomain users - Resolves: #954342 - In IPA AD trust setup, the sssd logs throws 'sysdb_search_user_by_name failed' error when AD user tries to login via ipa client.- Print password complexity hint when password change fails with constraint violation - Related: #983028 - passwd returns "Authentication token manipulation error" when entering wrong current password- Resolves: #983028 - passwd returns "Authentication token manipulation error" when entering wrong current password- Resolves: #948830 - sssd do too many disk writes causing delay in "getent netgroup allmachines-netgroup" nested netgroups.- Resolves: #984814 - sssd_nss terminated with segmentation fault- Resolves: #966757 - SSSD failover doesn't work if the first DNS server in resolv.conf is unavailable- Resolves: #963235 - sssd_be crashing with nested ldap groups- Apply a forgotten dependency for patch #254 - Related: #916997 - getgrnam / getgrgid for large user groups is too slow due to range retrieval functionality - Add two fixes for better handling of faulty SRV processing - Related: #954275 - sssd fails connect to IPA server during boot when spanning tree is enabled in network router. - Remove enumerate=true from example in man page - Related: #988381 - clarify the disadvantages of enumeration in sssd.conf- Resolves: #914433 - sssd pam write_selinux_login_file creating the temp file for SELinux data failed- Resolves: #916997 - getgrnam / getgrgid for large user groups is too slow due to range retrieval functionality- Resolves: #918394 - sssd etas 99% CPU and runs out of file descriptors when clearing cache- Resolves: #924113 - man sssd-sudo has wrong title- Resolves: #924397 - document what does access_provider=ad do- Use permissive control when adding ghost users - Resolves: #928797 - cyclic group memberships may not work depending on order of operations- Set correct state of SRV servers on resolving error - Resolves: #954275 - sssd fails connect to IPA server during boot when spanning tree is enabled in network router.- Resolves: #954323 - SSSD doesn't display warning for last grace login.- Format patch to configure sysv script differently - RHEL-6 patch(1) apparently doesn't like the output of git format-patch -M -C and doesn't properly copy files on renames - Resolves: #971435 - Enhance sssd init script so that it would source a configuration.- Resolves: #973345 - SSSD service randomly dies- Resolves: #971435 - Enhance sssd init script so that it would source a configuration- Resolves: #961356 - SUDO is not working for users from trusted AD domain- Resolves: #970519 - [RFE] Add support for suppressing group members- Resolves: #976273 - [RFE] Add a new override_homedir expansion for the "original value"- Resolves: #978966 - sudoHost mismatch response is incorrect sometimes- Clarify the min_id/max_id limits further - Resolves: #978994 - SSSD filter out ldap user/group if uid/gid is zero- Resolves: #979046 - sssd_be goes to 99% CPU and causes significant login delays when client is under load- Resolves: #986379 - sss_cache -N/-n should invalidate the hash table in sssd_nss- Resolves: #988525 - sssd fails instead of skipping when a sudo ldap filter returns entries with multiple CNs- Mention that enumeration should be discouraged - Resolves: #988381 - clarify the disadvantages of enumeration in sssd.conf- Call restorecon on memcache files to force the right context on upgrades - Resolves: #987456 - RHEL6 sssd upgrade restorecon workaround for /var/lib/sss/mc context- Resolves: #987479 - libsss_sudo should depend on sudo package with sssd support- Resolves: #951086 - sssd_pam segfaults if sssd_be is stuck- Resolves: #967636 - SSSD frequently fails to return automount maps from LDAP- Resolves: #953165 - Enabling enumeration causes sssd_be process to utilize 100% of the CPU- Resolves: #906398 - sssd_be crashes sometimes- Resolves: #950874: Simple access control always denies uppercased users in case insensitive domain- Resolves: #921454: Resolve local group members in LDAP groups- Resolves: rhbz#911299 - sssd: simple access provider flaw prevents intended ACL use when client to an AD provider- Fix pwd_expiration_warning=0 - Resolves: rhbz#911329 - pwd_expiration_warning has wrong default for Kerberos- Resolves: rhbz#911329 - pwd_expiration_warning has wrong default for Kerberos- Resolves: rhbz#872827 - Serious performance regression in sssd- Resolves: rhbz#888614 - Failure in memberof can lead to failed database update- Resolves: rhbz#903078 - TOCTOU race conditions by copying and removing directory trees- Resolves: rhbz#903078 - Out-of-bounds read flaws in autofs and ssh services responders- Resolves: rhbz#902716 - Rule mismatch isn't noticed before smart refresh on ppc64 and s390x- Resolves: rhbz#896476 - SSSD should warn when pam_pwd_expiration_warning value is higher than passwordWarning LDAP attribute.- Resolves: rhbz#902436 - possible segfault when backend callback is removed- Resolves: rhbz#895132 - Modifications using sss_usermod tool are not reflected in memory cache- Resolves: rhbz#894302 - sssd fails to update to changes on autofs maps- Resolves: rhbz894381 - memory cache is not updated after user is deleted from ldb cache- Resolves: rhbz895615 - ipa-client-automount: autofs failed in s390x and ppc64 platform- Resolves: rhbz#894997 - sssd_be crashes looking up members with groups outside the nesting limit- Resolves: rhbz#895132 - Modifications using sss_usermod tool are not reflected in memory cache- Resolves: rhbz#894428 - wrong filter for autofs maps in sss_cache- Resolves: rhbz#894738 - Failover to ldap_chpass_backup_uri doesn't work- Resolves: rhbz#887961 - AD provider: getgrgid removes nested group memberships- Resolves: rhbz#878583 - IPA Trust does not show secondary groups for AD Users for commands like id and getent- Resolves: rhbz#874579 - sssd caching not working as expected for selinux usermap contexts- Resolves: rhbz#892197 - Incorrect principal searched for in keytab- Resolves: rhbz#891356 - Smart refresh doesn't notice "defaults" addition with OpenLDAP- Resolves: rhbz#878419 - sss_userdel doesn't remove entries from in-memory cache- Resolves: rhbz#886848 - user id lookup fails for case sensitive users using proxy provider- Resolves: rhbz#890520 - Failover to krb5_backup_kpasswd doesn't work- Resolves: rhbz#874618 - sss_cache: fqdn not accepted- Resolves: rhbz#889182 - crash in memory cache- Resolves: rhbz#889168 - krb5 ticket renewal does not read the renewable tickets from cache- Resolves: rhbz#886091 - Disallow root SSH public key authentication - Add default section to switch statement (Related: rhbz#884666)- Resolves: rhbz#886038 - sssd components seem to mishandle sighup- Resolves: rhbz#888800 - Memory leak in new memcache initgr cleanup function- Resolves: rhbz#888614 - Failure in memberof can lead to failed database update- Resolves: rhbz#885078 - sssd_nss crashes during enumeration if the enumeration is taking too long- Related: rhbz#875851 - sysdb upgrade failed converting db to 0.11 - Include more debugging during the sysdb upgrade- Resolves: rhbz#877972 - ldap_sasl_authid no longer accepts full principal- Resolves: rhbz#870045 - always reread the master map from LDAP - Resolves: rhbz#876531 - sss_cache does not work for automount maps- Resolves: rhbz#884666 - sudo: if first full refresh fails, schedule another first full refresh- Resolves: rhbz#880956 - Primary server status is not always reset after failover to backup server happened - Silence a compilation warning in the memberof plugin (Related: rhbz#877974) - Do not steal resolv result on error (Related: rhbz#882076)- Resolves: rhbz#882923 - Negative cache timeout is not working for proxy provider- Resolves: rhbz#884600 - ldap_chpass_uri failover fails on using same hostname- Resolves: rhbz#858345 - pam_sss(crond:account): Request to sssd failed. Timer expired- Resolves: rhbz#878419 - sss_userdel doesn't remove entries from in-memory cache- Resolves: rhbz#880176 - memberUid required for primary groups to match sudo rule- Resolves: rhbz#885105 - sudo denies access with disabled ldap_sudo_use_host_filter- Resolves: rhbz#883408 - Option ldap_sudo_include_regexp named incorrectly- Resolves: rhbz#880546 - krb5_kpasswd failover doesn't work - Fix the error handler in sss_mc_create_file (Related: #789507)- Resolves: rhbz#882221 - Offline sudo denies access with expired entry_cache_timeout - Fix several bugs found by Coverity and clang: - Check the return value of diff_gid_lists (Related: #869071) - Move misplaced sysdb assignment (Related: #827606) - Remove dead assignment (Related: #827606) - Fix copy-n-paste error in the memberof plugin (Related: #877974)- Resolves: rhbz#882923 - Negative cache timeout is not working for proxy provider - Link sss_ssh_authorizedkeys and sss_ssh_knowhostsproxy with the client libraries (Related: #870060) - Move sss_ssh_knownhosts documentation to the correct section (Related: #870060)- Resolves: rhbz#884480 - user is not removed from group membership during initgroups - Fix incorrect synchronization in mmap cache (Related: #789507)- Resolves: rhbz#883336 - sssd crashes during start if id_provider is not mentioned- Resolves: rhbz#882290 - arithmetic bug in the SSSD causes netgroup midpoint refresh to be always set to 10 seconds- Resolves: rhbz#877974 - updating top-level group does not reflect ghost members correctly - Resolves: rhbz#880159 - delete operation is not implemented for ghost users- Resolves: rhbz#881773 - mmap cache needs update after db changes- Resolves: rhbz#875677 - password expiry warning message doesn't appear during auth - Fix potential NULL dereference when skipping built-in AD groups (Related: rhbz#874616) - Add missing parameter to DEBUG message (Related: rhbz#829742)- Resolves: rhbz#882076 - SSSD crashes when c-ares returns success but an empty hostent during the DNS update - Do not version libsss_sudo, it's not supposed to be linked against, but dlopened (Related: rhbz#761573)- Resolves: rhbz#880140 - sssd hangs at startup with broken configurations- Resolves: rhbz#878420 - SIGSEGV in IPA provider when ldap_sasl_authid is not set- Resolves: rhbz#874616 - Silence the DEBUG messages when ID mapping code skips a built-in group- Resolves: rhbz#824244 - sssd does not warn into sssd.log for broken configurations- Resolves: rhbz#874673 - user id lookup fails using proxy provider - Fix a possibly uninitialized variable in the LDAP provider - Related: rhbz#877130- Resolves: rhbz#878262 - ipa password auth failing for user principal name when shorter than IPA Realm name - Resolves: rhbz#871843 - Nested groups are not retrieved appropriately from cache- Resolves: rhbz#870238 - IPA client cannot change AD Trusted User password- Resolves: rhbz#877972 - ldap_sasl_authid no longer accepts full principal- Resolves: rhbz#861075 - SSSD_NSS failure to gracefully restart after sbus failure- Resolves: rhbz#877354 - ldap_connection_expire_timeout doesn't expire ldap connections- Related: rhbz#877126 - Bump the release tag- Resolves: rhbz#877126 - subdomains code does not save the proper user/group name- Resolves: rhbz#877130 - LDAP provider fails to save empty groups - Related: rhbz#869466 - check the return value of waitpid()- Resolves: rhbz#870039 - sss_cache says 'Wrong DB version'- Resolves: rhbz#875740 - "defaults" entry ignored- Resolves: rhbz#875738 - offline authentication failure always returns System Error- Resolves: rhbz#875851 - sysdb upgrade failed converting db to 0.11- Resolves: rhbz#870278 - ipa client setup should configure host properly in a trust is in place- Resolves: rhbz#871160 - sudo failing for ad trusted user in IPA environment- Resolves: rhbz#870278 - ipa client setup should configure host properly in a trust is in place- Resolves: rhbz#869678 - sssd not granting access for AD trusted user in HBAC rule- Resolves: rhbz#872180 - subdomains: Invalid sub-domain request type - Related: rhbz#867933 - invalidating the memcache with sss_cache doesn't work if the sssd is not running- Resolves: rhbz#873988 - Man page issue to list 'force_timeout' as an option for the [sssd] section- Resolves: rhbz#873032 - Move sss_cache to the main subpackage- Resolves: rhbz#873032 - Move sss_cache to the main subpackage - Resolves: rhbz#829740 - Init script reports complete before sssd is actually working - Resolves: rhbz#869466 - SSSD starts multiple processes due to syntax error in ldap_uri - Resolves: rhbz#870505 - sss_cache: Multiple domains not handled properly - Resolves: rhbz#867933 - invalidating the memcache with sss_cache doesn't work if the sssd is not running - Resolves: rhbz#872110 - User appears twice on looking up a nested group- Resolves: rhbz#871576 - sssd does not resolve group names from AD - Resolves: rhbz#872324 - pam: fd leak when writing the selinux login file in the pam responder - Resolves: rhbz#871424 - authconfig chokes on sssd.conf with chpass_provider directive- Do not send SIGKILL to service right after sending SIGTERM - Resolves: #771975 - Fix the initial sudo smart refresh - Resolves: #869013 - Implement password authentication for users from trusted domains - Resolves: #869071 - LDAP child crashed with a wrong keytab - Resolves: #869150 - The sssd_nss process grows the memory consumption over time - Resolves: #869443- BuildRequire selinux-policy so that selinux login support is built in - Resolves: #867932- Do not segfault if namingContexts contain no values or multiple values - Resolves: rhbz#866542- Fix the "ca" translation of the sssd-simple manual page - Related: rhbz#827606 - Rebase SSSD to 1.9 in 6.4- New upstream release 1.9.2- Rebase to 1.9.1- Require the latest libldb- Rebase to 1.9.0 - Resolves: rhbz#827606 - Rebase SSSD to 1.9 in 6.4- Rebase to 1.9.0 RC1 - Resolves: rhbz#827606 - Rebase SSSD to 1.9 in 6.4 - Bump the selinux-policy version number to pull in required fixes- Resolves: rhbz#840089 - Update the shadowLastChange attribute with days since the Epoch, not seconds- Fix protocol break for services map - Related: rhbz#825028 - Service lookups by port number doesn't work on s390x/ppc64 arches- Resolves: rhbz#825028 - Service lookups by port number doesn't work on s390x/ppc64 arches- Resolves: rhbz#824616 - sssd_nss crashes when configured with use_fully_qualified_names = true- Resolves: rhbz#824062 - sssd_be crashed with SIGSEGV in _tevent_schedule_immediate()- Resolves: rhbz#822236 - SSSD netgroups do not honor entry_cache_nowait_percentage- Resolves: rhbz#820759 - AVC denial seen on sssd upgrade during ipa-client upgrade - Resolves: rhbz#821044 - sss_groupadd no longer detects duplicate GID numbers- Resolves: rhbz#818642 - Auth fails for user with non-default attribute names - Resolves: rhbz#819063 - sssd fails to provide partial data till paged search returns "Size Limit Exceeded" - Resolves: rhbz#820585 - Group enumeration fails in proxy provider- Resolves: rhbz#816616 - group members are now lowercased in case insensitive domains- Resolves: rhbz#805431 - NFS files/folders are mapped to nobody user if NFS top level directory is chowned by a SSSD user- Resolves: rhbz#805924 - SSSD should attempt to get the RootDSE after binding - Resolves: rhbz#814237 - sdap_check_aliases must not error when detects the same user - Resolves: rhbz#812281 - autofs client: map name length used as key length - Related: rhbz#784870 - SSSD fails during autodetection of search bases for new LDAP features - Related: rhbz#814269 - sssd-1.5.1-66.el6_2.3.x86_64 freezes- Fix typo in patch for SSH umask - Related: rhbz#808107 - Coverity revealed memory management defects- Resolves: rhbz#808458 - Authconfig crashes when sets krb realm - Resolves: rhbz#808597 - sssd_nss crashes on request when no back end is running - Resolves: rhbz#808107 - Coverity revealed memory management defects- Related: rhbz#805452 - Unable to lookup user, group, netgroup aliases with case_sensitive=false- Resolves: rhbz#804057 - Initial service lookups having name with uppercase alphabets doesn't work - Resolves: rhbz#804065 - Service lookup using case-sensitive protocol names doesn't work when case_sensitive=false - Resolves: rhbz#805281 - sssd: Uses the wrong key when there a multiple realms in a single keytab - Resolves: rhbz#805452 - Unable to lookup user, group, netgroup aliases with case_sensitive=false - Resolves: rhbz#805918 - Wrong resolv_status might cause crash when name resolution times out - Resolves: rhbz#805431 - NFS files/folders are mapped to nobody user if NFS top level directory is chowned by a SSSD user- Related: rhbz#802207 - getent netgroup hangs when "use_fully_qualified_names = TRUE" in sssd - Resolves: rhbz#801719 - "Error looking up public keys" while ssh to replica using IP address - Resolves: rhbz#803659 - Service lookup shows case sensitive names twice with case_sensitive=false - Resolves: rhbz#803842 - Unable to bind to LDAP server when minssf set - Resolves: rhbz#805034 - accessing an undefined variable might cause crash - Resolves: rhbz#805108 - sss_ssh_knownhostproxy infinite loop hangs SSH login- Update translations - Resolves: rhbz#802372 - Pick up latest translation files for SSSD - Resolves: rhbz#802207 - getent netgroup hangs when "use_fully_qualified_names = TRUE" in sssd - Related: rhbz#801451 - Logging in with ssh pub key should consult authentication authority policies- Resolves: rhbz#801407 - sssd_nss gets hung processing identical search requests - Resolves: rhbz#801451 - Logging in with ssh pub key should consult authentication authority policies - Resolves: rhbz#795562 - Infinite loop checking Kerberos credentials - Resolves: rhbz#798317 - sssd crashes when ipa_hbac_support_srchost is set to true - Resolves: rhbz#799039 - --debug option for sss_debuglevel doesn't work - Resolves: rhbz#799915 - Unable to lookup netgroups with case_sensitive=false - Resolves: rhbz#799929 - Raise limits for max num of files sssd_nss/sssd_pam can use - Resolves: rhbz#799971 - sssd_be crashes on shutdown - Resolves: rhbz#801533 - sssd_be crashes when resolving non-trivial nested group structure - Resolves: rhbz#801368 - Group lookups doesn't return members with proxy provider configured - Resolves: rhbz#801377 - getent returns non-existing netgroup name, when sssd is configured as proxy provider- Do not auto-upgrade debug levels - Tool still available for manual use - Reverts: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade - Resolves: rhbz#798881 - Install-time warnings - Resolves: rhbz#798774 - IPA provider should assume that ipa_domain is also the dns_discovery_domain - Resolves: rhbz#798655 - Password logins failing due to a process with high UID- Fix explicit requires to use openldap instead of openldap-libs - Related: rhbz#797282 - sssd-1.5.1-66.el6.x86_64 needs openldap >= openldap-2.4.23-20.el6.x86_64- Fix multilib-clean issue due to upgrade script - Remove old copy from the spec file - Related: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade- Fix multilib-clean issue due to upgrade script - Fix typo in the patch - Related: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade- Fix multilib-clean issue due to upgrade script - Use a patch and install the script to python_sitelib - Related: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade- Fix multilib-clean issue due to upgrade script - Related: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade- Resolves: rhbz#753763 - Provide logging configuration compatibility on SSSD 1.5/1.6 upgrade - Resolves: rhbz#785871 - wrong build dependency on nscd - Resolves: rhbz#785873 - IPA host search base cannot be set - Resolves: rhbz#791208 - Entries lacking a POSIX username value break group lookups - Resolves: rhbz#796307 - Simple Paged Search control needs to be used more sparingly - Resolves: rhbz#797282 - sssd-1.5.1-66.el6.x86_64 needs openldap >= openldap-2.4.23-20.el6.x86_64 - Resolves: rhbz#787035 - ipa - sssd slow response with thousands of user entries - Resolves: rhbz#742509 - [RFE] Add SSSD Tool to purge cache - Resolves: rhbz#772297 - Fails to update if all nisNetgroupTriple or memberNisNetgroup entries are deleted from a netgroup - Resolves: rhbz#783138 - Backend occasionally goes offline under heavy load - Resolves: rhbz#797975 - sssd_be: The requested target is not configured is logged at each login - Resolves: rhbz#735422 - Rebase SSSD to 1.8.0 in RHEL 6.3- Resolves: rhbz#761570 - [RFE] support looking up autofs maps via SSSD - Resolves: rhbz#788979 - sssd crashes during initgroups against a user belonging to nested rfc2307bis group- Handle filtering python Provides in a safer way - Related: rhbz#735422 - Rebase SSSD to 1.8.0 in RHEL 6.3- Related: rhbz#735422 - Rebase SSSD to 1.8.0 in RHEL 6.3 - Resolves: rhbz#786553 - sssd on ppc64 doesn't pull cyrus-sasl-gssapi.ppc as a dependancy - Resolves: rhbz#785909 - --debug-timestamps=1 is not passed to providers - Resolves: rhbz#785908 - ldap_*_search_base doesn't fully limit the group and netgroup search base correctly - Resolves: rhbz#785907 - [RFE] Add support to request canonicalization on krb AS requests - Resolves: rhbz#785905 - [RFE] DEBUG timestamps should offer higher precision - Resolves: rhbz#785904 - [RFE] SSSD should have --version option - Resolves: rhbz#785902 - Errors with empty loginShell and proxy provider - Resolves: rhbz#785898 - Enable midway cache refresh by default - Resolves: rhbz#785888 - sssd returns empty netgroup at a second request for a non-existing netgroup - Resolves: rhbz#785884 - Honour TTL when resolving host names - Resolves: rhbz#785883 - check DNS records before updates - Resolves: rhbz#785881 - List the keytab to pick the princiapl to use instead of guessing - Resolves: rhbz#785880 - debug_level in sssd.conf overrides command-line - Resolves: rhbz#785879 - sss_obfuscate/python config parser modifies config file too much - Resolves: rhbz#785877 - on reconnect we need to detect that a ipa/ds server has been reinitialized - Resolves: rhbz#785741 - sssd.api.conf and sssd.api.d should not be in /etc - Resolves: rhbz#773660 - Kerberos errors should go to syslog - Resolves: rhbz#772163 - Iterator loop reuse cases a tight loop in the native IPA netgroups code - Resolves: rhbz#771706 - sssd_be crashes during auth when there exists UTF source host group in an hbacrule - Resolves: rhbz#771702 - sssd_pam crashes during change password operation against a IPA server - Resolves: rhbz#771361 - case_sensitive function not working as intended for ldap - Resolves: rhbz#768935 - Crash when applying settings - Resolves: rhbz#766941 - The full dyndns update message should be logged into debug logs - Resolves: rhbz#766930 - [RFE] Add a new option to override home directory value - Resolves: rhbz#766913 - [RFE] Add option to select validate and FAST keytab principal name - Resolves: rhbz#766907 - Use [...] for IPv6 addresses in kdc info files - Resolves: rhbz#766904 - [RFE] Create a command line tool to change the debug levels on the fly - Resolves: rhbz#766876 - [RFE] Make HBAC srchost processing optional - Resolves: rhbz#766141 - [RFE] SSSD should support FreeIPA's internal netgroup representation - Resolves: rhbz#761582 - [RFE] Add ldap_sasl_minssf option - Resolves: rhbz#759186 - [abrt] sssd-1.6.3-1.fc16: ping_check: Process /usr/sbin/sssd was killed by signal 11 (SIGSEGV) - Resolves: rhbz#755506 - [RFE] Add host-based (pam_host_attr) access control - Resolves: rhbz#753876 - [RFE] Add support for the services map - Resolves: rhbz#746181 - "getgrgid call returned more than one result" after group name change in MSAD - Resolves: rhbz#744197 - [RFE] close LDAP connection to the server when idle for some (configurable) time - Resolves: rhbz#742510 - [RFE] Separate Cache Timeouts for SSSD - Related: rhbz#742509 - [RFE] Add SSSD Tool to purge cache - Resolves: rhbz#742052 - id -G group resolution takes extremely long - Resolves: rhbz#739312 - [RFE] sssd does not set shadowLastChange - Resolves: rhbz#736150 - [RFE] SSSD should support multiple search bases - Resolves: rhbz#735827 - [RFE] Ability to set a domain as case sensitive or insensitive - Resolves: rhbz#735405 - [RFE] Option to disable warnings for unknown users - Resolves: rhbz#728212 - [RFE] sssd does not handle when paging control disabled for openldap - Resolves: rhbz#726467 - SSSD takes 30+ seconds to login - Resolves: rhbz#721289 - Process /usr/libexec/sssd/sssd_be was killed by signal 11 during auth when password for the user is not set- Resolves: rhbz#773655 - Race-condition bug in LDAP auth provider- Resolves: rhbz#753842 - sssd_nss crashes when passed invalid UTF-8 for the username in getpwnam() - Resolves: rhbz#758157 - LDAP failover not working if server refuses connections- Related: rhbz#750359 - Major cached entry performance regression- Resolves: rhbz#750359 - Major cached entry performance regression- Resolves: rhbz#749822 - SSSD may go into infinite loop during RFC2307bis initgroups when groups appear in multiple nesting levels- Resolves: rhbz#749256 - SELinux errors with SSSD Downgrade- Resolves: rhbz#748924 - RHEL6.1/sssd_pam segmentation fault- Resolves: rhbz#748412 - Memory leaks during the initgroups() operation- Related: rhbz#743841 - SSSD can crash due to dbus server removing a UNIX socket- Resolves: rhbz#742288 - RFC2307bis initgroups calls are slow - Resolves: rhbz#746654 - SSSD backend gets killed on slow systems - Related: rhbz#743925 - HBAC processing is very slow when dealing with FreeIPA deployments with large numbers of hosts Fixes a crash introduced by the earlier patch. - Related: rhbz#733382 - SSSD should pick a user/group name when there are multi-valued names Fixes for internationalization- Related: rhbz#742278 - Rework the example config- Resolves: rhbz#743925 - HBAC processing is very slow when dealing with FreeIPA deployments with large numbers of hosts - Resolves: rhbz#745966 - sssd_pam segfaults on sssd restart - Related: rhbz#743841 - SSSD can crash due to dbus server removing a UNIX socket- Resolves: rhbz#742278 - Rework the example config - Resolves: rhbz#746037 - Only access sssd_nss internal hash table if it was initialized - Resolves: rhbz#742526 - SSSD's man pages are missing information - Resolves: rhbz#743841 - SSSD can crash due to dbus server removing a UNIX socket- Resolves: rhbz#738621 - Lookup fails for non-primary usernames with multi-valued uid - Resolves: rhbz#738629 - Group lookups doesn't return it's member for sometime when the member has multi-valued uid - Resolves: rhbz#742295 - Use an explicit base 10 when converting uidNumber to integer - Resolves: rhbz#733382 - SSSD should pick a user/group name when there are multi-valued names- Resolves: rhbz#741751 - HBAC rule evaluation does not properly handle host groups - Resolves: rhbz#740501 - SSSD not functional after "self" reboot - Resolves: rhbz#742539 - HBAC: Hostname comparisons should be case-insensitive- Resolves: rhbz#728343 - SSSD taking 5 minutes to log in - Resolves: rhbz#739850 - Coverity defects newly introduced in rhel 6.2- Resolves: rhbz#737157 - "System error" appears in log during change password operation of a user in openldap server with ppolicy enabled - Resolves: rhbz#737172 - "Unknown (private extension) error(21853), (null)" messages are logged during change password operation of a user in openldap server with ppolicy enabled- Resolves: rhbz#736314 - sssd crashes during auth while there exists multiple external hosts along with managed host - Resolves: rhbz#732974 - [RFE] Have SSSD cache properly with krb5_validate = True and SElinux enabled- Resolves: rhbz#732010 - LDAP+GSSAPI needs explicit Kerberos realm - Resolves: rhbz#733382 - SSSD should pick a user/group name when there are multi-valued names - Resolves: rhbz#733409 - Improve password policy error message - Resolves: rhbz#733663 - Authentication fails when there exists an empty hbacsvcgroup - Resolves: rhbz#732935 - Add LDAP provider option to set LDAP_OPT_X_SASL_NOCANON - Resolves: rhbz#734101 - sssd blocks login of ipa-users- Related: rhbz#728353 - Resolve RPMDiff errors in SSSD- Resolves: rhbz#728961 - Provide a mechanism for vetoing the use of certain shells- Related: rhbz#728267 - When non-posix groups are skipped, initgroups returns random GID- Related: rhbz#726466 - HBAC rule evaluation does not support extended UTF-8 languages - Related: rhbz#718250 - Remove DENY rules from the HBAC access provider - Fixes an issue on big endian platforms- Resolves: rhbz#700828 - Process /usr/libexec/sssd/sssd_be was killed by signal 11 (SIGSEGV) when ldap_uri is misconfigured - Resolves: rhbz#726438 - sssd doesn't honor ldap supportedControls - Resolves: rhbz#726466 - HBAC rule evaluation does not support extended UTF-8 languages - Resolves: rhbz#718250 - Remove DENY rules from the HBAC access provider - Resolves: rhbz#728267 - When non-posix groups are skipped, initgroups returns random GID - Resolves: rhbz#726475 - sssd_pam leaks file descriptors - Resolves: rhbz#725868 - Explicitly ignore groups with gidNumber = 0- Related: rhbz#721052 - sssd does not handle kerberos server IP change - Use ares_search instead of ares_query to honor - search entries in /etc/resolv.conf- Resolves: rhbz#711416 - During the change password operation the ccache is - not replaced by a new one if the old one isn't - active anymore - Resolves: rhbz#715609 - Certificate validation fails with message - "Connection error: TLS: hostname does not match CN - in peer certificate" - Resolves: rhbz#719089 - IPA dynamic DNS update mangles AAAA records - Resolves: rhbz#721052 - sssd does not handle kerberos server IP change - Honor TTL values when resolving hostnames- Resolves: rhbz#713961 - libsss_ldap segfault at login against OpenLDAP - Resolves: rhbz#713438 - sssd shuts down if inotify crashes- Resolves: rhbz#709081 - sssd.$arch should require sssd-client.$arch- Resolves: rhbz#709342 - Typo in negative cache notification for initgroups() - Resolves: rhbz#708009 - "renew_all_tgts" and "renew_handlers" messages are - being logged multiple times when the provider comes - back online - Resolves: rhbz#707997 - The IPA provider does not work with IPv6 - Resolves: rhbz#677327 - [RFE] Support overriding attribute value - Resolves: rhbz#692090 - SSSD is not populating nested groups in - Active Directory- Resolves: rhbz#707627 - Include valid "ldap_uri" formats in sssd-ldap man - page- Resolves: rhbz#707513 - Unable to authenticate users when username - contains "\0"- Resolves: rhbz#698723 - kpasswd fails when using sssd and - kadmin server != kdc server- Resolves: rhbz#707282 - latest sssd fails if ldap_default_authtok_type is - not mentioned - Resolves: rhbz#692404 - rfc2307bis groups are being enumerated even when the - gidNumber is out of the range of min_id,max_id. - Resolves: rhbz#699530 - Users with a local group as their primary GID are - denied access by the simple access provider - Resolves: rhbz#700172 - RFE: SSSD should support paged LDAP lookups - Resolves: rhbz#705434 - IPA provider fails initgroups() if user is not a - member of any group - Resolves: rhbz#703624 - SSSD's async resolver only tries the first - nameserver in /etc/resolv.conf- Resolves: rhbz#701700 - sssd client libraries use select() but should use - poll() instead- Related: rhbz#693818 - Automatic TGT renewal overwrites cached password - Fix segfault in TGT renewal- Related: rhbz#693818 - Automatic TGT renewal overwrites cached password - Fix typo causing build breakage- Resolves: rhbz#693818 - Automatic TGT renewal overwrites cached password- Resolves: rhbz#696972 - Filters not honoured against fully-qualified users- Resolves: rhbz#694146 - SSSD consumes GBs of RAM, possible memory leak- Related: rhbz#691678 - SSSD needs to fall back to 'cn' for GECOS - information- Related: rhbz#694783 - SSSD crashes during getent when anonymous bind is - disabled- Resolves: rhbz#694444 - Unable to resolve SRV record when called with - _srv_, in ldap_uri - Related: rhbz#694783 - SSSD crashes during getent when anonymous bind is - disabled- Resolves: rhbz#694783 - SSSD crashes during getent when anonymous bind is - disabled- Resolves: rhbz#692472 - Process /usr/libexec/sssd/sssd_be was killed by - signal 11 (SIGSEGV) - Fix is to not attempt to resolve nameless servers- Resolves: rhbz#691678 - SSSD needs to fall back to 'cn' for GECOS - information- Resolves: rhbz#690866 - Groups with a zero-length memberuid attribute can - cause SSSD to stop caching and responding to - requests- Resolves: rhbz#690131 - Traceback messages seen while interrupting - sss_obfuscate using ctrl+d - Resolves: rhbz#690421 - [abrt] sssd-1.2.1-28.el6_0.4: _talloc_free: Process - /usr/libexec/sssd/sssd_be was killed by signal 11 - (SIGSEGV)- Related: rhbz#683885 - SSSD should skip over groups with multiple names- Resolves: rhbz#683158 - SSSD breaks on RDNs with a comma in them - Resolves: rhbz#689886 - group memberships are not populated correctly during - IPA provider initgroups - Resolves: rhbz#683885 - SSSD should skip over groups with multiple names- Resolves: rhbz#683860 - Skip users and groups that have incomplete contents - Resolves: rhbz#688491 - authconfig fails when access_provider is set as krb5 - in sssd.conf- Resolves: rhbz#683255 - sudo/ldap lookup via sssd gets stuck for 5min - waiting on netgroup - Resolves: rhbz#683431 - sssd consumes 100% CPU - Related: rhbz#680440 - sssd does not handle kerberos server IP change- Related: rhbz#680440 - sssd does not handle kerberos server IP change - SSSD was staying with the old server if it was still online- Resolves: rhbz#682850 - IPA provider should use realm instead of ipa_domain - for base DN- Resolves: rhbz#682340 - sssd-be segmentation fault - ipa-client on - ipa-server - Resolves: rhbz#680440 - sssd does not handle kerberos server IP change - Resolves: rhbz#680442 - Dynamic DNS update fails if multiple servers are - given in ipa_server config option - Resolves: rhbz#680932 - Do not delete sysdb memberOf if there is no memberOf - attribute on the server - Resolves: rhbz#682807 - sssd_nss core dumps with certain lookups- Related: rhbz#678614 - SSSD needs to look at IPA's compat tree for netgroups - Related: rhbz#679082 - SSSD IPA provider should honor the krb5_realm option- Resolves: rhbz#679082 - SSSD IPA provider should honor the krb5_realm option - Resolves: rhbz#677318 - Does not read renewable ccache at startup- Resolves: rhbz#678593 - User information not updated on login for secondary - domains - Resolves: rhbz#678777 - IPA provider does not update removed group - memberships on initgroups- Resolves: rhbz#677588 - sssd crashes at the next tgt renewals it tries - Resolves: rhbz#678410 - name service caches names, so id command shows - recently deleted users - Resolves: rhbz#678614 - SSSD needs to look at IPA's compat tree for - netgroups- Resolves: rhbz#670511 - SSSD and sftp-only jailed users with pubkey login - Resolves: rhbz#675284 - "no matching rule" message logged on all successful - requests - Resolves: rhbz#676911 - SSSD attempts to use START_TLS over LDAPS for - authentication- Resolves: rhbz#674164 - sss_obfuscate fails if there's no domain named - "default" - Resolves: rhbz#674515 - -p option always uses empty string to obfuscate - password - Resolves: rhbz#674141 - Traceback call messages displayed while - "sss_obfuscate" command is executed as a non-root - user- Resolves: rhbz#674172 - Group members are not sanitized in nested group - processing - Put translated tool manpages into the sssd-tools subpackage- Related: rhbz#670259 - Refresh SSSD in 6.1 to 1.5.1 - Also add the updated ding-libs to the BuildRequires- Related: rhbz#670259 - Refresh SSSD in 6.1 to 1.5.1 - Explicitly require updated ding-libs- Resolves: rhbz#670259 - Refresh SSSD in 6.1 to 1.5.1 - New upstream release 1.5.1 - Addresses CVE-2010-4341 - DoS in sssd PAM responder can prevent logins - Vast performance improvements when enumerate = true - All PAM actions will now perform a forced initgroups lookup instead of just - a user information lookup - This guarantees that all group information is available to other - providers, such as the simple provider. - For backwards-compatibility, DNS lookups will also fall back to trying the - SSSD domain name as a DNS discovery domain. - Support for more password expiration policies in LDAP - 389 Directory Server - FreeIPA - ActiveDirectory - Support for ldap_tls_{cert,key,cipher_suite} config options - Assorted bugfixes- Add noverify to sssd.conf - Resolves: rhbz#627165 - TPS VerifyTest failure- Related: rhbz#644072 - Rebase SSSD to 1.5 - New upstream release 1.5.0 - Fixed issues with LDAP search filters that needed to be escaped - Add Kerberos FAST support on platforms that support it - Reduced verbosity of PAM_TEXT_INFO messages for cached credentials - Added a Kerberos access provider to honor .k5login - Addressed several thread-safety issues in the sss_client code - Improved support for delayed online Kerberos auth - Significantly reduced time between connecting to the network/VPN and - acquiring a TGT - Added feature for automatic Kerberos ticket renewal - Provides the kerberos ticket for long-lived processes or cron jobs - even when the user logs out - Added several new features to the LDAP access provider - Support for 'shadow' access control - Support for authorizedService access control - Ability to mix-and-match LDAP access control features - Added an option for a separate password-change LDAP server for those - platforms where LDAP referrals are not supported - Added support for manpage translations- Resolves: rhbz#660592 - SSSD shutdown sometimes hangs - Resolves: rhbz#660585 - getent passwd ' returns nothing if its - uidNumber gt 2147483647- Resolves: rhbz#659401 - SSSD shutdown sometimes hangs- Resolves: rhbz#645449 - 'getent passwd ' returns nothing if its - uidNumber gt 2147483647- Resolves: rhbz#658374 - sssd stops on upgrade- Resolves: rhbz#658158 - sssd stops on upgrade- Resolves: rhbz#649312 - SSSD will sometimes lose groups from the cache- Resolves: rhbz#649286 - SSSD will sometimes lose groups from the cache- Resolves: rhbz#637070 - the krb5 locator plugin isn't packaged for multilib - Resolves: rhbz#642412 - SSSD initgroups does not behave as expected- Resolves: rhbz#633406 - the krb5 locator plugin isn't packaged for multilib - Resolves: rhbz#633487 - SSSD initgroups does not behave as expected- Resolves: rhbz#633406 - the krb5 locator plugin isn't packaged for multilib- Resolves: rhbz#629949 - sssd stops on upgrade- Resolves: rhbz#625122 - GNOME Lock Screen unocks without a password- Resolves: rhbz#621307 - Password changes are broken on LDAP- Resolves: rhbz#617623 - SSSD suffers from serious performance issues on - initgroups calls- Resolves: rhbz#607233 - SSSD users cannot log in through GDM - - Real issue was that long-running services - - do not reconnect if sssd is restarted- Resolves: rhbz#591715 - sssd should emit warnings if there are problems with - /etc/krb5.keytab file- Resolves: rhbz#606836 - libcollection needs an soname bump before RHEL 6 - final - Resolves: rhbz#608661 - SASL with OpenLDAP server fails - Resolves: rhbz#608688 - SSSD doesn't properly request RootDSE attributes- New upstream bugfix release 1.2.1 - Resolves: rhbz#601770 - SSSD in RHEL 6.0 should ship with zero open Coverity - bugs. - Resolves: rhbz#603041 - Remove unnecessary option krb5_changepw_principal - Resolves: rhbz#604704 - authconfig should provide error with no trace back - if disabling sssd when sssd is not enabled - Resolves: rhbz#591873 - Connecting to the network after an offline kerberos - auth logs continuous error messages to sssd_ldap.log - Resolves: rhbz#596295 - Authentication fails for user from the second domain - when the same user name is filtered out from the - first domain - Related: rhbz#598559 - Update translation files for SSSD before RHEL 6 - final- Resolves: rhbz#593696 - Empty list of simple_allow_users causes sssd service - to fail while restart - Resolves: rhbz#600352 - Wrapping the value for "ldap_access_filter" in - parentheses causes ldap_search_ext to fail - Resolves: rhbz#600468 - Segfault in krb5_child - Related: rhbz#601770 - SSSD in RHEL 6.0 should ship with zero open Coverity - bugs.- Resolves: rhbz#598670 - Ccache file of a user is removed too early - Resolves: rhbz#599057 - Incomplete comparison of a service name in - IPA access provider - Resolves: rhbz#598496 - Failure with IPA access provider - Resolves: rhbz#599027 - Makefile typo causes SSSD not to use the - kernel keyring- New stable upstream version 1.2.0 - Support ServiceGroups for FreeIPA v2 HBAC rules - Fix long-standing issue with auth_provider = proxy - Better logging for TLS issues in LDAP - Resolves: rhbz#584001 - Rebase sssd to 1.2 - Resolves: rhbz#584017 - Unconfiguring sssd leaves KDC locator file - Resolves: rhbz#587384 - authconfig fails if krb5_kpasswd in sssd.conf - Resolves: rhbz#587743 - Need to replicate pam_ldap's pam_filter in sssd.conf - Resolves: rhbz#590134 - sssd: auth_provider = proxy regression - Resolves: rhbz#591131 - Kerberos provider needs to rewrite kdcinfo file when - going online - Resolves: rhbz#591136 - Change SSSD ipa BE to handle new structure of the - HBAC rule- Improve DEBUG logs for STARTTLS failures- New LDAP access provider allows for filtering user access by LDAP attribute - Reduced default timeout for detecting offline status with LDAP - GSSAPI ticket lifetime made configurable - Better offline->online transition support in Kerberos- Release new upstream version 1.1.91 - Enhancements when using SSSD with FreeIPA v2 - Support for deferred kinit - Support for DNS SRV records for failover- Bump up release number to avoid library sub-packages version issues with previous releases.- New upstream release 1.1.1 - Fixed the IPA provider (which was segfaulting at start) - Fixed a bug in the SSSDConfig API causing some options to revert to - their defaults - This impacted the Authconfig UI - Ensure that SASL binds to LDAP auto-retry when interrupted by a signal- Release SSSD 1.1.0 final - Fix two potential segfaults - Fix memory leak in monitor - Better error message for unusable confdb- Release candidate for SSSD 1.1 - Add simple access provider - Create subpackages for libcollection, libini_config, libdhash and librefarray - Support IPv6 - Support LDAP referrals - Fix cache issues - Better feedback from PAM when offline- Rebuild against new libtevent- Fix licenses in sources and on RPMs- Fix regression on 64-bit platforms- Fixes link error on platforms that do not do implicit linking - Fixes double-free segfault in PAM - Fixes double-free error in async resolver - Fixes support for TCP-based DNS lookups in async resolver - Fixes memory alignment issues on ARM processors - Manpage fixes- Fixes a bug in the failover code that prevented the SSSD from detecting when it went back online - Fixes a bug causing long (sometimes multiple-minute) waits for NSS requests - Several segfault bugfixes- Fix CVE-2010-0014- Patch SSSDConfig API to address - https://bugzilla.redhat.com/show_bug.cgi?id=549482- New upstream stable release 1.0.0- New upstream bugfix release 0.99.1- New upstream release 0.99.0- Fix segfault in sssd_pam when cache_credentials was enabled - Update the sample configuration - Fix upgrade issues caused by data provider service removal- Fix upgrade issues from old (pre-0.5.0) releases of SSSD- New upstream release 0.7.0- Fix missing file permissions for sssd-clients- Add SSSDConfig API - Update polish translation for 0.6.0 - Fix long timeout on ldap operation - Make dp requests more robust- Ensure that the configuration upgrade script always writes the config file with 0600 permissions - Eliminate an infinite loop in group enumerations- New upstream release 0.6.0- New upstream release 0.5.0- Fix for CVE-2009-2410 - Native SSSD users with no password set could log in without a password. (Patch by Stephen Gallagher)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- Fix a couple of segfaults that may happen on reload- add missing configure check that broke stopping the daemon - also fix default config to add a missing required option- latest upstream release. - also add a patch that fixes debugging output (potential segfault)- release out of the official 0.3.2 tarball- bugfix release 0.3.2 - includes previous release patches - change permissions of the /etc/sssd/sssd.conf to 0600- Add last minute bug fixes, found in testing the package- Version 0.3.1 - includes previous release patches- Try to fix build adding automake as an explicit BuildRequire - Add also a couple of last minute patches from upstream- Version 0.3.0 - Provides file based configuration and lots of improvements- Version 0.2.1- Version 0.2.0- package git snapshot- fixed items found during review - added initscript- added sss_client- Small cleanup and fixes in the spec file- Initial release (based on version 0.1.0 upstream code)1.13.3-56.el61.13.3-56.el6krb5_childldap_childsssd-krb5-common-1.13.3COPYINGkrb5.include.d/usr/libexec/sssd//usr/share/doc//usr/share/doc/sssd-krb5-common-1.13.3//var/lib/sss/pubconf/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnu?7zXZ !PH6ⸯ~]"k%>eN8\7e|m?oָTWJ!-I)8_~3U,%K6/BƖl;9 +'TwC VrU6ePRoPU3el#p1Rdi|W!\q>ɀ)dyUlCElC&=39~%"]i=-2Y2K D5ze1 ̜m_Fͫ׼s.gSF.u,^TNUj ؁D-󲗛A8`Mʖ f m/]|B^L֦5 M 4D_0 gP<.#8xcI(X)|ZcW&DRL?@wp3##3c{6_TENGWڐfrgI(x'f)$&>xm<+J\ 4n BW#ߤ%!J#[C+Jg:qcb m?7e|zlL'_xܕ :.&hz k3 JxA )L$X\ tW()NdT>pH/j# :_#؂磇3 ^Dc~IP=|֦Sr[K9y#؊U06ӪU :GDĸ-dΩ!F E.ٮ - ~`BD +1H ҥEzmCus&& Kϗ)PI RXnR%ůo|zF|IO["|!nh:CN|Ty?y:T{}dݶ˷QjÍBU4Av$)s䐱B(=c~9Kf!- UmJZ0ɘO|CiSnࢢn]w4ۓz1>WՋ5PSWy =6y=#M!#0~t9H1U-:x4-heE@g6~O mKe-&Cl;aS|b<(~{2BJ.xQݬuxp_HIb N+hp4L^=dץia"S69Nԗ;m :"b2Ҫዒ_oS 52Vgn)W0]^Q(AuK$m[Γ>>! Gr&Hd8B2f>^Qvv߂0,0iEc@Uk0¹Ӣ<܂q> f9)ҁ4 ˡb߰ڕ4nsأ[=T26R9 `;Ol*ҤG;z_7'HIY Aȑ$ s8J Ht\wkKy)#G7@ZlX%~8-8R'-WC";UB <άTӂy5lxC!- $+m.2 ֳ@%ch)/2Ӡӷlt:zoyD˛>xtx_WzܚL)l? ߘ[L&axJºhogB!wN+]N\ Z!8[UMJ)8$C2qަTܵ)0 M'Z#Nx.(|2T q8Q&Atӆ "-6C24k^]3c$y@sǧ\J?0?6qR4 %u3N*P^m؛E9*Ip" d_x?FH g0SX59l]ig` OL5r":[?Vڙig:Cځg@ !@>Y,ހ#h I`ڠ|yܘJIHA8ؓH7 #'*&ȃ̩F kK" % mOtҢb؝vfdGecgܷ=h[qhajv jP5*fz~uZ6*(* ÍPtҚ; Iz8_{pSGF/2QzmE4Y.| r佝vxWy)4c<.Of4Oo t਷ub%=uWRHrl!EI߻| 6EacJJ>:Eva\Xb4ju+{&4^K1 jBX(♈_M-aP``|o/'Z1Dw^&n'ͤ RN@O8=9bUld5pʫu̶N`tH@##|fn)#v[h/(̤xh(2D 3qKbxdH~V3ȁdaߠ{!'_Iyy!dľ+%#^ֳd[&;J=yqk$;g4r :ŜTWH.}+ݿ:S#dP{?vwnmsO10QkvԒpщ!KBGt 24Z, x4?H*_TZIt.a:cHvDs,!#S2 u>{\2PT{1G E~\lLMR鶸rz\=H?IRL}!Qj%kD(52}>48 eFw1Kp$&\J9TQck\QW(%zK/m.5%_{jU,x4m SJwK!qRA"N߉> D:#TGLE9TmNk HCK?Ϭ7T=F37,[w\iC=2 |:6 iɁ ?%EiPW-C:N8 |T ^k;K~~bvL⎞Q_Du.5hqNܡͿ*zE9?S؏=!J'tϸpT v9oWQWa߄f=+WHE)=6!@bI|5;OMz@t$^DS)xHhcpe}_)U{Q6ih3LݮcHavpJDmWr:/]qi-AJwVI"d!gHQG{{x`n^iJXKQ8h/c#0/)؄!JCv8nJW!?G<$n~8JF˃98X.вǡ[0~9LpED `k >9LU:bQЌz2awDȳ԰#?" 4M#HK1Kkbk$B&F)"{}ns),.׻9jO 0XձCI -8j!+b "}!d`5t*-/>DDA[Ҳ\"0rJ\LKwNU0(dV;9*ir K?[x{Fg< F|@R9‰T/DEO"a"_&f>@Y)U#!VNL;8bњaӢ\5z<[j]^߁RؑV*:2BN9J魢Oߨˁ-`@3d5TCYd~uPTRɏ>`Jh×r&t]Yk`k{C,)Ik,BjY *֦Jދ&͛:HtV@i&*Q{qO|x00*{恖|P5mT|_?nB*êVėDph؂".ĉ /8K[Gϫ [vہW2d5Fbk(Q,דЗLS$}SuQ 1>;:wn_O L4'D27;N~svw+Cڴ5޺Ȅa l onCCN#?GMO$B;*jgGwUsyyĺԴr^L^lt;8UItj"E HeX\YOk Z0,~6k|6q<objV 9Ӗ5lꩣQ\K[zM=24̢?5- Czu:9[Pc0[&#P4g=S4QOfU|y  ^F"$*Qcץ~) ӦjocHF !"[`E `Xsԝf yiR^ƲnvH_l`9M/\7ZXIIAN|b_ Gc\ oht59)8!J1Ϣ۰1Iz@C7exw:9GZpcY?]cXm {KdB_fca,i?[uNr " Ho;% WHaQms.%ZqVMqs⋉E.pjz?_װ͢Oki]!`krSVphN"?1^e yg@mq .T< ߌa! i1j2g.^gXFK6ӳ嗠-&~ [1ިF=OcT=DʲW7e6K ]my׸gXEVNaP`^G&C%4vգc7}q5N[Q _g PB3/Wl)9-b/6&$)T9 ~9jzŸjo/AT.!󒗙c{`"({E">}L>[KrjfN+L-34ml4ԖDVA㻌ϫG9ƻjĈ9WxQ$+6Jo9}mEHu@YeTRcPM[aK6"j1sUA".~.br?N<Ԯf45,]MY/,O?5:2a6@DiKV>BL8C b?,a=Ptdcg3&0GTü/4_p־)`{$U핡JjA$42ő/?dh> AjȒdWɟ82b?ՆV ewY?{k$vG}t@RYFX71KAFGgD+B% sE .b0Nd8nIs(8 $rrk`Y]Ҩأ/ˣ + F\#{[Ŵŝff{.ST)!?K9|룑*2S\P\zwqX"ȞXpBj97~*ln"ʃMլǑߣ[Xpc8z!8mۯ@$(i6uY2Q!J7m%I!= 'w'`U'`_@RZݑS\cbg,j2+8?;B"A}OBXĈ+`gUsֆ !V*vd.9+5bӀVYo@#g|W`SRyW~/3)_6܁>gMsU]m֯@!h(Ś@*00& <5Fs()%' DEyrQ,ٕ{m9Ybt/Ed2e;EE^7{UjRd5vqzGC_[/+&'U+`fߎ;`?UxDTR+|04V*|Y#-ŪW޺C Luxx0ʸ>k_M5ϦxdUF>JJ@1C̶{0syJ7HI]zrOvt(E铵EꏏzqskjSA+8{LJ q|of:Wsi8bd8{>`X¦9F\ΈٟydJW$SJKvCrBk9Rװd`ty8q>cF |гLNN㛸 vYh=Uh1[1*Ih oc|:+@ O/(G NaK,;U[S ىUsFi[c(>\t(fuq"BhAR?ⓕ4yR\ 5ޔd͔آzq2)9zXQc?$ "be&8 2ظS3RǞX|U<: GC3,.Zw(%ZCc_h?b*;PWF0'ΜYHF#ٛU^)_ob0nˋNz;|_p:eCgs+0đkV~U׮jpis_%k}) ~[ܰ _,( wdՄ/%вd TP|Y-A^$9eGxZ GeI^׏)A%V&ɳg,e,RV F&_{><̪sy0Mzu< a k$hLf*įFEe+#q,1!g}ߑL lE\+ɑGNǀƊ]lב("<Vq(v 6q(nǞD`M|DÑ})[ws2cS'^̮3I TLhx[7ŊB7Yd݋6JhU;=nŎ՜mOs-wI >fߝu>ːD0YEK‚G^/o {QVFɰZ)JWiIƼ6$ICrt!@9MGA< @ZXSUvIVHu5ц`TB':/x6 $呀Xg]^tG݉BҢaN vNikM!Qo?̘c*ݼO{`}})"a6٘b,,!#'<٫$DVx\վ5aCawڱxv՚#Fzm:3,"mېB~~KG^\TXqZNYD xc@;"ڲ :|3;ЌW32~ [npttfߡ=;ֳCF '!w xWtn~f| nM\ T@ wEE;}M4Y@Zu me@PS@mZ{J/LxAz@!ubď1tn`yDe>Ȟ{ދPzIH=F=N}Db`ˇNaz!@IxH]aB0 ^M`HήIL;"KUZO-j|άRgxs}U) fA!6̛a㔆=IYAN^p-:d4 ޵Wz-RY7èD=&z c} 9UG&+m@d_2AFN,"Sr ]!30T Z|!x?1P=p,DT}A"q{ה(MӒ]XJ8mڰKCt\B39"[ e{i9y)jU* ۜ$jĕ`{*1 G=6E5MͲYmx,pٵ @q\.X) X9FPnMk*Ύ4 2qfCUv򱴰Eég 飽vK0 ݰkɨy[怑b붍WdE S鶦#>~DD#\i}ѺXėCr2y܈&TmyYtXvV( t[Bj7w j}תw9\T't_ \C 3&Ig?66t/Jx~,)z<ʦvGd?J{qGk5rNPe*H7ńd拋"̽_h=Prok3ٛjv=!e/O{ *GHcYr|)YMgV5|$CA rƌ=j-GN a |׈=5G[J?A+kb%aVGK Dԧ#@Pք'\gkhw0;ۏb\Z*Y[\ng ӲS}kdצdss$Y*pɺU z=]a r1T{%|T0@+Օ qJ,!nޱBxƲ] 22 =}(E;>3sSWZ3EyS&&4+Vr.\;…?3ܔ!fKOɡ6gRPTO3 AG/ϓ9MȠ1ǨUGlqK? +p3uWP#fe_]+}$RBx04B>5L84G;"bgr $p̔φM3;Afˏ)>?Wbh)l64f zb1v.` <#:Y"VL{秺9%G4~O FDgr4Z\g\=7f Gi'|2/"~uzx#]:=묻o' b3\"4T#ٷ"CN.Ωα(s#}a7 ;?S|u/dbi YCVq=Gp2B:xek}ĩK)"t{B 馿F}?2^V=9IX?>gObP½y*mIM'Tkv|cJ+$=#cG?)eP{8 As<|Rqζk(g0"˵D)8p<(cT [4mxRd"L6saewpcrml8V[L05w[^jO/-A@:+aG(%hT2I+%@[P $}-Y m8nR"*sח ԇPP›wA42isKFfD%j^mPn؄m _csN{lj^V"=(Zt7,>q=mC|!4[z$V@ec\ab$m:a0$ $b*t6X-|PFKaWbƓJjux"@?(]qVf g»Mĺ41bϖ#eIGYG)Xwߐ>4,uj8$6! PC5,<XJb荮|[USuG dVk}5 U8vBBA1]hBx!uxJuY@]Ԭ7X*B֙ECbwyޢJ\&i'DzˎP0y=BA12mnBϱS.ͬEZjMuڂo/-o[nz'G(vL]EgF[?./VF2ӫ 9'4M8p"Zm{2_TO7%)Tfd}r Դk&,5 'R-ZGiņ ĕʪv>`)1V 1wEQQXF8+]6'[D.(:s+kAG1#-_&QtGTYTW=VNpGO2s2C 4\Dv4ײpA!wSHvtFZ$ #n8w/ `J_$Q"ֻ ,ӝ4|<[*V0qiB<2#^|V /#y5O85IxF?Tas˥MdݺR9G֤AM0ϏS$Dt O W¸GTtB&1CFX̗6ٮu8Ғea/_'LO=<2-H6JxC퐍}.+qҀ[e"̡AnZ\rv׆ ܪ~<<5;)eu#PpxF'8(H/x>}(7FH(,-ۚX8~un#&5Bl \.Q d6FzPY&`B]eϧ袳%|C* tyQ+>:Ppsu]<۾=> Oώ$d asÃm.jmW֞RRt?<w>F$<ȥL'̺}Wq*8βy g?X b̃W劗~zں̻{24?ģHkD7N^Ƿ&"\8%)µ:#T|\G,j[dVdBHnz#;fHO` VI/0m;g'} 'RKI$"ARɡB|;- 0&d_׻="Wߋ-Tm:\t髺waoeѶTjXvjZ)lIi0-SώD/ȫSfɳ SwA"YԀ(-螒AHrAclt¥D $e۬U $jOCof{CY|lfF{y[-p{eϕESW+J;elžfwRװ|^z.ԯZ"Lɫnl@c/>$m`wg_:M?*.^?nXB/7oR? ^sĞuB Tb'h^1=; M΄Op5|i'XA3}k5A?Fj|?R`ڹ6R+Ifa/2=v}Ɯ ySҀVF @R;ꚉS'qx0BT`,TK^YcdI|cx- *H);(](sFN;E%ڂLf~0[ɢ9a+U1PP&Hz|B(t+qa'2kF:ݜkQ7m)%^ :MKL΀|ep\1>xs:jxFi ?X{Sx iC̝":{hH85&wYp  ^dtVk#d"UfRU ;2aQ)9oq")$mY~J;!.kM ߪLj< \{fi[VklF㪆,2fo 5d(| ?jjmRlH_z|]wS,vO%3 ŀBs6k4SW {~l[`; QoR*yܑrX_00ϛʦpj*2:1x <􊟘t)ݜsC6?\܈mE.j^+H{W c߆?._XO, akoTlG $WU[kR&i#xi ~n) ̀qϤJ&CrN4R.""|͛,PA|d}KI/;"rLjƗ̀V_bg<: #Cڇ!XL Mvƴ[yJ,ruj=h7LVz.Ԝ.$1YY/]5ec1( Cb J0+]x7|:iF4]*w[J"lDZ Bj- HX0M[GVWq974P3TX˟|#)`FVuJzq]WB /.G'Gd|Bzrɪ<_| 3twpv2֪a=ޕ]m& ނ,~Jyz2<xr=;Z]觠s$-)=qПBݤ"z=JYbF[ݯ7+wL#|T͕?b?B/G*#-i>'G D%ʢP 0Vc̭8 GS]EȞZ?2a2TDr!"#{ܬVa>MHDjeζ% ޝPn\4 J wͳX%Ŏv44*suAF}Tc+ˉ֞EQx*{ ֱ_z*{#boÙ|gVKS~³wL9Vuyq8Ϣ8Mњ)X3T rM.@B 2wss֌:iU.GEǏ[+ bCKuRCA-5ؑg/t@4E!yyG%op rSG˾>#=1<Fp1IOY=\G2LzqbAu(#վiXjb/ 'Ƌ{Ԉ>4h T^Y2 W桂` ƽRvu6uuIcW_;V6, 824D3 Typv[Yr\ 4acp$^+w:뭎o@c#(=)q4H8- Tꗼ n–5{oŦC%gEqciZ8 X^Ư_v["1jLWWQFtϻj蠢1̡y3C ;JkBvA̭FV]*ZVRm)Nmp?k<2DV`~p#/p$PY\r$qapjܲ×htj|`s%u>ԝr)ǫXS^~'cj[$7BRQp') ])G:oGƗw7ߋx-#`ىF|i_رyrP$*]\1s GL lzbN#-]ęTT7^Kr21*T-tOVuZXn&̉7Š\+2hqS1 <-Y05cISǙ^rhRǬk 'H 7?$;sz=etz#bH$q@W%-feuR^9m{Ԃx!WyYpsKFް)H%6B%T׬ {mǦ/h{TShQ@&8OǘMe!gN8NCvvb=FaS/.DrL"!zN2A|+R,4<4d\c9?&~􎈵'AY9nUh &^P {phj|P񤠥^eDX,FkٛpCC9&4& <p(A2ˑ[Â僷2j8 [k&9j)CdY(Ónܭx$ xԫ^~Vl5Y\9yGC'~ ,Ht+ )*:|3&ݱF襜7\Е_(8D#s N?PcyYQszinBE pj]#k% Ep3b^0| Q/"RHTn8t&s5-ޯ_Uhbjhn"Cez`=dZ\d5aU!Y& w\Ah֎1k&$kME:,B6O vMJy'2!bp받yRum+BZ?e8 @L@9&5)QZD\M/;; }9& gwZT7]GKnHaAzn}56H?YUsRQŪF$.[.XiNɦԞ+dMs7z13|^uI_g!/(~MU HI|3nPQ" 7?$-"* ҆Gbr%a])b@_>'Ƶ J+46QY$JK''eҟI9Q5p~ݨܹpt+jYoѱ)"At!r VpKc0J?kl0Ѓl'\R6?ݠ5{9.oe2#o^ DD.?1YpY(m`T]2ql}o]mG띄 071RwH4Lg8k{&i4~ݥD#[9e"UrdMD&ѭGZGW&2yS:Z`ɤP-@Ǭ%8'uG#w)Y9pLRNeN yYxsx:@dU|jC9ڳq avViq@䏓[}>r)%FOmw\iJ( HxGYZdNh?)6"CdxGm~)_ T #R=1ke}>JYz}x(#*! 4,+H*ù2r5tJr)q.,kBu5&g ,ꅫ/8 Z@Q'.58Ja Lێ41pBi" sB[wBH@O$zK +p'~̵аf2=DyKiӎbKWLsΊeʸ`{X.~'D@ B;JqȑNJջNyQqz,EaCmw']Vܮ}gw#܎R9,^5 Z^xXu4oQ'ߜ'-"^αUOUR'‘g3H')/7<[Q kbf\6v]VD*78on1Żv"ix@CX 5$PDDv MrRCڔ 0pAj ^O<o l ] 4J{iX~/YAdO*\L'amtЉ Li@x?{[ZiJ6j"NXm'F$.LC#q[n)!;ūnuͧ \ 0 ^MԍTȹGkKcǜnUKar"( T<{!UO}'!vj2VBUYP7\&Ii>,;G@!ح(j撀=N_LpW\ߧp9<.M@!ͳ߻{R$:4K1VS'8 .ME_$P; F̙ Ti+:S7VXV:^礿b5t,޵3J{k~.CC hd7gr/I[:p*tWPCfxk)'rVdvׂR*y;My.o߆rz*`u|aRQR?/³1D |Gr[l?D" HArifKFPE>OcjҳlĊ=6Yql0k 23Q~C1Ghv77\))Q^ EURp~YdnQ⻀C.l}#KGKQv ǯ}]9WP@k11 KO8:dc]'2-.#nfmA@냥*m]ˍc$5VL)r5Cmt3 RéNj88<^S8iAwn^wV*,IVD R{}FYUT՞Г6[W[r/萄hy&a: #?\b7GV8q!NRJ[/d*=A"\z럋t⛬Mu:!1;9oYɶJbud(I@|Ą~@xaRghx"b<+Dޫ KFRױӴVhGP#|f`?ٳ[*18zY"9V9AHA6M%t$omFd4!oeh?~SN,ޛ^-[̿ʹK654إ[~j6vov!˫,⁉ $DM%dg\*l`EbsH^]ց/>U~ppCm#96ËtI{ϣEӛ;V(+&wr1=9߱cAQfcN@~slڬ! we/3sл ΡqspIz*T%p9h4Ev(wb+BAJOrd_PDEƬ5y/ʛRrݟ)o<R=zKbhLͷ  $ Rh&!eY2^Hо|]BԩCj 队g"Y73vu4U*Jt ~auXp:vi|=[tŶ !` ;W3)h)Pl jx<م&CP..R`5dN喏ӄl;`jخmS>)F :(&؍CV}5Bi[,a,#poBX#1c.a749N̉_{WIiw ^ ɖ6RS oatiw3T0J{:Ӥ{eYjg^VՊ}a Yr;8IlN>StpZ2SO*I}l"X:1=N-Q:9A %vfӜçKKЍQ!F\YTX -è=lQ *: :pA {*GL)Tnb^ldtA  v:x2rJISMȡ}cTq |Þ,J4;[3Ʒ?G$oc&T*qow 1ASa0a&/{EZfzd5EŨb+9GAs~YˋFX2\Y=Jp9A&U%4@I`?A+QRiPd;P)MI-]x?Geνe "Tp<;99}NH0'=EP:sn/mzke}BfSVux&) w8S ED,NHc' H-|qZ4Ps:-^=+]HXE}=H2 2:}dx=>ƈ]!.1 c*0{ bYXBc"CC 8&TBHJߝHZ\Pؕbk<ػVAD 5~\j/y@@[grHM?*0v8wNۍ'ʘ|}Xb`+ҥ|-/RM$1!dvudH[~q$.KΝodoُX϶V)):T: \EbKc ޏ'޴_-ɛTV iTBEc%矼VzfHPFO B7R Su> D\qP18+Ӗ# pEm LMsmڃdARv !&f{ۉL@2vuF}׊눅y":V7 #6 >Lx&)ɬE6) S_Q!C"ݫ B߾ah-t_[+q 6/|-82 ^ҍlvo?S$bL?`ѓ^l" Fs +qhfh5dL' p;ԂA-xWJGTM YIOsjK<)9I޸Ȯ^zZv)aXGn]#PyvS%>86 N9ffz1!zmْ15 ?7d' eA٘%L. -:3DD I-1VA=;YG~K"d"]8mnm RDa^[:iJ]/÷`E˫$1!XH i*Z9 ܏tUtuVfLeK 3'A#Ų_\zlwtJD9klv)̌'Mx8c4pX,Ё-))FRI<6X-={;^q,a%a5 Vd&%]-0~<Q _{;_D?@ Di) 9`8>?/:&[4p$hL O=`7$LMI)Jߏʓxz+]HJ 'JGIL%ƯiS4vJ,"NȮcsu N}o yR!>CSE=dJcԁG*]#=GBׁb!v@_*xk9aKZCChE>stH됎bu; 9\̅S]vjLkr߆C B[)UqL e`Ib/fyg4`Dow)YʁSR?eHs.=n_ƀhd=Nl`&Y.f tN_}HOiEDJ⽗9P){Ny+a%A#cLzKOI #ʶ.2ɹhz5"MזBԪXV4;?Ŷ S4OR=]:cx%cx9M Cԕ"dQFK'|>PLl|UYKf.t9LrK/V 粒xB35 9(Onq@f$#r]#GW.Lo!6|L5f]m@+gG GFG1]!͏grobU/_0A$"Y4o҇# ݉~ۧ-:ᕕ[Q#p PUu3ć =kהn@˟pC,#0TUJ8QųXNCOa%7 ?HƝ >[75{>lgϞE5">Z^h9>j:;j4OIzH(XG*IFRcၘy]l+nv.TB׍8׸D4RJC$L4ߠ rYRGDd!2Cƅ2];_[Z.<6OG9+/T&8:q!$S cydF}ПQ 1iJ&.ɖ{Yw˟5l l"ЃaK'X_G^^WUm^S:SSih\3m:k/ } ijg/'L hNפp9ݛgBޓr۟:>HE7;^aX#_"43- =3h{@ }߈`nh ҽ`8qn=/ZzνŦufc CJs"Pؾv4]^ʍLqlm.Wf|#N$oT뷖G2 |_痩Pd8(ò@c_(L L׈LfO_:q[5uLB=dxf)x>,+QX ELF -0+RA҉Jc&tM:4#{1贸4R˻%SfquOe2"1SэEPGLT9*y>c"ypM$^eVyUsB#.#zA.,AҰ񯒱dmԚh@JP($ e`!#:/E??Q)=bAo4]2ɂ9n}hM3k`fjJM.n1⩹Z!!)I 1Kz3@HҌYTBKxO kFPR۠!XA&qDc`n}{ثF1T?3TL+N=aoɖX+k,>G1;/zGneb:*e쏪,\\ ;Yo=σ))<P2(房@B"^:Y])b5 Gݡd(O\BW_Wm筕*OU$P5S>O01JD\CI#$ j?oP5~rg~)vjE)7 s @6!f,p|HGi|o3t1zBZ6]û:k,`ބڪJа)LAH5ׄ 7p y:؟v!kw6簢,[{gZ\f B}/p( qIƊ~WlS}V)g-]ȚK kiZ\ԍ_ԍRmmYyqbNlA>=#XI$4)`.yu̼Pxh^K-[WР\%p"kw Ei)jZ)ӹjUiAM!P= 6{sʍ!G48 v@یoI%$QjE"F1!d~So 7&Dy^"]IfC%ʣK96 n}ǁț͵VE>yjcԘ)֢5="j`~DKϨM̷)J@ \t>ZGF*C}b͚S ^GΎb?ɖ Ps=wLHJ 5Y~)57ޘ~:tF 6E@3mOɱUTi-V "IBc!RG2Si0&RHlL]&DiR o`F^^Ou0Vmw ?wn\rnBICK0QE`{,O䋣,p }ر)ЗbmTA; ;9&7|*=`ϒ#ƍ }KC$HZm3cl"ƓZS$* ק G|(%K/س_ -ƢJ'fqgZw:O9؇+:h脢ͣ*adv?xP2?ɹCxK۟o fFLl^ha9;)l4;MOvsH'brA bSr*:k@^8'|cgwT<ж>NSUa1?Z#?|epNݥl$h'鸔=>熈.ߏoRJuB}0\=NMeN. LV2G"A˲C8eN&( Sz6DK@o&Ҕ r*byiX^}3o6<~vOΝG/i +j:!iiG@Z&I*}=ះ`z[ b:;5ܡX  ܋M)D5PN.eHZko~AʨV8be/w:35EނЩRixMХyeUi%}n2Ű3"G;ϰ`Ͼ4!v Ev=jl0i녑'Ʉas^4FKA&DH_ě⃁5TVjY@SտA/yT4܎ Xu7<ejTK+N1g4 wՑGFt\mV05mCKZA`LXviPU{~7{+U' f~^~xw67i%O>|4 /%W-,q&@>|@VbWY`S֞OV21ՁRY i~ZjF_Xwc oݎiKYW dV%%5P2;unZA׆AXq/b?ajW b>S,v\17kSM(25\%H3r7!ǴvSMKnO5" H"+l4*FWE 9Dk שɄj+ Z´/i֦m#X ك;bdjywNaugVur2C?c;T 0w=WϛB;g/!3$[4nkCewʃ+K(_e30*F9#(<,~)d887P W@Ql1җݯfk"%KS&9U\9l^\'xh.M9{d^E2jF+ hxFfB^l!!LrLԞOvK]KJ.%C`0d!jh]$m=&Cz}PїI=}5k Rn uo`iZȉB8lЛ ex kXݬBƠCe) -#O+lG1ޥiY BTQ7ճĵ; zg!O %ajdtfLϡ\o uРgTc,5I]{驸*zHJ:($\ kM@R-=Ma>ĸ f<ϙΠC!iL@h5Ą~~B !R3vŃWA K5Pu<-ÒԂdyj`ө iY.4^N"b!ADSb`t\&n*ГrUf%Ƹf$R:X&:<|6${G׌SY/"7_=jh+޹ ^$<ʾUHWyydֱ/CIz:LD_@'~ƙqVG1HڎiXL4.k a{# *SS$DjYZ;-76&?0~ N'(Oq>$X<֣t FSFTm%ƓH(C b,\']Ԇ/]S+Fͣ-=7wViQ˩="_O?9-GaCsS׶e¶0G5ZDw+>8gC/φTٝ"DH?NH@(&YDmz;ssp"H?󞴆ARQ9 3 ۋyj?t)'ВWIY^HAB6&s\yUA[N 蠝s¼Y'j 4IxBFSK0_+#AS 0j2IZ.gS$M˶ݖR,e/cόwU3/cxFkV+$˜ N-NZS}J3BK9\_?H[<"veC=v"bP#"fN}pJ^F8ig!y>K浻&HaWgWZ92MSJ~3®&[,H48̙%3ϓAd*$^HI_׿]bA8k²Ӹ6]s@]C#gNk@<*ȷ^$F=Ѽ5ro#L+L2zt~ls%((HGz7uDh ձ4.w%Slhf66n݈߱96KCy0(N&n~{1Iw λۢP&bGIrM̃hDI8jf3fT3p:%j؞OrPuћ*/OS"Txs냄J}Na&÷K4GWf(ƌu6H7Lp1E.K.]ɵ=7%qR%?c |q|؇Y헃h6(˘h?d#BJu^-n"mAI?lngNr[GYkbV' @^D6FƂH=):hpCDq݈gGE:XWs>lH[ h*5{@Y?4KiVsG-޿פ nry*ӫ%"s0l"9av7SCiՀc9޽?_/ꔷ̱@T(bZB|xOo}TŬ8 bZ}i a{g8` w=I]ߚHP-ZLGb$i%MS!!fp9MMPOmored3>)ͅ8ܖi@Ynxß?U76$ɞm*E'š/Rw[s[ǦnF6^5Wjb|:/C;c"cmZeJ3i438v%^ga,噱 FI~iC /jH27$~h֞N,ʯzM+(G. X@UL[ӊ!E"oSJPr;F(pC_AէcF$=Z,)gxoB(^L5D?B!ch_p 3qgnK#4Csqӑm (p+)3OX!+p\vS '>⅑˭uQsaszo2`m mVc@R"0u0۹q7T$W9Gp+rP2L)bGcoV[N|[1?ҏoeckK`KuM:?Ŀaj)G#]f%'sVKݱv> w(KTCϴ3H R%)->zԢM|_DN]gri;I޿!IJJ۟ Ϲ11W<ºh.F{^BX$m]xcu6PؤH^\;T'RR8W |!ׯ Ь:0/*΀_zsӊ{z7Ik?9MPzlÌZ{+Qap2eYZ&> E^\J &uIٷ2sugmsFj#i:$>:LͶwQs^bQz+Ug=%ztzwkҍ<,_KteJiڕ^RU.m)l b7-ox{ʌKuDuMOTi>Q%Z2}~aǦMCliH#~|xP=TRBip>9Fm^7jS%Pjx'j5o#uAp6HKAlR/Ϳ(f`֍nPsLwyS 㰻#9ò!ҘmKD E'0fjɧɃi=›Qȗ*fY&n]Yq(@4pbk*ؕTC3M5MowE P[AfGK)-W]*fôoq<`fáݔ? νK͓`3ĭmŐp7p;[`80p9<^ AO4C/Um760/) 4N[Z>驨߷3+L t'(}I%AT@l%W faVюٗz욵A r BoyQz >M1g(J Tx5Zc$'ٚ/5I03 56._RݘJ2Nq2Z [vkf#{q;QyrJM[p-bg~KDUHUp޼MQ&.su3n,Q3g? $d.woim]7zRn-޷pR4$a7@ʉל6[^2eL8upS% `a:"/v ڒl;" ߴ6\iV.H'f$i@u0%`|k&D_lR_ݐY1dǶ`Y;k0r4%ۼ:\#>5S"-{Ӆ Z.ղ9=5kn#C5Cv DT9=aZ:ʇ./TSO;a0=wBH:)HPP%i㻼YlFS~$V)"jaH'[$H&>q et!RiE YME#fN7SnDaS_DŠ6mԟtwuF}s0wOq_Qk^JF4FG=mb_}-ρ5|ajxRB~@X J$H6ٰ TIU'ֺ#L>lAn "ƊJ- o֯oA^UMZ»L+o_X\4nqVF;:cYdQ֡pC$+DR*.EinqM"̰ܛΥBBT] ̶ČFM;U$KK콝gn$J3R3)o C>z;<{?PNF>?5ǴuOlKi RaS33L*U"|iQ ⒠/SɞЭQiiOm@e5 _)CjC)MAaP;w)HȼG!E|B:G;&N۸Lb_dPlS _w͢ =;|hYl~0BǶPԫѤIo#whevkjki&\#(|9g@c=r-4$Fz aӆvOi:hkBIM5z1i 5nP ;%1uV$-M*K02`5:4` BW|d0S4Tuº&_y,7HΚUM@ 'eMQƅ*Xq6O _z6ȁqQ ÅBB<8o#R;OJN;> p)ΥO98B֍z9X@tr:Oi%';[,jQe(5 B l1 D^y:֫􀉅bj&H{b) ]>)&q㔵kv*wo _/'L\CSޡaOAF=6Ǽ?]M|#20v]7`,aʡY gsFJ%_*sw\h8l'>6#d-Ḽ+A8̿ٹC :hL`{:hI<6Ul@_즥%}0y?t༱MP*k*mX&K2И:?03U?_([E|s&y(І{m%珓/5@]k@)k=­/$´u["XVH@) vCr5N_. [`l Cqr~Zf޾|%DlD,ZU#K,.]>=*Z5e{DYװ5<9= URynl:;.u0A~׹xjaov=gA2-.d`o`; h̲j:l< Q09 !sk*}&4 +WD6D u7<0 #QV\ D.h Sj='Ei$ˤl:J|vW. di '»89 gRa,8|Bdw :*+$WN5mLφdw }@; #%!"1B *w٭$vs ]2TbW()*1,Bs5z/KyMnL=G{a{bGߓ$$|Nь-ĚxUsZjK3ǩEy^TY " >x婯 I8"ڥ\ gvBPnW(&^͛lxte ջ6 pֱ"a܆{*7PCZVfVDFxᰯi! j9q'k3 ߔwsui7RFB+ F": I(?nL0 9x2h@|4y pҊ==%wu?[Nriw^dxZ5t1Z0s#7$&:+EE-/SmCMY`Ah,0֝25I]i9ZMMy#C7qEQHH͠#^f`rH?gx^TI(<3f,Y>px̗gl(1FyoMm .l'~}+{/qQiS4pZKD)K&̟&0W3pT>YZ0MBҁZ0äEoim75C/|(XV{Mm_sNbҤTk yV|β,HE\m%g1Zݜx2ڻ]9 1G\A.f /hW2kX7]w#B{cn ܞ*'X\s\i7N|*r`JC_PjUg1ZA(CZD3uDȬ'Ѧ@hVtDTQxf!-wSTd(fSD45R%R4{O5tk+8!nyj^l{N׵8ε}N$މeGNr)H%^f{N XS;B zG#[UƇXHügڗc,Pihcb6Z} Df(AƽV}ᾭಅM-hŲ/Rݙ|/5'`gcjWf/Δl!Jטv|=b"(>LhK|!.9mw_/$oDu^#ƞi/e)sZd߯œB$Ynq맂t} }u(Av1ȭ\<|ZA m"7B N[ < s$BDw=qdG[6ݶ}Z1szN*diZMz4zx5j#*gWC*s#xg5 2)܁x{k18½H0=!XtupGɄać$;M+0'&À }eVA{T9ӸU&VϏPn㿉 %d"Kv';.Vd[{1r2P^Ǐ)?@S{v)CrCT[yS%C?9 NP{߉iTp UN4@?&7$tt0ϕ?k/2<%F2M*ܸ aXڱmN6dOMiIQ*9_~d %aA>f!䑂:N`aS/5nd[3 uʋĔÎ4QӴcEDz:9>-;"Ru*}>G=VU2hIDVSRPnv#`i}UI25l<Ѱ%֐ꢓfK^xT^5Yq/=K95n{]g~mBbZT_ ΪP@*{9pګ }W} x*L('%Tp&[ IZWՓijlĵn*'M=ÌEVy=#>'$RoP̄jhMխ]7kHNźhk5h&{^_n>~%}gprV:0~o< &UHʘ}9FcB#nocs%깝c&|sZz!GT{u]'_A sƋk ]FxK+&Z֊n Ax6^r n-xИ40~R:qb 8o+2A{?[ ^+0٫R9ZZd0=^{ZMqߍxׁsm 5 k;LYwĿ_DkpPic։(<#u7 1x̯ 9vv0X<=Nm3ߢ"UqH|q!"ڻ87qM㝳ɻT eBnv-9ݿ { u.C, E _zLQ欹,羜m9 O]3f$Ÿ+ˋM7t寧7ΒGf "D` !*x-ƹrL MxS6r|W}G"yvrb G|=0}7pgj;Y`|DVd;F|\nhJ,|굉+ 7"-@Xbz߬:#K2ي)ZJ~"঵90޾:,xa$k,qqJG;~b nA `4 ?#E[R,fWƺ#6x ( UKdЈFvi.Qs-oIw+'TMk>:9?i#-ۿU@.ð玊Z_־M$ֹ3IlP1DW6lRNֺ}o^D\ְ k~5P-T?p!l>5`WX/h>hpҠ)TE}dXՄ+.QKned9ifC;p@u x!eԼ\x®[uuSB g+$,Fc62IjsXI!he="{aID%:}j(Dx?B6\r ۊy/aݙ%*h ~y0PsQ I)$6nجָ.LwhUkL*@{; ;+O ] 8&]HCu^UgCNnH/y}^~hkޛBjҰS革>X:SSC?E z5́|wx{ 4SR b9ٷ!vXM[e L(.HڙI&zJfA}#>@Υ.e!,0dԈ7iœ:vkgwan϶OMI Hx!؃Klc3hP4?Say:*nlL5Ř"O%X8Hݜ6zq`3!.a[છtvnsx' Aߜ-og[`Q/wfrw/0ZivKfl~ 1c9vGO8J0͖HPt d-[ CC[yW.D\Jô炡yh@BU A٢W!ަѲ(^]e) ySnEz`g*2[NaPra"^Hi0 tr"QF1բPðb!|+Y @7(; \y0 gf=3b妕ӟyMS)?ems4F2zw~?k抾zǺC'?$_slXFԡs! ]+M)x4yX^>%B?BlvQ2.lU3$}18`e\maNi%΄HD:Yud^̒7`3/Ipiq)IHqg9H&}[C= F97)CHnY+㱭U-<-(?'ym?zL ڮr8Tjj';W8q]T(-^>nU,[O,7: { yw>sh;;!\up9 ш~Ȧ_*f )N`zUk0O@jgnt+ @=gl+q:ųI ,rM c`@QE-+":$[Ԝ3u#8RQE' M@"Be]1"z$r[;+lR}lMǑ "{\Qn6fKzx`$"ޖ$!ɨ-U&V(|m~ Uymu,"CJwg#w5̯ؖ'V [%Gk?)IJ-{8>\UiR.'KI1bKH8Ȟ: @;SQyIi8vIJ*@ck 'J'2V8CW9E kX "n*8⺛_=MGЫ#Z0.0U62!i+Ҡo, ^Ԗ@h2m9s ]i+?iH%7.fRN64A{CrW0;Y Ӄ0#wi3\\Çyd#Mb2(@ELk}J{9?ޔ0J@(,KsaGH]ŎeSH>Mnq厦ӕkG*̔f[7 {qP)BSgz?k|lp0%3#DE"+ևE?,}޷|8ƮjTȤnې;"i kLdf?sd 3YA*0(|\ο=r\SI sr>샶&%v/(1l\QyBaoa-&j.Q>8xA+T,tQ"W4GP%]4?T͋\ Qx:tBfZ]MKq϶,ufhFÃZki< EW]wV:%f;8fwݯBb~(E"*7eצ-E,ZP ziRkHˀk%?%(z61}T$hs{M+?B|!gǃtkF?jT =A`lqXVA$6`2#3%Z3}^VFe}Y Vк3vbv2W9j95ㅭk? 0(Ҧ|z*HXkP3tZ'l 5( f%SX~"EGq4F$Vգ 7JX y d4$ՐdUTBrqE:2QphrՏ8$]Z55ҶнM%YI<|g=9}[F#9~];J 3F_7iyF7 tT!Y)'L{C.ğͼwrGAb>Ay7ꍬx\M,@w gyPԳΧ$\V 7m DEـ2f@_!VUM^d6nt0Iv4 [GYMÅpڮkZ&ݹDR=[Iox2?/<ӊ#T/|]0Z4z馜-MאD}idJUϢip\.w"QW-;xnX"U 5?Ho*tp5MuN￐8C+Wgel3TiWհlM0Z Dtr,r0&MOc8`/v½C]|}x6 @r=\$q hmM}x4;(>E\ɹ'H̊`nuE']9z[Zl8!!qdpʭ4wܚQ%A_A_@4@oҿv<.wV{mĹDŽSTX#]0LЯϴZX4G1qLFl'pw칾ω-jX '&Y`bedã-]Fuf*B|;-D@[Ly;nZ߅{ \xÙQ2PF;](YՔ;spk'˗pM2% iE럝7ll*͕ͲxnkkPO,@~06".&g Ջ-wy|#foq=76LuZ+s1paa*< sK7@g ?IԪ_Iw{+^&v&}vgTBw}ܿ\a2rx6w|{qόHə#[w!MP +/ξ}wg׭Arai9R;Ȅ%DrowE !z^^H%~c+Lp2zsr<4LBW~DYCQ6Wc"=9~ew(hynD"3زXeG'p֬R@~pzp@O!QWI#) *W-WL*m?56r;i(v-D UF@ڰ ^w!=%R!!;c01VjQ]Em$3c7SYJ;y]U{Z:^Nn R`R@,K0,˴CYճ"]UwH&W3=ym!"Y8YOc>Qo{iM;>Souܷ'AB1!a(I@aRDl@Xc!h(T6$cO)bݺ-0oq-9]Z2?%?vlP{>r5-08`\DšL!SAr%Ь^Os3,ybjv@wƣt~`VW@.Bّ_FꭦUx9$|Tk},VyրγMO#JF̥p#ahU+ h3g4Y0u+ӁY9Y6s ->aI{3 _ܞ%P+Ӝ;x ? Lkvmν1[o=\kxYNxܕlrܢs`U\ a iUv~𮾌?@&vNo-G%gr"!VJR=D Ο|cjoCGf9. ܉0<VX}1ɉ3, Gu!qs݋FQ(zNG;YTʄw8RKt"?RoCɣi4އFEŭRDEh/z3ɑvJ`GưA eno||'v-@K4XNU? 8u×ԄO%Uuм| @t^4Ѷ:/Íx}G\O!8{\Mw^݇I+ELԟ>G>`nc{He瑡xs]\RuBX=enb 2+"r'~⬗O)"naE\{qSS-}]hV 4Y8I#.\].OX~A1^B=]oYcax\u L`BKB2')0@G axگ*+,٪"Α{Loamt6@-RA8 \ `lIrNBG:%3 >aJđ M1]h b+:鬕2N Z. ؍h+?p Vg]?o5o Țbf#)h~k8:V{1IS: ]9JCi4!,=Ѿ#w *Bd >-_P"g9RArծ<'DAI W!?&M茛̏e>ikϙG])X^Aݪb}:ڤ k^=/r%2XS$=㪐$>}'.yr6x*tRZf瘻x%6gjE+Ut{衘M8Խ@;&*&;6ba:2?~=eitf$wlLyy>ޡ]ė'7mf37"@|O1m%L~s)ۮ'T&GN\-:s R;0nXTAiq 6uؐ `Ayto2"$| ̀$Rс DmbM M@^s 1]Tl#? @XSga+͍3V"j`"3K$BV :cml80l3`W !˙v(4Jylu~ket@to9@c =hXoQD&-@v$qT]3/UH&a2c*@FFMphO>j2ch`I"59kB={ϔ:S-GM&!M$ͯ~;VLӠ|(_Pk OH™mm$>G@NBw&&,&X̻E>rݓ"+z*N)S-<MHaQn '3S u1o#"V6m?dmW;I[2s RA!v.ZX/spOG-QKQL/2HʵafVz6fô x# c2|DŀԠk0ΚraKIٚTRi91xRDh83G@s'ě\%@6,ch r#)0pX)VDN% '3-H2r/T8[GqINC YZX|JL^)ƍHٵMo\b@jN$8p`Aq x5NSqt^WYBNm=`:4 ZjKiMFmom nIv=㺸rXӰCk$d{>U;imz3#$USIhex9ҌbB,TCXDwag WXV(ӋH5B"*YwVhǐp&G}q8Ə(.ol ڀRz9wȂ 1y+MݔFQw9N5#Nl*RsU #B!{m履ap\ lF*3,%{(R<%d1|Ur&L#.^yׄM\.}?}*ޞOcέ.5tff:.tA0? :V4 6V;uүD%rcmi,>¡YeyUt SGT k4ßyh(cP$(HdBL$8 ՗([ d㈶"w+7W&GIR|F{Ό`IEk6KTiSb:jqB?߸gHTIjeU5?KDn{(u } Y)p: 7i_0kKENDt`M犤}_1E;#|xHpI.8Fj@3@Vƺ}S.˗"X9]%'ka6X9 .ƍiġ} @:NĘ6TbH5 i#:oDmXЕ+㷽9oafO|_L3~k~!^z*"!De߼r SMg ck"{6VcnXTI9d0=zrk.=9AU]UЛKQWID*?m(-HcbYNUxHXр5V&!t=;ES_ѴEIyՄVPexƭϷ㪣6NyD^IRip~0o\zBV&p:,.G>JZPblz]t䃼R)iϸ&HF2΄u4(Epp_[*q5[yWKHVYQ'gkU3 V%cS6 8V(Ђ3 EᡣȮ_@pՓc$NQMyY'׶O齉w=0|7rz;B~b+c]R 81,h+BF:ke}I&a3 xʘΤ t٭h@G'FXPquZ,yta^׹,_fc|&X "Bek8 o5MA?9ewU8 7()XK@w# fʲ*xֻQXi+.I" t|8bpgS} Z@$QAڢF]-3(#1Ta,,p(k姂ЎMPMeh(O9"F[տʊ$#|{`7|-k.jYޠOt{u(x]9=ܰ%L!/i"%ϳG,c,J]"C킂5aZewC:VxVOϑ u8_3ArL}m "x~wxB a2 $%KCM#y}ZЖ"!sVN2{&{U5 `*L|MuLMp[zRP6Ep+E Pn~W l&?'FӜ.[%LJMjh!&.RLԄP(Z \}牿gV {qT_oݗ_w z$ t: YZ