make data available for a certain amount of time

2008-07-10 Thread Sander de Bakker
Hello list,

I want to know if it is possible with gpg to offer data for a certain amount
of time.

I want to do the following :

I create a website and pack it in a zip file
when a complete stranger opens the website in the zip it checks for a valid
key on a keyserver.

when they key is valid the site opens
when the key is invalid the website never opens and the contentfiles of the
website in the zipfile cannot be accessed in any way

thanks in advance for your replies

n00bical
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread Robert J. Hansen

Sander de Bakker wrote:
I want to know if it is possible with gpg to offer data for a certain 
amount of time.


No.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Sander de Bakker escribió:
> Hello list,
>  
> I want to know if it is possible with gpg to offer data for a certain
> amount of time.
>  
> I want to do the following :
>  
> I create a website and pack it in a zip file
> when a complete stranger opens the website in the zip it checks for a
> valid key on a keyserver.
>  
> when they key is valid the site opens
> when the key is invalid the website never opens and the contentfiles of
> the website in the zipfile cannot be accessed in any way
>  
> thanks in advance for your replies

  You need DRM software... I have tried Locklizard, it looks very
good... and very expensive too. I am still thinking there may be a
cheaper alternative... but I think it is unlikely to find a Gnu version
of those programs... ok, I know free software doesn't mean absence of
copyright, but I *feel* Gnu people would focus the subjet in a different
way... it's not something I can express with words, just a "feeling".

  What locklizard does, it is to encrypt the document, lets say, a pdf
file, which now can only be open with a special (free) viewer...
basically, a pdf viewer with other functions (FileOpen, another DRM
company, uses a pluging for adobe acrobat reader). The viewer checks for
a user ID in the computer (which is sent to the user, and I don't know
how do it identifies the computer... but supposedly, it can't be copied
to another computer), and then connects to an internet hosted database,
checks the user rights to access the document, and then grant or deny
the document. It can be configured to restrict some rights, or
everything, and also the frequency (for each document) the reader checks
the current status of the user, in the online database. They have
solutions for websites too, but I don't know how does it work.

   I write this just to see if this is what you need... and maybe
somebody will say: "hey, you are wrong, there are free software
alternatives for that".

 Best Regards

P.S: sorry for the off topic, I don't intend to keep on the subject,
unless it returns to gpg, or unless other people is not against this
subject.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEcBAEBCAAGBQJIdeywAAoJEMV4f6PvczxAVJYH/189egiTEFAa2Zq+WFF3lKps
3+uuhwvPkq3sVin+wraQbE/YUeDtEnZvbnPk0LDF+q0xLDn4i5GS/tVDxZBYWA5k
GterPmFCLPBhQSUR3BxojdMjZFQC7NIWVLOGhiKXlhgJnLHZ+KSRONI7xkJ98Zkm
W/He+xo79SC8tJYbBW1fSVYenhiE0Thq4b/wHzuCi/9sTQOeVfssCpK6uAp5hdRG
fmJZcYhjkXjh1rQwdDrAmp2mCaNMc+4y3fKjfZEjcG5gWnvEF+4sX3nj/oL3GXx/
1FYLoa+HMvtkLb/ECk3EwxgNoQ/RPzloH6kXw8ZM+KuzQ16/VlDovYoBiGm9zC0=
=xWM5
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread Sander de Bakker
Hello Faramir and Robert,

thank you for the responses.

I want everyone to be able to acces the data as long as the data is valid.
When the data becomes invalid i want it to be inaccesible for everyone.

I want to control and force when the data should be invalid, i was thinking
of using the expiration of a gpg key.

Any suggestions are appreciated.

N00bical




On 7/10/08, Faramir <[EMAIL PROTECTED]> wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Sander de Bakker escribió:
> > Hello list,
> >
> > I want to know if it is possible with gpg to offer data for a certain
> > amount of time.
> >
> > I want to do the following :
> >
> > I create a website and pack it in a zip file
> > when a complete stranger opens the website in the zip it checks for a
> > valid key on a keyserver.
> >
> > when they key is valid the site opens
> > when the key is invalid the website never opens and the contentfiles of
> > the website in the zipfile cannot be accessed in any way
> >
> > thanks in advance for your replies
>
> You need DRM software... I have tried Locklizard, it looks very
> good... and very expensive too. I am still thinking there may be a
> cheaper alternative... but I think it is unlikely to find a Gnu version
> of those programs... ok, I know free software doesn't mean absence of
> copyright, but I *feel* Gnu people would focus the subjet in a different
> way... it's not something I can express with words, just a "feeling".
>
> What locklizard does, it is to encrypt the document, lets say, a pdf
> file, which now can only be open with a special (free) viewer...
> basically, a pdf viewer with other functions (FileOpen, another DRM
> company, uses a pluging for adobe acrobat reader). The viewer checks for
> a user ID in the computer (which is sent to the user, and I don't know
> how do it identifies the computer... but supposedly, it can't be copied
> to another computer), and then connects to an internet hosted database,
> checks the user rights to access the document, and then grant or deny
> the document. It can be configured to restrict some rights, or
> everything, and also the frequency (for each document) the reader checks
> the current status of the user, in the online database. They have
> solutions for websites too, but I don't know how does it work.
>
>   I write this just to see if this is what you need... and maybe
> somebody will say: "hey, you are wrong, there are free software
> alternatives for that".
>
> Best Regards
>
> P.S: sorry for the off topic, I don't intend to keep on the subject,
> unless it returns to gpg, or unless other people is not against this
> subject.
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.9 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iQEcBAEBCAAGBQJIdeywAAoJEMV4f6PvczxAVJYH/189egiTEFAa2Zq+WFF3lKps
> 3+uuhwvPkq3sVin+wraQbE/YUeDtEnZvbnPk0LDF+q0xLDn4i5GS/tVDxZBYWA5k
> GterPmFCLPBhQSUR3BxojdMjZFQC7NIWVLOGhiKXlhgJnLHZ+KSRONI7xkJ98Zkm
> W/He+xo79SC8tJYbBW1fSVYenhiE0Thq4b/wHzuCi/9sTQOeVfssCpK6uAp5hdRG
> fmJZcYhjkXjh1rQwdDrAmp2mCaNMc+4y3fKjfZEjcG5gWnvEF+4sX3nj/oL3GXx/
> 1FYLoa+HMvtkLb/ECk3EwxgNoQ/RPzloH6kXw8ZM+KuzQ16/VlDovYoBiGm9zC0=
> =xWM5
> -END PGP SIGNATURE-
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


File Extensions supported by GnuPG.....

2008-07-10 Thread Bhushan Jain
Hi,
I am using Bouncy Castle Libraries(a JAVA library for PGP
encryption(rfc2440)) for encrypting the files.
If I use any other extension than .gpg for the output encrypted file and try
to decrypt the file using command-line GnuPG the following error message is
shown:

Unknown Suffix.

Now if I change just the extension of the same encrypted file to .gpg and
then try to decrypt using GnuPG, it works fine.

Also, due to similar experiences what I have understood is that GnuPG
supports following extensions for following cases:---

Encryption->  .gpg

Sign-->   .asc

I don't know if my understanding is correct or not. Can someone please state
clearly which extensions are supported by GnuPG for following file
types:

1. Encrypt only
2. Sign only
3. Encrypt and sign


Thanks,
-
Bhushan Jain
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread vedaal
>Message: 6
>Date: Thu, 10 Jul 2008 10:16:00 +0200
>From: "Sander de Bakker" <[EMAIL PROTECTED]>
>Subject: make data available for a certain amount of time

>I create a website and pack it in a zip file
>when a complete stranger opens the website in the zip it checks 
>for a valid key on a keyserver.

>when they key is valid the site opens
>when the key is invalid the website never opens and the 
>contentfiles of website in the zipfile cannot be accessed in any 
way


a workaround can be done to do what you want,
but requires some input on your part

assuming the visitor to the website does not know which key on 
which webserver is being checked,
and you are not worried about people on the keyserver deliberately 
interfering with your site

you can do the following:

[1] let the passphrase for the zipfile be the hashfile of your 
public key block of the key on your keyserver

[2] when someone tries to access your site,
arrange for your site to get the key from the keyserver, and hash 
the public key, and enter the hash as passphrase for the zipfile

[3] whenever you want to stop access,
add a subkey to your key, and upload it to the keyserver

the hash will change,
and the zipfile won't decrypt


vedaal

any ads or links below this message are added by hushmail without 
my endorsement or awareness of the nature of the link

--
Hit it out of the park with a new bat. Click now!
http://tagline.hushmail.com/fc/Ioyw6h4fAyoZU3DmUvpqkQxJjzzLBUKz2fZdIRBjvh0trk3S1i2gAf/


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread Florian Philipp
On Thu, 10 Jul 2008 14:32:20 +0200
"Sander de Bakker" <[EMAIL PROTECTED]> wrote:

> Hello Faramir and Robert,
> 
> thank you for the responses.
> 
> I want everyone to be able to acces the data as long as the data is
> valid. When the data becomes invalid i want it to be inaccesible for
> everyone.
> 
> I want to control and force when the data should be invalid, i was
> thinking of using the expiration of a gpg key.
> 
> Any suggestions are appreciated.
> 
> N00bical


What I've seen once was a self-extracting archive built with bash. It
was basically a bash-script with some binary data attached to it.

It was created with something like:
#!/bin/bash
cat script.sh archive.tar >  archive.sh

The script did something like
#!/bin/bash
tail -n 30 archive.sh | tar x

That way you could all sorts of things like contacting a server,
checking the date and so forth. Of course, things get a bit ugly as
soon as it has to run on Windows. In that case I'd use Java and put the
data and the script into a jar.

Of course, that way you can't lock the file completely (at least, not
so easy) but you can warn the user that it's outdated.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: key generation in a script or non interactive mode?

2008-07-10 Thread Afzal, Naeem M
Thanks, that was exactly what I was looking for. I followed the instructions in 
the doc, and it works on Ubuntu host as user, but if I chroot to a filesystem 
within this host, I get the following error within chroot'd filesystem:


[EMAIL PROTECTED] sudo chroot ~/target/fs

[EMAIL PROTECTED] cat >foo 
>David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: make data available for a certain amount of time

2008-07-10 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

[EMAIL PROTECTED] escribió:

>> I create a website and pack it in a zip file
>> when a complete stranger opens the website in the zip it checks 
>> for a valid key on a keyserver.
> 
>> when they key is valid the site opens
>> when the key is invalid the website never opens and the 
>> contentfiles of website in the zipfile cannot be accessed in any 
> way
> 
> 
> a workaround can be done to do what you want,
> but requires some input on your part
> 
> assuming the visitor to the website does not know which key on 
> which webserver is being checked,
> and you are not worried about people on the keyserver deliberately 
> interfering with your site
> 
> you can do the following:
> 
> [1] let the passphrase for the zipfile be the hashfile of your 
> public key block of the key on your keyserver
> 
> [2] when someone tries to access your site,
> arrange for your site to get the key from the keyserver, and hash 
> the public key, and enter the hash as passphrase for the zipfile
> 
> [3] whenever you want to stop access,
> add a subkey to your key, and upload it to the keyserver
> 
> the hash will change,
> and the zipfile won't decrypt

  Then, he can store the hash in a txt file in a protected folder of the
server, and the website can check it... but then... why don't you just
remove the zip file, if it becomes invalid?

  Best Regards

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEcBAEBCAAGBQJIdl+rAAoJEMV4f6PvczxApR4H/R8jfhxJvS5dGTXIQlepFUu8
B3ZtoEBOiuieSxexNShIgBNmDyocf7teDlitaLnjE864IXsnCSpjpJ9wVQWbk71H
oBXxYqA9E3CklTtkVGf4SK6XrWhQg+tHO+VP53iYszHT/uolhc5pDRhewNbUTGyv
bZc2LwyHTLC17faJXdJgEIkbo678zRovu5c5Ycu0jdWXtjZ0rmo+rWglDNnceEfT
iINgljABUYckqGysvU2WcWk36KpqoWohZpX7RAGJTafbuO8c3AHGdyt6gzCouPyV
V1SfR9appkdDgNm0MZ2z6Y6J3SVTI4aGkbDiNr/3CFNFFfCafPrwSyySumwpr5Q=
=Ljf1
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: File Extensions supported by GnuPG.....

2008-07-10 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Bhushan Jain escribió:

> Also, due to similar experiences what I have understood is that GnuPG
> supports following extensions for following cases:---
> 
> Encryption->  .gpg
> 
> Sign-->   .asc
> 
> I don't know if my understanding is correct or not. Can someone please
> state clearly which extensions are supported by GnuPG for following file
> types:
> 
> 1. Encrypt only
> 2. Sign only
> 3. Encrypt and sign

   As far as I know (mainly, by checking and unchecking the "Armored
ASCII" option in gpgshell, .gpg files can be encrypted or signed (or
detached signature) files... and .asc are also those kind of files, but
with the "standard" extension, used by pgp. In other words, gpg files
are for use with gpg (and programs gpg compatible... like uncompressing
a zip file using winrar), and asc files are for any program capable of
openpgp standard... But I may be wrong about the compatibility thing. I
am sure about you can chose if you want to use gpg file extension, or
asc file extension, to perform the same task.

  Best Regards...
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEcBAEBCAAGBQJIdl7eAAoJEMV4f6PvczxAzSUH/j6a1X0mNhfb97kiXJnDDL5V
HKqON6iiakFgHdBJhduHhMhCZRyYyE3y71/VbvOPj5DPee35b6O68L1rjHc6rLHr
iOFXCFUqhlmXw+Vrt16XPe6gUlKmSr5mF+3DjRmxGyEoZTN2+u2Yi+Wt+6SsSdWe
PZajHJ02pVGyTMMFFIj6W6Hkof56RLqVkliscbwFEnQ2u8HGd7cOz9V2AX6dRFKy
1S1uLJ30cQxvuXUX6ZcFPXRDeap0pwZzSPNyyAUYBDjtIhVuJQbyqHJajMWPh8Av
Qw668QywQ6QSlu4B35jT1Ncp17mEYEocxAbE7zPBx262KZDgzg4QYXykFgF9MMw=
=x3ps
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: key generation in a script or non interactive mode?

2008-07-10 Thread Afzal, Naeem M

Ok, I was able to resolve this issue. I have to set HOME=/root inside the shell 
to get it going. Now I have new problem, script runs ok from within this chroot 
fs, but when keys generation process just hangs with statement:

"Not enough random bytes available. Please do some other work(Need 284 more 
bytes)"


How can I force it to complete it?

Regards
naeem


>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
>On Behalf Of Afzal, Naeem M
>Sent: Thursday, July 10, 2008 11:05 AM
>To: David Shaw; gnupg-users@gnupg.org
>Subject: RE: key generation in a script or non interactive mode?
>
>Thanks, that was exactly what I was looking for. I followed the
>instructions in the doc, and it works on Ubuntu host as user, but if I
>chroot to a filesystem within this host, I get the following error within
>chroot'd filesystem:
>
>


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: key generation in a script or non interactive mode?

2008-07-10 Thread David Shaw

On Jul 10, 2008, at 5:41 PM, Afzal, Naeem M wrote:



Ok, I was able to resolve this issue. I have to set HOME=/root  
inside the shell to get it going. Now I have new problem, script  
runs ok from within this chroot fs, but when keys generation process  
just hangs with statement:


"Not enough random bytes available. Please do some other work 
(Need 284 more bytes)"



How can I force it to complete it?


Your entropy source dried up.  Normally I'd suggest wiggling the mouse  
or poking at the keyboard to make some more entropy, but if you're  
running completely unattended that may be hard (you may not even have  
a mouse on that box).


There is a good article on entropy gathering on Linux (I'm assuming  
you are running Linux here) at http://lwn.net/Articles/283103/


David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPG encryption of binary sample requested. (fwd)

2008-07-10 Thread Julian Stacey
Hi gnupg-users@gnupg.org
Could a few people please post to list saying they will private
mail me (off list) some encrypted binary junk please ?  If you have
a Microsoft PC, so much the better, (I'm using FreeBSD, but want to verify
against an MS sender, though BSD or Linux sender etc also useful).

Examples of junk to send:
   dd if=/dev/random of=junk count=2 
   /boot/kernel/kernel 
   or just some large .exe or other jubk, even pictures or music,
   or random binary archive of ... I don't care what, so long as its binary
   not text.
Please also mail some cheksum output eg one of
   md5 junk # or kernel
   sha1 /boot/kernel/kernel
   sha256 /boot/kernel/kernel
   rmd160 /boot/kernel/kernel

I'd like to prove my FreeBSD can receive large encrypted binary from MS, as:
   I have an MS sender who can't mail me large encrypted binaries, I get
gpg: fatal: zlib inflate problem: invalid code lengths set
secmem usage: 2048/4000 bytes in 4/9 blocks of pool 5120/32768
   I'm receiving
Content-Transfer-Encoding: 7bit 
   I suspect it's not his Microsoft as such failing to send,
   but likely his MS mailer &/or corporate defaults or gateway failing 
   to ascii armour & encrypt in right order. 
   I send large base64 encrypted binaries OK using exmh & gpg.

I append my GPG public key, as a MIME enclosure, to make it
easy to click & save, (but guessing the mailman will chop
that), indented for edit below, & also here
http://www.berklix.org/~jhs/txt/pgp.html

Thanks for any help !
Julian S.

XX  -BEGIN PGP PUBLIC KEY BLOCK-
XX  Version: GnuPG v1.4.5 (FreeBSD)
XX  
XX  mQGiBEhGVO0RBACs/CNBqX/SNaNyC4PgddejxSaqQ2saMPRD2op46RYaP8ce/wIP
XX  67ckuNiHzpWQ0hA9nYsLkLAff8LFtLPpr9PsQr+efV5Q4EO7t9ddLTJA5lSUjegy
XX  QHf14FAMqQIiKgQkwRU8K3bXBZJUEAuuBjU/0Q0w5W4PmEsbRrMnNC4HxwCg0Ibi
XX  Y8hO0al6w62f5YbaAy2ruK8D/AuYqWmtKgiAHpjqSrCeqL0y7pR86cKiziqQLAbF
XX  fZtFn9Fmz34GjvhO3cHCE95teK9pTLN0P89dNp6X4XWqy/v3F3Vl9LAWGDkqiLbf
XX  Kk/bF0ucbg363LrTljcel6R1uqA0XP3yWXi8rTpcX/AnZ14i0+7AjsVJKXA5D9L3
XX  tIyyA/sGZT8PXx6JEg25VwDgUrgx4+WvNzpyOxJeG4BdEnvw+tVdwo880Jkvlju+
XX  uCwY7d8+j8nRMtr0a0EulhSy3eoPXaw07yR0Sdp3UDii6KZGu8EYalV8ouqXURU/
XX  hykHLLtC6oO6x/Ep/fQxjWF64G58FeCZ1bFNmjl++YO/IJz3ibQzSnVsaWFuIEgu
XX  IFN0YWNleSAoMjAwODA2MDQxMDM5MTApIDxqaHNAYmVya2xpeC5vcmc+iGAEExEC
XX  ACAFAkhGVO0CGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAKCRCMDdcn+Ybf4WpM
XX  AJ900uoDXQ1hqinNCF8AzWhj9LmYxgCfe63Lu6uU9nEc7AZoIVzMH7yd9BK5Ag0E
XX  SEZU8BAIAL3lH3/O1xzCe9XX1omUf1CVuQe02W0CPJkM0s/VaGsBViLQlMoltyud
XX  zXQXGB0Oa/9n+sRIKIOz/tSbCvLSyw42fO6inp1Vxn+/02SGwz9bKiWTYdW4gaJI
XX  0Z3DA8n97gw8PTwP0s5GinrC5CfjHBFRHrPUHmlgb6hoFCHk3ZEISxAfU6bxixnH
XX  x+yJ2KVz0OPMdULhuDLP45Ep+pgjRQ6+haD1x/pPoKmSeYT+gHAeZ7gLysSLGIhw
XX  hCmYN1fQqwU+DC5Yd5uRJ6sEkMMRMEOWStgWkEOyGrhE8P3FwvwCC1OBRrvlmyYt
XX  2JRdvuejHkU1BGRohgngDohqVp/gMsMAAwUH/ApINMJyU6zCuzjgYyk5TzzT/kEG
XX  XBBQ01E3TM9WstukoO+3+fku3dpYIsWchJLsvYM5j23KmRQCTpvR9zyHY9U1SeIF
XX  yqDEbrV9TWigUzKhEJ2qpTXmC7WuHdFB0Vt/S3yKC8GU4uZUz5KSH9x+8BOUF3rB
XX  9a3jGODcwqPLKuQYubrJtzAMx/ZRgLyCiVQ98KoddyEFpb0Tw/hA1FYGMNCjFHia
XX  IrBcF+2AFOC+AYI40/hRTsj/oZuDoqWUebjm1oWD5TBVql/r332qn8lmDJGWmTAr
XX  YWZgqHBs4JvmYbRz0DtU8ezTBDbLOqCXh3Wmmc9l8gDp0D4gEmMCdzOlvgqISQQY
XX  EQIACQUCSEZU8AIbDAAKCRCMDdcn+Ybf4ePTAJ91bvPB230c2pD9NrNTORkY3USu
XX  bACgoYGo20521SC+5VgIdR4CCtmVIQqZAaIESEU9aREEALlbkl1Ae2TkpsFUa0J7
XX  pU4LOz5TvQ5Y+mORLB6t9HhiP//jWX59DNogFCrt6CvKiX36PjUV+OZtAnMAbf8w
XX  8x/vjMEl3gqhS/ZaWFvLsAGtRtgvP2GXT0GaINjAFmUuYTy+OjxbXkeU+H7cmH73
XX  nMSPdYpn9Hgct1TfXrnNrVY3AKD01Da5Q4dOnUJvH6XDnkfQlnW2WwP/aAMUCIjI
XX  eiP0Q3QjbRWp/0LFlimN1BFAVcRI807IlsJ/7dobw9ZatC4ZEmitcSNhUTR/jyZ+
XX  fyzPdA/6tAUFpySzO/UOWibPaTkpbOZsjq8S+VmjWEF0wpAHXS//Hk/94VeQA+jN
XX  C+c2E6qc05PZTYW1ne+Iu71zTpoWWwifhb8D/jB/tButD7aSo8T+sKChzUWFOyGg
XX  pp9fYlE/p7iQtOI5taPPlToXXb6ze3kUwmlEn/wkJPycAQCo/RPuqfy2RQ1iyWSv
XX  JmiA+55SczzTnRbjMUGcGLj3pzxPr0FqXulJJCtkghFBvMYa/80S68ujWKk0PvC+
XX  7LMaXRG4iXHJ6KmptCJKdWxpYW4gSC4gU3RhY2V5IDxqaHNAYmVya2xpeC5jb20+
XX  iGAEExECACAFAkhFPWkCGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAKCRCl8u02
XX  NZE4NLtxAJ9BSPEzsPp+zNBxdPXgtAdXfogiYQCeMOh4o+RsomG1k03D8aaGWwiP
XX  fCK5Ag0ESEU9bxAIALdUwOKz0sRO89+Qr4woCislFbVMpoYTMcafodbs18ROkaR/
XX  MGtfAnNT/ZgdmvRIAe94LtE1GgNrf20DFNyctM5A09j4wVqGZfR0rbMYhlQ147dY
XX  siblTeZQEUHHb86esNzP3aETKK97d4VSrpnIETzqWWFq/j8tl3psRrjZ0gOwjSp8
XX  OpcSCFIXqjYnyaGh7iRfQbBRRxU8B39/LnSpi10h+MvtY1ijuMgFElA4IiLD5f0D
XX  wNkNsiOT7lxPpPeKP7WNRSxPSe+oi/tpDt2aIh1k1U7FQtVFBUNjJqrPHGVMwK3F
XX  9xLqj0vaE9QbzvcMzoe3obzyTnFydyksufNwqbcAAwcIAKkeezjzs0wJaQsxYkbD
XX  OiiPNMfcxzQoneNl5bSBEh2V1p2Yn6ULqQh6ENVXIIYDKALs2OjoRhGCuLh+SrMj
XX  +N0BaM9kTR6MKq2Ph24wJixmMRbcSJpkcqXsv9v7xxqJWgjU3ahI1Ln+IDfbDdgN
XX  qbqV3Ne8sr9qxnbMe2+aGaN9n2xXrforOfSgs8Q8bmkZMAjeAvRPO6oYO1gBG/mZ
XX  RLVv1KFOdzwARbpE697KDwrvuJmyFNvYDGO9VG/QKTVt4mebrCNd+WlT2qS0BUog
XX