cicadaIncrease UFS read-ahead speeds to match the state of hard drives and NCQ.vfs.read_maxdefaultSet the ephemeral port range to be lower.net.inet.ip.portrange.firstdefaultDrop packets to closed TCP ports without returning a RSTnet.inet.tcp.blackholedefaultDo not send ICMP port unreachable messages for closed UDP portsnet.inet.udp.blackholedefaultRandomize the ID field in IP packetsnet.inet.ip.random_iddefault
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.ip.sourceroutedefault
Source routing is another way for an attacker to try to reach non-routable addresses behind your box.
It can also be used to probe for information about your internal networks. These functions come enabled
as part of the standard FreeBSD core system.
net.inet.ip.accept_sourceroutedefault
This option turns off the logging of redirect packets because there is no limit and this could fill
up your logs consuming your whole hard drive.
net.inet.icmp.log_redirectdefaultDrop SYN-FIN packets (breaks RFC1379, but nobody uses it anyway)net.inet.tcp.drop_synfindefaultEnable sending IPv6 redirectsnet.inet6.ip6.redirectdefaultEnable privacy settings for IPv6 (RFC 4941)net.inet6.ip6.use_tempaddrdefaultPrefer privacy addresses and use them over the normal addressesnet.inet6.ip6.prefer_tempaddrdefaultGenerate SYN cookies for outbound SYN-ACK packetsnet.inet.tcp.syncookiesdefaultMaximum incoming/outgoing TCP datagram size (receive)net.inet.tcp.recvspacedefaultMaximum incoming/outgoing TCP datagram size (send)net.inet.tcp.sendspacedefaultDo not delay ACK to try and piggyback it onto a data packetnet.inet.tcp.delayed_ackdefaultMaximum outgoing UDP datagram sizenet.inet.udp.maxdgramdefaultHandling of non-IP packets which are not passed to pfil (see if_bridge(4))net.link.bridge.pfil_onlyipdefaultSet to 1 to additionally filter on the physical interface for locally destined packetsnet.link.bridge.pfil_local_physdefaultSet to 0 to disable filtering on the incoming and outgoing member interfaces.net.link.bridge.pfil_memberdefaultSet to 1 to enable filtering on the bridge interfacenet.link.bridge.pfil_bridgedefaultAllow unprivileged access to tap(4) device nodesnet.link.tap.user_opendefaultRandomize PID's (see src/sys/kern/kern_fork.c: sysctl_kern_randompid())kern.randompiddefaultDisable CTRL+ALT+Delete reboot from keyboard.hw.syscons.kbd_rebootdefaultEnable TCP extended debuggingnet.inet.tcp.log_debugdefaultSet ICMP Limitsnet.inet.icmp.icmplimdefaultTCP Offload Enginenet.inet.tcp.tsodefaultUDP Checksumsnet.inet.udp.checksumdefaultMaximum socket buffer sizekern.ipc.maxsockbufdefaultPage Table Isolation (Meltdown mitigation, requires reboot.)vm.pmap.ptidefaultDisable Indirect Branch Restricted Speculation (Spectre V2 mitigation)hw.ibrs_disabledefaultHide processes running as other groupssecurity.bsd.see_other_gidsdefaultHide processes running as other userssecurity.bsd.see_other_uidsdefaultEnable/disable sending of ICMP redirects in response to IP packets for which a better,
and for the sender directly reachable, route and next hop is known.
net.inet.ip.redirectdefault
Redirect attacks are the purposeful mass-issuing of ICMP type 5 packets. In a normal network, redirects
to the end stations should not be required. This option enables the NIC to drop all inbound ICMP redirect
packets without returning a response.
net.inet.icmp.drop_redirect1Maximum outgoing UDP datagram sizenet.local.dgram.maxdgramdefaultnormalhellfireramanet.aladminsSystem Administratorssystem199902000page-allrootSystem Administratorsystemadmins$2y$11$uEpk0P3slRkzHHlUMJOAFe05tpUeppr1Fbz9HnSr39QE14uSB9um601$2y$11$k3VIrWrzhadZph33ruwc5uAzQrApkzoY5wfFWPAFUOXwKWh4cMybGusermshillamMatthew Shillamc3NoLWVkMjU1MTkgQUFBQUMzTnphQzFsWkRJMU5URTVBQUFBSUFFNWFtWS9Fa3ZkVVM5c0Jrc2hEc3B6UExlY0FPc052S0xWU0Rod2h0QmMgbWF0dGhld0BzaGlsbGFtLm1lLnVrmatthew@shillam.me.uk2000/bin/sh20012000Europe/Amsterdam0.opnsense.pool.ntp.org 1.opnsense.pool.ntp.org 2.opnsense.pool.ntp.org 3.opnsense.pool.ntp.orghttps6626b18379cdclan,opt11Local Database111111hadphadphadpmonthly11admins1lanenabled1-1-1os-git-backup,os-qemu-guest-agent,os-theme-cicada,os-theme-rebellionen_USnonenonenonenonenonenonenonenone11https://gitea.shillam.me.uk/mshillam/OPNSense-ramanet-router-core-backup.gitmastermshillamTWi7mE9rrxzXam5115200video1urgentyesvtnet0WAN11dhcp32SavedCfgvtnet1LAN1110.10.10.1241Loopback1lo0127.0.0.1::18128none1vtnet2LINK11172.16.0.1241hmac-md510.10.10.20110.10.10.25088:66:5a:15:8a:9a10.10.10.20mats-macbook-wifiMats MacBook Pro Wifi.00:e0:4c:63:23:d810.10.10.21mats-macbook-ethMats MacBook Pro Eth.1172.16.0.1hmac-md5172.16.0.200172.16.0.250bc:24:11:e2:1d:29172.16.0.254router-edge88:66:5a:15:8a:9amats-macbook-wifiMats MacBook Pro Wifi.publichybridLANDLAB1waninetmshillam@192.168.1.10/firewall_nat_out_edit.php made changes01mshillam@10.10.10.20/firewall_nat_out_edit.php made changestcpwaninetForward all external web traffic to docker-landlab npmnat_66294aceae18a9.369120481docker_landlab_web_ports1wanip_web_portsmshillam@10.10.10.20/firewall_nat_edit.php made changesmshillam@10.10.10.20/firewall_nat_edit.php made changesnat_66294aceae18a9.369120481wankeep statetcpinet
docker_landlab
_web_portsForward all external web traffic to docker-landlab npmmshillam@10.10.10.20/firewall_nat_edit.php made changes1passinetDefault allow LAN to any rulelanlanpassinet6Default allow LAN IPv6 to any rulelanlanpassopt1inet46keep stateAllow access from LandLab router LAN to the Internet and block access to everything elsein11tcp/udp
LANDLAB
PrivateNetworks
1mshillam@192.168.1.10/firewall_rules_edit.php made changesmshillam@192.168.1.10/firewall_rules_edit.php made changespassopt1inet46keep stateAllow access from LandLab router LAN to the Internet and block access to everything elsein11icmp
LANDLAB
1mshillam@10.10.10.20/firewall_rules_edit.php made changesmshillam@10.10.10.20/firewall_rules_edit.php made changespassopt1inet46keep stateAllow access to all devices on the LANDLAB router LANin1tcp/udplan
LANDLAB
mshillam@192.168.1.10/firewall_rules_edit.php made changesmshillam@192.168.1.10/firewall_rules_edit.php made changes1passopt1inet46keep stateAllow admin devices access to LANDLAB router LANin1tcp/udp
admin_devices
LANDLAB
mshillam@10.10.10.20/firewall_rules_edit.php made changesmshillam@10.10.10.20/firewall_rules_edit.php made changes1passopt1inetkeep stateAllow ICMP to LINK Gateway from LANin1icmplan
172.16.0.254/24
mshillam@192.168.1.201/firewall_rules_edit.php made changesmshillam@192.168.1.201/firewall_rules_edit.php made changespassopt1inetkeep stateAllow ALL to LINK Gateway from LINK Network * TEST *in11opt1
172.16.0.254/24
mshillam@10.10.10.20/firewall_rules_edit.php made changesmshillam@10.10.10.20/firewall_rules_edit.php made changesyesICMPicmpICMPTCPtcpGeneric TCPHTTPhttpGeneric HTTP/200HTTPShttpsGeneric HTTPS/200SMTPsendGeneric SMTP220 *0.opnsense.pool.ntp.orginterface_list-container:00000000-col1:show,system_information-container:00000001-col1:show,gateways-container:00000002-col2:show,traffic_graphs-container:00000003-col2:show,services_status-container:00000004-col4:show2WAN_GW,LandLab1mshillam@10.10.10.20/firewall_rules_edit.php made changes0https://download.maxmind.com/app/geoip_download?edition_id=GeoLite2-Country-CSV&license_key=bUDDilXVKtjByVCi&suffix=zip1LANDLABnetwork010.100.0.0/24LandLab Network1PrivateNetworksnetworkgroup0LANDLAB
__lan_network
__opt1_networkAll Private Networks1mats_macbook_wifihost010.10.10.20
10.100.0.20Mats MacBook Pro Wifi.1mats_macbook_ethhost010.10.10.21
10.100.0.21Mats MacBook Pro Eth.1mats_deviceshost0mats_macbook_wifi
mats_macbook_ethMats Devices1admin_deviceshost0mats_devicesAdmin devices with escalated network access.1allowed_countriesgeoip0CA
US
AU
AD
AL
AT
AX
BA
BE
BG
CH
CZ
DE
DK
EE
ES
FI
FR
GB
GG
GI
GR
HR
HU
IE
IM
IT
JE
LU
LV
MC
MD
ME
MK
MT
NL
NO
PL
PT
RO
SE
SI
SK
SM
TR
UA
VACountries to allow access to External facing WAN1docker_landlabhost010.100.0.10Docker System on LandLab Network1_web_portsport080
443Web portsv90180015000wan192.168.0.0/16,10.0.0.0/8,172.16.0.0/12W0D2340000127.0.0.1800004000100120120127.0.0.1250auto10rootwHvLJw9sTchiJSjl9mtclfwI6dr4PAt2812510root@localhost.local01$HOSTsystem30030d154a552-cf23-45b4-8547-b8413dcc1d73,9e6aa406-ed77-4743-9869-8bb4489214f8,203ec5f2-5fbc-4874-b803-5fc2a40e0188,921cb3eb-3e54-472f-9d24-7bf20d7704f91RootFsfilesystem/30030e1175c29-6370-46ad-bf39-18328561b9d40carp_status_changecustom/usr/local/opnsense/scripts/OPNsense/Monit/carp_status300305aed87b3-eaa7-46cd-9242-71131b4e82f00gateway_alertcustom/usr/local/opnsense/scripts/OPNsense/Monit/gateway_alert30030b4e15ae9-5709-4885-835f-74acc95630d1PingNetworkPingfailed pingalertNetworkLinkNetworkInterfacefailed linkalertNetworkSaturationNetworkInterfacesaturation is greater than 75%alertMemoryUsageSystemResourcememory usage is greater than 75%alertCPUUsageSystemResourcecpu usage is greater than 75%alertLoadAvg1SystemResourceloadavg (1min) is greater than 8alertLoadAvg5SystemResourceloadavg (5min) is greater than 6alertLoadAvg15SystemResourceloadavg (15min) is greater than 4alertSpaceUsageSpaceUsagespace usage is greater than 75%alertChangedStatusProgramStatuschanged statusalertNonZeroStatusProgramStatusstatus != 0alert0WAN_GWWAN Gatewaywaninet1000025510LandLabLandLab router gatewayopt1inet172.16.0.2540000025511131153100110001transparent0000001000010000200.0.0.0/8,10.0.0.0/8,100.64.0.0/10,169.254.0.0/16,172.16.0.0/12,192.0.2.0/24,192.168.0.0/16,198.18.0.0/15,198.51.100.0/24,203.0.113.0/24,233.252.0.0/24,::1/128,2001:db8::/32,fc00::/8,fd00::/8,fe80::/100allow01dot1.1.1.1853cloudflare-dns.com1dot1.0.0.1853cloudflare-dns.com1010.100.0.0/24LandLabLandLab LAN06626b18379cdcWeb GUI TLS certificateLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUhIakNDQlFhZ0F3SUJBZ0lVUk9iV2UrSGliZm1JSGliZHgzMm1ZWTkzUWdvd0RRWUpLb1pJaHZjTkFRRUwKQlFBd2dZa3hIVEFiQmdOVkJBTU1GRTlRVG5ObGJuTmxMbXh2WTJGc1pHOXRZV2x1TVFzd0NRWURWUVFHRXdKTwpUREVWTUJNR0ExVUVDQXdNV25WcFpDMUliMnhzWVc1a01SVXdFd1lEVlFRSERBeE5hV1JrWld4b1lYSnVhWE14CkxUQXJCZ05WQkFvTUpFOVFUbk5sYm5ObElITmxiR1l0YzJsbmJtVmtJSGRsWWlCalpYSjBhV1pwWTJGMFpUQWUKRncweU5EQTBNakl4T0RVd05EZGFGdzB5TlRBMU1qUXhPRFV3TkRkYU1JR0pNUjB3R3dZRFZRUUREQlJQVUU1egpaVzV6WlM1c2IyTmhiR1J2YldGcGJqRUxNQWtHQTFVRUJoTUNUa3d4RlRBVEJnTlZCQWdNREZwMWFXUXRTRzlzCmJHRnVaREVWTUJNR0ExVUVCd3dNVFdsa1pHVnNhR0Z5Ym1sek1TMHdLd1lEVlFRS0RDUlBVRTV6Wlc1elpTQnoKWld4bUxYTnBaMjVsWkNCM1pXSWdZMlZ5ZEdsbWFXTmhkR1V3Z2dJaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQwpEd0F3Z2dJS0FvSUNBUUNhRlVZNGZzL0U5MDhROVdPMUJmNFJaa1lqZUd1akdMc3JYRlo4MEhtdFpWWlBGMi9RCkpSTm1rVWNuRjJPRzhwa29JaURvdDNVdU1NOXB0RWRHZy94VkVZNjkwdEZkeVFhbGd4cWNIVlIvb0tJNnBmbnUKYmprak0wSW9CWXdzMzZGMHpqQi9vZmFHblQ1dXhSd3BqVXhreDNzRG80R1k4SmVjRjVTamMrTW1kZFdaZU1JdgpBTjRtVVhRSkdEOUl5MkQ4SmZENWt0T2hyMmMyQWxyUzB0UHo0S1U3ZlhkNDJycWlKTUgxYU5PSVc1Q3RFZGIzCnNkRjdtMmhWK2ZHU21QSXFybitSQXhhN3VjeVNoUExlQUJUWFRPOUtKbjVGeWxmSGRra0tBT0NHbnN2TTd5Y28KRXF3K2JQNEN2OHAzQzVSRExDSERpdVFyUitWOWkrWlB6czN0M0R2YWthd0lWOU5IWHNPSFJFL29aUFp5OFQ1Uwo2Y3QyUHNRODlQK2llWXNiR2xRUWkvYTlrMkRQVEFvdERtZWxDMWV4TkZyVWVxMFg5dkpucytFUzJTTTRId2plClhvb05jMEU3bkxPQWlDOEpSaGNNZEZ5cFJSU3lQRHFYRmVzVElQL2w5b0ZBSE1RZkNzbkNJQS80RWlsNjN3WVYKUnhFNDNQbXhPWjNvWU1vN2JDRzJNRUhjL1F3NWFwOURzNXNobXJPS3FPUFJyS3VyWHRzNDZTeStJZ1YvSjR2cAowVll4YmRsNTBYWWFUOE8wTU9sUHcyZlJMZXFXWmZSQmp6ZzlFZ0RTM2dNcmp6YUlFT1RaR254NTZoVlM2YnNSCm5EeVNhQ21iYmFsS2RtbGQ0bGRoYVMxRUl5MFBueGlvS2ZDZ1NRT25iQTJrYSt6cWgyaDZWUitIcndJREFRQUIKbzRJQmVqQ0NBWFl3Q1FZRFZSMFRCQUl3QURBUkJnbGdoa2dCaHZoQ0FRRUVCQU1DQmtBd05BWUpZSVpJQVliNApRZ0VOQkNjV0pVOVFUbk5sYm5ObElFZGxibVZ5WVhSbFpDQlRaWEoyWlhJZ1EyVnlkR2xtYVdOaGRHVXdIUVlEClZSME9CQllFRkNKekVZNngyU1hnNEx1ZExKVlFhVmMwemxLV01JR3pCZ05WSFNNRWdhc3dnYWloZ1kra2dZd3cKZ1lreEhUQWJCZ05WQkFNTUZFOVFUbk5sYm5ObExteHZZMkZzWkc5dFlXbHVNUXN3Q1FZRFZRUUdFd0pPVERFVgpNQk1HQTFVRUNBd01XblZwWkMxSWIyeHNZVzVrTVJVd0V3WURWUVFIREF4TmFXUmtaV3hvWVhKdWFYTXhMVEFyCkJnTlZCQW9NSkU5UVRuTmxibk5sSUhObGJHWXRjMmxuYm1Wa0lIZGxZaUJqWlhKMGFXWnBZMkYwWllJVVJPYlcKZStIaWJmbUlIaWJkeDMybVlZOTNRZ293SFFZRFZSMGxCQll3RkFZSUt3WUJCUVVIQXdFR0NDc0dBUVVGQ0FJQwpNQXNHQTFVZER3UUVBd0lGb0RBZkJnTlZIUkVFR0RBV2doUlBVRTV6Wlc1elpTNXNiMk5oYkdSdmJXRnBiakFOCkJna3Foa2lHOXcwQkFRc0ZBQU9DQWdFQU5HcDZVWkJ4WEdIcjdxb09pcC9mZ3A1QVhidVpPN1ZlQU02RlExU1IKVGI5anYzQlNybHZydUh6R2NhOFV5a3dIWWlNL000enRlWndBNXVjWVZBQi8rbnovblVaakV6VG4zT2EvN2RJZgpxc0R1NTZ0OWdCVGNXWXJVdGp4NHFDVGlsSXdLOGIwK0xYNEV4MFRWRFFoWmJTdG1udU82ZEhPWk1mQk1lMk5uCllpbWdNMytVZUVWZkkzQlk5bDRXb1RSM082eS9EMzFjaGxRS1NHWExXay9HaXp3V3gyZXF6VC8waXhmZmxNY3MKKzQxaU5UVUpLQzh4Tlh4R3lvek9aS0xNcjc0RFB1QjJ3OEtVcTdMNlVnVlA5V3RydHE0NGlTU3E4dXpoa0N1cwpRb3ZTeTQzaFhMVVhZMFE3Qzljd21xUk5SeTJGUm5KNnkyWjNVbFV0UEJtd3d1M2c2SWsrV0VSM0Jhak1ZaGF5ClY0eWFGYVRtcXZGOGtRZUhUTGFWZVBNSVczV2FqbVhmc0M5NlNNVTV5b3RQT1pXb2pITXloNEtJM2NTc1laRGwKNzFnSnJmRHl0TUVWdGE0Uk9sZVZ1RVl2TGhsamRTTnFKWFd6N29DcnBKOGowOEVhRWowaGVkVk1STGZCbVcrdgppUk45NHcvTFNKTFpZRGJqUEJPWU1nbW5rWFlUV283dlp5Rm1HZWJwOHZIVGRZdGg0K3lINzRkY1d6N1l1ZkVWClZPUzBhd2s0Qk4rZVJxUWdubll0OEZRclVuM1pzd2pldUttL2QyYnc0M20rUnhzcmJFN1o2VkZ1bUlrZWRNZ1AKWDNGZTY5NXZPM3lWNlc2ejJwRkRrNTVWUXh3MG1RK2UzYWx6d3E0dDkvYWgzVGpIVzdWR1E3QWZBODg5cEczbgoweDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk1JSUpRZ0lCQURBTkJna3Foa2lHOXcwQkFRRUZBQVNDQ1N3d2dna29BZ0VBQW9JQ0FRQ2FGVVk0ZnMvRTkwOFEKOVdPMUJmNFJaa1lqZUd1akdMc3JYRlo4MEhtdFpWWlBGMi9RSlJObWtVY25GMk9HOHBrb0lpRG90M1V1TU05cAp0RWRHZy94VkVZNjkwdEZkeVFhbGd4cWNIVlIvb0tJNnBmbnViamtqTTBJb0JZd3MzNkYwempCL29mYUduVDV1CnhSd3BqVXhreDNzRG80R1k4SmVjRjVTamMrTW1kZFdaZU1JdkFONG1VWFFKR0Q5SXkyRDhKZkQ1a3RPaHIyYzIKQWxyUzB0UHo0S1U3ZlhkNDJycWlKTUgxYU5PSVc1Q3RFZGIzc2RGN20yaFYrZkdTbVBJcXJuK1JBeGE3dWN5UwpoUExlQUJUWFRPOUtKbjVGeWxmSGRra0tBT0NHbnN2TTd5Y29FcXcrYlA0Q3Y4cDNDNVJETENIRGl1UXJSK1Y5CmkrWlB6czN0M0R2YWthd0lWOU5IWHNPSFJFL29aUFp5OFQ1UzZjdDJQc1E4OVAraWVZc2JHbFFRaS9hOWsyRFAKVEFvdERtZWxDMWV4TkZyVWVxMFg5dkpucytFUzJTTTRId2plWG9vTmMwRTduTE9BaUM4SlJoY01kRnlwUlJTeQpQRHFYRmVzVElQL2w5b0ZBSE1RZkNzbkNJQS80RWlsNjN3WVZSeEU0M1BteE9aM29ZTW83YkNHMk1FSGMvUXc1CmFwOURzNXNobXJPS3FPUFJyS3VyWHRzNDZTeStJZ1YvSjR2cDBWWXhiZGw1MFhZYVQ4TzBNT2xQdzJmUkxlcVcKWmZSQmp6ZzlFZ0RTM2dNcmp6YUlFT1RaR254NTZoVlM2YnNSbkR5U2FDbWJiYWxLZG1sZDRsZGhhUzFFSXkwUApueGlvS2ZDZ1NRT25iQTJrYSt6cWgyaDZWUitIcndJREFRQUJBb0lDQUMxWkJZbXJDTXNYWGhYSG9zaXNNdEk4CkgzaGhBSXpId281SVpzdmxMMnB3NEszMlg5b0tqMk1vYnFCNnFiZ1Z2aTJwbmJYZ0NJVEhxTU9iWXo3RnFZWC8KM05yUktQMUpKTU9oaWp0WUJuNXBjRldDYzhSUWZGQjN6WWlwMlU5N29iRVczZjh5VTdQYW8zMUdWYnVFOG03Vwpwc1d6WVhqNWxpVkNhMlNQdnRLYTYzcDNwKzdkZW9RY2hPSUlXTmU3dzVkeU16SEFuTGlCUHdjT09sekIzODl1CjFqSmtBcjEyNG1iR0dxOTNZb3BIS0pWSEl0VlRhQ3ZRMlN3MG0zeGh0eVFJcDFLdWJncGg3R3RTNVllZ3pvRnYKQ3gzdnBrb3oreEdoSm0zalJERmFtdkI5a2pDaERrQnhJM0Q3c1VMSURhS1hZbmlDY0JTczNFWE8zc0d1UTd6QQpUYVNTYzJBRzE5QzZsV2pmNTFVSFZ6VlB1aFFHRWxyelZ1NVRYRGNQRDllSENKNWtDWncxYXFXenFWM00wTXFuCkFRZjdQbXhMMnlIdDRNZkdZTWdpTnJuREdVL2h2bm9WeTZBeWdBL05XYzNScEk4VzVPNWZUa0lTVXJTOXRuZjAKbjdsRjBmcFBSYVo5bGsxSSthZXNxaHZ3UmNCWTdScHNzWUtJOFlBZGRYMEQ5Z3U0MzdETHB5SjNkVzV4N2R0YgphVGxhRW5mVUxkQVdTOFAwRFNabnN0ak5IUjQwbm54KzhvQ3k5TG5vWm5UbUFGWXZIaUxaaFpDejdvTTBpdk05CjY2RFc1cjlkVEl3WVdiUG5mWEtCVjAvMlpBMVRiVDhRUnphbUEzQTFhVXlUZE9ZaXRIRVdmQ29JZFdUZ1ZkOE4KTjVvVlZ4WGQ2Y21lVlc2NFcvc0JBb0lCQVFEV1dHa3c3WlRWa1lSTkZ3K1c5WTlicThNMStoYjFVeG1BQ1AwYQo2S3RUcHN3UDVLTjIyb09qd0VEc0FDa3JrenVLd2RBUFRldW52U0E5aGZmaFQ3aHJrVlZnaFYxa0NoMFl3ak45CmcwNTFxTmFsZ3JqOGthNVVHNGdnSm9QNmlMT2lBV1g3clFudGhaSlI2S0pDODlXYnFEK1lKVWQvLzU2aTFSMXIKRzFJaUVtRS8yUzlRbXhhY0N3cmR3WmlkNkQwa3ltTEpHUjV5Y1UvaXFhM3h0SWhFbFV0NHVOd3V2dHlVaG54NApOL2N5ZVk0anZWWDdHbjBNemhndGQ4MnR4dEttWlk3bUh3cVNaeWNCSnhPY0hUL2xIZzFOYjBTTHRTaFdwM1NRClFLRHVacGJSMlZvRkhKSXJDODJCOEpzdit2b2Z4RDhRVEdXVksxSjQzcUJkRGtmeEFvSUJBUUM0QnRlZ3hXMGIKeTViZHhzRVZUT2RWeXBKVmNyRDJuWU1BSFFUa1A5QUh3RlVib20wN3AxR2dpY3JRWTlMMkVTZDJCbFpxdWNiUQo3WExoTklMWEJSdjBVOUxtTHloSEU4djd0VFhOMmRjM2RCcm5RNE5xWEdCLzFJT2NtVmZNeExvR3pYa0JLQmVXCmp0bjZiMTRZUkNmbWdFU1d6eXR5S0psYWxPMFNUam5oMTZ4ajRZbFVncWJNa041TC9jTXlORUYxRzFEUTREcTcKS1dzSi83YnRlVmlGZ1M4ZUlQSUJXUDB0cFBjZUluYy9ReTAyYUFTZXVuU2YvYXZic2ZxVkg4UWhnZ0xZcmdBRQpuWS90bEorU1VOMm9xOTNuTkxYc215RjVZQlVRUGNvQzExTFhJckZqN01HSjg1Z083NWtxQmN2cmt6RmwwNUp4ClFMS1pwWnFBcjJtZkFvSUJBUUNseUpIcnJ3WmJ2UVlvSGZzSDFudi8ralN0VGZadDNzMHRVMFo0aHBia3gzQ3oKcGpLc1hjeE5YZ2lZd0hNWGFmUTJtVHNVYXo4bWFNaEQ3WmRRcERsT3NZVG9kNTVKSHUxc1ZlQS9ac3pMZ2tBcQptWlg4ZTZ6ckRyUlZzWlNJdFN6QzAvUU9HY05BKy91MDhJcDM0R0pKMTNNQWVXejQyanZYVTZCQ1ZFcE5ZZ3ZuCnQxSzZOSW5qUFVNMVMyU0FWYnpjOU5BOUcvbUpxSXlTRW8wZ0VuTUhJTFhUOUo4UVpMejAvNlBMMC9XVkM2RmQKa1Rhc1ZjdDhtUGJvUys1QVJ6UnNVTWFheEUySCtOS1pPS0VaTVNKWFVzd1ZKVWRPQzFyYzB2MzhDSkN3YzVhWgpUbFFxK2ZNdjZod1VNWVhHTVljK0JLcUdMNkN1SkdqUVpkaUF3T2Z4QW9JQkFEVGFFamVrTzgvTnlzaHErcTBwClp3OG1uSnhaMGlVaDI2dStxZGI3MUwxRktheEVHK2NVQ01kNGkzMEtEbDZKVXJIODQvakczaWpHNlVWd2xWczMKcG0yblhWeXFrb0RIV01BenJQNHY0RFdXN05zYWNyV3JUak9vVHh3OGxoREROMElZNVBYR0UvQXptcnJvSFRnTwo2djZ5UEFDc0F5aElMTEx0THFFaFFsSndaSnhTKytQL21mUUtieTJYOWVXSFNIMWZtUGhFVGRuTzdXVHp3ZysxCjJBeVBxMzZWcTZ0amFXTWdpN0JsNmFXTG40S09vVFVOQzgyZlJ5cFRsVW9hMDNOa0tYa2RqL2ZEWU1DMC9KZEQKRGtZUkJpd080V2pRck81MC85ZW9SMHBGbVE4Y2NhSG5MeloxZFdoa3U3SnI4OEwyaFN0ZmRpRjhtVTZ6VndvNgpWclVDZ2dFQUwvdkhOa2V0dlFRZi9vZkZ5VlhtR2NKcEkzcmhpQmZjR2hMUDN0ZmNraklwRnVpVnIzMmJoZkN6Cm9hNFpaamh5VXJMbEpuQzZHc3VSUVhIMGpIU3BSS2VMclg0emlCLy9zckxGL0JFQVhCTzBwZytiYXd3YmtQNXUKT1pnNlBXeG1DZlg4NnJ1ZXAzaUJ6ZzZ5WC85ckg3WnltV3oxNEU4ZGhFNi94b2pxRHdDUVJ6ZmlJekdsaGlSKwpjc2JxOFZQTkQ1QzFUM1pxeTVsS2tpRWljNzNRV3h2RU5SaElCa0FKdEgzUE1iOWxuTXlFbHgwQWZkS1RFOVVDCmpKL1VjQ04rV3ROQk9Na3RNY25GTEY4NVU1bFBBNi9uTjMyRmdLMDFIRVNidUFWNEZvaEc3YWRLRGhiaGx5U0wKb0U5RVhCWHRMSnNuZ0ZoajlTUUJDOGR2R2RBdUNRPT0KLS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQo=1