<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175952#M8604</link>
    <description>&lt;P&gt;The previous model was a checkpoint 12200, it has been changed to a splunk 1800 model with gaia embedded. Are you referring to this? I don't understand your answer.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Mar 2023 16:21:02 GMT</pubDate>
    <dc:creator>Luis1980</dc:creator>
    <dc:date>2023-03-23T16:21:02Z</dc:date>
    <item>
      <title>Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175868#M8587</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm telling you my problem, let's see if someone can help me, in a backup center we have installed 2 FWs checkpoint model 1800 splunk smb, gaia embedded R80.20.35, the problem is that in the global properties there is a rule for default "image attached" and it is a frist rule and cannot be modified unless you disable it, this rule exposes services to the outside and represents a serious security problem, not if this is given by the dropbear program, but our SOC alerted of services exposed through the shodan page, can you think of how this can be changed? Is the only option is to disable that rule? Even if I put a drop rule first in the Firewalls, this rule will be implicit. Thank you all for your time.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rule_implied.PNG" style="width: 480px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20214iA7E1840CE6D8176A/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule_implied.PNG" alt="rule_implied.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 08:28:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175868#M8587</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T08:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175878#M8588</link>
      <description>&lt;P&gt;How is it a security risk? Those are management interfaces for your appliance, and only authenticated admin accounts can connect to them.&lt;/P&gt;
&lt;P&gt;If you want to disable this implied rule, create an explicit rule with Source IPs assigned to your dedicated admin devices and put it on top of your policy.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 09:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175878#M8588</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-23T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175883#M8589</link>
      <description>&lt;P&gt;Hi Val&lt;/P&gt;&lt;P&gt;When you have enabled that rule, which is an implicit rule and in accept, they appear published for the Firewall that we have output to intenert the public IP and my security team was able to connect via web and via ssh to this firewall until it disables the rule this does not change and puts between parenthesis small office appliance, as are these models. The rule says accept web and ssh connections for administration.&lt;/P&gt;&lt;P&gt;My security partner was connected to the appliance from outside our infrastructure.&lt;/P&gt;&lt;P&gt;Or can it be due to the dropbear he has running?, The truth is that I do not understand what is happening, but if I am clear that when I disable that rule my security colleagues no longer came from outside.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 09:47:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175883#M8589</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T09:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175890#M8590</link>
      <description>&lt;P&gt;Once again, I do not really understand the concern. You can actually configure the management access and disable it on the WAN interface while still allowing it from internal networks. But say someone is trying to connect to the appliance from outside your networks. There is still an authentication to do before the access is granted.&lt;BR /&gt;&lt;BR /&gt;What are you trying to achieve?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 10:34:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175890#M8590</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-23T10:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175914#M8595</link>
      <description>&lt;P&gt;Thank you for your answers and your time, apparently the problem came through port 264, I have already been reading several cases about this. And the security group understood that it is normal behavior.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 14:22:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175914#M8595</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T14:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175933#M8597</link>
      <description>&lt;P&gt;&amp;nbsp;"Accept Remote Access Control Connections" setting is one option to negate this but due diligence is required if Check Point is used for remote access here.&lt;/P&gt;
&lt;P&gt;As you say plenty of SK articles available on this and related topics otherwise.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 15:40:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175933#M8597</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-23T15:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175938#M8598</link>
      <description>&lt;P&gt;I prefer not to touch that rule at the moment, if it creates confusion for me that I had to disable the other implicit rule for ssh access and web access, it is in the image of my first query, in the end I don't know if it is an appliance configuration issue. Or is it due to the firewall model, but I think switching to these appliances was not a good idea.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 15:45:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175938#M8598</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T15:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175939#M8599</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry like &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt; says I don't understand what your concern is?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These are global properties mostly irrespective of appliance model/type.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 11:12:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175939#M8599</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-24T11:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175943#M8600</link>
      <description>&lt;P&gt;Let's see how I commented in my first comment, My security group alerted me that the appliance was accessible via the web and via ssh from outside, I know that later you have to have a username and password, but there are attacks to access it. And our device came out public in shodan as vulnerable via ssh and via the web and I had to disable the implicit rule that I commented in the first post. I don't know if it is a configuration issue of the WAN interface of the equipment or why this behaviour. This device was exchanged two months ago for another checkpoint model and this did not happen with that model.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 15:58:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175943#M8600</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T15:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175948#M8601</link>
      <description>&lt;P&gt;If the previous model was an appliance running full GAiA that setting wouldn't have applied before.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:15:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175948#M8601</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-23T16:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175952#M8604</link>
      <description>&lt;P&gt;The previous model was a checkpoint 12200, it has been changed to a splunk 1800 model with gaia embedded. Are you referring to this? I don't understand your answer.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:21:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175952#M8604</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T16:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175953#M8605</link>
      <description>&lt;P&gt;Correct 1800 (GAiA embedded) is classified as small office gateway hence why the setting now applies and didn't before.&lt;/P&gt;
&lt;P&gt;(Note: Spark not splunk)&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 22:42:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175953#M8605</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-23T22:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175955#M8607</link>
      <description>&lt;P&gt;&lt;BR /&gt;Thanks, that's why I had to disable that implicit rule, can you think of another way so that this doesn't happen without disabling that rule? I understand that no, but I ask you, thanks for your time.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:26:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175955#M8607</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-23T16:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175958#M8609</link>
      <description>&lt;P&gt;I am sorry, but this statement is not okay: "...&lt;EM&gt;but there are attacks to access it&lt;/EM&gt;". What are you referring to?&lt;/P&gt;
&lt;P&gt;If you know how to log into the appliance without a valid account, it should be reported as a vulnerability through appropriate channels.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 16:52:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175958#M8609</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-23T16:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175960#M8610</link>
      <description>&lt;P&gt;Hey Luis,&lt;/P&gt;
&lt;P&gt;As the guys said, it is somewhat confusing what your concern here is. Just so we can help you properly, can you maybe attach simple diagram or drawing of what exactly you are trying to do? Nothing too fancy, but at least paint drawing that can help us understand this better.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to keep that option off, you can follow below article, which is literally what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;indicated in his very first response:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106251&amp;amp;srcFavorites=favorites" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106251&amp;amp;srcFavorites=favorites&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 17:37:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175960#M8610</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-23T17:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175992#M8611</link>
      <description>&lt;P&gt;Change the setting to 'before last' rather than first and create rules in the policy itself per your requirements for the access behaviour you desire. But again I'm not sure why this is relevant&amp;nbsp; If you don't want the access to succeed.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 22:32:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175992#M8611</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-23T22:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175995#M8612</link>
      <description>&lt;P&gt;To add to what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;said, all you need to know is below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20232i848142C6E644C16D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 22:39:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/175995#M8612</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-23T22:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176028#M8613</link>
      <description>&lt;P&gt;I'm sorry I expressed myself badly, I don't know any vulnerability, I mean already known methods, brute force for example.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 08:30:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176028#M8613</guid>
      <dc:creator>Luis1980</dc:creator>
      <dc:date>2023-03-24T08:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176048#M8614</link>
      <description>&lt;P&gt;My concern is that the topic-starter claims external access to WebUI/SSH presents a security risk and makes his system vulnerable. Open ports by themself do not actually represent a security risk unless there is a way to break in without knowing admin credentials.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or are you asking about something else?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 10:57:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176048#M8614</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-24T10:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with implicit rule in SMB Firewall and use of dropbear as ssh client</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176050#M8615</link>
      <description>&lt;P&gt;Once again, this risk, however small, can be mitigated by setting up IP addresses for admin access. Please refer to the specific chapter in the admin guide, for example:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/SMB_R80.20.50/AdminGuides/Locally_Managed/EN/Topics/Configuring-Administrator-Access.htm?Highlight=admin" target="_blank"&gt;https://sc1.checkpoint.com/documents/SMB_R80.20.50/AdminGuides/Locally_Managed/EN/Topics/Configuring-Administrator-Access.htm?Highlight=admin&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 11:05:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Problem-with-implicit-rule-in-SMB-Firewall-and-use-of-dropbear/m-p/176050#M8615</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-24T11:05:36Z</dc:date>
    </item>
  </channel>
</rss>

