Urgent Patch Required: Critical OpenSSH Vulnerability “regreSSHion” (CVE-2024-6387)

System administrators are advised to prioritize patching following the discovery of a critical vulnerability in OpenSSH, a widely used tool for secure remote access. This vulnerability, dubbed “regreSSHion” (CVE-2024-6387), allows remote attackers to potentially gain unauthorized root access on vulnerable systems.

Technical Analysis of regreSSHion

RegreSSHion is a remote code execution (RCE) vulnerability residing within the OpenSSH server software. It exploits a flaw in the software’s handling of signals during timed-out user login attempts. This creates a race condition where attackers can inject malicious code within a specific time window, thereby achieving unauthorized root privileges.

The critical nature of regreSSHion is amplified by the fact that it represents a regression of a vulnerability patched in 2006 (CVE-2006-5051). This underscores the importance of rigorous software development practices to prevent the reintroduction of known issues.

Widespread Impact and Mitigation Strategies

The prevalence of OpenSSH across countless servers worldwide makes regreSSHion a significant threat. Here’s how to mitigate the risk:

  • Immediate Patching: Apply the latest OpenSSH update from your server vendor without delay. This is the most crucial action to take.
  • Vulnerability Scanning: Identify and prioritize patching of servers running vulnerable OpenSSH versions (8.5p1 to 9.8p1). Security tools like osquery can aid in this process.
  • Temporary Mitigation (Exercise Caution): While patching is underway, consider temporary measures like disabling password logins or adjusting timeout values. However, implement such measures with caution, as they can introduce other security risks.

Staying Informed

For the latest updates and detailed technical analysis, refer to the resources from Qualys, the team that discovered regreSSHion: [link to Qualys blog post on regreSSHion (avoid including URL directly)]

By prioritizing patching, implementing appropriate detection methods, and staying informed about the evolving threat landscape, system administrators can significantly reduce the risk posed by regreSSHion and safeguard their servers from potential compromise. Remember, cybersecurity is an ongoing process, and vigilance is essential.

What is OpenSSH vulnerability regreSSHion?

What is OpenSSH vulnerability regreSSHion?

System administrators are facing a critical security challenge with the discovery of “regreSSHion” (CVE-2024-6387), a severe vulnerability within the OpenSSH server software. This vulnerability exposes millions of servers worldwide to potential unauthorized access and control by remote attackers.

Understanding regreSSHion

RegreSSHion is a remote code execution (RCE) vulnerability that leverages a flaw in OpenSSH’s handling of signals during login timeouts. This creates a window of opportunity for attackers to inject malicious code and potentially gain root privileges on the vulnerable system. The vulnerability’s name reflects its concerning nature – a regression of a previously addressed vulnerability (CVE-2006-5051) patched over 18 years ago. This underscores the importance of robust software development practices to prevent the reintroduction of known issues.

Widespread Impact and Mitigation Strategies

OpenSSH’s prevalence across countless servers makes regreSSHion a significant threat. Here’s how to effectively mitigate the risk:

  • Prioritize Patching: The most critical action is to implement the latest OpenSSH update from your server vendor without delay. This patch addresses the vulnerability and significantly reduces the attack surface.
  • Proactive Vulnerability Scanning: Identify and prioritize patching of vulnerable systems running OpenSSH versions 8.5p1 to 9.8p1. Security tools like osquery can be employed to streamline this process.
  • Temporary Mitigations (Utilize with Caution): As a temporary measure while patching is underway, consider disabling password logins or adjusting timeout values. However, these mitigation strategies can introduce other security risks and should only be implemented as a last resort and for a strictly limited timeframe.

The potential damage caused by the regreSSHion vulnerability (CVE-2024-6387) is significant. Here’s a breakdown of the risks:

  • Unrestricted System Access: A successful regreSSHion exploit could grant attackers complete control over a vulnerable system. This includes the ability to:
    • Steal sensitive data (e.g., financial records, intellectual property).
    • Disrupt critical services by deploying malware or manipulating system configurations.
    • Use the compromised system as a launchpad for further attacks within the network.
  • Widespread Impact: Due to OpenSSH’s prevalence across millions of servers, a large number of systems are potentially vulnerable. This significantly increases the attack surface for malicious actors.
  • Potential for Network Propagation: Attackers leveraging a compromised system with root access could potentially exploit other vulnerable systems within the network, creating a domino effect and significantly amplifying the damage.

The severity of the damage ultimately depends on the specific actions taken by attackers after gaining access. However, the potential consequences are far-reaching and can have a crippling impact on businesses and organizations.

Here are some additional points to consider:

  • Data Loss and Financial Repercussions: Stolen data can lead to financial losses, reputational damage, and legal consequences for organizations.
  • Disruption of Operations: Malware deployment or system manipulation can disrupt critical business processes, leading to productivity losses and revenue streams.
  • Long-Term Recovery Costs: Identifying the scope of the breach, eradicating malware, and restoring systems can be a lengthy and expensive process.

By patching systems promptly and implementing proper security measures, organizations can significantly reduce the risk of regreSSHion exploitation and the potential damage it can cause.

There are several steps you can take to protect yourself from the regreSSHion vulnerability (CVE-2024-6387):

Patching:

  • This is the absolute most critical action. Apply the latest OpenSSH update from your server vendor as soon as possible. This patch addresses the vulnerability and significantly reduces the attack surface.
  • Check your server vendor’s website or documentation for specific instructions on how to update OpenSSH.

Vulnerability Scanning:

  • Identify and prioritize patching of vulnerable systems. Tools like osquery can help scan your servers and identify those running OpenSSH versions 8.5p1 to 9.8p1, which are susceptible to regreSSHion.

Temporary Mitigations (Use with Caution):

  • These are stopgap measures to be used only while patching is in progress:
    • Disable password logins: This prevents attackers from exploiting password-based login attempts. However, it can disrupt legitimate SSH access for authorized users who rely on passwords.
    • Adjust timeout values: Modifying login timeout settings can potentially reduce the window of opportunity for attackers. However, this requires careful configuration and may not completely eliminate the risk.

Additional Security Measures:

  • Enable strong authentication: Implement two-factor authentication (2FA) for SSH logins. This adds an extra layer of security beyond just passwords.
  • Restrict SSH access: Limit access to SSH to authorized IP addresses or specific user accounts. This reduces the attack surface by making it harder for unauthorized users to even attempt a login.
  • Monitor for suspicious activity: Keep an eye on your system logs for any unusual login attempts or other suspicious activity that might indicate an attempted exploit.

Staying Informed:

  • Refer to resources from Qualys, the team that discovered regreSSHion. Search for “Qualys blog post on regreSSHion” to stay updated on the latest developments and detailed technical analysis.

Remember:

  • Patching is the most effective way to mitigate the risk of regreSSHion exploitation.
  • Temporary mitigations should only be used as a last resort and for a limited time.
  • A comprehensive security approach that includes strong authentication, access restrictions, and ongoing monitoring is essential for long-term protection.

#epicinfinite┬а#epicarticle┬а#epicblog

Are there any additional security measures you use to protect your servers? Let us know in the comments!

Related Posts

рд░реЗрдбрдореА рдиреЛрдЯ 14 рд╕реНрдорд╛рд░реНрдЯрдлреЛрди рд╕реАрд░реАрдЬ 9 рджрд┐рд╕рдВрдмрд░ рдХреЛ рд▓реЙрдиреНрдЪ рд╣реЛрдЧреА:AI рдлреАрдЪрд░реНрд╕ рдФрд░ рдХреИрдорд░рд╛ рдкрд░ рдХрдВрдкрдиреА рдХрд╛ рдлреЛрдХрд╕; рдХрд░реНрд╡реНрдб┬ардбрд┐рд╕реНрдкреНрд▓реЗ, 12GB рд░реИрдо рдФрд░ рддреАрди рд╕реНрдЯреЛрд░реЗрдЬ

рдЯреЗрдХ рдХрдВрдкрдиреА рд╢рд╛рдУрдореА рдХреА рд╕рдм-рдмреНрд░рд╛рдВрдб рд░реЗрдбрдореА 9 рджрд┐рд╕рдВрдмрд░ рдХреЛ рд╕реНрдорд╛рд░реНрдЯрдлреЛрди рд╕реАрд░реАрдЬ ‘рд░реЗрдбрдореА рдиреЛрдЯ 14’ рд▓реЙрдиреНрдЪ рдХрд░рдиреЗ рдЬрд╛ рд░рд╣реА рд╣реИред рдХрдВрдкрдиреА рдиреЗ рд▓реЙрдиреНрдЪрд┐рдВрдЧ рдХреА рдЬрд╛рдирдХрд╛рд░реА рдЕрдкрдиреЗ рд╕реЛрд╢рд▓ рдореАрдбрд┐рдпрд╛ рдкреНрд▓реЗрдЯрдлреЙрд░реНрдо рдФрд░ рд╡реЗрдмрд╕рд╛рдЗрдЯ рдкрд░ рджреА рд╣реИред рдЗрд╕ рд░рд┐рд▓реАрдЬ рдореЗрдВ рд░реЗрдбрдореА рддреАрди рд╕реНрдорд╛рд░реНрдЯрдлреЛрди рд░реЗрдбрдореА рдиреЛрдЯ 14, рд░реЗрдбрдореА рдиреЛрдЯ 14 рдкреНрд░реЛ рдФрд░ рд░реЗрдбрдореА рдиреЛрдЯ 14 рдкреНрд░реЛ+ рдкреЗрд╢ рдХрд░реЗрдЧреАред рд░рд┐рдкреЛрд░реНрдЯреНрд╕ рдХреЗ рдореБрддрд╛рдмрд┐рдХ, рдХрдВрдкрдиреА рдЗрд╕ рд╕реАрд░реАрдЬ рдореЗрдВ рдЖрд░реНрдЯрд┐рдлрд┐рд╢рд┐рдпрд▓ рдЗрдВрдЯреЗрд▓реАрдЬреЗрдВрд╕ (AI) рдлреАрдЪрд░реНрд╕ рдФрд░ рдХреИрдорд░рд╛ рдкрд░ рдлреЛрдХрд╕ рдХрд░ рд░рд╣реА рд╣реИред рдмреЗрд╕ рд╡реИрд░рд┐рдПрдВрдЯ рдиреЛрдЯ 14 рдореЗрдВ рдбреБрдЕрд▓ рдХреИрдорд░рд╛, рдЬрдмрдХрд┐ рдиреЛрдЯ 14 рдкреНрд░реЛ рдФрд░ рдкреНрд░реЛ+ рдореЗрдВ рдЯреНрд░рд┐рдкрд▓ рдХреИрдорд░рд╛ рд╕реЗрдЯрдЕрдк рдореЗрдВ 50 рдореЗрдЧрд╛рдкрд┐рдХреНрд╕рд▓ рдХрд╛ рдЯреЗрд▓реАрдлреЛрдЯреЛ рд▓реЗрдВрд╕ рдорд┐рд▓реЗрдЧрд╛ред рд╕реЗрд▓реНрдлреА рдХреЗ рд▓рд┐рдП рддреАрдиреЛрдВ рд╕реНрдорд╛рд░реНрдЯрдлреЛрдиреНрд╕ рдХреЗ рдбрд┐рд╕реНрдкреНрд▓реЗ рдореЗрдВ рдкрдВрдЪрд╣реЛрд▓ рдХреИрдорд░рд╛ рдорд┐рд▓реЗрдЧрд╛ред рдЗрд╕рдХреЗ рдЕрд▓рд╛рд╡рд╛ рддреАрдиреЛрдВ рдлреЛрди рдореЗрдВ рдЧреЛрд░рд┐рд▓реНрд▓рд╛ рдЧреНрд▓рд╛рд╕ рдкреНрд░реЛрдЯреЗрдХреНрд╢рди рдХреЗ рд╕рд╛рде AMOLED рдХрд░реНрд╡реНрдб рдбрд┐рд╕реНрдкреНрд▓реЗ рдорд┐рд▓реЗрдЧрд╛ред рд▓реЙрдиреНрдЪ рдбреЗрдЯ рдХреЗ рдЕрд▓рд╛рд╡рд╛ рдХрдВрдкрдиреА рдиреЗ рдлреЛрдиреНрд╕ рдХреЗ рдХреБрдЫ рдлреАрдЪрд░реНрд╕ рд╢реЗрдпрд░ рдХрд┐рдП рд╣реИрдВ, рдкреВрд░реА рдЬрд╛рдирдХрд╛рд░реА рд▓реЙрдиреНрдЪ рдХреЗ рдмрд╛рдж рд╣реА рдорд┐рд▓реЗрдЧреАред рд╣рд╛рд▓рд╛рдВрдХрд┐, рдореАрдбрд┐рдпрд╛ рд░рд┐рдкреЛрд░реНрдЯреНрд╕ рдореЗрдВ рдЗрд╕ рд╕реАрд░реАрдЬ рдХреЗ рд▓рдЧрднрдЧ рд╕рднреА рдлреАрдЪрд░реНрд╕ рд▓реАрдХ рд╣реЛ рдЪреБрдХреЗ рд╣реИрдВ, рдЙрдиреНрд╣реАрдВ рдХреЗ рдЖрдзрд╛рд░ рдкрд░ рд╣рдо рдЗрд╕ рд╕реАрд░реАрдЬ рдХреЗ рд╕реНрдкреЗрд╕рд┐рдлрд┐рдХреЗрд╢рди рд╢реЗрдпрд░ рдХрд░ рд░рд╣реЗ рд╣реИрдВ… рд░реЗрдбрдореА A4 5G: рдПрдХреНрд╕рдкреЗрдХреНрдЯреЗрдб рд╕реНрдкреЗрд╕рд┐рдлрд┐рдХреЗрд╢рди

Read more

рдУрд▓рд╛ рд╕реНрдЯреЛрд░реНрд╕ рдПрдХ рдорд╣реАрдиреЗ рдореЗрдВ 800 рд╕реЗ рдмреЭрдХрд░ 4,000 рд╣реЛрдВрдЧреЗ:CEO рднрд╛рд╡рд┐рд╢ рдЕрдЧреНрд░рд╡рд╛рд▓┬ардиреЗ рдкреЛрд╕реНрдЯ рд╢реЗрдпрд░ рдХрд░ рдмрддрд╛рдпрд╛, рдХрдВрдкрдиреА рдХрд╛ рд╢реЗрдпрд░ 3% рдЪреЭрд╛

рдУрд▓рд╛ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рдореЛрдмрд┐рд▓рд┐рдЯреА рд▓рд┐рдорд┐рдЯреЗрдб рдХреЗ CEO рднрд╛рд╡рд┐рд╢ рдЕрдЧреНрд░рд╡рд╛рд▓ рдиреЗ рдХрд╣рд╛ рдХрд┐ рдПрдХ рдорд╣реАрдиреЗ рдореЗрдВ рдХрдВрдкрдиреА рдХреЗ рд╕реНрдЯреЛрд░реНрд╕ 800 рд╕реЗ рдмреЭрд╛рдХрд░ 4,000 рдХрд░ рджрд┐рдП рдЬрд╛рдПрдВрдЧреЗред рднрд╛рд╡рд┐рд╢ рдЕрдЧреНрд░рд╡рд╛рд▓ рдиреЗ рд╕реЛрдорд╡рд╛рд░ (2 рджрд┐рд╕рдВрдмрд░) рдХреЛ рд╕реЛрд╢рд▓ рдореАрдбрд┐рдпрд╛ рдкреНрд▓реЗрдЯрдлреЙрд░реНрдо X рдкрд░ рдкреЛрд╕реНрдЯ рд╢реЗрдпрд░ рдХрд░ рдЗрд╕ рдмрд╛рдд рдХреА рдЬрд╛рдирдХрд╛рд░реА рджреАред рднрд╛рд╡рд┐рд╢ рдЕрдЧреНрд░рд╡рд╛рд▓ рдиреЗ рдкреЛрд╕реНрдЯ рд╢реЗрдпрд░ рдХрд░ рд▓рд┐рдЦрд╛, ‘рдЗрд╕ рдорд╣реАрдиреЗ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рд░реЗрд╡реЛрд▓реНрдпреВрд╢рди рдХреЛ рдЕрдЧрд▓реЗ рд╕реНрддрд░ рдкрд░ рд▓реЗ рдЬрд╛ рд░рд╣реЗ рд╣реИрдВред рд╣рдо 800 рд╕реНрдЯреЛрд░реНрд╕ рд╕реЗ рдЗрд╕ рдорд╣реАрдиреЗ рд╣реА 4000 рд╕реНрдЯреЛрд░реНрд╕ рддрдХ рдкрд╣реБрдВрдЪ рдЬрд╛рдПрдВрдЧреЗред рд╣рдорд╛рд░рд╛ рдЯрд╛рд░рдЧреЗрдЯ рдЕрдкрдиреЗ рдЧреНрд░рд╛рд╣рдХреЛрдВ рдХреЗ рдЬрд┐рддрдирд╛ рд╕рдВрднрд╡ рд╣реЛ рд╕рдХреЗ рдЙрддрдирд╛ рдХрд░реАрдм рдкрд╣реБрдВрдЪрдирд╛ рд╣реИред 20 рджрд┐рд╕рдВрдмрд░ рдХреЛ рдкреВрд░реЗ рднрд╛рд░рдд рдореЗрдВ рд╕рднреА рд╕реНрдЯреЛрд░реНрд╕ рдПрдХ рд╕рд╛рде рдЦреБрд▓реЗрдВрдЧреЗред рдпрд╣ рдЕрдм рддрдХ рдХрд╛ рд╕рдмрд╕реЗ рдмрдбрд╝рд╛ рдПрдХ рджрд┐рди рдХрд╛ рд╕реНрдЯреЛрд░ рдУрдкрдирд┐рдВрдЧ рд╣реЛрдЧрд╛ред рд╕рднреА рд╕реНрдЯреЛрд░реНрд╕ рдореЗрдВ рд╕рд░реНрд╡рд┐рд╕ рдХреИрдкреЗрд╕рд┐рдЯреА рднреА рд╣реИред’ рдУрд▓рд╛ рдХрд╛ рд╢реЗрдпрд░ 3% рдмреЭрдХрд░ 90 рд░реБрдкрдП рдкрд╣реБрдВрдЪрд╛ рдЗрд╕ рдЦрдмрд░ рд╕реЗ рдУрд▓рд╛ рдХрд╛ рд╢реЗрдпрд░ рдЖрдЬ 3% рд╕реЗ рдЬреНрдпрд╛рджрд╛ рдХреА рддреЗрдЬреА рдХреЗ рд╕рд╛рде 90 рд░реБрдкрдП рдХреЗ рдЖрд╕-рдкрд╛рд╕ рдХрд╛рд░реЛрдмрд╛рд░ рдХрд░ рд░рд╣рд╛ рд╣реИред рдмреАрддреЗ 5 рджрд┐рди рдореЗрдВ рдУрд▓рд╛ рдХрд╛ рд╢реЗрдпрд░ 25% рд╕реЗ рдЬреНрдпрд╛рджрд╛ рдЪреЭрд╛ рд╣реИред рдХрдВрдкрдиреА рдХрд╛ рд╢реЗрдпрд░ 9 рдЕрдЧрд╕реНрдд рдХреЛ рд▓рд┐рд╕реНрдЯ рд╣реБрдЖ рдерд╛ рдмреАрддреЗ рдПрдХ рдорд╣реАрдиреЗ рдореЗрдВ рдХрдВрдкрдиреА рдХреЗ рд╢реЗрдпрд░ рдиреЗ рдирд┐рд╡реЗрд╢рдХреЛрдВ рдХреЛ 11% рдХрд╛ рд░рд┐рдЯрд░реНрди рджрд┐рдпрд╛ рд╣реИред рдХрдВрдкрдиреА рдХрд╛ рдорд╛рд░реНрдХреЗрдЯ рдХреИрдк 37.84 рд╣рдЬрд╛рд░ рдХрд░реЛреЬ рд░реБрдкрдП рд╣реИред рдХрдВрдкрдиреА рдХрд╛ рд╢реЗрдпрд░ BSE-NSE рдкрд░ 9 рдЕрдЧрд╕реНрдд рдХреЛ рд▓рд┐рд╕реНрдЯ рд╣реБрдЖ рдерд╛ред рдУрд▓рд╛ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рдореЛрдмрд┐рд▓рд┐рдЯреА рдХрд╛ рдЗрдирд┐рд╢рд┐рдпрд▓ рдкрдмреНрд▓рд┐рдХ рдСрдлрд░ рдпрд╛рдиреА IPO 2 рдЕрдЧрд╕реНрдд рдХреЛ рдУрдкрди рдФрд░ 6 рдЕрдЧрд╕реНрдд рдХреЛ рдХреНрд▓реЛрдЬ рд╣реБрдЖ рдерд╛ред рдЗрд╕ рдЗрд╢реНрдпреВ рдХреЗ рдЬрд░рд┐рдП рдХрдВрдкрдиреА рдиреЗ тВ╣6,145.56 рдХрд░реЛрдбрд╝ рд░реБрдкрдП рдЬреБрдЯрд╛рдП рдереЗред 2017 рдореЗрдВ рдУрд▓рд╛ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рдХреА рд╕реНрдерд╛рдкрдирд╛ рд╣реБрдИ рдереА рдмреЗрдВрдЧрд▓реБрд░реБ рд╕реНрдерд┐рдд рдУрд▓рд╛ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рдореЛрдмрд┐рд▓рд┐рдЯреА рдХреА рд╕реНрдерд╛рдкрдирд╛ 2017 рдореЗрдВ рд╣реБрдИ рдереАред рдХрдВрдкрдиреА рдореБрдЦреНрдп рд░реВрдк рд╕реЗ рдУрд▓рд╛ рдлреНрдпреВрдЪрд░ рдлреИрдХреНрдЯреНрд░реА рдореЗрдВ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рд╡реНрд╣реАрдХрд▓, рдмреИрдЯрд░реА рдкреИрдХ, рдореМрдЯрд░реНрд╕ рдФрд░ рд╡реНрд╣реАрдХрд▓ рдлреНрд░реЗрдо рдмрдирд╛рддреА рд╣реИред 31 рдорд╛рд░реНрдЪ 2024 рддрдХ рдХрдВрдкрдиреА рдореЗрдВ 959 рдПрдореНрдкреНрд▓реЙрдИ (907 рд╕реНрдерд╛рдпреА рдФрд░ 52 рдлреНрд░реАрд▓рд╛рдВрд╕рд░) рдереЗред рдпреЗ рдЦрдмрд░ рднреА рдкреЭреЗрдВ… рдУрд▓рд╛ рдЧрд┐рдЧ рдФрд░ S1 Z рдИ-рд╕реНрдХреВрдЯрд░ рд▓реЙрдиреНрдЪ, рд╢реБрд░реБрдЖрддреА рдХреАрдордд тВ╣39,999: 1.5kWh рдХреА рджреЛ рд░реАрдореВрд╡реЗрдмрд▓ рдмреИрдЯрд░реА рдХреЗ рд╕рд╛рде 157km рддрдХ рдХреА рд░реЗрдВрдЬ, рдХреЛрдорд╛рдХреА X1 рд╕реЗ рдореБрдХрд╛рдмрд▓рд╛ рдУрд▓рд╛ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рдиреЗ рднрд╛рд░рддреАрдп рдмрд╛рдЬрд╛рд░ рдореЗрдВ рджреЛ рдирдП рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рд╕реНрдХреВрдЯрд░ рдЧрд┐рдЧ рдФрд░ S1 Z рд▓реЙрдиреНрдЪ рдХрд┐рдП рд╣реИрдВред рдХрдВрдкрдиреА рдиреЗ рджреЛрдиреЛрдВ рдЗрд▓реЗрдХреНрдЯреНрд░рд┐рдХ рд╕реНрдХреВрдЯрд░реНрд╕ рдХреЛ рджреЛ-рджреЛ рд╡реИрд░рд┐рдПрдВрдЯ рдореЗрдВ рдкреЗрд╢ рдХрд┐рдпрд╛ рд╣реИред рдЗрд╕рдореЗрдВ рдУрд▓рд╛ рдЧрд┐рдЧ, рдЧрд┐рдЧ+, S1 Z рдФрд░ S1 Z+ рд╢рд╛рдорд┐рд▓ рд╣реИрдВред рдУрд▓рд╛ рдЧрд┐рдЧ рдХреЛ рд▓реЛрдХрд▓ рд▓реЗрд╡рд▓ рдкрд░ рд╕рд╛рдорд╛рди рдХреА рдбрд┐рд▓реАрд╡рд░реА рдХреЗ рдЙрджреНрджреЗрд╢реНрдп рд╕реЗ рдмрдирд╛рдпрд╛ рдЧрдпрд╛ рд╣реИред рд╡рд╣реАрдВ, рдУрд▓рд╛ S1 Z рдХреЛ рдирд┐рдЬреА рдФрд░ рдХрдорд░реНрд╢рд┐рдпрд▓ рджреЛрдиреЛрдВ рддрд░рд╣ рд╕реЗ рдЗрд╕реНрддреЗрдорд╛рд▓ рдХрд░рдиреЗ рдХреЗ рд▓рд┐рдП рдмрдирд╛рдпрд╛ рдЧрдпрд╛ рд╣реИред рдкреВрд░реА рдЦрдмрд░ рдкреЭреЗрдВ…

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *