Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0328 TLS/DTLS 'Lucky 13' vulnerability CVE-2013-0169 30 January 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: BIG-IP LTM BIG-IP AAM BIG-IP AFM BIG-IP Analytics BIG-IP APM BIG-IP ASM BIG-IP DNS BIG-IP Edge Gateway BIG-IP GTM BIG-IP Link Controller BIG-IP PEM BIG-IP PSM BIG-IP WebAccelerator BIG-IP WOM ARX Enterprise Manager Firepass BIG-IQ Cloud BIG-IQ Device BIG-IQ Security BIG-IQ ADC BIG-IQ Centralized Management BIG-IQ Cloud and Orchestration Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-0169 Reference: ESB-2013.0177 Original Bulletin: https://support.f5.com/csp/article/K14190 - --------------------------BEGIN INCLUDED TEXT-------------------- K14190:TLS/DTLS 'Lucky 13' vulnerability CVE-2013-0169 Security Advisory Original Publication Date: 01 May, 2015 Latest Publication Date: 25 Jan, 2020 Security Advisory Description A vulnerability exists in the TLS and DTLS protocols that may allow an attacker to recover plaintext from TLS/DTLS connections that use CBC-mode encryption. ( CVE-2013-0169) Note: Stream ciphers, such as RC4, are not vulnerable to this issue. Impact The vulnerability may allow an attacker to recover plaintext from TLS/DTLS connections. Security Advisory Status F5 Product Development has assigned ID 580596 and ID 407706 (BIG-IP), ID 594397 (BIG-IQ), ID 594400 Enterprise Manager, ID 410613 (FirePass), and ID 410742 (ARX) to this vulnerability. To find out whether F5 has determined that your release is vulnerable, and to obtain information about releases, point releases, or hotfixes that resolve the vulnerability, refer to the following table. Note: Subsequent hotfix releases for a given software version listed in Versions known to be not vulnerable are also not vulnerable, as hotfixes are cumulative. For example 11.6.1 HF1 is listed as not vulnerable; therefore, 11.6.1 HF2 is also not vulnerable. +----------------+----------------+------------------+------------------------+ |Product |Versions known |Versions known to |Vulnerable component or | | |to be vulnerable|be not vulnerable |feature | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 14.0.0 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | |BIG-IP LTM |HF1 | | | | |12.0.0 - 12.0.0 | | | | |HF3 |12.1.1 - 14.0.0 | | | |11.6.1 |12.1.0 HF2 | | | |11.6.0 - 11.6.0 |12.0.0 HF4 | | | |HF7 |11.6.1 HF1 | | | |11.5.2 - 11.5.4 |11.6.0 HF8 |SSL/TLS virtual servers | | |HF1 |11.5.4 HF2 | | | |11.5.1 - 11.5.1 |11.5.1 HF11 | | | |HF10 |11.4.1 HF11 | | | |11.4.1 - 11.4.1 |11.2.1 HF16 | | | |HF10 | | | | |11.2.1 - 11.2.1 | | | | |HF15 | | | | |10.0.0 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | | | |None (Configuration | | |None |11.4.0 - 14.0.0 |utility is not | | | | |vulnerable) | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | | |HF1 | | | | |12.0.0 - 12.0.0 |12.1.1 - 14.0.0 | | | |HF3 |12.1.0 HF2 | | |BIG-IP AAM |11.6.1 |12.0.0 HF4 | | | |11.6.0 - 11.6.0 |11.6.1 HF1 | | | |HF7 |11.6.0 HF8 |SSL/TLS virtual servers | | |11.5.2 - 11.5.4 |11.5.4 HF2 | | | |HF1 |11.5.1 HF11 | | | |11.5.1 - 11.5.1 |11.4.1 HF11 | | | |HF10 | | | | |11.4.1 - 11.4.1 | | | | |HF10 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 |11.4.0 - 14.0.0 |Configuration utility | | |HF1 |11.3.0 HF2 | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | | |HF1 | | | | |12.0.0 - 12.0.0 |12.1.1 - 14.0.0 | | | |HF3 |12.1.0 HF2 | | |BIG-IP AFM |11.6.1 |12.0.0 HF4 | | | |11.6.0 - 11.6.0 |11.6.1 HF1 | | | |HF7 |11.6.0 HF8 |SSL/TLS virtual servers | | |11.5.2 - 11.5.4 |11.5.4 HF2 | | | |HF1 |11.5.1 HF11 | | | |11.5.1 - 11.5.1 |11.4.1 HF11 | | | |HF10 | | | | |11.4.1 - 11.4.1 | | | | |HF10 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 14.0.0 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 |Configuration utility | | |HF3 |11.2.0 HF4 | | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | |BIG-IP Analytics|HF1 | | | | |12.0.0 - 12.0.0 | | | | |HF3 |12.1.1 - 14.0.0 | | | |11.6.1 |12.1.0 HF2 | | | |11.6.0 - 11.6.0 |12.0.0 HF4 | | | |HF7 |11.6.1 HF1 | | | |11.5.2 - 11.5.4 |11.6.0 HF8 |SSL/TLS virtual servers | | |HF1 |11.5.4 HF2 | | | |11.5.1 - 11.5.1 |11.5.1 HF11 | | | |HF10 |11.4.1 HF11 | | | |11.4.1 - 11.4.1 |11.2.1 HF16 | | | |HF10 | | | | |11.2.1 - 11.2.1 | | | | |HF15 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 14.0.0 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | |BIG-IP APM |HF1 | | | | |12.0.0 - 12.0.0 | | | | |HF3 |12.1.1 - 14.0.0 | | | |11.6.1 |12.1.0 HF2 | | | |11.6.0 - 11.6.0 |12.0.0 HF4 | | | |HF7 |11.6.1 HF1 | | | |11.5.2 - 11.5.4 |11.6.0 HF8 |SSL/TLS virtual servers | | |HF1 |11.5.4 HF2 | | | |11.5.1 - 11.5.1 |11.5.1 HF11 | | | |HF10 |11.4.1 HF11 | | | |11.4.1 - 11.4.1 |11.2.1 HF16 | | | |HF10 | | | | |11.2.1 - 11.2.1 | | | | |HF15 | | | | |10.0.0 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 14.0.0 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | |BIG-IP ASM |HF1 | | | | |12.0.0 - 12.0.0 | | | | |HF3 |12.1.1 - 14.0.0 | | | |11.6.1 |12.1.0 HF2 | | | |11.6.0 - 11.6.0 |12.0.0 HF4 | | | |HF7 |11.6.1 HF1 | | | |11.5.2 - 11.5.4 |11.6.0 HF8 |SSL/TLS virtual servers | | |HF1 |11.5.4 HF2 | | | |11.5.1 - 11.5.1 |11.5.1 HF11 | | | |HF10 |11.4.1 HF11 | | | |11.4.1 - 11.4.1 |11.2.1 HF16 | | | |HF10 | | | | |11.2.1 - 11.2.1 | | | | |HF15 | | | | |10.0.0 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | | | |None (Configuration | |BIG-IP DNS |None |12.0.0 - 14.0.0 |utility is not | | | | |vulnerable) | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 | | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | |BIG-IP Edge |HF5 |11.0.0 HF5 | | |Gateway |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |11.3.0 | | | | |11.2.1 - 11.2.1 |11.2.1 HF16 |SSL/TLS virtual servers | | |HF15 | | | | |10.2.1 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 11.6.3 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | |BIG-IP GTM |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 14.0.0 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | | |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ |BIG-IP Link |12.1.0 - 12.1.0 | | | |Controller |HF1 | | | | |12.0.0 - 12.0.0 | | | | |HF3 |12.1.1 - 14.0.0 | | | |11.6.1 |12.1.0 HF2 | | | |11.6.0 - 11.6.0 |12.0.0 HF4 | | | |HF7 |11.6.1 HF1 | | | |11.5.2 - 11.5.4 |11.6.0 HF8 |SSL/TLS virtual servers | | |HF1 |11.5.4 HF2 | | | |11.5.1 - 11.5.1 |11.5.1 HF11 | | | |HF10 |11.4.1 HF11 | | | |11.4.1 - 11.4.1 |11.2.1 HF16 | | | |HF10 | | | | |11.2.1 - 11.2.1 | | | | |HF15 | | | | |10.0.0 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 |11.4.0 - 14.0.0 |Configuration utility | | |HF1 |11.3.0 HF2 | | | +----------------+------------------+------------------------+ | |12.1.0 - 12.1.0 | | | | |HF1 | | | | |12.0.0 - 12.0.0 |12.1.1 - 14.0.0 | | | |HF3 |12.1.0 HF2 | | |BIG-IP PEM |11.6.1 |12.0.0 HF4 | | | |11.6.0 - 11.6.0 |11.6.1 HF1 | | | |HF7 |11.6.0 HF8 |SSL/TLS virtual servers | | |11.5.2 - 11.5.4 |11.5.4 HF2 | | | |HF1 |11.5.1 HF11 | | | |11.5.1 - 11.5.1 |11.4.1 HF11 | | | |HF10 | | | | |11.4.1 - 11.4.1 | | | | |HF10 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 |11.4.0 - 11.4.1 | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | |BIG-IP PSM |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |11.3.0 | | | | |11.2.1 - 11.2.1 |11.2.1 HF16 |SSL/TLS virtual servers | | |HF15 | | | | |10.2.1 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 | | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | |BIG-IP |HF5 |11.0.0 HF5 | | |WebAccelerator |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |11.3.0 | | | | |11.2.1 - 11.2.1 |11.2.1 HF16 |SSL/TLS virtual servers | | |HF15 | | | | |10.2.1 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | |11.3.0 - 11.3.0 | | | | |HF1 | | | | |11.2.1 - 11.2.1 | | | | |HF3 |11.3.0 HF2 | | | |11.2.0 - 11.2.0 |11.2.1 HF4 | | | |HF3 |11.2.0 HF4 |Configuration utility | | |11.1.0 - 11.1.0 |11.1.0 HF6 | | | |HF5 |11.0.0 HF5 | | |BIG-IP WOM |11.0.0 - 11.0.0 |10.2.4 HF6 | | | |HF4 | | | | |10.0.0 - 10.2.4 | | | | |HF4 | | | | +----------------+------------------+------------------------+ | |11.3.0 | | | | |11.2.1 - 11.2.1 |11.2.1 HF16 |SSL/TLS virtual servers | | |HF15 | | | | |10.2.1 - 10.2.4 | | | +----------------+----------------+------------------+------------------------+ | | | |ARX Manager GUI | |ARX |6.0.0 - 6.4.0 |None^1 | | | |5.0.0 - 5.3.1 | |API (disabled by | | | | |default) | +----------------+----------------+------------------+------------------------+ |Enterprise |3.0.0 - 3.1.1 | | | |Manager |2.0.0 - 2.3.0 |None^1 |Configuration utility | | |1.6.0 - 1.8.0 | | | +----------------+----------------+------------------+------------------------+ | |7.0.0 | |Administrative interface| |FirePass |6.0.0 - 6.1.0 |None^1 | | | | | |WebServices | +----------------+----------------+------------------+------------------------+ |BIG-IQ Cloud |4.0.0 - 4.5.0 |None^1 |TMM | +----------------+----------------+------------------+------------------------+ |BIG-IQ Device |4.2.0 - 4.5.0 |None^1 |TMM | +----------------+----------------+------------------+------------------------+ |BIG-IQ Security |4.0.0 - 4.5.0 |None^1 |TMM | +----------------+----------------+------------------+------------------------+ |BIG-IQ ADC |4.5.0 |None^1 |TMM | +----------------+----------------+------------------+------------------------+ |BIG-IQ | | | | |Centralized |5.0.0 - 5.1.0 |5.2.0 |TMM | |Management | | | | +----------------+----------------+------------------+------------------------+ |BIG-IQ Cloud and|1.0.0 |None^1 |TMM | |Orchestration | | | | +----------------+----------------+------------------+------------------------+ ^1These products and versions have reached end of life. Security Advisory Recommended Actions o BIG-IP o FirePass o Enterprise Manager o ARX BIG-IP The following section describes affected BIG-IP components and how to protect those components from potential exploit. Mitigating the exploit for the MGMT interface and the Configuration utility The BIG-IP Configuration utility is vulnerable. To mitigate potential exploit,F5 recommends that you limit network access to the management(MGMT) interface to a secure, management-only network. You can change the default cipher string for the BIG-IP Configuration utility. For example, to change the cipher string for the Configuration utility to use the RC4-SHA cipher, refer to the following commands: BIG-IP 10.x - 11.x tmsh modify /sys httpd ssl-ciphersuite RC4-SHA Mitigating the exploit for SSL/TLS virtual servers Tomitigate potential exploit for SSL/TLS virtual servers, you can configure the SSL profile to prefer non-CBC ciphers. To do so, perform the following steps: Impact of workaround: Changing the ciphers supported by the SSL profile may result in clients being unable to establish an SSL connection. 1. Log in to the Configuration utility. 2. Navigate to Local Traffic > Profiles. 3. In the SSL list, choose Client. 4. Click Create. 5. Type a name for the SSL profile. 6. In the Parent Profile list, choose clientssl. 7. In the Configuration list, choose Advanced. 8. Click the Custom box for Ciphers. 9. From the Ciphers box, delete the DEFAULT cipher string. 10. In the Ciphers box, enter the desired cipher string. For BIG-IP 11.5.0 and later, configure the cipher string to prefer non-CBC ciphers. For example, the following string configures the SSL profile to prefer AES-GCM ciphers first, then RC4-SHA ciphers, before resorting to the DEFAULT string, which contains CBC ciphers: AES-GCM:RC4-SHA:DEFAULT For BIG-IP 11.4.0 and earlier, the following cipher string configures the SSL profile to prefer RC4-SHA before resorting to the DEFAULT string, which contains CBC ciphers: RC4-SHA:DEFAULT 11. Click Finished. 12. You must now associate the SSL profile with the virtual server. FirePass To protect the FirePass Controller Administrator interface from potential exploit, perform the following procedure: Changing the cipher string for the FirePass Administrator interface Impact of procedure: Changing the cipher string may prevent some connections to the Administrator interface. 1. Log in to the FirePass Administrator interface. 2. Navigate to Device Management > Security > User Access Security page > SSL Cipher Security. 3. Click Medium-Grade Security. 4. Click Apply. Enterprise Manager To protect the Enterprise Manager Configuration utility from potential exploit, F5 recommends that you limit network access to the MGMTinterface to a secure, management-only network. You can also change the default cipher string for the Enterprise Manager Configuration utility. For example, to change the cipher string for the Configuration utility to use the RC4-SHA cipher, refer to the following commands: Enterprise Manager 3.x tmsh modify /sys httpd ssl-ciphersuite RC4-SHA Enterprise Manager 2.x bigpipe httpd sslciphersuite RC4-SHA ARX The following section describes how to protect the ARX Manager GUI from potential exploit (6.2.0 and later). Changing the ARX Manager GUI cipher string (6.2.0 and later) Impact of procedure: Changing the cipher string may prevent some connections to the ARX Manager GUI. 1. Log in to the ARX CLI. 2. Enable privileged mode by typing the following command: enable 3. Enable config mode by typing the following command: config 4. Enter ssl mode by typing the following command: ssl 5. Change the cipher string by typing the following command cipher ssl-rsa-with-rc4-128-sha 6. Exit the menu by typing the following command: end Acknowledgements F5 would like to acknowledge Nadhem J. AlFardan and Kenneth G. Paterson of the Information Security Group Royal Holloway, University of London for bringing this issue to our attention, and for following the highest standards of responsible disclosure. Supplemental Information o http://www.isg.rhul.ac.uk/tls/ Note: This link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. o K8802: Using SSL ciphers with BIG-IP Client SSL and Server SSL profiles o K13405: Restricting Configuration utility access to clients using high encryption SSL ciphers (11.x) o K6768: Restricting Configuration utility access to clients using high encryption SSL ciphers (9.x - 10.x) o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K9502: BIG-IP hotfix matrix o K10322: FirePass hotfix matrix o K12766: ARX hotfix matrix - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXjIZj2aOgq3Tt24GAQhQ2A/+IqwfHSRekZCXBGJ4ftIZUe8zVE4H1ZUx NUez+0mdpvMIgKT7uBbH6ivi4Ihguxyn1kB7wWdjz0k1LcBKfpG3bRuLFujiS7bH WAoUBwCQhs8bp/PCwLk1HH1jEGg58KWkLOzKKyZrOoZmWgqODfN2C4VLCXTZPH+j mcMjJKDZWe+GrjsBO1q0xxKwhJkmw9uISrektiFYFvket3/ThOyeDeSvf8Y/EVxJ IpwPYxOGYnmxtqSqJ0qxjKcaGGBD0ycZlfYz+U0F3S5FMvUKD8rkN8QRIo2WF4IQ OxKlDQUlcCT+yr4ofbY+KC8Iec9h6xTBdOZk7w8AJ7GBK0IHsc5Ip2ZrmS9FM5d7 O6qsy29Bg3EuwjlnnoUniu+YeJNUMI1IQXZ4093h5zwrMvzUdmhJF9tKz3IxntAt dh6DDkVLVTjiIvUZa/oDfYM/rMNtgEHqb6PdJJSvRA+NPv0xwRrofHN5JARcdjZC UHQlXzNn/E/R83Ck4btr6n5KUwJeidUC7vSLIRVORDVNxoA5FpQAyQrgo1geN2PA /ylY1to8cDaB+/FhowHMwcq6TdhMjID9VG8XRGGHvKs+aTHVAruEvaluc86DtVNn lZTLIpYQcq0Draz+GJltFOgiJ38XOzUu4KlMYO65siPwjV94k+x88IDsj7BrQlnI mrr7W/DQFh8= =1JyB -----END PGP SIGNATURE-----