<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: White Paper - URL Filtering using SNI for HTTPS websites in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/98543#M19251</link>
    <description>&lt;P&gt;For anyone reading this white paper and Checkmates thread and believes (like me) you are all good with R80.40 without HTTPS Inspection policy and blade at all&lt;/P&gt;&lt;P&gt;- or with other words -&lt;/P&gt;&lt;P&gt;When you want to use only "HTTPS Inspection Light", which means you enabled "Categorize HTTPS sites" checkbox in URL Filtering blade settings:&lt;/P&gt;&lt;P&gt;Let me give you this litte hints:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Gateway is watching the TLS handshake (not intercepting it, because we don't use full HTTPS Inspection). I guess this is done by CPAS.&lt;/LI&gt;&lt;LI&gt;If Gateway sees problems in this TLS handshake, connection may be permitted (depending on your policy), but certificate information is &lt;U&gt;not&lt;/U&gt; used for site categorization by URL Filtering blade. You will see a log entry of type Detect from URL Filtering blade, telling you about the problem, your gateway has with this handshake. There is no hint in the log, that site categorization by URL Filtering blade is limited because of this problem.&lt;UL&gt;&lt;LI&gt;If you retry the connection attempt, please take care: you will get only one log entry of this type with the first try, because site categorization will be cached in table cptls_host_name_cache.&lt;/LI&gt;&lt;LI&gt;Problems could be&lt;UL&gt;&lt;LI&gt;Expired certificate&lt;/LI&gt;&lt;LI&gt;Revoked certificate&lt;/LI&gt;&lt;LI&gt;Untrusted CA&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;While expired certificate and revoked certificate are easy to understand, the part with untrusted CA is interesting. While we are NOT intercepting TLS handshakes by NOT using HTTPS Inspection blade, the gateway still verifies the server certificate against its own HTTP Inspection trusted CA list. &lt;STRONG&gt;If this fails, URL categorization by SNI will not work&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;So when you (like me) never checked HTTPS Inspection blade settings in old SmartDashboard (still not migrated to SmartConsole in R80.40), you might not notice, that the Trusted CA list is not up to date or does not contain the CA certificates you need.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;You can learn about that in sk64521 and sk159872 which also tell you, that you have to take care of the site categorization cache (table cptls_host_name_cache) and the responsible deamon (wstlsd) yourself after fixing the Trusted CA list.&lt;/P&gt;&lt;P&gt;Update of the HTTPS Inspection CA Trust List is documented in sk64521, but this did not work on our side. SMS downloaded recent version 2.6 zip file sucessfully (month ago), but SmartDashboard did not show an available update. We have a TAC case running for this. Workaround: Download zip file from SMS to your client with scp or something and upload it manually using SmartDashboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 10:02:31 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2020-10-08T10:02:31Z</dc:date>
    <item>
      <title>White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52675#M10433</link>
      <description>&lt;H3&gt;Author&lt;/H3&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1781"&gt;@Kevin_Jones&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;Abstract&lt;/H3&gt;
&lt;P&gt;The document describes how to leverage Server Name Indication (SNI) when using URL Filtering Software Blade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the full list of White Papers, &lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 12:43:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52675#M10433</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-07-08T12:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52687#M10435</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1781"&gt;@Kevin_Jones&lt;/a&gt;&amp;nbsp;, thank you for a brief and concise document describing SNI filtering functionality. Many of my clients can benefit from reading it.&lt;/P&gt;
&lt;P&gt;In regards to its general availability: your document is from December of last year. When is this functionality will be available in R80.20 by JHFA?&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Vladimir&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 12:26:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52687#M10435</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-05-06T12:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52692#M10436</link>
      <description>And SNI visibility with tls 1.3?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://blog.cloudflare.com/encrypted-sni/" target="_blank"&gt;https://blog.cloudflare.com/encrypted-sni/&lt;/A&gt;</description>
      <pubDate>Mon, 06 May 2019 14:05:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52692#M10436</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2019-05-06T14:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52696#M10437</link>
      <description>&lt;P&gt;R80.30&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 14:18:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52696#M10437</guid>
      <dc:creator>Uri_Lewitus</dc:creator>
      <dc:date>2019-05-06T14:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52740#M10502</link>
      <description>&lt;P&gt;Can CheckPoint teach us how to use "&lt;SPAN&gt;Next Generation Bypass"?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for&amp;nbsp;clarification.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 09:32:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52740#M10502</guid>
      <dc:creator>RickLin</dc:creator>
      <dc:date>2019-05-07T09:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52754#M10507</link>
      <description>For URL filtering this is on by default&lt;BR /&gt;I am told that NG bypass does not require any extra configuration I am still validating</description>
      <pubDate>Tue, 07 May 2019 11:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/52754#M10507</guid>
      <dc:creator>Uri_Lewitus</dc:creator>
      <dc:date>2019-05-07T11:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/53912#M10774</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1527"&gt;@Uri_Lewitus&lt;/a&gt;&amp;nbsp;, did you get the chance to validate this?&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Vladimir&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 16:33:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/53912#M10774</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-05-20T16:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/55481#M11075</link>
      <description>&lt;P&gt;That is part of this&amp;nbsp;White Paper - URL Filtering using SNI for HTTPS websites !&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 09:40:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/55481#M11075</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-11T09:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58131#M11738</link>
      <description>Is this functionality will be available in R80.20 by JHFA???&lt;BR /&gt;Considering right now R80.20 is the recommended version</description>
      <pubDate>Fri, 12 Jul 2019 23:49:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58131#M11738</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2019-07-12T23:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58901#M11875</link>
      <description>&lt;P&gt;Is this functionality already available in R80_10_JUMBO_HF?? thanks&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 13:05:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58901#M11875</guid>
      <dc:creator>saulomendonca</dc:creator>
      <dc:date>2019-07-24T13:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58905#M11877</link>
      <description>Is that available in R80_10_JUMBO_HF?</description>
      <pubDate>Wed, 24 Jul 2019 14:43:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58905#M11877</guid>
      <dc:creator>saulomendonca</dc:creator>
      <dc:date>2019-07-24T14:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58918#M11882</link>
      <description>&lt;P&gt;Great information!&lt;/P&gt;&lt;P&gt;I have two qustions:&lt;/P&gt;&lt;P&gt;1) Can anyone confirm is the following feature is included in the new engine of SSL Inspection in R80.30? R80.30 doesn't need the probe bypass feature since it checks de Client Hello and the certificate. Also, it works with Categorize HTTPS without SSL Inspection and without turning on the kernel parameters? I'll try to check this later in a lab enviroment.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Using this field, rather than relying on the CN of the certificate, gives more specific and accurate information about the requested site. The recently released hotfix for Check Point R80.10 gateways does change this behavior and utilize the SNI extension for categorization. Once installed, the feature can be enabled with the following command: fw ctl set int urlf_use_sni_for_categorization 1 This hotfix also allows a further check to make sure that the SNI requested by the client matches one of the SAN entries on the certificate. To enable this feature, use this command: fw ctl set int urlf_block_unauthorized_sni 1"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;2) Is there any benefit in having "Categorize HTTPS sites" &lt;U&gt;&lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;/U&gt; Outbound SSL Inspection? There are many posts that state that they are mutually exclusive, but in R80.20+ you can have both turned on. So far in my testing I could not see any benefits. Maybe it doesn't inspect all the https traffic?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Federico Meiners&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 18:42:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58918#M11882</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-07-24T18:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58921#M11885</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28479"&gt;@FedericoMeiners&lt;/a&gt;&amp;nbsp;, the SSL categorization is there simply to improve the Application Control and URL filtering. SSL inspection actually allow the payload to be analyzed by other TP blades as well as Content Control and DLP.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 19:10:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58921#M11885</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-07-24T19:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58924#M11888</link>
      <description>&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt; I know that, but what is the effect/advantage of having Outbound SSL Inspection + HTTPS Categorization? You can turn them both in R80.20+</description>
      <pubDate>Wed, 24 Jul 2019 19:18:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58924#M11888</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-07-24T19:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58927#M11889</link>
      <description>&lt;P&gt;Consider, for instance, the situation when you are &lt;STRONG&gt;exempt&lt;/STRONG&gt;ing certain traffic from SSL inspection &lt;STRONG&gt;based on its categories&lt;/STRONG&gt;, i.e. financial and health.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 19:48:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/58927#M11889</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-07-24T19:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/59164#M11926</link>
      <description>&lt;P&gt;I see here many questions about SNI enhancement availability with R80.20.&lt;/P&gt;
&lt;P&gt;As fas as I am concern, R80.20 can have SNI functionality back-ported, with a special HFA, with is not part of the regular Jumbo.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5966"&gt;@Oren_Segev&lt;/a&gt;, can you please give more details?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 13:52:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/59164#M11926</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-07-29T13:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60280#M12199</link>
      <description>Any idea when this functionality (URL Filtering using SNI for HTTPS websites) will be available for Gaia Embedded (7xx/14xx)?</description>
      <pubDate>Wed, 14 Aug 2019 02:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60280#M12199</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2019-08-14T02:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60287#M12200</link>
      <description>&lt;P&gt;Hi Miguel,&lt;BR /&gt;&lt;BR /&gt;In matter of fact, SNI for APPI/URLF it is already available on Gaia Embedded on recent firmwares (disabled by default) in locally managed mode.&lt;BR /&gt;&lt;BR /&gt;Go to Device -&amp;gt; Advanced Settings and find [Application Control and URL Filtering - Custom App over HTTPS].&lt;BR /&gt;Enable the parameter and you're good to go.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="enabling_SNI_INS_on_embedded.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2143i2B1FE21064EB5708/image-size/large?v=v2&amp;amp;px=999" role="button" title="enabling_SNI_INS_on_embedded.PNG" alt="enabling_SNI_INS_on_embedded.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 03:35:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60287#M12200</guid>
      <dc:creator>Tom_Hinoue</dc:creator>
      <dc:date>2019-08-14T03:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60753#M12313</link>
      <description>&lt;P&gt;Could someone please confirm if this functionality works on R80.20? thanks&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 14:47:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60753#M12313</guid>
      <dc:creator>saulomendonca</dc:creator>
      <dc:date>2019-08-20T14:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - URL Filtering using SNI for HTTPS websites</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60861#M12338</link>
      <description>Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8345"&gt;@Tom_Hinoue&lt;/a&gt;!&lt;BR /&gt;What about centrally managed mode?</description>
      <pubDate>Wed, 21 Aug 2019 11:49:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60861#M12338</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2019-08-21T11:49:06Z</dc:date>
    </item>
  </channel>
</rss>

