<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Inbound Inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280229#M75823</link>
    <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Kindly help with below query.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;We approx host 100 websites of our partners. All websites are on SSL (https).&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I want to configure SSL Inbound Inspection. As per my understanding, I need to import SSL certificate of 100 websites for SSL inbound inpection. However this is not feasible.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Is there any other simple way to implement the same.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik M&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Wed, 31 Jul 2019 08:20:47 GMT</pubDate>
    <dc:creator>MohammedAsik</dc:creator>
    <dc:date>2019-07-31T08:20:47Z</dc:date>
    <item>
      <title>SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280229#M75823</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Kindly help with below query.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;We approx host 100 websites of our partners. All websites are on SSL (https).&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I want to configure SSL Inbound Inspection. As per my understanding, I need to import SSL certificate of 100 websites for SSL inbound inpection. However this is not feasible.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Is there any other simple way to implement the same.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik M&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 31 Jul 2019 08:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280229#M75823</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2019-07-31T08:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280240#M75824</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106720"&gt;@MohammedAsik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No, this is required: With SSL inbound inspection, the firewall is impersonating the server by handling the ssl handshake. It needs to have the real certificate for the client to trust this connection and not throw an error&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 08:30:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280240#M75824</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-31T08:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280258#M75830</link>
      <description>&lt;P&gt;Hi Reaper&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;I host more than 100+ websites.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Do I need to upload certificate of all websites?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Will it impact performance of Palo?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik M&lt;/DIV&gt;</description>
      <pubDate>Wed, 31 Jul 2019 10:38:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280258#M75830</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2019-07-31T10:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280288#M75832</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106720"&gt;@MohammedAsik&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi Reaper&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;I host more than 100+ websites.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Do I need to upload certificate of all websites?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Will it impact performance of Palo?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik M&lt;/DIV&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you want to ensure that all SSL inbound traffic is being inspected, then yes, you would want to consider having all certs on the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is always some impact with decryption, usually 10% hit in CPU utilization.&amp;nbsp; Depending on the size of the FW (better performance with larger sized models of FWs) you may be able to mitigate any CPU degradation or latency.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What size FW are you working with (thinking PA5000 series FW, so please advise)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have see companies invest in an appliance called an HSM (Hardware Security Module), that offloads all of the decryption functionality onto this appliance, so that it does the heavy math/CPU processing to decrypt/re-encrypt traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 13:41:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280288#M75832</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-07-31T13:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280290#M75834</link>
      <description>&lt;P&gt;The performance impact lies in the total volume of decrypted sessions, not the amount of certificates. Your platform will need to be scaled to acommodate this volume and taking into account decryption.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if nearly all of your sessions are encrypted, it maybe be wise to consider one of the newer platforms (5200 series) with far superior decryption capabilities&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the HSM serves as a vault, keeping all the private keys extra private (kinda like a password manager for firewalls)&lt;/P&gt;
&lt;P&gt;it handles all ssl handshakes, but it does not take the brunt of the decryption processing, so performance gain is near negligable&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 13:51:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280290#M75834</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-07-31T13:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280443#M75844</link>
      <description>&lt;P&gt;Hi SteveCantwell&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for your valuable infirmation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What size FW are you working with (thinking PA5000 series FW, so please advise)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My Answer : We are using PA 3020 firewall model. Please let us know is this model having better performance for decryption? Please advise.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Mohammed Asik&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 05:27:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280443#M75844</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2019-08-01T05:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280572#M75863</link>
      <description>&lt;P&gt;I'm not sure of the SSL decryption inbound performance specs of the 3020, but if you're hosting over 100 sites behind it, I'm not sure it's going to have the HW capabilities you need.&amp;nbsp; Another thing to consider is your encryption ciphers you're using and making sure the PAN-OS version you're running will support the decryption&amp;nbsp;of that cipher.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also take a look at this thread which is similar to this topic:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Is-the-PA-3020-adequate-for-SSL-Decryption-and-other-features/m-p/254224" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/General-Topics/Is-the-PA-3020-adequate-for-SSL-Decryption-and-other-features/m-p/254224&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS 7.1 - Ciphers&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-7-1/cipher-suites-supported-in-pan-os-7-1-decryption.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-7-1/cipher-suites-supported-in-pan-os-7-1-decryption.html#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS 8.1 - Ciphers&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-8-1/cipher-suites-supported-in-pan-os-8-1-decryption.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-8-1/cipher-suites-supported-in-pan-os-8-1-decryption.html#&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 17:33:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280572#M75863</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-01T17:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280632#M75866</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106720"&gt;@MohammedAsik&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Nobody can answer what size firewall you should invest in if this is something you are looking to do, because we don't have any of the required information. What size firewall you will need to size out depends on a lot of different factors that you will need to determine before purchase; this all depends on bandwidth requirements, session count, session per second average, the number of virtual systems you utilize, and the feature set you are looking to enable.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As others have stated I would doubt you would want to enable inbound inspection on a PA-3020 if those sites see moderate traffic levels; but with that being said they could all be low traffic sites where this would all work perfectly fine. We simply don't know from the information present.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side note, is this something that you have communicated to your partners and actually have their sign-off on? Before having that conversation with everyone I wouldn't even worry about sizing anything. Depending on what sort of websites these actually are you have additional considerations in actually breaking this encryption.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 20:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280632#M75866</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-08-01T20:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280945#M75892</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;As previously stated, there will be a performance impact, no we cannot judge how big it will be. The newer models have their own chipsets that deal with SSL decryption so the load is less, e.g. 32XX and 52XX.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start small, do one at a time and watch the perfomance of the PAN to see where it is. If it peaks out, you'll need to upgrade, if it doesnt keep going until all sites are done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 20:53:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/280945#M75892</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-08-02T20:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281149#M75921</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all to share the valuable infornation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will check and let you know the status.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again thanks very much for all&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Mohammed Asik&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 14:41:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281149#M75921</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2019-08-05T14:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281253#M75938</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Just to share additional details -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;We have nginx web server who acts as a proxy and directs traffic to the server where we have hosted Joomla (CMS).&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Every website of Joomla (i.e partner website) is SSL with Lets Encrypt. To be precise we have 350+ websites. We recently received attack on these websites which was not detected by Palo Alto, probably due to absence of SSL inbound Inspection.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;I configure my Nginx server in DMZ and Application server (Joomla) in LAN.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Nginx server will decrypt the ssl traffic and transfer through PA firewall to LAN&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;My question is,&amp;nbsp;Will Firewall can now detect Vulnerabilities?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Mohammed Asik&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 06 Aug 2019 09:12:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281253#M75938</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2019-08-06T09:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inbound Inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281568#M75974</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/106720"&gt;@MohammedAsik&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...&lt;/P&gt;&lt;DIV&gt;Every website of Joomla (i.e partner website) is SSL with Lets Encrypt. To be precise we have 350+ websites. We recently received attack on these websites which was not detected by Palo Alto, probably due to absence of SSL inbound Inspection.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;I configure my Nginx server in DMZ and Application server (Joomla) in LAN.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Nginx server will decrypt the ssl traffic and transfer through PA firewall to LAN&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;My question is,&amp;nbsp;Will Firewall can now detect Vulnerabilities?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Mohammed Asik&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'm not familiar with&amp;nbsp;&lt;SPAN&gt;Nginx, but if it's decrypting and NOT re-encrypting the traffic before it sends it on you will be fine.&amp;nbsp; If the Palo is getting decrypted traffic the firewall will then be able to apply threat signatures to traffic and take action based on policy you've confgiured.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:23:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-inbound-inspection/m-p/281568#M75974</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-07T16:23:20Z</dc:date>
    </item>
  </channel>
</rss>

