<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91051#M56428</link>
    <description>&lt;P&gt;Just FYI&lt;/P&gt;&lt;P&gt;Due to the high performance impact this will affect customers with a &lt;STRONG&gt;"strict" or custom IPS profile &lt;/STRONG&gt;only&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 792px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7201iE2D146AAB63705CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oddly enough my colleague's lab system has this very protection as "low confidence"&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Thu, 09 Jul 2020 16:02:56 GMT</pubDate>
    <dc:creator>Albert_Wilkes</dc:creator>
    <dc:date>2020-07-09T16:02:56Z</dc:date>
    <item>
      <title>INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90959#M56417</link>
      <description>&lt;P&gt;zdebug drop shows errors PSL Drop: MUX_PASSIVE and PSL Drop: TLS_PARSER and https sites were not working on several environments due to IPS protection "openssl padding oracle information disclosure" that was updated on 7/8/2020.&lt;/P&gt;&lt;P&gt;Disabling this protection resolves the issue.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 06:59:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90959#M56417</guid>
      <dc:creator>anstelios</dc:creator>
      <dc:date>2020-07-09T06:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90961#M56418</link>
      <description>&lt;P&gt;"zdebug" is a macros that only sends debug flags to fw module, if used without additional efforts, as "fw ctl zdebug drop". In R80.x fw module does not do much. You need to debug KISS and UP.&lt;BR /&gt;&lt;BR /&gt;It is better to involve TAC in your case.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 07:10:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90961#M56418</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-07-09T07:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90962#M56419</link>
      <description>&lt;P&gt;Thanks for this - got several customers affected by this.&amp;nbsp; Can confirm that disabling the protection restores internet access.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 07:12:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90962#M56419</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-07-09T07:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90963#M56420</link>
      <description>&lt;P&gt;Please raise TAC case for this, thanks&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 07:15:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90963#M56420</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-07-09T07:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90964#M56421</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Have engaged TAC - but also received the following update from my CP SE:&lt;/P&gt;&lt;P&gt;The problematic updates are:&lt;BR /&gt;634204548 or 635204548&lt;/P&gt;&lt;P&gt;The impact:&lt;BR /&gt;- After IPS update, many drops observed (via fw ctl zdebug + drop on CLI)&lt;BR /&gt;dropped by fwmultik_process_f2p_cookie_inner Reason: PSL Drop: TLS_PARSER&lt;BR /&gt;- The following may be seen in /var/log/messages:&lt;BR /&gt;kernel: [fw4_4];ips_gen_dyn_log: malware_policy_global_send_log() failed&lt;BR /&gt;- High CPU utilization and traffic impact&lt;/P&gt;&lt;P&gt;Short term remediation:&lt;BR /&gt;1. Re-enable IPS on the gateway object if it was disabled as a workaround.&lt;/P&gt;&lt;P&gt;2. Ensure that updates are not set to automatic gateway updates. (See sk120255 for more info)&lt;BR /&gt;a. Open Gateway Object in SmartConsole&lt;BR /&gt;b. Go to IPS tab (blade must be enabled)&lt;BR /&gt;c. Under "IPS Update Policy" select "Use IPS management updates"&lt;/P&gt;&lt;P&gt;3. Revert to previous good IPS database update&lt;BR /&gt;a. Under the "Security Policies" tab, select Threat Prevention or IPS policy&lt;BR /&gt;b. Under "Threat Tools" (left hand side) select "Updates"&lt;BR /&gt;c. Click the arrow next to "Update Now" and select "Switch to version..."&lt;BR /&gt;d. Select a previous version that is not 634204548 or 635204548 and click "Switch" (note it may take some time for the previous versions to populate if there are many previous versions. Look at the top right of the dialogue box where it says "# items")&lt;BR /&gt;e. Update will be pushed to gateways&lt;BR /&gt;f. Clear any scheduled updates from the "scheduled updates" option&lt;/P&gt;&lt;P&gt;4. Turn on IPS on the gateway if "IPS off" command was used to disable IPS via the CLI and test traffic.&lt;/P&gt;&lt;P&gt;Best practices for updates and IPS implementation:&lt;BR /&gt;This document (while it is specified for R80.10, it is still relevant for newer versions) contains our best practices recommendations about IPS profile implementation, and update best practices. &lt;A href="https://sc1.checkpoint.com/documents/Best_Practices/IPS_Best_Practices/CP_R80.10_IPS_Best_Practices/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/Best_Practices/IPS_Best_Practices/CP_R80.10_IPS_Best_Practices/html_frameset.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Alternately, disabling TLS parsing for IPS is a secondary workaround. However, this degrades IPS protections and is therefore not the recommended path at this time. Nonetheless, if customers are experiencing severe issues, they can use this command on the gateway:&lt;BR /&gt;fw ctl set int tls_parser_enable 0&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 07:33:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90964#M56421</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2020-07-09T07:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90967#M56422</link>
      <description>&lt;P&gt;Hello, we are aware of the issue and are working to provide a fix for it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Meanwhile, if you are affected, please use the following steps for short term remediation:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;1. Re-enable IPS on the gateway object if it was disabled as a workaround.&lt;/P&gt;
&lt;P&gt;2. Ensure that updates are not set to automatic gateway updates. (See sk120255 for more info)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;a. Open Gateway Object in SmartConsole&lt;BR /&gt;b. Go to IPS tab (blade must be enabled)&lt;BR /&gt;c. Under "IPS Update Policy" select "Use IPS management updates"&lt;/P&gt;
&lt;P&gt;3. Revert to previous good IPS database update&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;a. Under the "Security Policies" tab, select Threat Prevention or IPS policy&lt;BR /&gt;b. Under "Threat Tools" (left hand side) select "Updates"&lt;BR /&gt;c. Click the arrow next to "Update Now" and select "Switch to version..."&lt;BR /&gt;d. Select a previous version that is not 634204548 or 635204548 and click "Switch" (note it may take some time for the previous versions to populate if there are many previous versions. Look at the top right of the dialogue box where it says "# items")&lt;BR /&gt;e. Update will be pushed to gateways&lt;BR /&gt;f. Clear any scheduled updates from the "scheduled updates" option&lt;/P&gt;
&lt;P&gt;4. Turn on IPS on the gateway if "IPS off" command was used to disable IPS via the CLI and test traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Alternately, disabling TLS parsing for IPS is a secondary workaround. However, this &lt;U&gt;degrades IPS protections&lt;/U&gt; and is therefore &lt;U&gt;not the recommended path&lt;/U&gt; at this time.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Nonetheless, if customers are experiencing severe issues, they can use this command on the gateway:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;fw ctl set int tls_parser_enable 0&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 08:00:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90967#M56422</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-07-09T08:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90971#M56423</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":zipper_mouth_face:"&gt;🤐&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 08:31:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/90971#M56423</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-07-09T08:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91011#M56424</link>
      <description>&lt;P&gt;I am also facing the same issue after active the &lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;OpenSSL Padding Oracle Information Disclosure (CVE-2016-210). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;After disabling this protection resolves the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;R.B&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 11:17:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91011#M56424</guid>
      <dc:creator>Rahul_Borah</dc:creator>
      <dc:date>2020-07-09T11:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91015#M56425</link>
      <description>&lt;P&gt;IPS update has been replaced. It is now safe to update.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 12:14:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91015#M56425</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-07-09T12:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91017#M56426</link>
      <description>&lt;P&gt;We were facing this issue at a customers installation today as well.&lt;BR /&gt;After opening sr we got update, that IPS versions 634204548 or 635204548 are affected. We reverted to &lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;635204525&lt;/SPAN&gt;&lt;/SPAN&gt; and the issue persisted.&lt;/P&gt;&lt;P&gt;As we did not want to try and error we now have disabled this protection and now the issue is gone for now.&lt;/P&gt;&lt;P&gt;Now we're waiting for the next update (and reply from sr owner)&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 12:22:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91017#M56426</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-07-09T12:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91051#M56428</link>
      <description>&lt;P&gt;Just FYI&lt;/P&gt;&lt;P&gt;Due to the high performance impact this will affect customers with a &lt;STRONG&gt;"strict" or custom IPS profile &lt;/STRONG&gt;only&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 792px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7201iE2D146AAB63705CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oddly enough my colleague's lab system has this very protection as "low confidence"&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 09 Jul 2020 16:02:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91051#M56428</guid>
      <dc:creator>Albert_Wilkes</dc:creator>
      <dc:date>2020-07-09T16:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91057#M56429</link>
      <description>&lt;P&gt;Yeah, that was a nasty one.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 15:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91057#M56429</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2020-07-09T15:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91058#M56430</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;First question: in which package is the IPS protection&amp;nbsp;&lt;SPAN&gt;CPAI-2016-0349 updated and fixed?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Second question: why is not an official advisory regarding this issue? Impact has been huge&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 16:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91058#M56430</guid>
      <dc:creator>Eduardo_Eiros</dc:creator>
      <dc:date>2020-07-09T16:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91065#M56431</link>
      <description>&lt;P&gt;Anyone having this update propagate?&lt;/P&gt;&lt;P&gt;I'm mashing update and still 635204548.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 17:48:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91065#M56431</guid>
      <dc:creator>StackCap43382</dc:creator>
      <dc:date>2020-07-09T17:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: INFO - https sites not working, zdebug errors PSL Drop: MUX_PASSIVE and  PSL Drop: TLS_PARSER</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91115#M56432</link>
      <description>&lt;P&gt;Check Point has finally released&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167939" target="_self"&gt;sk167939&lt;/A&gt; which describes the issue and solution.&lt;BR /&gt;It also outlines that Check Point will improve their QA testing.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 09:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/INFO-https-sites-not-working-zdebug-errors-PSL-Drop-MUX-PASSIVE/m-p/91115#M56432</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-07-10T09:29:36Z</dc:date>
    </item>
  </channel>
</rss>

