From owner-freebsd-security@FreeBSD.ORG Mon Apr 10 22:25:08 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A16EE16A401 for ; Mon, 10 Apr 2006 22:25:08 +0000 (UTC) (envelope-from ricardo_bsd@yahoo.com.br) Received: from smtp101.mail.mud.yahoo.com (smtp101.mail.mud.yahoo.com [209.191.85.211]) by mx1.FreeBSD.org (Postfix) with SMTP id 110FE43D46 for ; Mon, 10 Apr 2006 22:25:07 +0000 (GMT) (envelope-from ricardo_bsd@yahoo.com.br) Received: (qmail 13607 invoked from network); 10 Apr 2006 22:03:03 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.br; h=Received:To:Subject:From:Organization:Content-Type:MIME-Version:Content-Transfer-Encoding:Date:Message-ID:User-Agent; b=OVu1nwKy/5rd31zNL3EW4KXZnVMXx84pBjcPrAxTXkvcAmjWPPlr+oTkqeIh07NWcbRH7zukiIwA2tvQjWCJbH74jsWzJmpvvAxrAp1XuBaMh34AJBW8DABbEQ/kMQSBlGYPuq0JLF7sWn27fIVBp4Wf7LQ1cTRpXLzX7lUoD8c= ; Received: from unknown (HELO localhost) (ricardo?bsd@201.1.76.169 with login) by smtp101.mail.mud.yahoo.com with SMTP; 10 Apr 2006 22:03:02 -0000 To: freebsd-security@freebsd.org From: "Ricardo A. Reis" Organization: UNIFESP Content-Type: text/plain; format=flowed; delsp=yes; charset=iso-8859-1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Date: Mon, 10 Apr 2006 16:03:00 -0300 Message-ID: User-Agent: Opera Mail/9.00 (FreeBSD) Subject: [RFC] Ideas and Questions in security updates ( portaudit, freebsd-update) X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Apr 2006 22:25:08 -0000 Hi all, I use FreeBSD for severals years and this Project now have a possibility the full security update (src) with freebsd-update, is really great for Release users but is break for Stable user. Ok !!! Exist a possibility for apply manual patch and compile issue, but for me problem existe in fix kernel issue in stable branch because is require a update for last stable and this result in {make buildworld,kernel,installworld) large time for correct a security issue, in large enviroment with jails and critical applications like administrative ldap e high webservers. Correct issue in large enviroment is a tormento, and result in full downtime, what the recomendation for security update in large enviroment with jail ? About Ports security issues, one idea is integrate portaudit and portupgrade or create another tool for update ports, this ideia is based in Gentoo glsa-check ( http://www.gentoo.org/doc/en/security/security-handbook.xml?part=1&chap=14 ) Thanks for Attention and sorry for my bad english. Ricardo A. Reis UNIFESP Unix and Network Admin _______________________________________________________ Abra sua conta no Yahoo! Mail: 1GB de espaço, alertas de e-mail no celular e anti-spam realmente eficaz. http://br.info.mail.yahoo.com/ From owner-freebsd-security@FreeBSD.ORG Tue Apr 11 00:57:50 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B503A16A405 for ; Tue, 11 Apr 2006 00:57:50 +0000 (UTC) (envelope-from tmclaugh@sdf.lonestar.org) Received: from straycat.dhs.org (c-24-63-86-11.hsd1.ma.comcast.net [24.63.86.11]) by mx1.FreeBSD.org (Postfix) with ESMTP id CC57343D6E for ; Tue, 11 Apr 2006 00:57:47 +0000 (GMT) (envelope-from tmclaugh@sdf.lonestar.org) Received: from bofh.straycat.dhs.org (bofh.straycat.dhs.org [192.168.1.56]) by straycat.dhs.org (8.13.4/8.13.4) with ESMTP id k3B0vkko027007; Mon, 10 Apr 2006 20:57:46 -0400 (EDT) From: Tom McLaughlin To: "Ricardo A. Reis" In-Reply-To: References: Content-Type: text/plain Date: Mon, 10 Apr 2006 20:57:46 -0400 Message-Id: <1144717066.1824.12.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.6.0 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit Cc: freebsd-security@freebsd.org Subject: Re: [RFC] Ideas and Questions in security updates ( portaudit, freebsd-update) X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 Apr 2006 00:57:50 -0000 On Mon, 2006-04-10 at 16:03 -0300, Ricardo A. Reis wrote: > Hi all, > > About Ports security issues, one idea is integrate portaudit and > portupgrade or create another tool for update ports, > this ideia is based in Gentoo glsa-check > ( http://www.gentoo.org/doc/en/security/security-handbook.xml?part=1&chap=14 > ) > I recently saw glsa-check while talking to a Gentoo dev at Linux World this past week. It's very nice but does not fit in with our tree and updating model. Gentoo supports updating individual ports while leaving other ports on the system untouched. We do not support this sort of updating model. To get security updates for the FreeBSD collection you have one of two options. Either A) follow the recommended procedure and update all ports when a security issue for one arises or B) backport patches yourself and support all potential problems yourself. Tom > > > Thanks for Attention and sorry for my bad english. > > Ricardo A. Reis > UNIFESP > Unix and Network Admin -- | tmclaugh at sdf.lonestar.org tmclaugh at FreeBSD.org | | FreeBSD http://www.FreeBSD.org | | BSD# http://www.mono-project.com/Mono:FreeBSD | From owner-freebsd-security@FreeBSD.ORG Wed Apr 12 18:32:40 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id CF12416A400 for ; Wed, 12 Apr 2006 18:32:40 +0000 (UTC) (envelope-from bifrost@minions.com) Received: from evil.minions.com (server01.minions.com [69.22.167.2]) by mx1.FreeBSD.org (Postfix) with ESMTP id A7AC143D45 for ; Wed, 12 Apr 2006 18:32:40 +0000 (GMT) (envelope-from bifrost@minions.com) Received: from localhost (localhost [127.0.0.1]) by evil.minions.com (Postfix) with ESMTP id ABC3D6D41B for ; Wed, 12 Apr 2006 11:32:40 -0700 (PDT) Date: Wed, 12 Apr 2006 11:32:40 -0700 (PDT) From: Tom To: freebsd-security@freebsd.org Message-ID: <20060412112332.L47470@evil.minions.com> X-Accepted-File-Formats: ASCII .rtf .ps - *NO* MS Office files please MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Mailman-Approved-At: Wed, 12 Apr 2006 18:58:38 +0000 Subject: Question about Export Restrictions X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Apr 2006 18:32:40 -0000 I work for a company that builds an appliance based on FreeBSD (4.X) and we've just had our first question come up about exporting the appliance out of the US (specifically the EU). Since FreeBSD uses OpenSSL/OpenSSH, I'm under the impression that we need to gut out anything higher than 56bit (3DES/etc) crypto out of it. I would really appreciate it if someone could point me in the right direction on this :) -Tom From owner-freebsd-security@FreeBSD.ORG Wed Apr 12 19:12:33 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2632B16A400 for ; Wed, 12 Apr 2006 19:12:33 +0000 (UTC) (envelope-from kris@obsecurity.org) Received: from elvis.mu.org (elvis.mu.org [192.203.228.196]) by mx1.FreeBSD.org (Postfix) with ESMTP id D4EB543D9D for ; Wed, 12 Apr 2006 19:12:12 +0000 (GMT) (envelope-from kris@obsecurity.org) Received: from obsecurity.dyndns.org (elvis.mu.org [192.203.228.196]) by elvis.mu.org (Postfix) with ESMTP id 159521A3C33; Wed, 12 Apr 2006 12:11:34 -0700 (PDT) Received: by obsecurity.dyndns.org (Postfix, from userid 1000) id 589E65157B; Wed, 12 Apr 2006 15:11:33 -0400 (EDT) Date: Wed, 12 Apr 2006 15:11:33 -0400 From: Kris Kennaway To: Tom Message-ID: <20060412191133.GA26006@xor.obsecurity.org> References: <20060412112332.L47470@evil.minions.com> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="RnlQjJ0d97Da+TV1" Content-Disposition: inline In-Reply-To: <20060412112332.L47470@evil.minions.com> User-Agent: Mutt/1.4.2.1i Cc: freebsd-security@freebsd.org Subject: Re: Question about Export Restrictions X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Apr 2006 19:12:33 -0000 --RnlQjJ0d97Da+TV1 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Apr 12, 2006 at 11:32:40AM -0700, Tom wrote: > I work for a company that builds an appliance based on FreeBSD (4.X) and= =20 > we've just had our first question come up about exporting the appliance= =20 > out of the US (specifically the EU). >=20 > Since FreeBSD uses OpenSSL/OpenSSH, I'm under the impression that we need= =20 > to gut out anything higher than 56bit (3DES/etc) crypto out of it. Only if it's still 1995 in your timezone, AFAIK. Kris --RnlQjJ0d97Da+TV1 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (FreeBSD) iD8DBQFEPVDkWry0BWjoQKURAmabAJ9ilyLkAoNTXgAYw7d34HjFWqMXnQCfROBV r3frUifGdwGyOaJGwZ7ZUqk= =aCZJ -----END PGP SIGNATURE----- --RnlQjJ0d97Da+TV1-- From owner-freebsd-security@FreeBSD.ORG Thu Apr 13 00:29:07 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C833D16A403 for ; Thu, 13 Apr 2006 00:29:07 +0000 (UTC) (envelope-from bifrost@minions.com) Received: from evil.minions.com (server01.minions.com [69.22.167.2]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3976043D64 for ; Thu, 13 Apr 2006 00:29:02 +0000 (GMT) (envelope-from bifrost@minions.com) Received: from localhost (localhost [127.0.0.1]) by evil.minions.com (Postfix) with ESMTP id 71F8A6D41B for ; Wed, 12 Apr 2006 17:29:03 -0700 (PDT) Date: Wed, 12 Apr 2006 17:29:03 -0700 (PDT) From: Tom To: freebsd-security@freebsd.org In-Reply-To: <443D5308.1080907@iang.org> Message-ID: <20060412172438.U47470@evil.minions.com> References: <20060412112332.L47470@evil.minions.com> <443D5308.1080907@iang.org> X-Accepted-File-Formats: ASCII .rtf .ps - *NO* MS Office files please MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Mailman-Approved-At: Thu, 13 Apr 2006 01:24:29 +0000 Subject: Re: Question about Export Restrictions X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Apr 2006 00:29:07 -0000 On Wed, 12 Apr 2006, Iang wrote: > Nope, that is old. If it is software & the crypto is freely > available off the net, then it is not "controlled". Hrm, so even though we're selling an "appliance", it doesn't change anything? > The specific restrictions were lifted by Clinton Jan 2000 from > memory, for americans. Hrm, any idea on what part of the export code its in? I've been reviewing a lot of government documents and they all seem to point at it being an "advisory license". -Tom From owner-freebsd-security@FreeBSD.ORG Thu Apr 13 12:10:19 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B1B2216A404 for ; Thu, 13 Apr 2006 12:10:19 +0000 (UTC) (envelope-from gdt@ir.bbn.com) Received: from fnord.ir.bbn.com (fnord.ir.bbn.com [192.1.100.210]) by mx1.FreeBSD.org (Postfix) with ESMTP id 480CD43D6E for ; Thu, 13 Apr 2006 12:10:14 +0000 (GMT) (envelope-from gdt@ir.bbn.com) Received: by fnord.ir.bbn.com (Postfix, from userid 10853) id 9A67253E4; Thu, 13 Apr 2006 08:10:13 -0400 (EDT) From: Greg Troxel To: Tom References: <20060412112332.L47470@evil.minions.com> Date: Thu, 13 Apr 2006 08:10:13 -0400 In-Reply-To: <20060412112332.L47470@evil.minions.com> (bifrost@minions.com's message of "Wed, 12 Apr 2006 11:32:40 -0700 (PDT)") Message-ID: User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: freebsd-security@freebsd.org Subject: Re: Question about Export Restrictions X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Apr 2006 12:10:19 -0000 Tom writes: > I work for a company that builds an appliance based on FreeBSD (4.X) > and we've just had our first question come up about exporting the > appliance out of the US (specifically the EU). > Since FreeBSD uses OpenSSL/OpenSSH, I'm under the impression that we > need to gut out anything higher than 56bit (3DES/etc) crypto out of it. > I would really appreciate it if someone could point me in the right > direction on this :) Find a good lawyer familiar with export control issues - the rules are complicated. -- Greg Troxel From owner-freebsd-security@FreeBSD.ORG Thu Apr 13 12:25:11 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3E88716A400 for ; Thu, 13 Apr 2006 12:25:11 +0000 (UTC) (envelope-from arne_woerner@yahoo.com) Received: from web30313.mail.mud.yahoo.com (web30313.mail.mud.yahoo.com [68.142.201.231]) by mx1.FreeBSD.org (Postfix) with SMTP id A8E9043D48 for ; Thu, 13 Apr 2006 12:25:10 +0000 (GMT) (envelope-from arne_woerner@yahoo.com) Received: (qmail 90221 invoked by uid 60001); 13 Apr 2006 12:25:10 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=aEQzCy/A2rsAW5i3KcYMhEUnJRnOA4EGiIvkiK3MYgD2h9zRD8XKs0y7iLINpEsViqMLqgz8Q4LH405r3cTNtHiSqiuIgS79ErQWrt5FLP+VyPUVL8Wtb6wqxqwvsGK3mH/ji0UVgwQJ2uvmp26KYeviQi3Q3N/ZydfMWAPLbZw= ; Message-ID: <20060413122510.90219.qmail@web30313.mail.mud.yahoo.com> Received: from [213.54.78.184] by web30313.mail.mud.yahoo.com via HTTP; Thu, 13 Apr 2006 05:25:10 PDT Date: Thu, 13 Apr 2006 05:25:10 -0700 (PDT) From: "R. B. Riddick" To: Tom In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit Cc: freebsd-security@freebsd.org Subject: Re: Question about Export Restrictions X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Apr 2006 12:25:11 -0000 Tom writes: > I work for a company that builds an appliance based on FreeBSD > (4.X) and we've just had our first question come up about exporting > the appliance out of the US (specifically the EU). > > Since FreeBSD uses OpenSSL/OpenSSH, I'm under the impression > that we need to gut out anything higher than 56bit (3DES/etc) crypto > out of it. > What about downloading and installing the crypto package(-s) right at the deployment site (in europe or whereever) from some Canadian or european (e. g. Denmark) ftp server? That's what I do since many years and I still never was in prison... -Arne --- Canada Oh Canada... __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com From owner-freebsd-security@FreeBSD.ORG Thu Apr 13 23:21:45 2006 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 41CA116A403 for ; Thu, 13 Apr 2006 23:21:45 +0000 (UTC) (envelope-from ricardo_bsd@yahoo.com.br) Received: from smtp101.mail.mud.yahoo.com (smtp101.mail.mud.yahoo.com [209.191.85.211]) by mx1.FreeBSD.org (Postfix) with SMTP id D6D4043D48 for ; Thu, 13 Apr 2006 23:21:43 +0000 (GMT) (envelope-from ricardo_bsd@yahoo.com.br) Received: (qmail 4303 invoked from network); 13 Apr 2006 23:21:43 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.br; h=Received:Date:To:Subject:From:Organization:Cc:Content-Type:MIME-Version:Message-ID:User-Agent; b=vwYSVtG8+FXVyhtP7gZk4dfY36nglXLWO6eNA+N9n8enC4Z42QLcsBb9txMCx+T0b3ZPTJNvAtg0Uq65tWxGB74Fog5IqBcelbJv1eXQhdJ1eRSTS/Q9qRhCTUbeh216U5WkrbTcroqspmKGcW2RJtAPCSTnqSVBAbNXA+hmXMA= ; Received: from unknown (HELO localhost) (ricardo?bsd@201.1.79.70 with login) by smtp101.mail.mud.yahoo.com with SMTP; 13 Apr 2006 23:21:41 -0000 Date: Thu, 13 Apr 2006 17:21:38 -0300 To: "freebsd-security@freebsd.org" From: "Ricardo A. Reis" Organization: UNIFESP Content-Type: multipart/mixed; boundary=----------z4pw9qViLyJoxAfGvOdut6 MIME-Version: 1.0 Message-ID: User-Agent: Opera Mail/9.00 (FreeBSD) Cc: "freebsd-current@freebsd.org" Subject: Prototyping for basejail distribuition X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Apr 2006 23:21:45 -0000 ------------z4pw9qViLyJoxAfGvOdut6 Content-Type: text/plain; format=flowed; delsp=yes; charset=iso-8859-1 Content-Transfer-Encoding: 8bit Hi, I attach 2 files in this email, the first is a Makefile and the second is jail.conf. For demonstre my idea i resolved create one "Pseudo Prototyping", for test is necessary: 1 - Create dir /usr/local/basejail 2 - Copy Makefile to /usr/local/basejail 3 - Copy jail.conf to /etc 4 - The initial basejail is precompiled is distributed in CD1, for simular basejail is necessary a installworld structure in /usr/local/basejail cd /usr/src ; make installworld DESTDIR=/usr/local/basejail Now is necessary config jail.conf, ----- #sample template for create freebsd jail # # RC.CONF GLOBAL VARIABLES # exec_start="/bin/sh /etc/rc" exec_stop="/bin/sh /etc/rc.shutdown" devfs_enable="NO" fdescfs_enable="NO" procfs_enable="NO" mount_enable="NO" devfs_ruleset="ruleset_name" flags="-l -U root" # # JAIL RC.CONF # sendmail_enable="NO" inetd_flags="-wW -a" rpcbind_enable="NO" network_interfaces="" # # FILES # copy_to_jail="/etc/localtime /etc/resolv.conf /etc/csh.cshrc /etc/csh.login" # # JAILS # jail_node01_rootdir="/usr/jail/node01" jail_node01_hostname="node01.example.com" jail_node01_ip="127.0.0.1 " jail_node02_rootdir="/usr/jail/node02" jail_node02_hostname="node02.example.com" jail_node02_ip="127.0.0.2 " ------- In this moment is possible create large numbers of jail, i implemente in makefile, [root@daemon:/usr/local/basejail] # make >>> Sample in /usr/share/examples/etc/jail.conf jail == create jail rcconf == create rc.conf for start jails etcconfig == create rc.conf for jails and copy file showconfig == show information Thanks for any comments, Sorry for my english and poor Makefile. -- Ricardo A. Reis UNIFESP Unix and Network Adm ------------z4pw9qViLyJoxAfGvOdut6 Content-Disposition: attachment; filename=jail.conf Content-Type: application/octet-stream; name=jail.conf Content-Transfer-Encoding: Base64 I3NhbXBsZSB0YW1wbGF0ZSBmb3IgY3JlYXRlIGZyZWVic2QgamFpbAojCiMgUkMu Q09ORiBHTE9CQUwgVkFSSUFCTEVTCiMKZXhlY19zdGFydD0iL2Jpbi9zaCAvZXRj L3JjIgpleGVjX3N0b3A9Ii9iaW4vc2ggL2V0Yy9yYy5zaHV0ZG93biIKZGV2ZnNf ZW5hYmxlPSJOTyIKZmRlc2Nmc19lbmFibGU9Ik5PIgpwcm9jZnNfZW5hYmxlPSJO TyIKbW91bnRfZW5hYmxlPSJOTyIKZGV2ZnNfcnVsZXNldD0icnVsZXNldF9uYW1l IgpmbGFncz0iLWwgLVUgcm9vdCIKIwojIEpBSUwgUkMuQ09ORgojCnNlbmRtYWls X2VuYWJsZT0iTk8iCmluZXRkX2ZsYWdzPSItd1cgLWEiCnJwY2JpbmRfZW5hYmxl PSJOTyIgCm5ldHdvcmtfaW50ZXJmYWNlcz0iIgojCiMgRklMRVMKIwpjb3B5X3Rv X2phaWw9Ii9ldGMvbG9jYWx0aW1lIC9ldGMvcmVzb2x2LmNvbmYgL2V0Yy9jc2gu Y3NocmMgL2V0Yy9jc2gubG9naW4iCiMKIyBKQUlMUwojCmphaWxfbm9kZTAxX3Jv b3RkaXI9Ii91c3IvamFpbC9ub2RlMDEiIApqYWlsX25vZGUwMV9ob3N0bmFtZT0i bm9kZTAxLmV4YW1wbGUuY29tIgpqYWlsX25vZGUwMV9pcD0iMTI3LjAuMC4xIgoK amFpbF9ub2RlMDJfcm9vdGRpcj0iL3Vzci9qYWlsL25vZGUwMiIKamFpbF9ub2Rl MDJfaG9zdG5hbWU9Im5vZGUwMi5leGFtcGxlLmNvbSIKamFpbF9ub2RlMDJfaXA9 IjEyNy4wLjAuMiIKDQo= ------------z4pw9qViLyJoxAfGvOdut6 Content-Disposition: attachment; filename=Makefile Content-Type: application/octet-stream; name=Makefile Content-Transfer-Encoding: Base64 Iy0qLSBtb2RlOiBGdW5kYW1lbnRhbDsgdGFiLXdpZHRoOiA0OyAtKi0KIyBleDp0 cz00CkRJU1RCQVNFPz0vdXNyL2xvY2FsL2Jhc2VqYWlsCkNPTkZJR0NGRz89L2V0 Yy9qYWlsLmNvbmYKSkxJU1RSIT0gZ3JlcCAnXmphaWxfW2Etel0uKl9yb290ZGly JyAkKENPTkZJR0NGRykgMj4vZGV2L251bGwgfCBjdXQgLWQ9IC1mMiB8IHNlZCAt ZSAncy8iLy9nJyB8dHIgJyAnICdcbicgCkpMSVNUTiE9IGdyZXAgJ15qYWlsX1th LXpdLipfJyAkKENPTkZJR0NGRykgMj4vZGV2L251bGwgfCBjdXQgLWQ9IC1mMSB8 Y3V0IC1kXyAtZjIgfHNvcnQgfHVuaXEKSkxJU1RJSVAhPSBncmVwICdeamFpbF8k KEpMSVNUTilfaXAnICQoQ09ORklHQ0ZHKSAyPi9kZXYvbnVsbCB8IGN1dCAtZD0g LWYyIHwgc2VkIC1lICdzLyIvL2cnClRNUERJUj89L3RtcAoKCi5pZiAhZXhpc3Rz KCR7Q09ORklHQ0ZHfSkKCUBlY2hvICIiCglAZWNobyAiPj4+IFBsZWFzZSBjb25m aWd1cmUgJChDT05GSUdDRkcpIgoJQGVjaG8gIj4+PiBTYW1wbGUgaW4gL3Vzci9z aGFyZS9leGFtcGxlcyQoQ09ORklHQ0ZHKSIKCUBlY2hvICIiCglAZXhpdCAxCi5l bHNlCi4gaW5jbHVkZSAiJChDT05GSUdDRkcpIiAKLmVuZGlmCgpoZWxwOgoJQGVj aG8gIiIKCUBlY2hvICI+Pj4gU2FtcGxlIGluIC91c3Ivc2hhcmUvZXhhbXBsZXMk KENPTkZJR0NGRykiCglAZWNobyAiIgoJQGVjaG8gImphaWwgICAgICAgPT0gY3Jl YXRlIGphaWwiCglAZWNobyAicmNjb25mICAgICA9PSBjcmVhdGUgcmMuY29uZiBm b3Igc3RhcnQgamFpbHMiCglAZWNobyAiZXRjY29uZmlnICA9PSBjcmVhdGUgcmMu Y29uZiBmb3IgamFpbHMgYW5kIGNvcHkgZmlsZSIKCUBlY2hvICJzaG93Y29uZmln ID09IHNob3cgaW5mb3JtYXRpb24gZm9yIGphaWwuY29uZiIKCmphaWw6Ci5pZiAk e0pMSVNUUn0gIT0gIiIgfHwgJHtKTElTVFJ9ICE9ICIiIHx8ICR7SkxJU1ROfSAh PSAiIgouZm9yIF9yb290ZGlyIGluICQoSkxJU1RSKQouIGlmICFleGlzdHMoJHtf cm9vdGRpcn0pCglAZWNobyAiPj5TVEFHRSAxIC0gQ3JlYXRpbmcgUk9PVERJUjog KCR7X3Jvb3RkaXJ9KSIKCUBta2RpciAtcCAke19yb290ZGlyfQouIGVuZGlmCiMK I0NQSU8gQkFTRUpBSUwgCiMKCUBybSAtcmYgJChUTVBESVIpL2phaWwuKiAJCglA VE1QRklMRV8wMT1gbWt0ZW1wICQoVE1QRElSKS9qYWlsLlhYWFhYWGAgfHwgZXhp dCAxICYmIFwKCWVjaG8gIj4+U1RBR0UgMiAtIFBvcHVsaW5nIEphaWw6ICgke19y b290ZGlyfSkiIC0gJCR7VE1QRklMRV8wMX0gO1wKCWNkICQoRElTVEJBU0UpIDsg ZmluZCAuIC1kZXB0aCAtcHJpbnQwIHxjcGlvIC0tbnVsbCAtcHZkbSAke19yb290 ZGlyfSA+JCR7VE1QRklMRV8wMX0gIDI+JjEgO1wKCXJtIC1yZiAke19yb290ZGly fS9NYWtlZmlsZQoKLmVuZGZvcgoJQGVjaG8gICIiCglAZWNobyAgIkZvciBjcmVh dGUgcmMuY29uZiB1c2UgdGFyZ2V0IChyY29uZikiCglAZWNobyAgIiIKLmVsc2UK CUBlY2hvICI+Pj4gUGxlYXNlIGRlZmluZSBqYWlsIFRFTVBMQVRFLCBzZWUgamFp bC5jZmcoOCkiCi5lbmRpZgoKcmNvbmY6CiMKI0NSRUFURSBSQy5DT05GIEZPUiBT VEFSVCBKQUlMCiMKCUBlY2hvICQoSkxJU1ROKSB8IHRyICcgJyAnXG4nIHwgXAoJ d2hpbGUgcmVhZCBfam5hbWU7IGRvIFwKCQkJSlJPT1REPWBncmVwIF5qYWlsXyQk e19qbmFtZX1fcm9vdGRpciAkKENPTkZJR0NGRykgMj4vZGV2L251bGwgfGN1dCAt ZD0gLWYyIHwgc2VkIC1lICdzLyIvL2cnYCA7IFwKCQkJSklQPWBncmVwIF5qYWls XyQke19qbmFtZX1faXAgICQoQ09ORklHQ0ZHKSAyPi9kZXYvbnVsbCB8Y3V0IC1k PSAtZjIgfCBzZWQgLWUgJ3MvIi8vZydgIDsgXAoJCQlKRkRRTj1gZ3JlcCBeamFp bF8kJHtfam5hbWV9X2hvc3RuYW1lICQoQ09ORklHQ0ZHKSAyPi9kZXYvbnVsbCB8 Y3V0IC1kPSAtZjIgfCBzZWQgLWUgJ3MvIi8vZydgIDsgXAoJCQkJZWNobyBqYWls XyQke19qbmFtZX1fcm9vdGRpcj1cIiQke0pST09URH1cIiA7XAoJCQkJZWNobyBq YWlsXyQke19qbmFtZX1faXA9XCIkJHtKSVB9XCIgO1wKCQkJCWVjaG8gamFpbF8k JHtfam5hbWV9X2hvc3RuYW1lPVwiJCR7SkZEUU59XCIgO1wKICAgIAkgCQllY2hv IGphaWxfJCR7X2puYW1lfV9leGVjX3N0YXJ0PVwiJChleGVjX3N0YXJ0KVwiIDtc CiAgICAgCQkJZWNobyBqYWlsXyQke19qbmFtZX1fZXhlY19zdG9wPVwiJChleGVj X3N0b3ApXCIgO1wKCQkgICAgCWVjaG8gamFpbF8kJHtfam5hbWV9X2RldmZzX2Vu YWJsZT1cIiQoZGV2ZnNfZW5hYmxlKVwiIDtcCiAgICAgCQkJZWNobyBqYWlsXyQk e19qbmFtZX1fZmRlc2Nmc19lbmFibGU9XCIkKGZkZXNjZnNfZW5hYmxlKVwiIDtc CgkgICAgIAkJZWNobyBqYWlsXyQke19qbmFtZX1fcHJvY2ZzX2VuYWJsZT1cIiQo cHJvY2ZzX2VuYWJsZSlcIiA7XAogICAgCSAJCWVjaG8gamFpbF8kJHtfam5hbWV9 X21vdW50X2VuYWJsZT1cIiQobW91bnRfZW5hYmxlKVwiIDtcCiAgICAgCQkJZWNo byBqYWlsXyQke19qbmFtZX1fZGV2ZnNfcnVsZXNldD1cIiQoZGV2ZnNfcnVsZXNl dClcIiA7XAogICAgIAkJCWVjaG8gamFpbF8kJHtfam5hbWV9X2ZzdGFiPVwiL2V0 Yy9mc3RhYi4kJHtfam5hbWV9XCIgO1wKICAgICAJCQllY2hvIGphaWxfJCR7X2pu YW1lfV9mbGFncz1cIiQoZmxhZ3MpXCIgO1wKCQkJCWVjaG8gIiIgO1wKCWRvbmUK CmV0Y2NvbmZpZzoKIwojQ1JFQVRFIFJDLkNPTkYgRk9SIEpBSUwKIwoJQGVjaG8g Ij4+U1RBR0UgMSAtIENyZWF0aW5nIFJDLkNPTkYgZm9yIEpBSUwiCglAZWNobyAk KEpMSVNUTikgfCB0ciAnICcgJ1xuJyB8IFwKCXdoaWxlIHJlYWQgX2puYW1lOyBk byBcCgkJCUpST09URD1gZ3JlcCAiXmphaWxfJCR7X2puYW1lfV9yb290ZGlyIiAk KENPTkZJR0NGRykgMj4vZGV2L251bGwgfGN1dCAtZD0gLWYyIHwgc2VkIC1lICdz LyIvL2cgOyBzLyAvL2cnYCA7IFwKCQkJSklQPWBncmVwIF5qYWlsXyQke19qbmFt ZX1faXAgICQoQ09ORklHQ0ZHKSAyPi9kZXYvbnVsbCB8Y3V0IC1kPSAtZjIgfCBz ZWQgLWUgJ3MvIi8vZydgIDsgXAoJCQlleGVjIDM8JjAgO1wKCQkJZXhlYyA+ICQk e0pST09URH0vZXRjL3JjLmNvbmY7XAogCQkJZWNobyAic2VuZG1haWxfZW5hYmxl PVwiJChzZW5kbWFpbF9lbmFibGUpXCIiICAgIDtcCgkgICAJCWVjaG8gImluZXRk X2ZsYWdzPVwiJChpbmV0ZF9mbGFncykgJCR7SklQfVwiIiAgICA7XAogICAgCQll Y2hvICJycGNiaW5kX2VuYWJsZT1cIiQocnBjYmluZF9lbmFibGUpXCIiICAgICAg O1wKICAgIAkJZWNobyAibmV0d29ya19pbnRlcmZhY2VzPVwiJChuZXR3b3JrX2lu dGVyZmFjZXMpXCIiICAgO1wKCQkJZXhlYyAwPCYzIDtcCgkJCWV4ZWMgMzwmLSA7 XAoJZG9uZQoJQGVjaG8gIj4+U1RBR0UgMiAtIENvcGluZyBhcmNoaXZlcyB0byBK YWlsIgoJQGVjaG8gJChKTElTVE4pIHwgdHIgJyAnICdcbicgfCBcCgl3aGlsZSBy ZWFkIF9qbmFtZTsgZG8gXAoJCQlKUk9PVEQ9YGdyZXAgIl5qYWlsXyQke19qbmFt ZX1fcm9vdGRpciIgJChDT05GSUdDRkcpIDI+L2Rldi9udWxsIHxjdXQgLWQ9IC1m MiB8IHNlZCAtZSAncy8iLy9nIDsgcy8gLy9nJ2AgOyBcCgkJCWZvciBfZmlsZXMg aW4gYGVjaG8gJChjb3B5X3RvX2phaWwpIHwgdHIgJyAnICdcbidgOyBkb1wKCQkJ CWNwICQke19maWxlc30gJCR7SlJPT1REfS8kJHtfZmlsZXN9IDtcCgkJCWRvbmUg OyBcCglkb25lCgpzaG93Y29uZmlnOgoKCUBlY2hvICI+PlNUQUdFIDEgLSBTZWFy Y2ggaW5mb3JtYXRpb24gaW4gJChDT05GSUdDRkcpIgoJQGVjaG8gIiIKCUBlY2hv ICI+PlNZU1RFTSBSQy5DT05GIFRlbXBsYXRlIEF0dWFsOiIKCUBlY2hvICIiCglA ZWNobyAiamFpbF9YWFhYWFhYX2V4ZWNfc3RhcnQ9XCIkKGV4ZWNfc3RhcnQpXCIi CglAZWNobyAiamFpbF9YWFhYWFhYX2V4ZWNfc3RvcD1cIiQoZXhlY19zdG9wKVwi IiAKCUBlY2hvICJqYWlsX1hYWFhYWFhfZGV2ZnNfZW5hYmxlPVwiJChkZXZmc19l bmFibGUpXCIiCglAZWNobyAiamFpbF9YWFhYWFhYX2ZkZXNjZnNfZW5hYmxlPVwi JChmZGVzY2ZzX2VuYWJsZSlcIiIKCUBlY2hvICJqYWlsX1hYWFhYWFhfcHJvY2Zz X2VuYWJsZT1cIiQocHJvY2ZzX2VuYWJsZSlcIiIKCUBlY2hvICJqYWlsX1hYWFhY WFhfbW91bnRfZW5hYmxlPVwiJChtb3VudF9lbmFibGUpXCIiCglAZWNobyAiamFp bF9YWFhYWFhYX2RldmZzX3J1bGVzZXQ9XCIkKGRldmZzX3J1bGVzZXQpXCIiCglA ZWNobyAiamFpbF9YWFhYWFhYX2ZzdGFiPVwiL2V0Yy9mc3RhYi5YWFhYWFhYXCIi CglAZWNobyAiamFpbF9YWFhYWFhYX2ZsYWdzPVwiJChmbGFncylcIiIKCUBlY2hv ICIiCglAZWNobyAiPj5KQUlMIFJDLkNPTkYgVGVtcGxhdGUgQXR1YWw6IgoJQGVj aG8gIiIKCUBlY2hvICJzZW5kbWFpbF9lbmFibGU9XCIkKHNlbmRtYWlsX2VuYWJs ZSlcIiIgICAKCUBlY2hvICJpbmV0ZF9mbGFncz1cIiQoaW5ldGRfZmxhZ3MpICQk e0pJUH1cIiIgCglAZWNobyAicnBjYmluZF9lbmFibGU9XCIkKHJwY2JpbmRfZW5h YmxlKVwiIgoJQGVjaG8gIm5ldHdvcmtfaW50ZXJmYWNlcz1cIiQobmV0d29ya19p bnRlcmZhY2VzKVwiIgoJQGVjaG8gIiIKCUBlY2hvICI+PkZpbGVzIHRvIEphaWw6 IgoJQGVjaG8gIiIKCUBlY2hvICIkKGNvcHlfdG9famFpbCkiCglAZWNobyAiIgoJ QGVjaG8gIj4+SmFpbHMgQ29uZmlnOiIKCUBlY2hvICIiCglAZWNobyAkKEpMSVNU TikgfCB0ciAnICcgJ1xuJyB8IFwKCXdoaWxlIHJlYWQgX2puYW1lOyBkbyBcCgkJ CUpST09URD1gZ3JlcCAiXmphaWxfJCR7X2puYW1lfV9yb290ZGlyIiAkKENPTkZJ R0NGRykgMj4vZGV2L251bGwgfGN1dCAtZD0gLWYyIHwgc2VkIC1lICdzLyIvL2cg OyBzLyAvL2cnYCA7IFwKCQkJSklQPWBncmVwIF5qYWlsXyQke19qbmFtZX1faXAg ICQoQ09ORklHQ0ZHKSAyPi9kZXYvbnVsbCB8Y3V0IC1kPSAtZjIgfCBzZWQgLWUg J3MvIi8vZydgIDsgXAogCQkJZWNobyAiTkFNRSAgICA9ICQke19qbmFtZX0iIDtc CgkJCWVjaG8gIlJPT1RESVIgPSAkJHtKUk9PVER9IiAgO1wKCQkJZWNobyAiSVAg ICAgICA9ICQke0pJUH0iICAgICA7XAoJCQllY2hvICIiCTtcCglkb25lCg0K ------------z4pw9qViLyJoxAfGvOdut6-- _______________________________________________________ Yahoo! doce lar. Faça do Yahoo! sua homepage. http://br.yahoo.com/homepageset.html