<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: securing Redhat 7.1 in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144434#M8595</link>
    <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Guys if the questions are too much just answer "how to close open ports on linux 7.1?". Thank you.&lt;BR /&gt;&lt;BR /&gt;Regards,   &lt;BR /&gt;&lt;BR /&gt;LAT</description>
    <pubDate>Mon, 15 Dec 2003 03:26:17 GMT</pubDate>
    <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
    <dc:date>2003-12-15T03:26:17Z</dc:date>
    <item>
      <title>securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144433#M8594</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Just want to know how will you secure redhat 7.1. How do you close the ports listed in nmap? How do you trace hackers? what logs do i need to look for?&lt;BR /&gt;&lt;BR /&gt;Hope you could help me on these.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;LAT</description>
      <pubDate>Mon, 15 Dec 2003 02:19:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144433#M8594</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-12-15T02:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144434#M8595</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;Guys if the questions are too much just answer "how to close open ports on linux 7.1?". Thank you.&lt;BR /&gt;&lt;BR /&gt;Regards,   &lt;BR /&gt;&lt;BR /&gt;LAT</description>
      <pubDate>Mon, 15 Dec 2003 03:26:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144434#M8595</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-12-15T03:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144435#M8596</link>
      <description>You don't specifically "close" ports, you just don't "open" them.  If have an application listening on a port, it will be considered open.  "xinetd" will listen on lots of ports but you can stop it doing that by commenting out the services you don't need in "/etc/services".  Other applications such as sendmail get started up during boot so you need to look at disabling those services you don't need to.&lt;BR /&gt; &lt;BR /&gt;Finally, if you absolutely want to make sure, then look at iptables to set up firewall rules on your machine.&lt;BR /&gt; &lt;BR /&gt;There is a whole world of related information at the following link.&lt;BR /&gt; &lt;BR /&gt;&lt;A href="http://www.linuxsecurity.com/" target="_blank"&gt;http://www.linuxsecurity.com/&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 03:41:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144435#M8596</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2003-12-15T03:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144436#M8597</link>
      <description>To trace hackers means to monitor your system. A good tool for that specific filtering is pure secure to monitor servers, and snort to detect intrusions :&lt;BR /&gt;&lt;A href="http://www.snort.org/" target="_blank"&gt;http://www.snort.org/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.demarc.com/products/puresecure/" target="_blank"&gt;http://www.demarc.com/products/puresecure/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;J&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 04:41:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144436#M8597</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2003-12-15T04:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144437#M8598</link>
      <description>Hi Mark! &lt;BR /&gt;&lt;BR /&gt;Thank you for your response, I tried your advice but seems it doesn't work. I commented out ports i think do need to be opened in the /etc/services. Here is the result.&lt;BR /&gt;&lt;BR /&gt;[root]# nmap localhost&lt;BR /&gt;&lt;BR /&gt;Starting nmap V. 2.54BETA7 ( &lt;A href="http://www.insecure.org/nmap/" target="_blank"&gt;www.insecure.org/nmap/&lt;/A&gt; )&lt;BR /&gt;Interesting ports on gatekeeper (127.0.0.1):&lt;BR /&gt;(The 1495 ports scanned but not shown below are in state: closed)&lt;BR /&gt;Port       State       Service&lt;BR /&gt;1/tcp      open        tcpmux&lt;BR /&gt;7/tcp      open        echo&lt;BR /&gt;9/tcp      open        discard&lt;BR /&gt;11/tcp     open        systat&lt;BR /&gt;15/tcp     open        netstat&lt;BR /&gt;22/tcp     open        ssh&lt;BR /&gt;25/tcp     open        smtp&lt;BR /&gt;53/tcp     open        domain&lt;BR /&gt;70/tcp     open        gopher&lt;BR /&gt;79/tcp     open        finger&lt;BR /&gt;80/tcp     open        http&lt;BR /&gt;109/tcp    open        pop-2&lt;BR /&gt;110/tcp    open        pop-3&lt;BR /&gt;111/tcp    open        sunrpc&lt;BR /&gt;119/tcp    open        nntp&lt;BR /&gt;138/tcp    open        netbios-dgm&lt;BR /&gt;139/tcp    open        netbios-ssn&lt;BR /&gt;143/tcp    open        imap2&lt;BR /&gt;512/tcp    open        exec&lt;BR /&gt;513/tcp    open        login&lt;BR /&gt;514/tcp    open        shell&lt;BR /&gt;515/tcp    open        printer&lt;BR /&gt;540/tcp    open        uucp&lt;BR /&gt;635/tcp    open        unknown&lt;BR /&gt;1080/tcp   open        socks&lt;BR /&gt;1524/tcp   open        ingreslock&lt;BR /&gt;2000/tcp   open        callbook&lt;BR /&gt;2001/tcp   open        dc&lt;BR /&gt;6000/tcp   open        X11&lt;BR /&gt;6001/tcp   open        X11:1&lt;BR /&gt;6667/tcp   open        irc&lt;BR /&gt;12345/tcp  open        NetBus&lt;BR /&gt;12346/tcp  open        NetBus&lt;BR /&gt;31337/tcp  open        Elite&lt;BR /&gt;32771/tcp  open        sometimes-rpc5&lt;BR /&gt;32772/tcp  open        sometimes-rpc7&lt;BR /&gt;32773/tcp  open        sometimes-rpc9&lt;BR /&gt;32774/tcp  open        sometimes-rpc11&lt;BR /&gt;54320/tcp  open        bo2k&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 05:10:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144437#M8598</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-12-15T05:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144438#M8599</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;How astonishing it is to see:&lt;BR /&gt;12345/tcp open NetBus&lt;BR /&gt;12346/tcp open NetBus&lt;BR /&gt;31337/tcp open Elite&lt;BR /&gt;54320/tcp open bo2k&lt;BR /&gt;&lt;BR /&gt;Is this a linux box ? Running those clients ?&lt;BR /&gt;If you want a port that an application uses to be closed, the idea is to stop this application in order to close the port.&lt;BR /&gt;For each, you can run service application_name stop.&lt;BR /&gt;But you can't stop everything if you want your box to work... Looking at iptables to protect your Linux would be a good idea...&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;J</description>
      <pubDate>Mon, 15 Dec 2003 05:18:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144438#M8599</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2003-12-15T05:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144439#M8600</link>
      <description>LAT,&lt;BR /&gt; &lt;BR /&gt;Sorry, after commenting out the services in /etc/services, you need to restart xinetd or find it's PID and "kill -1" it.&lt;BR /&gt; &lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 06:06:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144439#M8600</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2003-12-15T06:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144440#M8601</link>
      <description>&amp;gt;how to close open ports listed in nmap&lt;BR /&gt;1. Run iptables firewall do disallow access to open ports&lt;BR /&gt;2. Stop the programm that is leaving the ports open.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Sergejs</description>
      <pubDate>Mon, 15 Dec 2003 08:30:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144440#M8601</guid>
      <dc:creator>Sergejs Svitnevs</dc:creator>
      <dc:date>2003-12-15T08:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144441#M8602</link>
      <description>As you are running 7.1 you can set up firewall after installation time by running the following from a root shel&lt;BR /&gt;&lt;BR /&gt;#setup&lt;BR /&gt;&lt;BR /&gt;this will allow you to choice from a list ... in this case firewall &lt;BR /&gt;&lt;BR /&gt;from there you can choice High, Medium, No Firewall, and allow some of the port you want !&lt;BR /&gt;&lt;BR /&gt;The above will create default rule for in your case probably ipchains (iptables is I think default as of 7.2)&lt;BR /&gt;&lt;BR /&gt;To check on this type the following&lt;BR /&gt;&lt;BR /&gt;#ipchains -L &lt;BR /&gt;&lt;BR /&gt;if it retuns rules and no error this is wat it is using&lt;BR /&gt;&lt;BR /&gt;else try for iptables&lt;BR /&gt;&lt;BR /&gt;#iptables -L&lt;BR /&gt;&lt;BR /&gt;You can also do a &lt;BR /&gt;&lt;BR /&gt;#service ipchains status&lt;BR /&gt;&lt;BR /&gt;to know if this is running&lt;BR /&gt;&lt;BR /&gt;to check for open port &lt;BR /&gt;&lt;BR /&gt;#nmap "your_IP_name or OR your_IP_address"&lt;BR /&gt;&lt;BR /&gt;the rules for ipchains are keep in /etc/sysconfig/ipchains&lt;BR /&gt;&lt;BR /&gt;have a look at those and use man ipchains to futher explain/analyze&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;J-P</description>
      <pubDate>Mon, 15 Dec 2003 08:42:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144441#M8602</guid>
      <dc:creator>Huc_1</dc:creator>
      <dc:date>2003-12-15T08:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144442#M8603</link>
      <description>This is quite a list.&lt;BR /&gt;&lt;BR /&gt;What are you *ACTUALLY* running on the box?&lt;BR /&gt;&lt;BR /&gt;Judging by the list, you're running a pop server, an smtp server (sendmail), an IRC server, a web server, a news server, leaving all r* commands open (rexec, rsh, rlogin), not to mention uucp, a socks server, and running a GUI X Session on the console.&lt;BR /&gt;&lt;BR /&gt;you also appear to have been *HACKED* and are being used to hack other people (31337, 12345-6, 54320).&lt;BR /&gt;&lt;BR /&gt;Use 'netstat -ntulp' to find out what these processes are, and stop them.&lt;BR /&gt;&lt;BR /&gt;For the xinetd launched ones, turn them off using 'chkconfig &lt;SERVICE&gt; off'.  Do this for other higher level services (httpd, nntp, etc.) of which you are not using.&lt;BR /&gt;&lt;BR /&gt;Once you've closed off the obvious holes, then get to work on the not-so-obvious ones.&lt;BR /&gt;&lt;BR /&gt;Find out which root-kits have been used on your machine.  The path to the processes which are running these daemons are you friends here, and will probably point to some half-hidden directories.  At this point, /proc/&lt;PID&gt;/ is your friend (in particular, the 'cwd' symbolic link).&lt;BR /&gt;&lt;BR /&gt;Once you've found and removed the root-kits (google is helpful), you need to verify that no trojans still exist.  Use 'rpm -Va' to help find these.&lt;BR /&gt;&lt;BR /&gt;If it's any of the root kits I'm aware of, you will also need to use 'lsattr' a fair bit to be able to fix these issues.&lt;BR /&gt;&lt;BR /&gt;Once you've cleaned yourself up, and rebooted a few times to make sure they don't come back, you need to set up your firewall properly as discussed by the others in this thread.&lt;BR /&gt;&lt;BR /&gt;You then need to update all affected packages with the latest eratta from RedHat.&lt;BR /&gt;&lt;BR /&gt;These are just starting points.  Each individual step will most probably take hours to complete.&lt;BR /&gt;&lt;BR /&gt;Usually, the best thing for you to do is to back up your own personal data and settings, wax the box with a newer, more up-to-date distribution, and start again.&lt;/PID&gt;&lt;/SERVICE&gt;</description>
      <pubDate>Mon, 15 Dec 2003 19:08:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144442#M8603</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-12-15T19:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144443#M8604</link>
      <description>Hi Guys!&lt;BR /&gt;&lt;BR /&gt;thank you for all your responses especially to Stuart Browne. actually, this incident is the first time i've experienced with redhat. I already turned-off some of the services but the ports are still open. Also, ran 'netstat -ntulp' and saw portsentry, named and sendmail running. The box is running ipchains. What else do I have to do?</description>
      <pubDate>Mon, 15 Dec 2003 20:32:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144443#M8604</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-12-15T20:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144444#M8605</link>
      <description>Start by verifying that 'netstat' (part of the 'net-tolls' RPM) hasn't been replaced by a rootkit:&lt;BR /&gt;&lt;BR /&gt;rpm -V net-tools&lt;BR /&gt;&lt;BR /&gt;If '/bin/netstat' comes up, it's bad.  Download a clean package (or pull off your install CD's), and re-install it.&lt;BR /&gt;&lt;BR /&gt;Once you've confirmed it's clean, issue the command:&lt;BR /&gt;&lt;BR /&gt;netstat -nutlp&lt;BR /&gt;&lt;BR /&gt;This will list processes listening (either UDP or TCP), and what their process-id's are (PID).  An example of the output from one of my machines:&lt;BR /&gt;&lt;BR /&gt;tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 26363/sendmail      &lt;BR /&gt;tcp 0 0 0.0.0.0:8080 0.0.0.0:* LISTEN 26376/ishttpd       &lt;BR /&gt;tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 795/httpd           &lt;BR /&gt;tcp 0 0 192.231.136.2:53 0.0.0.0:* LISTEN 27128/named         &lt;BR /&gt;tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 27128/named         &lt;BR /&gt;&lt;BR /&gt;This is just 5 of the listening ports.&lt;BR /&gt;&lt;BR /&gt;They state the protocol, the send/receive queues, the listening IP and port (the next two aren't a concern in this command), and the last field is the PID/process name.&lt;BR /&gt;&lt;BR /&gt;lets look at the process listening on 8080 as an example.&lt;BR /&gt;&lt;BR /&gt;It's called 'ishttpd', and is at PID 26376.&lt;BR /&gt;&lt;BR /&gt;If we look in /proc/26376/, an 'ls -l' shows the following:&lt;BR /&gt;&lt;BR /&gt;total 0&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 cmdline&lt;BR /&gt;lrwxrwxrwx 1 root root 0 Dec 16 13:45 cwd -&amp;gt; /etc/iscan&lt;BR /&gt;-r-------- 1 root root 0 Dec 16 13:45 environ&lt;BR /&gt;lrwxrwxrwx 1 root root 0 Dec 16 13:45 exe -&amp;gt; /opt/trend/ISHTTP/IScan.HTTP/ishttpd&lt;BR /&gt;dr-x------ 2 root root 0 Dec 16 13:45 fd&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 maps&lt;BR /&gt;-rw------- 1 root root 0 Dec 16 13:45 mem&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 mounts&lt;BR /&gt;lrwxrwxrwx 1 root root 0 Dec 16 13:45 root -&amp;gt; /&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 stat&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 statm&lt;BR /&gt;-r--r--r-- 1 root root 0 Dec 16 13:45 status&lt;BR /&gt;&lt;BR /&gt;This shows us various pieces of good information.  For starters, it shows the exact path to the executed binary (exe: /opt/trend/ISHTTP/IScan.HTTP/ishttpd), and the directory it was launched from (cwd: /etc/iscan).  The contents of 'cmdline' is the command line that launched it.&lt;BR /&gt;&lt;BR /&gt;With these details, you can start tracking down where a paper-trail might be.  Rootkits usually leave a log of their progress in the directory they are launched from.&lt;BR /&gt;&lt;BR /&gt;With the PID, you can try using the 'kill' command to be rid of it.  You may want to verify that it is also not been replaced by using 'rpm -V util-linux'.&lt;BR /&gt;&lt;BR /&gt;Once you've got the path name, and the binary name, you can do 2 things.  One: find out where it was launched from (cd /etc;grep -r "&lt;THE path=""&gt;" *), two: remove the offending binary (using 'lsattr' to make sure it isn't immutable (+i) and 'rm' to make sure you can get rid of it).&lt;BR /&gt;&lt;BR /&gt;As for logs to trace them, well, try using the 'last' command.  I highly doubt it will show anything as the files it relies upon (/var/run/utmp) will have most probably been destroyed after you were exploited.&lt;/THE&gt;</description>
      <pubDate>Mon, 15 Dec 2003 21:53:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144444#M8605</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-12-15T21:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144445#M8606</link>
      <description>Oops, I was going to attach a file with those command outputs in a neater format..</description>
      <pubDate>Mon, 15 Dec 2003 21:55:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144445#M8606</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-12-15T21:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144446#M8607</link>
      <description>Hi! &lt;BR /&gt;&lt;BR /&gt;Thank you Stuart for that very helpful information. I just figured out the problem why there are ports opened on my linux box. It's because I let portsentry monitor other hackable ports (portsentry.conf).&lt;BR /&gt;&lt;BR /&gt;Again, thank you for all your help especially to Stuart.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;LAT</description>
      <pubDate>Mon, 15 Dec 2003 22:43:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144446#M8607</guid>
      <dc:creator>Leovino A. Trinidad, Jr</dc:creator>
      <dc:date>2003-12-15T22:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: securing Redhat 7.1</title>
      <link>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144447#M8608</link>
      <description>No problems.. It's what we're here for.. ;)</description>
      <pubDate>Mon, 15 Dec 2003 23:53:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/securing-redhat-7-1/m-p/3144447#M8608</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2003-12-15T23:53:54Z</dc:date>
    </item>
  </channel>
</rss>

