ELF@4Ԛ4 (444444ЌЌЌHHH Ptd  Qtd/lib/ld-linux.so.2GNU N C@+NPT|CEK8qX<Ҍ _P-Oj  7g}y> X2LL>WiDIV[v^@+>B42|:  "[: BKp5MU_DF4%+= w2 29 ;lDWwMnZ&CB+8xz887< 1@pTMC4MsX` MhnM:nMxMhP1Mq5.P8X@8^^^^^_8_<_L_8____8̿п0Կؿܿٳn`ii 0ii :ii Dti Nii Z" d8Q@U      $(,048<@DHL P!T"X#\$`%d&h'l(p)t*x+|,-./0123456789:;<=>?@ABCVDEFGHIJKLMUU5%%h%h%h%h%h %h(%h0%h8p%h@`%hHP%hP@%hX0%h` %hh% hp%hx%h%h%h% h%$h%(h%,h%0hp%4h`%8hP%<h@%@h0%Dh %Hh%Lh%Ph%Th%Xh%\h%`h%dh %hh(%lh0%ph8p%th@`%xhHP%|hP@%hX0%h` %hh%hp%hx%h%h%h%h%h%h%h%hp%h`%hP%h@%h0%h %h%h%h%h%h%h%h%h %h(%h0%h8p%h@`%hHP%hP@%hX0%h` 1^PTRhhQVhUS[XtNX[ÐUS=u?-X9v&9w[]Ít&'Utt $ÐUWVS$u} D$$`øL\$ D$9D$$\$ D$/D$$@\$ D$3D$$p\$ D$=D$$\$ D$(D$$}t\$ D$;D$$N\$ D$:D$$L.\$ D$$D$$ED$D$$D$ $1[^_]É\$ D$D$$>$I-\$ D$D$$$\$ D$D$$K댍'UWVS D$)$6EE$D$D$Ɖ$EE4$|$D$`tV>#t4$D8 ]CD$E$4$EUMDU됉<$$D$)$WE$@D$D$E$EUD$D$$E[u+u4 u}UG$D$] $EMU$$Ãx%$xً DP uMED9,}GD$E$]$E'UM$ $Ãx* t&xً DP uEED8(D$)$EXEM1[^_]UWVS ]uD$$`Ǹ3|$ D$5D$$|$$ QU}t,t&D$ D$XD$<$CuڋE t7U t.ӍD$ D$dD$<$Cuڅtrtl^ .FމL$ D$oD$D$<$z t9VtˋFމL$ T$D$}D$D$<$A ulj<$1[^_]É|$ D$ D$$A|$ D$ D$$M&UWVS]eE1}D$$Ƹyt$ D$@D$$Ct$ D$8D$$,#t$ D$D$$t$ D$D$$t$ D$D$$t$ D$D$$D$ D$D$4$D$ D$D$4$D$ D$ D$4$sD$ D$D$4$St9t3t&D$D$ D$3D$4$ CuD$ D$JD$4$D$ D$eD$4$D$ D$|D$4$D$ D$hD$4$D$ D$D$4$vD$ D$D$4$VD$ D$D$4$6D$ D$(D$4$_ :G߉L$D$ D$dD$D$D$4$ tEWtG߉L$T$D$ D$D$D$D$4$ uD$ D$D$4$`t$ D$D$$4$D$$M1uUe3ļ[^_]ÍpDžp/sbiDžtn/moDžxdproDž|be iEp6_tEableEs >/Edev/EnullE 2>&fE1$ Džp/sbiDžtn/seDžxrvicDž|e ipE6tabEles EstarEt >/Edev/EnullE 2>&fE1$1&fUWVS utF]t?E8t>t81U $T$uCuޅt [^_]ËM<$D$M]] DE [^_]Ít&'UWVS<] }eE1D$D$4$SSfT$$VpCD$D$D$D$ D$D$4$g! t€u҃)AD$$t$É$&CT$D$D$D$ D$D$D$4$d<$ Ë! t€td҃)DD$$Mt$|$D$ D$D$É$3Ue3u3<[^_]Í딋CD$D$D$}'UWVS,}D$:<$EEtEE؉EZDAtED$ D$ D$<$EƋEt]tYU؉<$T$tF@fE8|$ D$D$$,[^_]Á}uɁ~vD$-<$E<EED$ D$ D$<$D$ D$ ÍEމD$E$‰Ed=tZtT_ Et&ڃ t,9uBU؉$T$suۋڃ EuԋE܅<$@D$ [2uD ru؉rt&'Ut$]ÍvUWVS u} t;t%t7 t&$ ut [^_]É$UWVS,EE,D$)$`E0D$$@E$)ÍvE$D$D$tuRE$D$t=E$\$D$D$)މD$t$ E$념t&\$D$E$dE$-E$",D$0$,[^_]ËEE,[^_]&'UWVS,EE,D$)$E0D$$E,E$$Í&U$D$T$=tuu$UD$D$T$ E$uE$D$BtP\$D$U$GnE$U$,D$0$,[^_]D$"$tCU)؉\$D$ D$T$D$E$UU,[^_]WE$LU$A0E,[^_]'UWVSE eU1ҋ]}D$`$8ƸUt$ D$@D$$t$ D$8D$$,t$ D$D$$t$ D$D$$t$ D$D$$it$ D$D$$ID$ D$D$4$YD$ D$D$4$9D$ D$ D$4$D$ D$D$4$t4t.D$D$ D$3D$4$CuD$ D$D$4$D$ D$eD$4$D$ D$|D$4$aD$ D$DD$4$AD$ D$D$4$!D$ D$D$4$D$ D$xD$4$_ @G߉L$D$ D$D$D$D$4$ tEWtG߉L$T$D$ D$D$D$D$4$N uD$ D$0D$4$%`t$ D$D$$t$ D$D$$t$ D$D$$t$ D$D$$gt$ D$D$$Gt$ D$D$$'t$ D$D$$"`t5Ӑt&D$ D$ D$dD$4$Cu҉t$ D$D$$t$ D$D$$=t$ D$D$$ft$ D$D$$Ft$ D$D$$"&D$ D$D$4$6t$ D$D$$4$D$$$CU1uUe3ļ[^_]ÍpDžp/sbiDžtn/moDžxdproDž|be iEptabEles E>/deEv/nuEll 2E>&1$Džp/sbiDžtn/seDžxrvicDž|e ipEtablEes sEtartE >/dEev/nEull E2>&1E$t1t&UW[VS2] eE1hD$D$$h$D$D$D$D$$4$D$D$yD$D$,$4$D$D$ID$D$$}4$D$D$D$D$$M4$(D$D$D$D$$D$@D$($D$D$$($D$@D$wD$D$$4$D$@D$GD$D$X${4$D$@D$D$D$<$K4$D$@D$D$D$$4$D$@D$D$D$$4$D$@D$D$D$@$4$D$@D$WD$D$$4$D$@D$'D$D$$[4$D$@D$D$D$x$+4$D$@D$D$D$L$4$D$@D$D$D$8$4$D$@D$eugD$D$`$D$D$c$qhT$\$$Ee3u]2[^_]D$(D$`$"D$D$z$t$\$$T'UWVS,$(_$ EEEEvM $iEt~] uD$:$[uD$~$Gu t} tE$MUEMrfE$i]EUۉtMD$ D$T$ $K}#E,[^_]ËEUD$$Erv'US]tRD$$tD$$u[]D$$1҅tf[]ÍvUWVS\D$eE1EED$$D$D$$D$D$$UT$UT$ UT$t$\$D$$5D$$ D$D$,$ID$D$ D$D$ 2D$D$$D$$gD$$MD$$3D$D$$$D$$D$YD$(D$$D$ $D$D$D$D$D$ D$D$o4D$D$$ \$ 1D$D$$D$D$(D$$D$ $D$D$D$D$D$ D$D$=4D$D$$a\$ D$$T$D$[D$(D$$D$ $D$D$D$D$D$ D$D$!D$D$$D$$D$}D$(D$$D$ D$D$D$$D$D$ D$$D$D$ D$D$$D$D$$ D$$D$D$D$$D$ $D$D$D$$D$D$$$D$(D$$ $D$ D$D$D$T$D$ D$D$g  +D$$[E$ DžEDž0404T$ $D$D$$D$$D$:D$(D$$D$ D$D$D$D$D$ D$$D$PE@$]ۉDžTDž(Dž,DDž@=SD11 Lޅ/L$L$uڋ@LD${|$D$ *D$D$$¡! DS,T$(D$(D$$D$D$ D$D$D$D$ T$ $((94,Dž(TT@ D9UD$(D$$$D$D$ D$D$D$D$ D$D$804L$$PD$D$#$XD$$D$vD$(D$$D$ $D$D$D$D$D$ D$D$E@$EDžPDž`Dž\<Dž8=,<11 HޅyH$T$uڋ8HD${|$D$ *L$D$$¡D$D$$M$D$4D$P$}\$D$$$$"D$D$$UT$D$$D$$)D$D$$D$D$ D$D$ AD$D$$SD$(D$$D$ D$D$D$D$D$ D$D$4$OD$(D$$D$ T$D$D$D$D$ D$D$4$\$D$(D$$D$ D$D$D$D$ D$D$4$D$D$$D$D$$'4$D$D$\$4$$ ;}D$D$[$0D$D$c$$D$D$\$ $6$>;E;EZuD$$D$$}1  9u~+;*uD$C$ D$W9uՋu~d11  9u~S| *u苅|* D$D$D$ 8$9u]tY;tT„t< /<,/„ut< <,fE$?];u}*}*}*k}*t&%}*$}*}*}* $94$M$ $Ue3\[^_]Íwp > 2@{D|$D$D$ D$$D$C8{<|$D$D$ D$$D$/L$$5,@{D8{zD$ $D$g  D$ $Dž1DžDžDžDžDžDž b=gD$$.$R$v}*R=$ 臾http@s:tcf@p0Dž4D$$=D$$}$=xD$$T$x=)D$$+$O=D$$$&}*F=$ g2049@:tcp@=H$ 0Hhttp@:tcp@2=$ smtp@:tcp@=c$ ¼cteln@et:tf@cp@ G= h$腼hssh:@tcpV$_ftp:@tcp@t&t& pPDžAD$$P$teD$$/$SxD$$$2C$腻p137:@udp^D$$Ǹ$D$$覸$D$$腸$wDžFDž7e$蝷蘺$ܻ$&445:@tcp$蚺139:@tcp$t138:@udpvvt?KDž$Dž`DžQDžBL$qUWVSQIeU1DžDžDžDžD$D$$ܷD$D$0$躷D$D$$蘷D$D$.$vD$D$?$TD$D$Y$2D$D$g$D$D$$D$D$\$̶D$D$$誶D$D$$舶D$D$$fD$D$$DD$D$$"D$D$$D$D$$޵D$D$$D$D$$袵D$D$0$耵D$D$x$^D$D$x$$2$2D$$D$ݿD$$D$躿 $$9 $b$J$D$4$聯oD$D$$蠯D$D$8$'$4u$$x!$D$1D$"=4D$D$D$ D$D$$$̭D$D$ D$ D$D$$輰$蔭D$D$L D$ D$D$$脰$\D$D$p D$ D$D$$L$$$跮$誮4D$ D$D$$޶$f=4u 4z4`1D$ D$D$$1D$ D$D$$U]Ít&'UWVS^93E)E}Ut+1ƍED$E D$E$9}u߃[^_]Ë$ÐUSt Ћu[]US[49Y[wSELINUX=enforcing /usr/sbin/setenforce 1SELINUX=permissive /usr/sbin/setenforce 0SELINUX=disabled SELINUXTYPE=%s rSELINUX=SELINUXTYPE=--disabled --enabled --trust=%s --masq=%s --port=%d:%s --port=%d-%d:%s *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] RH-Firewall-1-INPUT:%s - [0:0] -A INPUT -j %s -A FORWARD -j %s -A %s -i lo -j ACCEPT -A %s -i %s -j ACCEPT -A %s -p icmpv6 -j ACCEPT -A %s -p 50 -j ACCEPT -A %s -p 51 -j ACCEPT COMMIT %s:%s%d-%d:%s%s %sIPTABLES_MODULES="%.*s%sIPTABLES_MODULES=""IPTABLES_MODULES="%s" %.*s %s" *mangle :PREROUTING ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] *nat ip_conntrack_netbios_nshelpOkFirewall ConfigurationFirewall Customizationifcfg-ifcfg-loenforcingpermissivedisabledCancelCustomizeOKSecurity Level:EnabledDisabledSELinux:EnforcingPermissiveTrusted Devices:MASQUERADE Devices:Allow incoming:SSHTelnetFTPWWW (HTTP)SambaMail (SMTP)Secure WWW (HTTPS)NFS4Other portshelp_customip_conntrack_ftpftp:tcphttps:tcp137:udp138:udp139:tcp445:tcp2049:tcphttp:tcpsmtp:tcptelnet:tcpssh:tcpEnable firewall (default)Disable firewallEnable an iptables modulemodule to addDisable an iptables modulemodule to removeport:protocol (e.g, ssh:tcp)device to trustdevice to masqueradeConfigure SELinuxConfigure SELinux PolicyHelp options:quietnostartenabledaddmoduleremovemoduleportmasqselinuxtypehighmediumdhcp/usr/share/localesystem-config-securitylevellokkit%s: %s targeted/etc/sysconfig/iptables/etc/sysconfig/ip6tables/etc/selinux/config/etc/sysconfig/selinux# This file controls the state of SELinux on the system. # SELINUX= can take one of these three values: # enforcing - SELinux security policy is enforced. # permissive - SELinux prints warnings instead of enforcing. # disabled - SELinux is fully disabled. # SELINUXTYPE= type of policy in use. Possible values are: # targeted - Only targeted network daemons are protected. # strict - Full SELinux protection. # Configuration file for system-config-securitylevel # Firewall configuration written by system-config-securitylevel # Manual customization of this file is not recommended. -A %s -p udp --dport 5353 -d ff02::fb -j ACCEPT -A %s -p udp -m udp --dport 631 -j ACCEPT -A %s -p tcp -m tcp --dport 631 -j ACCEPT -A %s -p udp -m udp --dport 32768:61000 -j ACCEPT -A %s -p tcp -m tcp --dport 32768:61000 ! --syn -j ACCEPT -A %s -m %s -p %s --dport %d -j ACCEPT -A %s -m %s -p %s --dport %d:%d -j ACCEPT -A %s -j REJECT --reject-with icmp6-adm-prohibited Error: Port or port range %s is not valid -A %s -p icmp --icmp-type any -j ACCEPT -A %s -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT -A %s -m state --state ESTABLISHED,RELATED -j ACCEPT -A %s -m state --state NEW -m %s -p %s --dport %d -j ACCEPT -A %s -m state --state NEW -m %s -p %s --dport %d:%d -j ACCEPT -A %s -j REJECT --reject-with icmp-host-prohibited -A PREROUTING -i %s -j MARK --set-mark 0x%X -A POSTROUTING -m mark --mark 0x%X -j MASQUERADE Firewall Configuration A firewall sits between your computer and the network, and determines which resources on your computer remote users on the network are able to access. A properly configured firewall can greatly increase the out-of-the-box security of your system. Choose the appropriate security level for your system. Enabled -- By choosing enabled, your system will not accept connections from the outside that are not explicitly defined by you. If you are connecting your system to the Internet, but do not plan to run a server, this is the safest choice. If additional services are needed, you can choose Customize to allow specific services through the firewall, or to implicitly trust traffic coming over certain interfaces. Disabled -- Disabling the firewall allows complete access and does no security checking. It is recommended that this only be selected if you are running on a trusted network (not the Internet), or if you plan to do more detailed firewall configuration later. Firewall Customization Choose which trusted devices and incoming services should be allowed for your network security settings. Trusted Devices -- Checking these for any of your devices allows all traffic coming from that device to be allowed. For example, if you are running a local network, but are connecting to the Internet via a PPP dialup, you could check that eth0 is trusted to allow any traffic coming from your local network. It is not recommended to enable this for devices that are connected to public networks, such as the Internet. Allow Incoming -- Enabling these options allows the specified services to pass through the firewall. Note, during a workstation-class installation, the majority of these services are not present on the system. * SSH -- Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful. * Telnet -- Telnet is a protocol for logging into remote machines. It is unencrypted, and provides little security from network snooping attacks. Enabling telnet is not recommended. You need the telnet-server package installed for this option to be useful. * WWW (HTTP) -- HTTP is the protocol used to serve Web pages. If you plan on making your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful. * Secure WWW (HTTPS) -- HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful * Mail (SMTP) -- This allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam. * FTP -- FTP is a protocol used for remote file transfer. If you plan on making your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful. * Samba Browsing -- This allows you to access access and participate in Windows file and printer sharing networks. You need the Samba package installed for this option to be useful * NFSv4 -- This allowed you to use the NFS version 4 protocol via TCP to share files. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful. * Other ports -- You can specify that other ports not listed here be allowed through the firewall. The format to use is 'port:protocol'. For example, if you wanted to allow IMAP access through your firewall, you can specify 'imap:tcp'. You can also specify numeric ports explicitly; to allow UDP packets on port 1234 through, specify '1234:udp'. To specify multiple ports, separate them by commas. /etc/sysconfig/network-scriptsA firewall protects against unauthorized network intrusions. Enabling a firewall blocks all incoming connections. Disabling a firewall allows all connections and is not recommended. / between elements | selects | next screensystem-config-securitylevel © 2003 Red Hat, Inc.You can customize your firewall in two ways. First, you can select to allow all traffic from certain network interfaces. Second, you can allow certain protocols explicitly through the firewall. Specify additional ports in the form 'service:protocol', such as 'imap:tcp'. Firewall Configuration - CustomizeWill not add %s to MASQUERADE list because it is not trusted. Run noninteractively; process only command-line argumentsConfigure firewall but do not activate itAllow specific ports through the firewallAllow all traffic on the specified deviceMasquerades traffic from the specified device'enforcing', 'permissive', or 'disabled'Usually 'targeted' or 'strict'ignore settings stored in /etc/sysconfig/system-config-securitylevelBackwards compatibilty, aliased to --enabledBackwards compatiblity, ignored ERROR - You must be root to run lokkit. /sbin/iptables -D INPUT -j %s 2>/dev/null/sbin/iptables -D FORWARD -j %s 2>/dev/null/sbin/iptables -F %s 2>/dev/null/sbin/iptables -X %s 2>/dev/null/etc/sysconfig/system-config-securitylevel/etc/sysconfig/iptables-config/etc/sysconfig/new-iptables-config;Lܑ(Y@ pӥE   `e@??ulibpopt.so.0__gmon_start___Jv_RegisterClasses_fini_initpoptGetNextOptpoptGetContextpoptBadOptionpoptStuffArgspoptStrerrorpoptHelpOptionspoptResetContextlibnewt.so.0.52newtListboxGetCurrentnewtButtonBarnewtPushHelpLinenewtEntrynewtClsnewtRadiobuttonnewtTextboxReflowednewtRadioGetCurrentnewtCreateGridnewtListboxAppendEntrynewtSetHelpCallbacknewtInitnewtGridAddComponentsToFormnewtGridWrappedWindownewtListboxnewtListboxSetCurrentnewtCheckboxnewtWinMessagenewtRunFormnewtDrawRootTextnewtFormnewtEntrySetnewtGridSetFieldnewtLabelnewtFinishednewtPopWindownewtFormDestroylibslang.so.2libc.so.6_IO_stdin_usedstrcpyexitreaddirsetlocalefopenstrrchr__strdupdcgettextclosedir__stack_chk_failunlinkreallocchmodfgetscallocstrlenmemsetstrstr__fprintf_chkfputcfclose__strtol_internalmallocstrcasecmpopendir__ctype_b_locgetservbynamestderrsystem__snprintf_chkgetuidfwriterenamestrchrqsort__sprintf_chkbindtextdomain__strcat_chkstrcmp__libc_start_maingetservbyportsnprintffree_edata__bss_start_endGLIBC_2.4GLIBC_2.1GLIBC_2.3GLIBC_2.3.4GLIBC_2.0NEWT_0.52libm.so.6libdl.so.2/lib/ld-linux.so.2lokkit.debug \ELF@4,4 (444444ЌЌЌhHHH Ptd  Qtd 44HH !ohhH+ p3  n;o Ho<< W  ` Ԍ h i<<dTTo@@HPud{d`%  8Ќ،čȍ@0888L.shstrtab.interp.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rel.dyn.rel.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink.dynbss.gnu.liblist.gnu.conflict.gnu.prelink_undo 44HH !ohhH+ po   ;o Ho<< W  ` Ԍ h i<<dTTo@@HPud{d`%  8Ќ،čȍ@088x 3Џh|D