-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Lewis,
It sounds like you are progressing pretty well with VCL! Deleting things depends on how you have VCL set up. With VMware, the image files will at least be in a datastore. You could also have copies of them in a different format in a repository, if you have one set up. I've not used the XenServer patch. So, I'm not sure where it will place files. As an example, if your query gave you a file named "linux-CentOS6-5-v0" that had been flagged as deleted, and you had a repository mounted on your management node under "/install/vmware_repository", you could delete the directory and its contents located at "/install/vmware_repository/linux- CentOS6-5-v0". You would also need to delete the directory for that image from the datastore being used by your VMware host servers. If you have that mounted from NFS, and also have it mounted on your management node, you could delete them that way. For example, if it was mounted at "/install/vmware_datastore", you could delete the directory and its contents located at "/install/vmware_datastore/linux-CentOS6-5-v0". If you have it set up as a vmfs filesystem that is only available on the VMware hosts themselves, you could ssh to a host server from your management node, and delete it from there. You'll find everything mounted under /vmfs/volumes. An example would be deleting "/vmfs/volumes/datastore/linux-CentOS6-5-v0" and all of its contents. Josh On Thursday, May 28, 2015 1:56:26 PM Litchfield, Elwin L. wrote: > Sorry, I didn't have the nerve to try 2.4.2, I am waiting for it to settle > down before jumping in way over my head. 2.3.2 is over my head & I am > slowly learning how to use it. Now that I have the list of deleted = 1, I > have been looking in the PHP and MySql book to figure how to delete the > unwanted images & am totally lost. Can you point me in the correct > direction. > > Thanks. > > Lewis Litchfield > Technology Services – Viking Center Lab > University of South Florida Sarasota-Manatee > 941-359-4231 > > ________________________________________ > From: Josh Thompson <[email protected]> > Sent: Wednesday, May 27, 2015 11:02 AM > To: [email protected] > Subject: Re: vcld.log > > - gpg control packet > Lewis, > > Under Manage Images, you can delete images (including all of their > revisions) as well as deleting specific revisions (after clicking Edit next > for that image). However, doing this only flags them as deleted in the > database. As a measure to prevent images from accidentally being > permanently deleted, they are not automatically deleted. The following > command should give you a list of base names for images that can then be > manually deleted: > > mysql vcl -e "SELECT imagename FROM imagerevision WHERE deleted = 1" > > Also, in 2.4.2, you can delete VMware based images by using "vcl --setup". > > Josh > > On Wednesday, May 27, 2015 9:47:38 AM Elwin Litchfield wrote: > > Thanks, is there a way to remove deleted images? > > > > On Wed, May 27, 2015 at 9:08 AM, Josh Thompson <[email protected]> > > > > wrote: > > > -----BEGIN PGP SIGNED MESSAGE----- > > > Hash: SHA1 > > > > > > Lewis, > > > > > > That is correct. However, if you can successfully make an imaging > > > reservation > > > and connect to it, you can use that as your starting point for updating > > > your > > > firewall configuration. Then, just save it off as a new revision of the > > > image > > > or as a new image. > > > > > > Josh > > > > > > On Tuesday, May 26, 2015 7:52:23 PM Litchfield, Elwin L. wrote: > > > > I assume this configuration must be done before the image is created. > > > > > > > > > > > > Lewis Litchfield > > > > Technology Services – Viking Center Lab > > > > University of South Florida Sarasota-Manatee > > > > 941-359-4231 > > > > > > > > ________________________________________ > > > > From: Josh Thompson <[email protected]> > > > > Sent: Tuesday, May 26, 2015 3:40 PM > > > > To: [email protected] > > > > Subject: Re: vcld.log > > > > > > > > Elwin, > > > > > > > > I can't find any docs on how you are supposed to configure the > > > > firewall > > > > > > for > > > > > > > a base linux image under 2.3.2, and I don't remember the details of > > > > it. > > > > > > I > > > > > > > think something like the following should get your working. > > > > > > > > First, stop iptables to clear all of the tables: > > > > > > > > service iptables stop > > > > > > > > Create a custom table - you can name it anything, we'll go with "VCL". > > > > > > > > iptables -N VCL > > > > > > > > Create a rule in INPUT that jumps to the VCL table for everything: > > > > > > > > iptables -A INPUT -j VCL > > > > > > > > Add a few important rules to the VCL table: > > > > > > > > iptables -A VCL -i lo -j ACCEPT > > > > iptables -A VCL -m state --state RELATED,ESTABLISHED -j ACCEPT > > > > iptables -A VCL -p icmp -m icmp --icmp-type any -j ACCEPT > > > > > > > > Add a rule to the VCL table to accept traffic from your management > > > > node: > > > > > > > > iptables -A VCL -s <management node IP> -m state --state NEW -m tcp -p > > > > > > tcp > > > > > > > -- dport 22 -j ACCEPT > > > > > > > > Add a rule to the VCL table to reject other traffic: > > > > > > > > iptables -A VCL -j REJECT --reject-with icmp-host-prohibited > > > > > > > > Save the new configuration: > > > > > > > > service iptables save > > > > > > > > If I remember correctly, VCL should then manage required additions and > > > > removals on the INPUT table, and leave the VCL table alone, and since > > > > the > > > > VCL table has a rule allowing traffic from your management node, it > > > > > > should > > > > > > > stop shutting itself out. > > > > > > > > Let me know if this works for you. > > > > > > > > Josh > > > > > > > > On Tuesday, May 26, 2015 1:13:37 PM Elwin Litchfield wrote: > > > > > Everything seemed to work till the reservation was over. Port 22 is > > > > > blocked, but ping is OK & port 3389 is still available & connection > > > > > > with > > > > > > > > admin ID & password presented at the beginning of the reservation. > > > > > I > > > > > > have > > > > > > > > bee reading the vcld.log & am unable to make any sense of it. Can > > > > > you > > > > > help > > > > > me understand what is hapening? > > > > > > > > > > > > > > > Thanks 2015-05-26 > > > > > 12:26:32|9344|46:46|timeout|utils.pm:run_ssh_command(4902)|executing > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > VM7Cent6VCL1 > > > > > '/sbin/chkconfig --list iptables' 2>&1 > > > > > 2015-05-26 > > > > > 12:26:32|9344|46:46|timeout|Linux.pm:service_exists(3186)|'iptables' > > > > > service exists > > > > > 2015-05-26 > > > > > 12:26:32|9344|46:46|timeout|utils.pm:run_ssh_command(4902)|executing > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > VM7Cent6VCL1 > > > > > 'iptables -L --line-number -n' 2>&1 > > > > > 2015-05-26 > > > > > > > > 12:26:33|9344|46:46|timeout|utils.pm: > > > run_ssh_command(5020)|run_ssh_command > > > > > > > > output: > > > > > |9344|46:46|timeout| Chain INPUT (policy ACCEPT) > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > |9344|46:46|timeout| 1 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state > > > > > > > > > > NEW,RELATED,ESTABLISHED tcp dpt:22 > > > > > > > > > > |9344|46:46|timeout| 2 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state > > > > > > > > > > RELATED,ESTABLISHED > > > > > > > > > > |9344|46:46|timeout| 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 > > > > > |9344|46:46|timeout| 4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 > > > > > |9344|46:46|timeout| 5 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW > > > > > |tcp > > > > > > > > > > dpt:443 > > > > > > > > > > |9344|46:46|timeout| 6 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW > > > > > |tcp > > > > > > > > > > dpt:80 > > > > > > > > > > |9344|46:46|timeout| 7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW > > > > > |tcp > > > > > > > > > > dpt:3389 > > > > > > > > > > |9344|46:46|timeout| 8 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW > > > > > |udp > > > > > > > > > > dpt:3389 > > > > > > > > > > |9344|46:46|timeout| 9 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with > > > > > > > > > > icmp-host-prohibited > > > > > > > > > > |9344|46:46|timeout| Chain FORWARD (policy ACCEPT) > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > |9344|46:46|timeout| 1 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with > > > > > > > > > > icmp-host-prohibited > > > > > > > > > > |9344|46:46|timeout| Chain OUTPUT (policy ACCEPT) > > > > > |9344|46:46|timeout| num target prot opt source destination > > > > > > > > > > 2015-05-26 12:26:33|9344|46:46|timeout|utils.pm: > > > run_ssh_command(5034)|SSH > > > > > > > > command executed on VM7Cent6VCL1, returning (0, "Chain INPUT (policy > > > > > ACCEPT) nu...") > > > > > 2015-05-26 > > > > > > 12:26:33|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > tp > > > > > > > > ut Chain = INPUT > > > > > 2015-05-26 > > > > > > 12:26:33|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > tp > > > > > > > > ut rule: 1, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 22 > > > > > 2015-05-26 > > > > > > 12:26:35|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > tp > > > > > > > > ut rule: 5, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 443 > > > > > 2015-05-26 > > > > > > 12:26:36|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > tp > > > > > > > > ut rule: 6, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 80 > > > > > 2015-05-26 > > > > > > 12:26:36|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > tp > > > > > > > > ut rule: 7, ACCEPT, tcp, 0.0.0.0/0, 0.0.0.0/0, 3389 > > > > > 2015-05-26 12:26:36|26123|vcld:main(167)|lastcheckin time updated > > > > > for > > > > > management node 1: 2015-05-26 12:26:36 > > > > > 2015-05-26 > > > > > > 12:26:37|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4007)|ou > > > tp > > > > > > > > ut rule: 8, ACCEPT, udp, 0.0.0.0/0, 0.0.0.0/0, 3389 > > > > > 2015-05-26 > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > tp > > > > > > > > ut Chain = FORWARD > > > > > 2015-05-26 > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(3991)|ou > > > tp > > > > > > > > ut Chain = OUTPUT > > > > > 2015-05-26 > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:get_firewall_configuration(4050)|re > > > tr > > > > > > > > ie ved > > > > > > > > > > firewall configuration from VM7Cent6VCL1: > > > > > |9344|46:46|timeout| : { > > > > > |9344|46:46|timeout| : "FORWARD" => { > > > > > |9344|46:46|timeout| : "1" => { > > > > > |9344|46:46|timeout| : "all" => { > > > > > |9344|46:46|timeout| : "any" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > |9344|46:46|timeout| : "number" => 1, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "REJECT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "INPUT" => { > > > > > |9344|46:46|timeout| : "1" => { > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > |9344|46:46|timeout| : "22" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "ssh", > > > > > |9344|46:46|timeout| : "number" => 1, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "2" => { > > > > > |9344|46:46|timeout| : "all" => { > > > > > |9344|46:46|timeout| : "any" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > |9344|46:46|timeout| : "number" => 2, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "3" => { > > > > > |9344|46:46|timeout| : "icmp" => { > > > > > |9344|46:46|timeout| : "any" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > |9344|46:46|timeout| : "number" => 3, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "4" => { > > > > > |9344|46:46|timeout| : "all" => { > > > > > |9344|46:46|timeout| : "any" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > |9344|46:46|timeout| : "number" => 4, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "5" => { > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > |9344|46:46|timeout| : "443" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "https", > > > > > |9344|46:46|timeout| : "number" => 5, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "6" => { > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > |9344|46:46|timeout| : "80" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "http", > > > > > |9344|46:46|timeout| : "number" => 6, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "7" => { > > > > > |9344|46:46|timeout| : "tcp" => { > > > > > |9344|46:46|timeout| : "3389" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "ms-wbt-server", > > > > > |9344|46:46|timeout| : "number" => 7, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "8" => { > > > > > |9344|46:46|timeout| : "udp" => { > > > > > |9344|46:46|timeout| : "3389" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "ms-wbt-server", > > > > > |9344|46:46|timeout| : "number" => 8, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "ACCEPT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : }, > > > > > |9344|46:46|timeout| : "9" => { > > > > > |9344|46:46|timeout| : "all" => { > > > > > |9344|46:46|timeout| : "any" => { > > > > > |9344|46:46|timeout| : "destination" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "name" => "any", > > > > > |9344|46:46|timeout| : "number" => 9, > > > > > |9344|46:46|timeout| : "scope" => "0.0.0.0/0", > > > > > |9344|46:46|timeout| : "target" => "REJECT" > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > |9344|46:46|timeout| : } > > > > > > > > > > 2015-05-26 > > > > > > 12:26:38|9344|46:46|timeout|Linux.pm:disable_firewall_port(3783)|attempt > > > in > > > > > > > > g > > > > > to execute command on VM7Cent6VCL1: 'iptables -D INPUT 1' > > > > > 2015-05-26 > > > > > 12:26:38|9344|46:46|timeout|utils.pm:run_ssh_command(4902)|executing > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > VM7Cent6VCL1 > > > > > 'iptables -D INPUT 1' 2>&1 > > > > > 2015-05-26 > > > > > > > > 12:26:39|9344|46:46|timeout|utils.pm: > > > run_ssh_command(5020)|run_ssh_command > > > > > > > > output: > > > > > > > > 2015-05-26 12:26:39|9344|46:46|timeout|utils.pm: > > > run_ssh_command(5034)|SSH > > > > > > > > command executed on VM7Cent6VCL1, returning (0, "") > > > > > 2015-05-26 > > > > > > 12:26:39|9344|46:46|timeout|Linux.pm:disable_firewall_port(3785)|execute > > > d > > > > > > > > command on VM7Cent6VCL1: 'iptables -D INPUT 1' > > > > > 2015-05-26 > > > > > 12:26:39|9344|46:46|timeout|utils.pm:run_ssh_command(4902)|executing > > > > > > > > > > SSH command on VM7Cent6VCL1: > > > > > |9344|46:46|timeout| /usr/bin/ssh -i /etc/vcl/vcl.key -o > > > > > > > > > > StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o > > > > > ConnectionAttempts=1 -o ConnectTimeout=3 -l root -p 22 -x > > > > > VM7Cent6VCL1 > > > > > '/sbin/iptables-save > /etc/sysconfig/iptables' 2>&1 > > > > > > > > > > |9344|46:46|timeout| ---- WARNING ---- > > > > > |9344|46:46|timeout| 2015-05-26 > > > > > > > > > > 12:26:39|9344|46:46|timeout|utils.pm:run_ssh_command(5006)|attempt > > > > > > > > 1/3: failed to execute SSH command on VM7Cent6VCL1: > > > '/sbin/iptables-save > > > > > > > > > /etc/sysconfig/iptables', exit status: 255, output: > > > > > |9344|46:46|timeout| ssh output (/sbin/ipta...): ssh: connect to > > > > > |host > > > > > > > > > > VM7Cent6VCL1 port 22: No route to host > > > > > > > > > > |9344|46:46|timeout| ( 0) utils.pm, run_ssh_command (line: 5006) > > > > > |9344|46:46|timeout| (-1) OS.pm, execute (line: 1992) > > > > > |9344|46:46|timeout| (-2) Linux.pm, disable_firewall_port (line: > > > > > |3794) > > > > > |9344|46:46|timeout| (-3) OS.pm, process_connect_methods (line: > > > > > |2576) > > > > > |9344|46:46|timeout| (-4) Linux.pm, sanitize (line: 1172) > > > > > |9344|46:46|timeout| (-5) reclaim.pm, call_os_sanitize (line: 271) > > > > > > > > > > 2015-05-26 > > > > > 12:26:39|9344|46:46|timeout|utils.pm:run_ssh_command(4894)|sleeping > > > > > > for 2 > > > > > > > > seconds before making next SSH attempt > > > > > 201 > > > > > > > > > > Thanks > > > > > > > > > > Lewis > > > > > > > > -- > > > > ------------------------------- > > > > Josh Thompson > > > > VCL Developer > > > > North Carolina State University > > > > > > > > my GPG/PGP key can be found at pgp.mit.edu > > > > > > > > All electronic mail messages in connection with State business which > > > > are sent to or received by this account are subject to the NC Public > > > > Records Law and may be disclosed to third parties. > > > > > > - -- > > > - ------------------------------- > > > Josh Thompson > > > VCL Developer > > > North Carolina State University > > > > > > my GPG/PGP key can be found at pgp.mit.edu > > > > > > All electronic mail messages in connection with State business which > > > are sent to or received by this account are subject to the NC Public > > > Records Law and may be disclosed to third parties. > > > -----BEGIN PGP SIGNATURE----- > > > Version: GnuPG v2 > > > > > > iEYEARECAAYFAlVlweoACgkQV/LQcNdtPQMQMwCeKII154mTy404UH9lVj7Jay/C > > > BFkAn1bCP/vRTeQIFeOsz73Rx/dDUL13 > > > =1olU > > > -----END PGP SIGNATURE----- > > -- > ------------------------------- > Josh Thompson > VCL Developer > North Carolina State University > > my GPG/PGP key can be found at pgp.mit.edu > > All electronic mail messages in connection with State business which > are sent to or received by this account are subject to the NC Public > Records Law and may be disclosed to third parties. - -- - ------------------------------- Josh Thompson VCL Developer North Carolina State University my GPG/PGP key can be found at pgp.mit.edu All electronic mail messages in connection with State business which are sent to or received by this account are subject to the NC Public Records Law and may be disclosed to third parties. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEUEARECAAYFAlVnUlMACgkQV/LQcNdtPQPQiQCfX8xKdZwzBEN1CgYTTiObgvL5 iqgAmK4jDZzJBILWcY8c5YW0P30xkzI= =i4iw -----END PGP SIGNATURE-----
