update..
This commit is contained in:
22
roles/common/files/b.mx/etc/postfix/postfwd.bl-hosts
Normal file
22
roles/common/files/b.mx/etc/postfix/postfwd.bl-hosts
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# hosts blocked by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # block all hosts of domain 'oopen.de'
|
||||
# \.oopen\.de$
|
||||
#
|
||||
# # block host a.mx.oopen.de
|
||||
# ^a\.mx\.oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give hostnames to blocke here
|
||||
|
16
roles/common/files/b.mx/etc/postfix/postfwd.bl-nets
Normal file
16
roles/common/files/b.mx/etc/postfix/postfwd.bl-nets
Normal file
@ -0,0 +1,16 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Networks blocked by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # web0.warenform.de
|
||||
# #83.223.86.76
|
||||
# #2a01:30:0:505:286:96ff:fe4a:6ee
|
||||
# #2a01:30:0:13:286:96ff:fe4a:6eee
|
||||
#
|
||||
# ---
|
||||
|
||||
# give networks to block here
|
||||
|
@ -2,4 +2,37 @@
|
||||
|
||||
# ---
|
||||
# Sender addresses blocked by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# @acieu\.co\.uk$
|
||||
# ^error@mailfrom.com$
|
||||
#
|
||||
# instedt of
|
||||
#
|
||||
# @acieu.co.uk
|
||||
# error@mailfrom.com
|
||||
#
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # # annoying spammer domains
|
||||
# # block all senders of maildomaindomain 'oopen.de'
|
||||
# @acieu\.co\.uk$
|
||||
#
|
||||
# # annoying spammer addresses
|
||||
# # block sender address
|
||||
# error@mailfrom.com
|
||||
# sqek@eike\.se$
|
||||
#
|
||||
# ---
|
||||
|
||||
# annoying spammer domains
|
||||
@acieu\.co\.uk$
|
||||
|
||||
# annoying spammer addresses
|
||||
^error@mailfrom\.com$
|
||||
^sqek@eike\.se$
|
||||
|
@ -2,5 +2,12 @@
|
||||
|
||||
# ---
|
||||
# SASL Users blocked by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # give SASL usernames to block here
|
||||
# ckubu@oopen.de
|
||||
#
|
||||
# ---
|
||||
|
||||
# give SASL usernames to block here
|
||||
|
172
roles/common/files/b.mx/etc/postfix/postfwd.cf
Normal file
172
roles/common/files/b.mx/etc/postfix/postfwd.cf
Normal file
@ -0,0 +1,172 @@
|
||||
|
||||
#======= Definitions ============
|
||||
|
||||
# Match messages with an associated SASL username
|
||||
&&SASL_AUTH {
|
||||
sasl_username!~^$
|
||||
}
|
||||
|
||||
# Trusted networks
|
||||
&&TRUSTED_NETS {
|
||||
client_address==file:/etc/postfix/postfwd.wl-nets
|
||||
}
|
||||
|
||||
# Trusted hostnames
|
||||
# client_name~=.warenform.de$
|
||||
&&TRUSTED_HOSTS {
|
||||
client_name=~file:/etc/postfix/postfwd.wl-hosts
|
||||
}
|
||||
|
||||
# Trusted users
|
||||
&&TRUSTED_USERS {
|
||||
sasl_username==file:/etc/postfix/postfwd.wl-user
|
||||
}
|
||||
|
||||
# Trusted senders
|
||||
&&TRUSTED_SENDERS {
|
||||
sender=~file:/etc/postfix/postfwd.wl-sender
|
||||
}
|
||||
|
||||
# Blacklist networks
|
||||
&&BLOCK_NETS {
|
||||
client_address==file:/etc/postfix/postfwd.bl-nets
|
||||
}
|
||||
|
||||
# Blacklist hostnames
|
||||
&&BLOCK_HOSTS {
|
||||
client_name=~file:/etc/postfix/postfwd.bl-hosts
|
||||
}
|
||||
|
||||
# Blacklist users
|
||||
&&BLOCK_USERS {
|
||||
sasl_username==file:/etc/postfix/postfwd.bl-user
|
||||
}
|
||||
|
||||
# Blacklist sender adresses
|
||||
&&BLOCK_SENDER {
|
||||
# =~
|
||||
# using '=~' allows also matching entries for domains (i.e. @acieu.co.uk)
|
||||
sender=~file:/etc/postfix/postfwd.bl-sender
|
||||
}
|
||||
|
||||
# Inbound emails only
|
||||
&&INCOMING {
|
||||
client_address!=127.0.0.1
|
||||
}
|
||||
|
||||
|
||||
#======= Rule Sets ============
|
||||
|
||||
# ---
|
||||
#
|
||||
# Processing of the Rule Sets
|
||||
#
|
||||
# The parser checks the elements of a policy delegation request against the postfwd set
|
||||
# of rules and, if necessary, triggers the configured action (action=). Similar to a
|
||||
# classic firewall, a rule is considered true if every element of the set of rules (or
|
||||
# one from every element list) applies to the comparison. I.e. the following rule:
|
||||
#
|
||||
# client_address=1.1.1.1, 1.1.1.2; client_name==unknown; action=REJECT
|
||||
#
|
||||
# triggers a REJECT if the
|
||||
#
|
||||
# Client address is equal (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
|
||||
#
|
||||
#
|
||||
# Note:
|
||||
# If an element occurs more than once, an element list is formed:
|
||||
#
|
||||
# The following rule set is equivalent to the above:
|
||||
#
|
||||
# client_address=1.1.1.1; client_address=1.1.1.2; client_name==unknown; action=REJECT
|
||||
#
|
||||
#
|
||||
# triggers a REJECT if (as above) the
|
||||
#
|
||||
# Client address (1.1.1.1 OR 1.1.1.2) AND the client name 'unknown'
|
||||
#
|
||||
# ---
|
||||
|
||||
# Whitelists
|
||||
|
||||
# Whitelist trusted networks
|
||||
id=WHL_NETS
|
||||
&&TRUSTED_NETS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist trusted hostnames
|
||||
id=WHL_HOSTS
|
||||
&&TRUSTED_HOSTS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist sasl users
|
||||
id=WHL_USERS
|
||||
&&TRUSTED_USERS
|
||||
action=DUNNO
|
||||
|
||||
# Whitelist senders
|
||||
id=WHL_SENDERS
|
||||
&&INCOMING
|
||||
&&TRUSTED_SENDERS
|
||||
action=DUNNO
|
||||
|
||||
|
||||
# Blacklists
|
||||
|
||||
# Block networks
|
||||
id=BL_NETS
|
||||
&&BLOCK_NETS
|
||||
action=REJECT Network Address $$client_address blocked by Mailserver admins. Error: BL_NETS
|
||||
|
||||
# Block hostname
|
||||
id=BL_HOSTS
|
||||
&&BLOCK_HOSTS
|
||||
action=REJECT $$client_name blocked by Mailserver admins. Error: BL_HOSTS
|
||||
|
||||
# Block users
|
||||
id=BL_USERS
|
||||
&&BLOCK_USERS
|
||||
action=REJECT User is blocked by Mailserver admins. Error: BL_USERS
|
||||
|
||||
# Blacklist sender
|
||||
#
|
||||
# Claim successful delivery and silently discard the message.
|
||||
#
|
||||
id=BL_SENDER
|
||||
&&BLOCK_SENDER
|
||||
#action=DISCARD
|
||||
action=REJECT Sender address is blocked by Mailserver admins. Error: BL_SENDER
|
||||
|
||||
|
||||
# Rate Limits
|
||||
|
||||
# Throttle unknown clients to 5 recipients per 5 minutes:
|
||||
id=RATE_UNKNOWN_CLIENT_ADDR
|
||||
sasl_username =~ /^$/
|
||||
client_name==unknown
|
||||
action=rate(client_address/5/300/450 4.7.1 only 5 recipients per 5 minutes allowed)
|
||||
|
||||
# Block clients (ip-addresses) sending more than 50 messages per minute exceeded. Error:RATE_CLIENT)
|
||||
id=RATE_CLIENT_ADDR
|
||||
&&INCOMING
|
||||
action=rate($$client_address/50/60/421 421 4.7.0 Too many connections from $$client_address)
|
||||
|
||||
# Block messages with more than 50 recipients
|
||||
id=BLOCK_MSG_RCPT
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
recipient_count=50
|
||||
action=REJECT Too many recipients, please reduce to less than 50 or consider using a mailing list. Error: BLOCK_MSG_RCPT
|
||||
|
||||
# Block users sending more than 50 messages/hour
|
||||
id=RATE_MSG
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
action=rate($$sasl_username/50/3600/450 4.7.1 Number messages per hour exceeded. Error:RATE_MSG)
|
||||
|
||||
# Block users sending more than 250 recipients total/hour
|
||||
id=RATE_RCPT
|
||||
&&INCOMING
|
||||
&&SASL_AUTH
|
||||
action=rcpt($$sasl_username/250/3600/450 4.7.1 Number recipients per hour exceeded. Error:RATE_RCPT)
|
||||
|
22
roles/common/files/b.mx/etc/postfix/postfwd.wl-hosts
Normal file
22
roles/common/files/b.mx/etc/postfix/postfwd.wl-hosts
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted hosts whitelisted by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # all hosts of domain 'oopen.de'
|
||||
# \.oopen\.de$
|
||||
#
|
||||
# # host a.mx.oopen.de
|
||||
# ^a\.mx\.oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give truested hostnames here
|
||||
|
15
roles/common/files/b.mx/etc/postfix/postfwd.wl-nets
Normal file
15
roles/common/files/b.mx/etc/postfix/postfwd.wl-nets
Normal file
@ -0,0 +1,15 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted networks whitelisted by postfwd
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # web0.warenform.de
|
||||
# #83.223.86.76
|
||||
# #2a01:30:0:505:286:96ff:fe4a:6ee
|
||||
# #2a01:30:0:13:286:96ff:fe4a:6eee
|
||||
#
|
||||
# ---
|
||||
|
||||
# give truested networrk adresses here
|
22
roles/common/files/b.mx/etc/postfix/postfwd.wl-sender
Normal file
22
roles/common/files/b.mx/etc/postfix/postfwd.wl-sender
Normal file
@ -0,0 +1,22 @@
|
||||
# *** [ Ansible managed: DO NOT EDIT DIRECTLY ] ***
|
||||
|
||||
# ---
|
||||
# Trusted senders whitelisted by postfwd
|
||||
#
|
||||
# This file is called with '=~'. This means perl regexp is possible
|
||||
#
|
||||
#
|
||||
# To increase performance use ^ and/or $ in regular expressions
|
||||
#
|
||||
# Example:
|
||||
#
|
||||
# # all senders of maildomaindomain 'oopen.de'
|
||||
# @oopen\.de$
|
||||
#
|
||||
# # sender address ckubu@oopen.de
|
||||
# ^ckubu@oopen\.de$
|
||||
#
|
||||
# ---
|
||||
|
||||
# give trusted sender addresses here
|
||||
|
@ -2,6 +2,15 @@
|
||||
|
||||
# ---
|
||||
# SASL Users whitelisted by postfwd
|
||||
#
|
||||
# example:
|
||||
#
|
||||
# # give trusted sasl usernames here
|
||||
# ckubu@oopen.de
|
||||
# vertrieb@akweb.de
|
||||
#
|
||||
# ---
|
||||
|
||||
# give trusted sasl usernames here
|
||||
|
||||
kanzlei-kiel@b.mx.oopen.de
|
||||
|
51
roles/common/files/b.mx/root/.ssh/b.mx-id_rsa-dehydrated
Normal file
51
roles/common/files/b.mx/root/.ssh/b.mx-id_rsa-dehydrated
Normal file
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKQIBAAKCAgEDGyLighV4MmtQ0JXtK7FGKF91aoug6Z/0PLZyfvqV1XfQrs0s
|
||||
/8pHMpGmPImt11Ugiw6sZ9D7gDbNau2NIDIhQ4kv499XzyHX+UnUEqg0lyKkAUQ9
|
||||
XYrnWQACa/CM0ruKLNEI3Vg8utBHLing5bsisFHzVF4QYGZYxX+kQyeK7+Z1oDWF
|
||||
6bVfqkloifxG1y7DDj71XfBTTYtB9Gz1mU7ll/8NGWSbCRp5M8KCRGqtF9qh6NTa
|
||||
clbf5fxosLZoYaP4M6TxgQFBbfYQ62lCi14IHFyRHyB2Qx6oEkgNp/CzCE0j4NL2
|
||||
9ZYAxW4dZZg5miqIgaDFgRcznU/NeyyHBGeIpRzNubE2sH/tFF+cZl3nNwLyZ+g8
|
||||
16OBIwtRhscwLWesmse+UEfqteMkDqoStNX8b3ZdOcOlrhSVbbzbJ24rTuWHusRu
|
||||
5W5zJ3sKv0yvtCck6LrZ27GGrdq2BuLR2dwTQWEBLBRWzltDgQobDzmD0hsk+6Rf
|
||||
QTlFkUB7+LqJNbT6RJy70AFpbVv88khQIWeBUcJYIMIE2BMqP4LGqhqICZ+Qpidm
|
||||
zjFu5pvgnwo+R5avVCuD3zkrUZTExJVdUxGEDlFGUY0AVFB6/OfHtwKpzrW4OZvJ
|
||||
dGvzYiZfIANcqHN95tqP6utRWVs2+wz7AQMkbudIFCzG6L7QTNvRQ1RJy1ECAwEA
|
||||
AQKCAgEC95/CKWh9Zh2kHUG+TSmUzukzcVBnsAoB+SaMB8c58a//i5+0R8Jldmgz
|
||||
Gk6l57wJ1Q91odDDFOBGKss7MfDyWmTrfZVXfCjm/d+MXS6Y33JWoGcjAQS8tAgQ
|
||||
SDKNNp24CczB3UR48DgeaHnVw2OeZjhEcOtUVeQxFq00rntOfpX69c1sW7PM6xAq
|
||||
cPi0bMrdyfRX0SDRVJmfrvWRRJ9dNHKTfxjgDDhgZhSDAv2u08UpPRhsgSOBz2Pu
|
||||
WDRLUEynyB7iIc6jRXv4+g2bZy20LfQ5KDWJBeJ5ys1PTovjXiDkD9s7168wmWzz
|
||||
ZKWjEidkNgLz7LnPs5ATzILjkk+e9kxySEWrImcToLLufFh6TBkPk7xvNK2338e6
|
||||
RMAWu2JsTK/Ry7P5DhdcPi23NUSLAjeO1JlbnYXkOeBbqFcTJ2gE33P7+Ja3oE0m
|
||||
vZDh5KuvBuqCgly/aJvLiekFTzz3YBNBbWmeoXHiEHzobkA0XaAaZNHpZtIyS0t2
|
||||
wO34g4sQh/pDw2gS3AJ4zX2bbeBggcWJOSmJokvd22A4HZDKPUXIv+VTw3Uc0fKf
|
||||
ASIv+d4cQS5s9rzlKvIvEdBKWEsOvlDECYryHo7yDBprgzQDb2DnLpXNkyhjzLcC
|
||||
woiAo48qhv79fCfPa3/hxb8NWBPLnCAm67RfgU82Pigo/157eakCggEBAfG0WPYk
|
||||
8WW5xPPfTMNfTW0i06ZfVABKxkb2wZ+Y1NJlq57ulE1HXDFvRBB6I2vhL4xHYA3q
|
||||
2D1kXyWkHUW5Zc+dzQAdCkA1A4Z1oda25KsoRltihVSVl78WOrZgNCag118BGM7A
|
||||
4iRPUnOlvODc8334fMprWpYejZdCIFF6fC5E213w54fOTODurOxAIt+w9UwcF+JX
|
||||
LOEtXVpCnEvlpoSJAO1/jGNw+Y6Y1KrNdnh1tOHauVTzZNYVG4C/9f9FRKpr2NT9
|
||||
7AMl47lCqc2tmoLvVoYct8jkn5cEPdBrmpby1ggg7jyCgQKbfpmuIhj54SNl5dtd
|
||||
sGj/coVXPK5RDJsCggEBAZj8yTda4wBNRFJRXO0KU5oyBJW5CZuF7KMlJcm4+XkK
|
||||
hY2lxuWo0BA2pUDF91EQw0skHqV2tD2mX7flBgqqCAylvOTcXbu7FxKOrSavHZ+C
|
||||
+TqrVc9dH5Sxbf98lGdhiAAtwK6PuECGDXj9mMTt0882ZyrzduqewL6ifhojQKNr
|
||||
f2UpupMkv1ukaXZK4Al5+wJWXzOeR3aUunSmxM1NWyo/kLEgRrtvjsQvYaEPu2oS
|
||||
Z8JN7AstTX8txon0XNxwx6y/fgvr1MHgkCwTgc4kFq0DW+m4LnxZYEtmt+x8mtHY
|
||||
uDg335ss38IFC1FoZnACqenZDiiK5ZEUrjfMOJU6iIMCggEALTlI+BzFPowRxGMe
|
||||
84W+YFNQzgZNeLVSrPIRB/J4LCIG5SsimJ8KVoeYtLKUc2ID0whNRxZ2zaVILABs
|
||||
lIBTKvlYvlDlNI5coqQfr4Xw40iGlBkwqk3peviHHzlAo93rk/tiiK7oHYqDoHSH
|
||||
5BrPmTuyAyacFZXzIbJlg2HQ1Nd242NXdnSdcbbeSZ1OTesjbuYCmZN4RYG8wM3a
|
||||
q97TManNRsdXN1X1pypl8Js4z5tKc1dPjdOL7xP96sYGkUp3AdFI45mrD2Iq/hN7
|
||||
oG/M4WbkAs2rOXrksXE2OLD+XAb2wchUPXVSSa1dZJN5D7Hs7i19JGCv/epwOoOB
|
||||
xQkiTwKCAQA5oBRx2jp1xm1D8/bV50iUR0viFKpH4XzQF+HVJFzyMwtSQ/NcVIbM
|
||||
Ygays7H/GA+MPNCcm7cVoKWH8ZsCUabEsW2GCY6jbt73XGcFNlNEMF4RaCa1Cvfy
|
||||
KXXIM7NtRY62B7xIXDOn07t+Oq0VwjS/03iB0sAEms2pjpeZ8zGeVP0kMdb5+ImF
|
||||
zgqWAkLC0w8M60KKsVh8WsRSv1SnYKjhsQcgDd4pdrR07AAjg2XyshkwhW4mvQFY
|
||||
VAjPU0DqRnG741dNMrNNheiKbU0y0F7pjbmbmrniB23L8fMkPQJLYu/B7A1zfcUh
|
||||
PzizBbS5P4bVTiHykG98G5/YeMvYKuElAoIBAQCzkiVctc/db/QOPneoLYgReVgr
|
||||
ul6H9hUBPiawa/WbypWuBkRrnOI9/c3cX1UulPGSaej1SOO21Z9Ll8hTwHiDcNJu
|
||||
Ab5aG16LHBeBkC57Df1fg6jBndJ7sENxmnMpMC6E7gl1ZlhqpnJFiow1Adeck7W2
|
||||
bQ7+JDKJmz+SKqMoXk7wg6EFQ/w/6aviUtR5pH+g/ea+PfjxRq726aCi/zgMlkM0
|
||||
HZFB3KT1CEa8cIcv1DQ03WiyNiWqHGFKWPDzm8ghOTn9wiOkv6VJVBq3cCmvtcGh
|
||||
VrvzhmM/Vl0U4nGaG4D6MVUyjo2hrrlM81JUzIZWpLeCsRZ7zkksoy8FKlGp
|
||||
-----END RSA PRIVATE KEY-----
|
@ -0,0 +1 @@
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQMbIuKCFXgya1DQle0rsUYoX3Vqi6Dpn/Q8tnJ++pXVd9CuzSz/ykcykaY8ia3XVSCLDqxn0PuANs1q7Y0gMiFDiS/j31fPIdf5SdQSqDSXIqQBRD1diudZAAJr8IzSu4os0QjdWDy60EcuKeDluyKwUfNUXhBgZljFf6RDJ4rv5nWgNYXptV+qSWiJ/EbXLsMOPvVd8FNNi0H0bPWZTuWX/w0ZZJsJGnkzwoJEaq0X2qHo1NpyVt/l/Giwtmhho/gzpPGBAUFt9hDraUKLXggcXJEfIHZDHqgSSA2n8LMITSPg0vb1lgDFbh1lmDmaKoiBoMWBFzOdT817LIcEZ4ilHM25sTawf+0UX5xmXec3AvJn6DzXo4EjC1GGxzAtZ6yax75QR+q14yQOqhK01fxvdl05w6WuFJVtvNsnbitO5Ye6xG7lbnMnewq/TK+0JyToutnbsYat2rYG4tHZ3BNBYQEsFFbOW0OBChsPOYPSGyT7pF9BOUWRQHv4uok1tPpEnLvQAWltW/zySFAhZ4FRwlggwgTYEyo/gsaqGogJn5CmJ2bOMW7mm+CfCj5Hlq9UK4PfOStRlMTElV1TEYQOUUZRjQBUUHr858e3AqnOtbg5m8l0a/NiJl8gA1yoc33m2o/q61FZWzb7DPsBAyRu50gULMbovtBM29FDVEnLUQ== root@b.mx.oopen.de
|
51
roles/common/files/b.mx/root/.ssh/b.mx-id_rsa-opendkim
Normal file
51
roles/common/files/b.mx/root/.ssh/b.mx-id_rsa-opendkim
Normal file
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKgIBAAKCAgEAv9fq6H/lPwWsTvgseiBq3XtCCRKMYFhASb35fF91e0vZ0ZFu
|
||||
+fTf1gP+7ph0LNX91xqWDyiPQTshFfbUS7c0mcd67cMl1IOFFTPz0GSA8wgc/Pyb
|
||||
AojIQTlmKcQyj7yMkgz49bIkXfO/XbAlJVWl9tevO9ZPlkmX5nJuYrw1I6jkzwgC
|
||||
7cUbVe5CMVKRNFgOmeeaH3GkRFq0vB+FkyiBFuTCNsF8IYROGPesdqgLfwnP7FR6
|
||||
uBxMwcMqE9aALo/UyEZjgBA7cio6hCHKctNXg/g0acuhgpCnxH/QvHIpulaSoY9s
|
||||
mbFG30ziCuxJRrmfYbmK2YmXQ2TTU7AngylB47N99C1vdYCexPm7Ck2LZCC4zB80
|
||||
gXsuG4e4gqYFEMj19ByviblnWsZLHI/dJojJiTIUqvrSYg3tZHIUahdw6nD3Gjgv
|
||||
lKapUERXUw/OMBQV2A+f3Ix0OjsJECAscttpSXgKeYnEmavNgeQ5snINfjjxcjMk
|
||||
0wMog1F8Mj8+/ei8iif7DBpyAceIw4WQZiQfaq+O0IO8Idvi++mvNnUZ3KwMlaHP
|
||||
vwd4k3al9CDvfne1rXpZqOuKdoQTauHbaunNIEZMBbx2pmJBzM3+qRlvBti5nDZD
|
||||
dPCT19wbQNLujlxrdIwKcJSzZ1RBziFam3Guh1d7gQlxpg+BpEQYaTaCXrkCAwEA
|
||||
AQKCAgEAsmwGNiZ895g3IVr/QrZTrZmtWPK/S/vIDs1484t0oC9zbc1tAVwVsd4V
|
||||
g6KWqfx8EUrQtVhro6dyphLib2j8quk0E12kGXoYlBe1cuOGaoHpNAFbyYedd8wC
|
||||
kGXBAJ3DvzIBecEswZSpLmFcqtR1fpYqi+ROMOBRPiq/L2ULpxa1dzdkQe9H9Sua
|
||||
tHSuR5h+O/WDCiuPM2OJJE3M1YieRsSLPJHG+QUr/VycMd8okgZ2Mr5/RCxN1wfE
|
||||
Yp7kqGls5LdSYxC1uQA9XBZxS0nz4vE9DggtNlmDLuYRJLKozH0n8sqJnoeZ+qRu
|
||||
tun7XKPW7/S4honI/Q0Q3oy+suX0OE3GqvUr17jFQik4itqOKeXymT2JPeu6KEz/
|
||||
6aJ3G6bd67T0h9jqqRobPPKJcDoH3SZ5cuxRQswLHRZu8+S8q5zPgXnK2B9xjCGu
|
||||
yC5Q3pxEwO0BzcF8Fq751HvATAgAW9oKAB2TkUcEwfqgd/ADr52mnqJ94kidYfoV
|
||||
NrUGkQPR8dnKT7aPq1Pd4tbDuYMx5xmaW+uhWu831B4v0RwQhogPhOH9cbzcJvwI
|
||||
jxPtJHSUhmBhDZAHELF7wVpMztjTkVFAcDQcqFu5orjrzA+n7qh59lzERoTQyUHj
|
||||
9VTDkbOfx39VQLcKpos9HYd7/3B6nioUplHi6BFjOPvLRreiJ4ECggEBAN3SZNqD
|
||||
xkHIRqoUurDvO9ZYII1YFSDdx1DiR14Fv0hCxRJSpiVCLMOKbinNdxBkutKo1Ypj
|
||||
gQmLvDSz/fMAT4zosrEnG7ZaSsV8KI1ufiWI+AijG1GhOjz1A+b6yUeWvLwk9SYr
|
||||
eM31yFtkRvtI8EXzjzrYTGAoZfaqLfXolHvgSa6rN3txf5wtI6E+qpRgNiLmzRXM
|
||||
mRenb7Y4bUMXz7dYdWrTjOv4oHvRmdX1b95ePPIzylCMitstE4f3uLQRQFx9nYh4
|
||||
zsiFXw5ko5wUrv/nj1XFmweBO7R+e5NAN5itAm4W3dUyObN9fVX3RK4iS/DWvlSl
|
||||
AIZNiANk80+rZJ0CggEBAN1nC8NRgZjU+BWtjTAcUs+mmHv6E+VrF2a/9dpshubn
|
||||
uUJ5ZTgR87HCB3twEqS+5El8dcFTKZraG/PPDuLiLBrPv0koLtczyk/e6+QC+Kwb
|
||||
yeCauzwxr0Wcap3XE8C6PZhseupjANWvorBe70aJSQeP/vRIEhV6Tshte0n8xlHd
|
||||
8Q+WjXxc3hWuQMAJfbVDlJkD2ml6cYvfmn1M/X6cECU7AooaL2BJzZT9OykF2V54
|
||||
ScUrFhMpD2h4MBSlqlLjg49HqgG9JJxQnLX28E6ZJiaJAiFUNO3HlrveQrV6xOA7
|
||||
DktkgNrOtD1C4mYCgfR2ByqfLmase6btCTSe4v1H8c0CggEAd9kiFpIV/xrHW0Oh
|
||||
7tEDIncw90089Sn+c6weZSVzyQYSVikDjaPobaoQhVN23gueiQ0hewjyAgdWo58Q
|
||||
OUfUs0xSp7Z6mZbFSVggzPGDBKKxaHE/5GXZAnBbMGQVdjFyPbE2Ju5b8eO24fIX
|
||||
C9PHxfOnUmLlORr6pEAkXvXPq/JtvQrTCkYzbV1SH9+s6EfnWAodioalvIsBp5Fr
|
||||
L1HhL62Cmzo7rI8DnoKLvHdEfv+prC7hQ437xBnhsJfeWqPrg013XPHwv5SX3D3x
|
||||
y/W865Tf87a1YWOor4ebGt8aasonQvXl2zesx1ao7laP7AmpwDE2WqNf2jBvqW3U
|
||||
rBntXQKCAQEAhUiMd0ew6e2Db6Fr9oOGgsU61J+mrJy8mLmE6rocuBLVnyPvgEKm
|
||||
XuN8l53PS2gzi92mEfzbdgJJg4up3YHkpTtdX1AWaq0d5NlBTqFPTGTqMhFUGBec
|
||||
+R4BvQWGOaakgAcGM+Xn0bwLB3wPNXpeAXR5OlvMrytTFCt8Zf0K8qvWe9jZUf2i
|
||||
IJEnH7RW/fEyGq+MI6V3h4nTugzIKhkPSypsC/FZhfDIFyIfJEIGKm3lkxGuF1jH
|
||||
ks+Puk5E6+NVBsNQn/1addO9k3mWDur5YYdnReMofeCCaJSTuiavMIG8yDw3qgF3
|
||||
1c1W96wYya7n/4uWZm79fW8C9K+V3H4cHQKCAQEAmw8qh5uKtUB9SGF2IBGvs+rm
|
||||
VDc9AP5OvKw0HiG9EqUekwj7nPZlbQgA/q7Pw4xJH6A40V5g8VX9soxyhajfYYd5
|
||||
TRJnq0h6EDhFUyQ2h+Z37XH/ALq3pAMetHQq5w46we7ZOWqWsPkzRjvu9sQKoTzx
|
||||
qHEWHRBafmG9l7OKjsjoiqiF0bO0hUU9UbGnGIyFRnxwVESGvVKL+nN2jNUP0ugY
|
||||
dhT1ukmUB2csqo+1gROrTQ5KIAGXbvRnqO770mwy3n2E+A83zoCWcXRPK0Y2+/Qg
|
||||
jNG0QLs/wrIfJsf2Oyr23k/HE+l+9VxcAdgNdzjkr8Zcn1RldvgyfVYy8CqMSw==
|
||||
-----END RSA PRIVATE KEY-----
|
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@b.mx
|
Reference in New Issue
Block a user