<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IKE vulnerability patch/fix release and image upgrade path in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855154#M158143</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;due to this IKE vulnerability, i was asked to upgrade our ASAs:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;can someone concur the upgrade path?&lt;/P&gt;
&lt;P&gt;also there's no major changes in config (i.e. NAT/ACL)?&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116685-problemsolution-product-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116685-problemsolution-product-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/release/notes/asarn92.html#pgfId-769104" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/release/notes/asarn92.html#pgfId-769104&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse; width: 564px;" height="281" width="264"&gt;
&lt;TBODY&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; width: 80pt; text-align: center;" width="106"&gt;Current Version&lt;/TD&gt;
&lt;TD style="border-left: medium none; width: 71pt; text-align: center;" width="94"&gt;Fixed Release&lt;/TD&gt;
&lt;TD style="width: 48pt; text-align: center;" width="64"&gt;Upgrade path&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.2(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.2(5.59)&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.3(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.3.2 &amp;gt; 8.4.6 &amp;gt; 8.4.7&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.6(1)2&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.1(6.11)&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.6.1 &amp;gt; 9.0.2 &amp;gt; 9.1.6&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(6)4&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(5)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.3(2)34&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.3.2 &amp;gt; 8.4.6 &amp;gt; 8.4.7&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.2(4)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:33:33 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2019-03-12T07:33:33Z</dc:date>
    <item>
      <title>IKE vulnerability patch/fix release and image upgrade path</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855154#M158143</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;due to this IKE vulnerability, i was asked to upgrade our ASAs:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;can someone concur the upgrade path?&lt;/P&gt;
&lt;P&gt;also there's no major changes in config (i.e. NAT/ACL)?&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116685-problemsolution-product-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/116685-problemsolution-product-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/release/notes/asarn92.html#pgfId-769104" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/release/notes/asarn92.html#pgfId-769104&lt;/A&gt;&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse; width: 564px;" height="281" width="264"&gt;
&lt;TBODY&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; width: 80pt; text-align: center;" width="106"&gt;Current Version&lt;/TD&gt;
&lt;TD style="border-left: medium none; width: 71pt; text-align: center;" width="94"&gt;Fixed Release&lt;/TD&gt;
&lt;TD style="width: 48pt; text-align: center;" width="64"&gt;Upgrade path&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.2(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.2(5.59)&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.3(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.3.2 &amp;gt; 8.4.6 &amp;gt; 8.4.7&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.6(1)2&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.1(6.11)&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.6.1 &amp;gt; 9.0.2 &amp;gt; 9.1.6&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(2)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(6)4&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.1(5)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;8.3(2)34&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;8.4(7.30)&amp;nbsp;&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;8.3.2 &amp;gt; 8.4.6 &amp;gt; 8.4.7&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 15.0pt;"&gt;
&lt;TD style="height: 15pt; border-top: medium none; text-align: center;"&gt;9.2(4)&lt;/TD&gt;
&lt;TD style="border-top: medium none; border-left: medium none; text-align: center;"&gt;9.2(4)8&lt;/TD&gt;
&lt;TD style="text-align: center;"&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855154#M158143</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T07:33:33Z</dc:date>
    </item>
    <item>
      <title>You are late with this</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855155#M158146</link>
      <description>&lt;P&gt;You are late with this upgrade ...&lt;/P&gt;
&lt;P&gt;What's your running version?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 07:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855155#M158146</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-03-31T07:32:46Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855156#M158147</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;the first column is what the ASAs are currently running.&lt;/P&gt;
&lt;P&gt;the second column is what i'm trying to upgrade to.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 08:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855156#M158147</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-03-31T08:25:48Z</dc:date>
    </item>
    <item>
      <title>Ok, didn't realize that you</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855157#M158149</link>
      <description>&lt;P&gt;Ok, didn't realize that you are running all these versions ...&amp;nbsp;From my experience:&lt;/P&gt;
&lt;P&gt;Easy and straight forward:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;8.2x -&amp;gt;&amp;nbsp;8.2(5.59)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;9.2x -&amp;gt;&amp;nbsp;9.2(4)8&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;9.1x -&amp;gt;&amp;nbsp;9.2(4)8&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;Be aware of the arp &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html#pgfId-1837762"&gt;permit-nonconnected&lt;/A&gt;&amp;nbsp;and &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/n.html#pgfId-1792563"&gt;nat-chnages (proxy-arp and route-lookup)&lt;/A&gt;&amp;nbsp;changes:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;8.3x -&amp;gt;&amp;nbsp;8.4(7.30)&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;An ASA that is capable of 8.6 is also capable of running 9.2, the realease that you approach for most of your upgrades:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;8.6(1)2 -&amp;gt;&amp;nbsp;9.1(6.11)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;But it's always good to read the release notes and compare that to your config!&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you are running SSL/TLS-VPNs, I would go for a release &amp;gt;= 9.3 because of TLS1.2 that was introduced there.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 08:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855157#M158149</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-03-31T08:53:13Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855158#M158151</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;on &lt;SPAN&gt;8.3x -&amp;gt;&amp;nbsp;8.4(7.30), where are the said commands changed? is it on 8.4.6 or on 8.4.7?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 09:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855158#M158151</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-03-31T09:02:28Z</dc:date>
    </item>
    <item>
      <title>as shown in the linked</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855159#M158153</link>
      <description>&lt;P&gt;as shown in the linked command-reference, it's already in 8.4(6).&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 09:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855159#M158153</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-03-31T09:23:57Z</dc:date>
    </item>
    <item>
      <title>karsten,
thank you sir!</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855160#M158155</link>
      <description>&lt;P&gt;karsten,&lt;/P&gt;
&lt;P&gt;thank you sir!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 13:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855160#M158155</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-03-31T13:52:41Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855161#M158158</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;just another quick one, for the 9.2.4 release, do you go for &lt;SPAN id="69EAD56E0B5FCE01D15DE6D443AD01EA0B800555" class="overlay_img"&gt;&lt;STRONG&gt;asa924-&lt;SPAN style="color: #ff0000;"&gt;8&lt;/SPAN&gt;-smp-k8.bin&lt;/STRONG&gt; or &lt;STRONG&gt;&lt;SPAN id="C40F5F66C998F8B77109C8ED4B4CFF341AC18E2E" class="overlay_img"&gt;asa924-&lt;SPAN style="color: #ff0000;"&gt;5-&lt;/SPAN&gt;smp-k8.bin&lt;/SPAN&gt;&lt;/STRONG&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 03:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855161#M158158</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-04-01T03:22:20Z</dc:date>
    </item>
    <item>
      <title>I always go for the latest</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855162#M158161</link>
      <description>&lt;P&gt;I always go for the latest interims releases, but there are different opinions on that ...&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 06:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855162#M158161</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-04-01T06:28:49Z</dc:date>
    </item>
    <item>
      <title>thanks! i already downloaded</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855163#M158163</link>
      <description>&lt;P&gt;thanks! i already downloaded the latest interim 9.2.4(8).&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 06:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855163#M158163</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-04-01T06:40:05Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855164#M158166</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;i'm currently raising a change window, for this upgrade path: 8.3.2 &amp;gt; 8.4.6 &amp;gt; 8.4.7&lt;/P&gt;
&lt;P&gt;if there's a problem with it, can i roll back directly from 8.4.7 down to 8.3.2?&lt;/P&gt;
&lt;P&gt;or do i need to follow the path: 8.4.7 &amp;gt; 8.4.6 &amp;gt; 8.3.2?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2016 14:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855164#M158166</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-04-05T14:01:14Z</dc:date>
    </item>
    <item>
      <title>I never had exactly this</title>
      <link>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855165#M158169</link>
      <description>&lt;P&gt;I never had exactly this downgrade, but in similar situations it was just to load the old image with the old config (that you place as backup in flash before the upgrade).&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2016 17:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ike-vulnerability-patch-fix-release-and-image-upgrade-path/m-p/2855165#M158169</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-04-05T17:29:15Z</dc:date>
    </item>
  </channel>
</rss>

