bind-chroot-32:9.18.37-1.red80> K KtĉH2!c31^ Wghf\Esupport@red-soft.ru  Wg{az?F!K(kNmZH{+9Om >{r/U{B_z_=N7mDP s>QCu#2(8'o+.r5e60c#OaCEr{Dr["_ڊu[cA/܃O&Aw% *`MFooe֙R xPtm&+P @@43d9ad817c04a100bb5867b07eed81cbf8224a1fb26af382493c017f4849ac7ba5a6cb1659a309f845e3dac77817310a5ac618865)O=olny?"x>Ge?Ud  $ g $<@FN  P      P  p       p   D  t  - ( x8 9 : >1?9@AGL H IL JlXY\ ]H ^Ibdeflt uD vw x yCbind-chroot9.18.371.red80 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak he2stapel80.red-soft.ruredosredsoftMPL-2.0 AND ISC AND MIT AND BSD-3-Clause AND BSD-2-ClauseRED SOFTUnspecifiedhttps://www.isc.org/downloads/bind/linuxi686 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fi AA!!!!AAAA聠AAAAAAAAAAAAAACA hehehehehe~he~hehehehehe~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~he~43a025934b4840c014afab9e440d101bf9f873ccdffe9e81a3b3afc8221fb9ec67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e57b3c2756f830c1282c416d8cbac779b357db2a39a7c5eb1e8eaa569c0102f702da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.37-1.red80.src.rpmbind-chrootbind-chroot(x86-32)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(x86-32)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.18.37-1.red8032:9.18.37-1.red803.0.4-14.6.0-14.0-15.4.18-14.18.2he@f@f`S@feeee7dǢ@d!Dmitry Safonov - 32:9.18.37-1Dmitry Safonov - 32:9.18.28-1Alexandr Subbotin - 32:9.18.24-5Alexandr Subbotin - 32:9.18.24-4Alexandr Subbotin - 32:9.18.24-3Alexandr Subbotin - 32:9.18.24-2Dmitry Safonov - 32:9.18.24-1Dmitry Safonov - 32:9.18.19-1Dmitry Safonov - 32:9.18.16-2Vladislav Mitin - 32:9.18.16-1- Update to 9.18.37 - fix CVE-2024-12705, CVE-2024-11187 - remove start named.service from logrotate - build with dnsrps- Update to 0.18.28 - fix CVE-2024-0760, CVE-2024-1737, CVE-2024-4076, CVE-2024-1975- add start bind service to logrotate file- change ExecReload- add After rule to named-chroot.service- Update changed b.root-servers.net address in hints- Update to 9.18.24 - fix CVE-2023-50387, CVE-2023-50868, CVE-2023-4408, CVE-2023-5517, - CVE-2023-5679- Update to stable 9.18.19 version- Rebuild with x86- update to 9.18.16/bin/sh/bin/sh/bin/sh  /var/named/chroot32:9.18.37-1.red8032:9.18.37-1.red8032:9.18.37-1.red80   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlibbindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -U_FORTIFY_SOURCE -Wp,-U_FORTIFY_SOURCE -Wp,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19i686-redsoft-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-80ad42140fdfb749ca276fd56268b1e45fc2699de816059dd4df38e20758017b7b7077bc679bfb5592e2a4a2ed5d014d40355e72e36a93c0a94027a845385e2d3?(/hH\ -,a \!JT (4AE':b[੐oD  *ՙ*NMa;+Z9= hcp#KWO1VGЭB&+iŞhV+ӌՑ,&B$gڬҪ,Rhg]RJω*哳/v4AZ-Ӟ@X֋%JK^F9վ<:]׶Vteuמ4U|;Oҙ\݈ʏ3.im>my]F2Ƹ$1.^-CwB[s [.s>™cM|\ ]iINh͢ZARy>w|ѮD2`Yud}5Jʠ. ^|1K²D"ĭjH]= Uצ Q90`""~UMKFI:/J1x(NQn.iMffE<]uyTt|QVM<:n ]`\Jh7 AZ*T NFQimA2*ygveN=検T*Oc;]`3ʡـBBn; s0HPRɞOg`@Yu;Z AIv+ ի SO3SH$R(1Z. zF."'64wŒ%L-.ez`la Z{(Yt,Ɗźw{.8P>(KL{ YF {D}|:{YkN2cYªn'ECƪ"p &UjS镧IW[y~5kGN{Mҧ+tq=!K~zi֗Ce"q0KarSe.򄉂,Bt&)  yј8r dbDDD$ D IK7C2_@V65<ͳ9Vr@ cC1ffW tSM 1+>1?´D!a~6stAvHǯv6pEWUT$eM;}+ZL}'MczUr/zh( .RB2[ĝFM_zuJǮ3oBpDcF_ bS ~<axç_D.SeR$c9%kSflqR1V\eTfy/(w?. pcRmƛ $-e)Ŗ&--MA7%8 D*䱖м3g)]~E3.V1:H|,}KR^<]Z##F]V 40qi峕~#ƪ2dNj1ٛ jHe;]U|Z=?|+Qf%9Te/3$[cܭ Bz0b(R_t?)c+ȗVhMq&>Pwmsbނ I'zWƒTbh ${k 8Zyf7M|(7RMD Ѵ-OǹA6@:q _2 A$"6 j2@~QHɜJsO_Qz1$iVW6ШP&ES@b2#|ZݟF$RScIOoM0—Z,*SJ4)Y#Jfќ