<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN certificates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/115973#M16346</link>
    <description>&lt;P&gt;After a bit of testing these are the results that helped me understand what was happening a lot better.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Our issue Ikev1 was used.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Ikev1 has 6 packets for the phase1.&lt;BR /&gt;packet 3 and packet 4 are certificate requests.&lt;BR /&gt;5 and 6 are the certificates responses.&lt;/P&gt;&lt;P&gt;Packet 3 initiator request -&amp;gt; packet 6 peer response&lt;BR /&gt;Packet 4 peer request -&amp;gt; packet 5 initiator response&lt;/P&gt;&lt;P&gt;Packet 5 and 6 should have the cert and all subordinate certs listed.&lt;BR /&gt;If all subordinates are not installed or are not in the correct section (Trusted CA and Subordinate CA) one gateway most likely will fail the auth&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Specifying which cert you want the other gateway to send&lt;/STRONG&gt;&lt;BR /&gt;When you set matching criteria in an interop device you choose the Root CA for the certificate that you wish the other end to send&lt;BR /&gt;Whoever initiates the VPN will use packet 3 for cert request and this will contain the Root CA from the Matching criteria&lt;BR /&gt;The responding peer gateway will reply with packet 4 cert request containing the root CA specified in their matching criteria.&lt;BR /&gt;If it is a 3rd party device, then they will need to have a way to change their certificate request. Setting an IKE-ID is not enough as that is just a check when the cert arrives at the gateway. (only having one cert installed will work. Until you add a second then CP may use that and the VPN will fail)&lt;/P&gt;&lt;P&gt;Packet 5 will be the initiators certificate sent to the peer that if correct will be from the chain of the root CA in cert request packet 4&lt;/P&gt;&lt;P&gt;If the Peer gateway accepts the cert it will respond with Packet 6 with the certificate from the chain of the root CA in request packet 3.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;If there is no Matching Criteria set.&lt;/STRONG&gt;&lt;BR /&gt;Any Interop device not configured with a Matching Criteria i.e. ANY, That gateway will send a list of all Root CA's installed in Trusted CA's in its cert request.&lt;BR /&gt;The peer will choose one of its certificates that match one of the chains containing one of those root certs.&lt;BR /&gt;If more than one.. I cannot work out how it chooses without a lot more tests. It would be necessary for the peer to trust all the certs that potentially will be sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No Trusted CA to match the certificate received.&lt;/STRONG&gt;&lt;BR /&gt;If a gateway cannot match one of the Root CA’s on the cert recvied, it will send one of its installed certs. If it only has the internal cert it will send that.&lt;BR /&gt;I cannot work out how it chooses without a lot more tests.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If the peer responds to a cert request but has a subordinate installed in the Trusted CA section.&lt;/STRONG&gt;&lt;BR /&gt;The initiator will fail the auth with an error found in normal logs:&lt;BR /&gt;Main Mode Expected to get certificate whose root CA is Example_rootCA, got certificate whose root CA is Example_sub_CA_installed_in_trusted_CA&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;If initiator installs a subordinate in the Trusted section of Check Point&lt;/STRONG&gt;&lt;BR /&gt;The peer will fail the auth and not send packet 6&lt;BR /&gt;Unless it also has the subordinate in the trusted section. This can cause issue down the track when other certificates are used so recommended not to save headaches later.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;If the peer sends the wrong CA in its cert request&lt;/STRONG&gt;&lt;BR /&gt;The peer may have an insufficient way to specify a cert request and it uses a default CA it has install etc.&lt;BR /&gt;Your gateway would just choose one of the certs installed, if none installed it will send the ICA cert.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Apr 2021 22:52:12 GMT</pubDate>
    <dc:creator>spottex</dc:creator>
    <dc:date>2021-04-13T22:52:12Z</dc:date>
    <item>
      <title>VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;&lt;P&gt;Does anyone know how to control which certificate gets sent in a certificate-based site-to-site VPN?&lt;BR /&gt;There's a nice repository of certificates available on the gateway, but it always seems to send the ICA signed certificate. We only want to use the ICA certificate for CP&amp;lt;-&amp;gt;CP VPN's that are managed by the same management. We also have some third-party DAIP gateways we want to use another PKI infrastructure for (that already has CRL publicly available, unlike the CP ICA).&lt;/P&gt;&lt;P&gt;Any ideas how to accomplish this? Browsing the documentation and SK's for half a day didn't seem to reveal a solution.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Nik&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 06:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70001#M12002</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T06:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</link>
      <description>&lt;P&gt;This can be configured in the gateway object &amp;gt; IPsec Site-to-Site VPN. There you can choose which certificate from the cert repository it has to use.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/HowTo-Set-Up-Certificate-Based-VPNs-with-Check-Point-Appliances/td-p/38371" target="_self"&gt;&lt;SPAN&gt;HowTo Set Up Certificate Based VPNs with Check Point Appliances&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 07:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70014#M12003</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T07:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</link>
      <description>I still don't quite understand how. I found that post yesterday and I know you can configure what CA the certificate of the other side has to belong to (with the Matching Critera on the Interoperable Device) but I don't understand how to control the certificate that is sent from Check Point to the third party DAIP gateway. The post shows how to do it with an Externally Managed CP gateway, but the GW we're dealing with on the other end is not Check Point.</description>
      <pubDate>Wed, 11 Dec 2019 07:47:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70018#M12004</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T07:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30501" target="_self"&gt;&lt;SPAN&gt;Setting up the ICA Management Tool&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102837" target="_self"&gt;&lt;SPAN&gt;Best Practices - ICA Management Tool configuration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101049" target="_self"&gt;&lt;SPAN&gt;Expired certificates cannot be deleted from the Management Database&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Basically you can just run &lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool on&amp;nbsp; -no_ssl"&lt;/EM&gt; in expert mode of your SmartCenter, connect to the ICA Management Tool via http://SmartCenter-IP:18265/ and configure your certificates and turn off the Management Tool via&amp;nbsp;&lt;EM&gt;"cpca_client&amp;nbsp;&amp;nbsp;set_mgmt_tool off"&lt;/EM&gt; afterwards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 08:08:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70028#M12005</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-12-11T08:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</link>
      <description>I don't see how the ICA Management Tool is going to help me. It's for downloading or revoking the ICA issued certificates.&lt;BR /&gt;&lt;BR /&gt;I have 2 certificates available in the IPSEC VPN pane of the Check Point gateway:&lt;BR /&gt;1. the default Check Point ICA issued certificate&lt;BR /&gt;2. a certificate signed by our internal PKI infrastructure CA&lt;BR /&gt;&lt;BR /&gt;What I need to know if how to configure Check Point to send the non-ICA certificate (2) to a third party VPN peer instead of the internal ICA one (1).</description>
      <pubDate>Wed, 11 Dec 2019 09:31:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70060#M12006</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-11T09:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</link>
      <description>For these third party DAIP gateways, are they part of the same VPN community or a different one?</description>
      <pubDate>Wed, 11 Dec 2019 16:58:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70147#M12007</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-11T16:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</link>
      <description>&lt;P&gt;On Management Server using object Explorer you can create under Servers - Trusted CA an object that defines a external CA, you will need the Root CA Certificate ... Once done you can use Digital Certificates issued by that external CA for the VPNs that you need.&lt;/P&gt;&lt;P&gt;Simply add the Certificate under Gateway - IPSec VPN properties page !!&lt;/P&gt;&lt;P&gt;I did myself a couple of times using Comodo issued Certificates !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warm regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 19:18:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70164#M12008</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-11T19:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</link>
      <description>They are part of the same community since they are trusted locations. They just don't have Check Point gateways at those locations (yet).</description>
      <pubDate>Thu, 12 Dec 2019 07:47:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70227#M12014</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</link>
      <description>As mentioned, I have the trusted CA certificate available under IPSec VPN tab along with the ICA certificate, it just doesn't send it to peers, it only sends the ICA certificate.</description>
      <pubDate>Thu, 12 Dec 2019 07:49:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70228#M12009</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-12T07:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</link>
      <description>&lt;P&gt;Nik ...&lt;/P&gt;&lt;P&gt;I did it to stablish a Certificate authentication based Site to Site VPN with a Cisco appliance.&lt;/P&gt;&lt;P&gt;Did you delete the ICA Certificate on the IPSec VPN properties ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 11:13:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70260#M12015</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T11:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</link>
      <description>&lt;P&gt;Uff ... forget my previous post ... you have CheckPoint and no-Checkpoint on the same community ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 15:55:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70315#M12016</guid>
      <dc:creator>Malopro</dc:creator>
      <dc:date>2019-12-12T15:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</link>
      <description>&lt;P&gt;why not using preshared key, if your remote GWs are a third party?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 08:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70371#M12010</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-13T08:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</link>
      <description>Because they're DAIP. Check Point doesn't allow PSK for DAIP peers.</description>
      <pubDate>Fri, 13 Dec 2019 10:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70380#M12011</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T10:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</link>
      <description>&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38926"&gt;@Malopro&lt;/a&gt;: indeed, I want to use the ICA certificate for the CP-CP centrally managed VPN's. Besides, what's the point of having a certificate repository if you can only actually use one certificate... Deleting the other certificate should not be the solution.</description>
      <pubDate>Fri, 13 Dec 2019 11:18:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70385#M12017</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T11:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</link>
      <description>&lt;P&gt;So i would suggest to use the CP internal CAs certificates - for S2S VPN this has no drawbacks...&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 11:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70387#M12012</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-12-13T11:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</link>
      <description>But we have a PKI infrastructure for which the CRL is publically available. This is not the case with CP PKI. It should be possible to use a different PKI infrastructure. It is also managed by different people than the CP ICA infrastructure. So there is a drawback.</description>
      <pubDate>Fri, 13 Dec 2019 12:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70404#M12013</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-13T12:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</link>
      <description>&lt;P&gt;For the peers in question, do you have them configured to require presenting a certificate signed by a specific CA?&lt;BR /&gt;You would have to import and configure an OPSEC CA object.&lt;BR /&gt;This is described in the "Trusting an Externally Managed CA" section of the R80.30 Site-to-Site VPN guide:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Then you go into the external object and configure the matching criteria, as shown here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" style="width: 592px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3749iA295E199CE9BE2BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-12-13 at 11.17.16 AM.png" alt="Screen Shot 2019-12-13 at 11.17.16 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 19:22:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70456#M12018</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-13T19:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</link>
      <description>Yes, I have the Matching Criteria enabled and that part works. The Check Point accepts the PKI signed certificate from the third party peer gateway properly (I have a one-way IKE Main mode), that's not the problem. The problem is that Check Point sends the ICA certificate to the third party, which is not trusted obviously and the negotiation fails. On the third party gateway I can easily configure what certificate to send to a peer, but on Check Point this seems either impossible or needlessly obscure, while they force you to use certs for authentication.</description>
      <pubDate>Mon, 16 Dec 2019 07:30:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70548#M12019</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-16T07:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</link>
      <description>Specifically, we force the use of certificates for DAIP gateways in particular as Pre-Shared Keys are not entirely secure in this configuration.&lt;BR /&gt;Trying to confirm with R&amp;amp;D if it's possible to use different certificates.</description>
      <pubDate>Mon, 16 Dec 2019 16:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70591#M12020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-12-16T16:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN certificates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</link>
      <description>Thank you. It would be really odd if it wasn't possible. What's the point of having a certificate repository for IPSec then... Also, it's something that's easily possible on even 10 year old ScreenOS devices. I can just select what certificate to use for a peer gateway from a simple dropdown.</description>
      <pubDate>Tue, 17 Dec 2019 12:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-certificates/m-p/70659#M12021</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2019-12-17T12:59:50Z</dc:date>
    </item>
  </channel>
</rss>

