<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Irresponsible Disclosure</title><link>https://blog.daknob.net/</link><description>Recent content on Irresponsible Disclosure</description><generator>Hugo</generator><language>en-us</language><copyright>© 2013-2026 Antonios A. Chariton. All rights reserved.</copyright><lastBuildDate>Thu, 11 Apr 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.daknob.net/index.xml" rel="self" type="application/rss+xml"/><item><title>IPv6-First LANs with VyOS</title><link>https://blog.daknob.net/ipv6-first-with-vyos/</link><pubDate>Thu, 11 Apr 2024 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/ipv6-first-with-vyos/</guid><description>&lt;p&gt;&lt;a href="https://vyos.io/"&gt;VyOS&lt;/a&gt; is a free Linux-based distribution that can turn any
regular computer or virtual machine into a fully-featured router. By combining
existing open source software into a single image, and tying it together with a
single configuration file, upgrade mechanism, and an automation API, it makes
the job of network engineers and sysadmins easy.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s been a few years since I last used it, after determining it was not good
enough for me, but the progress they&amp;rsquo;ve made in this time frame is
unbelievable, and it&amp;rsquo;s practically a different thing by now. I plan to blog
about VyOS more soon, and this transformation that happened, but for now I&amp;rsquo;d
like to go over a setup that I did.&lt;/p&gt;</description></item><item><title>Do you really need IPv4 anymore?</title><link>https://blog.daknob.net/do-you-really-need-ipv4-anymore/</link><pubDate>Tue, 09 Apr 2024 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/do-you-really-need-ipv4-anymore/</guid><description>&lt;p&gt;Setting up and maintaining access networks today requires double the effort
due to the parallel coexistence of IPv6 and IPv4. Dual-stack has network
engineers and sysadmins do twice the amount of work, so there must be a good
reason for it, right?&lt;/p&gt;
&lt;p&gt;The answer is &amp;ldquo;probably not&amp;rdquo;! The IPv4 network is not really needed, with the
exception of LANs with devices that do not support IPv6 after almost 30 years.
And even there, solutions can minimize the impact of that considerably.&lt;/p&gt;</description></item><item><title>Deploying Fiber In The Home</title><link>https://blog.daknob.net/fiber-in-the-home/</link><pubDate>Thu, 29 Feb 2024 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/fiber-in-the-home/</guid><description>&lt;p&gt;Getting a fiber Internet connection to your home is a big deal! It&amp;rsquo;s probably
the last physical connection you&amp;rsquo;ll ever need, due to the virtually unlimited
bandwidth, stability, performance, and attainable speeds.&lt;/p&gt;
&lt;p&gt;Having your ISP drop it off on the building entrance however is not enough.
Wiring within a building is often needed, especially if you need to reach
apartments, mechanical rooms, and all sorts of places where networking may be
required.&lt;/p&gt;</description></item><item><title>Single-domain or Multi-SAN certificates?</title><link>https://blog.daknob.net/the-rare-multisan-usecase/</link><pubDate>Sat, 09 Dec 2023 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/the-rare-multisan-usecase/</guid><description>&lt;p&gt;For &lt;a href="https://en.wikipedia.org/wiki/Transport_Layer_Security"&gt;TLS&lt;/a&gt; to be able to
encrypt connections between two communicating devices, by far the most common
authentication method is &lt;a href="https://en.wikipedia.org/wiki/X.509#Certificates"&gt;X.509
Certificates&lt;/a&gt;. They have been
around for decades and have supported the move to an encrypted web.&lt;/p&gt;
&lt;p&gt;The job of certificates is to bind two things together: a cryptographic key and
an identity. They serve as a document that tells us that, for example, the
public key&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;04:60:4a:74:2e:ea:2b:bf:16:3f:14:2f:c5:26:df:
fe:65:c7:bd:7f:81:b0:48:a7:dd:82:3b:36:ee:28:
0d:2b:2c:06:18:68:aa:9d:c3:b8:e7:73:cb:21:36:
11:b3:ec:f0:ff:ab:77:51:0a:fa:4e:07:27:16:1f:
23:3f:32:71:2e
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;is tied to the domain &lt;code&gt;daknob.net&lt;/code&gt;. It could have been an IP Address, an e-mail
address, or a few other things, but most certificates right now are used with
domain names.&lt;/p&gt;</description></item><item><title>The IXP is not your L2 Domain</title><link>https://blog.daknob.net/l2-protocols-on-ixes/</link><pubDate>Mon, 04 Dec 2023 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/l2-protocols-on-ixes/</guid><description>&lt;p&gt;There are currently over 1,100 &lt;a href="https://en.wikipedia.org/wiki/Internet_exchange_point"&gt;Internet Exchange
Points&lt;/a&gt; around the world
according to &lt;a href="https://www.peeringdb.com/"&gt;PeeringDB&lt;/a&gt;. These Internet
infrastructure locations serve as a meeting point for networks all over the
planet, allowing for cheap (or free!) exchange of low latency traffic.&lt;/p&gt;
&lt;p&gt;The idea is simple: if a lot of networks are in the same datacenter, why have
them spend a fortune connecting to each other with direct cables? We can add
some switches there, everyone connects to one of them, and then they get a
Layer 2 connection to all other participants.&lt;/p&gt;</description></item><item><title>Introducing TP: A Zero Trust Secure Proxy</title><link>https://blog.daknob.net/introducing-tp/</link><pubDate>Wed, 15 Nov 2023 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/introducing-tp/</guid><description>&lt;p&gt;Over the past few years I&amp;rsquo;ve been building a significant infrastructure that
contains a &lt;a href="https://bgp.tools/as/210312"&gt;network&lt;/a&gt; with great connectivity,
state-of-the-art compute capabilities based on Kubernetes, and a lot of
automation to keep it running.&lt;/p&gt;
&lt;p&gt;This serves as a great testbed to experiment with and implement all sorts of
technologies, including a &lt;a href="https://en.wikipedia.org/wiki/Zero_trust_security_model"&gt;Zero
Trust&lt;/a&gt; security model.
That&amp;rsquo;s increasingly more popular today, with many
&lt;a href="https://cloud.google.com/beyondcorp/"&gt;commercial&lt;/a&gt;
&lt;a href="https://www.cloudflare.com/zero-trust/"&gt;offerings&lt;/a&gt; to help enterprises reap
its benefits.&lt;/p&gt;
&lt;p&gt;As you can see in my previous posts, I have &lt;a href="https://blog.daknob.net/workload-mtls-with-acme/"&gt;built&lt;/a&gt;
an ACME CA which I am &lt;a href="https://blog.daknob.net/acme-end-user-client-certificates/"&gt;using&lt;/a&gt; to issue TLS
and SSH client certificates to all of my devices, such as my laptop. That&amp;rsquo;s
great, but how can I connect to all my services now using these?&lt;/p&gt;</description></item><item><title>Reset passwords after a data breach?</title><link>https://blog.daknob.net/password-reset-after-data-breach/</link><pubDate>Thu, 27 Jul 2023 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/password-reset-after-data-breach/</guid><description>&lt;p&gt;Today I received an e-mail from a website I am using regarding a data breach
that seems to have leaked the user database. The message was well written, and
it prompted users to reset their passwords and enable 2FA. That&amp;rsquo;s great, right?&lt;/p&gt;
&lt;p&gt;In this post I&amp;rsquo;d like to argue that blindly moving to password resets and calls
for 2FA isn&amp;rsquo;t necessarily the best first step for such situations. There&amp;rsquo;s more
that needs to happen in advance, otherwise you may even lower the security of
your users.&lt;/p&gt;</description></item><item><title>L3 Hardware Offload on MikroTik CRS326</title><link>https://blog.daknob.net/crs326-l3-hw-offload/</link><pubDate>Sun, 05 Feb 2023 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/crs326-l3-hw-offload/</guid><description>&lt;p&gt;With the release of RouterOS 7.1, MikroTik added &lt;a href="https://help.mikrotik.com/docs/display/ROS/L3+Hardware+Offloading"&gt;L3 HW
Offload&lt;/a&gt;.
But what is that?&lt;/p&gt;
&lt;p&gt;In order for a router to deliver packets correctly, for each one of them that
arrives in one of its interfaces, it needs to look up at the destination IP
address, and then determine what is the right port that it should go out of.&lt;/p&gt;
&lt;p&gt;In order to decide, it uses an internal table, the routing table. This contains
the match between destination and interface. Some more advanced tables even
contain the source as well, or other parameters to take into account. A
simplified version looks like this, for IPv4:&lt;/p&gt;</description></item><item><title>End-user Client Certificates with ACME</title><link>https://blog.daknob.net/acme-end-user-client-certificates/</link><pubDate>Tue, 06 Dec 2022 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/acme-end-user-client-certificates/</guid><description>&lt;p&gt;&lt;strong&gt;DISCLAIMER:&lt;/strong&gt; &lt;em&gt;I am currently working for Google. This post is published in my
personal capacity, without using any knowledge I may have obtained from my
employment with them. All the information provided here is coming from purely
personal time and effort and does not represent the opinions or practices of my
employer.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;In my &lt;a href="../workload-mtls-with-acme"&gt;previous blog post&lt;/a&gt; I described how I built
my own ACME CA to issue workload certificates for the various services I am
running. The only thing left out was one final use case. End-user client
certificates. This post helps complete the &amp;ldquo;vision&amp;rdquo; of the &amp;ldquo;mTLS Universe&amp;rdquo;.
After reading this out loud, I can see how it may sound like a nightmare for
some&amp;hellip; :)&lt;/p&gt;</description></item><item><title>Workload mTLS with ACME &amp; Go</title><link>https://blog.daknob.net/workload-mtls-with-acme/</link><pubDate>Mon, 05 Dec 2022 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/workload-mtls-with-acme/</guid><description>&lt;p&gt;&lt;strong&gt;DISCLAIMER:&lt;/strong&gt; &lt;em&gt;I am currently working for Google. This post is published in my
personal capacity, without using any knowledge I may have obtained from my
employment with them. All the information provided here is coming from purely
personal time and effort and does not represent the opinions or practices of my
employer.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;ACME, standardized in &lt;a href="https://www.rfc-editor.org/rfc/rfc8555.html"&gt;RFC8555&lt;/a&gt;,
provides for a way of automatically issuing certificates at scale, using an
API, and eliminating all manual work. Most of the TLS certificates issued today
in the WebPKI are issued using ACME. It is an enormous milestone for a protocol
first presented in 2016 and standardized in 2019!&lt;/p&gt;</description></item><item><title>A scalable OCSP Responder on Cloudflare Workers</title><link>https://blog.daknob.net/cf-ocsp/</link><pubDate>Wed, 16 Nov 2022 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/cf-ocsp/</guid><description>&lt;p&gt;&lt;strong&gt;DISCLAIMER:&lt;/strong&gt; &lt;em&gt;I am currently working for Google. This post is published in my
personal capacity, without using any knowledge I may have obtained from my
employment with them. All the information provided here is coming from purely
personal time and effort and does not represent the opinions or practices of my
employer.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;We use X.509 certificates everywhere today, many times a day, without knowing
so. They are used to secure TLS, e-mail via S/MIME, VPN servers, etc. They even
help protect your connection right now, as you are reading this blog post.&lt;/p&gt;</description></item><item><title>Fixing IP Geolocation: An ISP Guide</title><link>https://blog.daknob.net/fix-ip-geoloc-isp-guide/</link><pubDate>Thu, 03 Nov 2022 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/fix-ip-geoloc-isp-guide/</guid><description>&lt;p&gt;&lt;strong&gt;DISCLAIMER:&lt;/strong&gt; &lt;em&gt;I am currently working for Google. This post is published in my
personal capacity, without using any knowledge I may have obtained from my
employment with them. All the information provided here is coming from purely
personal experience in dealing with this issue.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;There are probably infinitely many reasons why one might want to know the
approximate location of a device based on its IP address. However, this
information is not part of any Internet protocol, therefore third party
services are trying to determine, with the highest accuracy possible, where
each address probably is. There are plenty of free and commercial offerings
that can provide this to operators.&lt;/p&gt;</description></item><item><title>AirPrinting across networks</title><link>https://blog.daknob.net/airprint-across-vlans/</link><pubDate>Mon, 27 Dec 2021 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/airprint-across-vlans/</guid><description>&lt;p&gt;Thanks to Apple, a lot of modern printers and scanners today come with AirPrint
and AirScan, which allows seamless operation of capable devices over the
network, e.g. from an iPhone or a Mac. Linux even went ahead and added support
for that and now users of this OS can finally print too :)&lt;/p&gt;
&lt;p&gt;However, due to how AirPrint works, it does not work across Layer 2 domains
such as VLANs, or over IP-routed networks. Luckily, this is not a problem that
can&amp;rsquo;t be solved. In this post I am publishing the process I followed to allow
printing over any type of network, even across countries.&lt;/p&gt;</description></item><item><title>Configuring COSMOTE VoIP on your PBX</title><link>https://blog.daknob.net/cosmote-voip-pbx/</link><pubDate>Wed, 01 Dec 2021 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/cosmote-voip-pbx/</guid><description>&lt;p&gt;About a month ago, for technical reasons, I was no longer able to use COSMOTE&amp;rsquo;s
CPE in a landline connection with a traditional telephone. I could either spend
time and money in the middle of a pandemic, to have contractors visit and
route some cables, or, I could take the opportunity and do something I&amp;rsquo;ve been
hearing about recently, which is to switch the service to VoIP, and terminate
it to my own PBX.&lt;/p&gt;</description></item><item><title>The utilization of 44/8: the reason I mapped IPv4 &amp; IPv6</title><link>https://blog.daknob.net/mapping-44net/</link><pubDate>Sat, 15 May 2021 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/mapping-44net/</guid><description>&lt;p&gt;In the early days, when the Internet was just beginning, back in 1981, &lt;a href="https://en.wikipedia.org/wiki/Amateur_radio"&gt;radio
amateurs&lt;/a&gt; were allocated, by what
is now known as
&lt;a href="https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority"&gt;IANA&lt;/a&gt;, an
IPv4 block for usage and experimentation by all members of this hobby,
internationally. This block was 44.0.0.0/8, which is a huge amount of address
space by today&amp;rsquo;s standards, but effectively the only allocation size back then.&lt;/p&gt;
&lt;p&gt;This network was mainly used under the
&amp;ldquo;&lt;a href="https://en.wikipedia.org/wiki/AMPRNet"&gt;AMPRNet&lt;/a&gt;&amp;rdquo; name and utilized &lt;a href="https://en.wikipedia.org/wiki/Packet_radio"&gt;packet
radio&lt;/a&gt;, or to put it simply, a
packet-based network (like the Internet) over radio frequencies, wirelessly.
This network was able to interconnect &amp;ldquo;hams&amp;rdquo; (the people that have been
licensed to practice this hobby) around the world, and provide them with
digital connectivity before (access to) the Internet was generally available.&lt;/p&gt;</description></item><item><title>I lost my wallet(s)!</title><link>https://blog.daknob.net/lost-my-wallet/</link><pubDate>Sun, 09 May 2021 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/lost-my-wallet/</guid><description>&lt;p&gt;It is currently 2021, and cryptocurrencies have scored an all-time high in
terms of price, more than doubling the previous event that happened in 2017.
For the record, a Bitcoin (BTC) went for over 51,000 EUR. Even large companies
like Tesla &lt;a href="https://www.cnbc.com/2021/02/08/tesla-buys-1point5-billion-in-bitcoin.html"&gt;are buying large
volumes&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;So during this time, I was wondering if cryptocurrency theft is also on the
rise, because of the increased returns of performing these illegal actions.
After all, it makes sense to try and obtain something by any means, especially
when it became extremely more valuable than before.&lt;/p&gt;</description></item><item><title>The IPv4 Map of 36C3</title><link>https://blog.daknob.net/mapping-36c3/</link><pubDate>Fri, 03 Jan 2020 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/mapping-36c3/</guid><description>&lt;p&gt;Last year (three days ago), I visited
&lt;a href="https://events.ccc.de/congress/2019/wiki/index.php/Main_Page"&gt;36C3&lt;/a&gt;, the 36th
Annual CCC event, held in Leipzig, Germany. This is an event with thousands of
attendees, that gather together to attend talks, hack things, create tools,
showcase new projects, etc. It is an amazing event, that I simply can&amp;rsquo;t
recommend enough.&lt;/p&gt;
&lt;p&gt;During this event, the &lt;a href="https://twitter.com/c3noc"&gt;C3NOC&lt;/a&gt;, under the trademark
CCC Internetmanufaktur™, provides an amazing network, both wired and wireless,
for attendees to use. It spans the entire event area, and people use it
extensively. This network is dual-stack, which means it runs on both IPv6 and
IPv4.&lt;/p&gt;</description></item><item><title>Mapping the Greek Internet - Oct 2019 Edition</title><link>https://blog.daknob.net/mapping-the-greek-inet-oct-19/</link><pubDate>Mon, 04 Nov 2019 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/mapping-the-greek-inet-oct-19/</guid><description>&lt;p&gt;On October of 2019, I attended &lt;a href="https://ripe79.ripe.net/"&gt;RIPE79&lt;/a&gt; in Rotterdam,
which was a very good experience. I had a chance to meet new people, talk to
people I already knew, exchange ideas, and discuss various topics. It&amp;rsquo;s a very
good event, and Ι recommend it, if you can attend.&lt;/p&gt;
&lt;p&gt;During one of the conversations I had there, ironically with another guy from
Crete, &lt;a href="https://twitter.com/vkotronis"&gt;Vasileios Kotronis&lt;/a&gt;, we discussed about
how some companies pay large sums to obtain IPv4 space, yet some others,
especially univerities, have vast and unutilized address space. And then we
wondered, if there was a way to know how much IP Space is being used, and how
much isn&amp;rsquo;t, and it&amp;rsquo;s just sitting there.&lt;/p&gt;</description></item><item><title>Academic Publications</title><link>https://blog.daknob.net/academic/</link><pubDate>Sat, 05 Oct 2019 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/academic/</guid><description>&lt;p&gt;Welcome to the academic part of this website. Here you can find my academic
profile, as well as a list of my peer-reviewed publications, including all the
files, in PDF format. My profile on Google Scholar is
&lt;a href="https://scholar.google.com/citations?user=WZ2I53YAAAAJ"&gt;this&lt;/a&gt;. And here&amp;rsquo;s
&lt;a href="https://dblp.org/pers/hd/c/Chariton:Antonios_A="&gt;DBLP&lt;/a&gt;. My current academic
affiliation is Undergraduate Student, at the &lt;a href="https://www.csd.uoc.gr/"&gt;Computer Science
Department&lt;/a&gt;, of the &lt;a href="https://www.uoc.gr/"&gt;University of
Crete&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id="list-of-publications"&gt;List of Publications&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/zombies-imc-2025.pdf"&gt;A First Look into Long-lived BGP
Zombies&lt;/a&gt;, Iliana Xygkou,
Antonis Chariton, Xenofontas Dimitropoulos, Alberto Dainotti, &lt;em&gt;2025 ACM
Internet Measurement Conference (IMC ’25)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/outopia-eurosec-2022.pdf"&gt;OUTOPIA: Private User Discovery on the
Internet&lt;/a&gt;,
Panagiotis Papadopoulos, Michalis Pachilakis, Antonios A. Chariton, Evangelos
P. Markatos, &lt;em&gt;15th European Workshop on Systems Security (EUROSEC ’22)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/ccsp-toit-2020.pdf"&gt;Design and Implementation of a Compressed Certificate Status Protocol&lt;/a&gt;, Michalis Pachilakis, Antonios A. Chariton, Panagiotis Papadopoulos, Panagiotis Ilia, Eirini Degkleri, Evangelos P. Markatos, &lt;em&gt;ACM Transactions on Internet Technology (TOIT)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/0pass-eurosec-2018.pdf"&gt;Øpass: Zero-storage password management based on password
reminders&lt;/a&gt;, G.
Tzagarakis, P. Papadopoulos, A. A. Chariton, E. Athanasopoulos, E. P.
Markatos, &lt;em&gt;EuroSec 2018&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/wally-asiaccs-2018.pdf"&gt;Where&amp;rsquo;s Wally?: How to Privately Discover your Friends on the
Internet&lt;/a&gt;, P.
Papadopoulos, A.A. Chariton, E. Athanasopoulos, E.P. Markatos, &lt;em&gt;AsiaCCS 2018&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/ccsp-infocom-2017.pdf"&gt;CCSP: A compressed certificate status
protocol&lt;/a&gt;, A.A.
Chariton, E. Degkleri, P. Papadopoulos, P. Ilia, E.P. Markatos, &lt;em&gt;Infocom 2017&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/dcsp-womencourage-2016.pdf"&gt;Leveraging DNS for timely SSL Certificate
Revocation&lt;/a&gt;, E.
Degkleri, A.A. Chariton, P. Ilia, P. Papadopoulos, E.P. Markatos, &lt;em&gt;womENcourage
2016&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pdf.daknob.net/academic/dcsp-eurosec-2016.pdf"&gt;DCSP: Performant Certificate Revocation a DNS-based
approach&lt;/a&gt;, A.A.
Chariton, E. Degkleri, P. Papadopoulos, P. Ilia, E.P. Markatos, &lt;em&gt;EuroSec 2016&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Contact Information</title><link>https://blog.daknob.net/contact/</link><pubDate>Sat, 05 Oct 2019 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/contact/</guid><description>&lt;p&gt;If you&amp;rsquo;d like to contact me, apart from the various social options available in
the menu, you can use the following e-mail addresses, which are the preferred
methods of communication:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Preferred&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="mailto:daknob@daknob.net"&gt;daknob@daknob.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gmail&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="mailto:daknob.mac@gmail.com"&gt;daknob.mac@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;ProtonMail&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="mailto:daknob@pm.me"&gt;daknob@pm.me&lt;/a&gt;&lt;/p&gt;</description></item><item><title>The state of RPKI Deployment in Greece</title><link>https://blog.daknob.net/rpki-deployment-greece-feb-19/</link><pubDate>Mon, 25 Feb 2019 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/rpki-deployment-greece-feb-19/</guid><description>&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Resource_Public_Key_Infrastructure"&gt;RPKI&lt;/a&gt;, or Resource Public Key Infrastructure, is a way to cryptographically produce and sign messages that bind a particular IP prefix with an originating Autonomous System. It essentially contains the information &amp;ldquo;&lt;code&gt;192.0.2.0/24&lt;/code&gt; up to &lt;code&gt;/24&lt;/code&gt; can originate in BGP from &lt;code&gt;AS64500&lt;/code&gt;&amp;rdquo;. Or, &amp;ldquo;&lt;code&gt;2001:db8::/32&lt;/code&gt; up to &lt;code&gt;/48&lt;/code&gt; can originate in BGP from &lt;code&gt;AS64500&lt;/code&gt;&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;These messages, after they are signed by the rightful owner of &lt;code&gt;192.0.2.0/24&lt;/code&gt; or &lt;code&gt;2001:db8::/32&lt;/code&gt;, can be made available to anyone, so network operators can protect against accidents, such as a typo, causing traffic to be sent to the wrong destination, or against malicious attacks, with the purpose of hijacking IP prefixes using BGP, to monitor or change traffic.&lt;/p&gt;</description></item><item><title>Not everyone works for you</title><link>https://blog.daknob.net/not-everyone-works-for-you/</link><pubDate>Tue, 07 Mar 2017 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/not-everyone-works-for-you/</guid><description>&lt;p&gt;In the past few days, a lot of people started complaining about &lt;a href="https://letsencrypt.org/"&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt; and how it has issued TLS Certificates for &lt;a href="https://www.paypal.com/"&gt;PayPal&lt;/a&gt;. Various posts like &lt;a href="https://community.letsencrypt.org/t/a-fake-paypal-phishing-website-is-using-lets-encrypt-certificate/20760"&gt;this&lt;/a&gt; were written to complain about that, and some people even went as far as writing blog posts for Let&amp;rsquo;s Encrypt to &lt;a href="https://www.thesslstore.com/blog/lets-encrypt-paypal/"&gt;stop issuing certificates with the word &amp;ldquo;PayPal&amp;rdquo;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Apparently, a lot of people agree with this. That last blog post even mentions that Certificate Authorities performed checks and still do, to try and avoid issuing certificates with this word. Luckily, some people &lt;a href="https://scotthelme.co.uk/lets-encrypt-are-enabling-the-bad-guys-and-why-they-should/"&gt;are still reasonable&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>"Security" companies and abuse e-mails</title><link>https://blog.daknob.net/security-companies-and-abuse-e-mails/</link><pubDate>Tue, 07 Feb 2017 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/security-companies-and-abuse-e-mails/</guid><description>&lt;p&gt;The Internet, like almost anything invented by humans, has been used to conduct malicious acts. This can be something not really important like comment spam, all the way to very important cases that are usually investigated by law enforcement like private information and user data theft. While running a Tor Exit Node, I had the chance to witness a lot of that stuff. This, unfortunately, isn&amp;rsquo;t an easy problem to solve, and most approaches have failed.&lt;/p&gt;</description></item><item><title>Debian Firewall when using Docker</title><link>https://blog.daknob.net/debian-firewall-docker/</link><pubDate>Mon, 02 Jan 2017 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/debian-firewall-docker/</guid><description>&lt;p&gt;Having a firewall is something that&amp;rsquo;s necessary, in my opinion, for every server. Not only for those with a Public IP Address, for any server. Not only for IPv4, for any IP version.&lt;/p&gt;
&lt;p&gt;Running a firewall and managing it adds overhead to the server administration and most people either ignore it, or use their provider&amp;rsquo;s firewall. Amazon and Google have done a great work in pushing people to use them in their clouds, but often that&amp;rsquo;s not enough.&lt;/p&gt;</description></item><item><title>Guarding your Tor Exit's DNS</title><link>https://blog.daknob.net/guarding-your-tor-exits-dns/</link><pubDate>Tue, 04 Oct 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/guarding-your-tor-exits-dns/</guid><description>&lt;p&gt;In the past few days, a &lt;a href="https://nymity.ch/tor-dns/"&gt;study&lt;/a&gt; was released detailing some attacks against the &lt;a href="https://torproject.org/"&gt;Tor Network&lt;/a&gt;. These attacks made it into the &lt;a href="http://www.zdnet.com/article/how-dns-can-be-used-to-unmask-tor-users/"&gt;news&lt;/a&gt; because one could compromise Tor Users&amp;rsquo; anonymity by examining the DNS queries from exit nodes.&lt;/p&gt;
&lt;p&gt;The argument made by the researchers is that while HTTP traffic may be encrypted, DNS traffic is sent in plaintext, and can usually traverse more networks, before it eventually reaches its final destination. In addition to that, they also discovered that about 40% of the Tor Exit Nodes use Google&amp;rsquo;s Public DNS&amp;rsquo;, in the IP Addresses &lt;code&gt;8.8.8.8&lt;/code&gt;, &lt;code&gt;8.8.4.4&lt;/code&gt;, &lt;code&gt;2001:4860:4860::8888&lt;/code&gt;, and &lt;code&gt;2001:4860:4860::8844&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>Running a Tor Exit Node for fun and e-mails</title><link>https://blog.daknob.net/running-a-tor-exit-node-for-fun-and-e-mails/</link><pubDate>Fri, 02 Sep 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/running-a-tor-exit-node-for-fun-and-e-mails/</guid><description>&lt;p&gt;The &lt;a href="https://www.torproject.org/"&gt;Tor Project&lt;/a&gt; is a non-profit organization in the United States that created Tor, The Onion Router, a free software that creates an open network of volunteers which helps people anonymize their traffic by routing it through three or more other computers before it reaches its final destination.&lt;/p&gt;
&lt;p&gt;Tor got its name from the encryption that happens during the relaying of the information. Every time a user wants to access a website using Tor, they create a circuit between three or more nodes in the network. Afterwards, they encrypt the data with the last node&amp;rsquo;s public key, then they encrypt the output with the middle node&amp;rsquo;s public key, and finally they encrypt that output with the first node&amp;rsquo;s public key. This creates an message with several encryption layers, which needs to be peeled by each node like an onion.&lt;/p&gt;</description></item><item><title>Capturing flags in Thessaloniki</title><link>https://blog.daknob.net/capturing-flags-in-thessaloniki/</link><pubDate>Fri, 26 Aug 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/capturing-flags-in-thessaloniki/</guid><description>&lt;p&gt;Earlier this summer, I have participated in the organization of a Capture the Flag competition in &lt;a href="https://www.auth.gr"&gt;Aristotle University of Thessaloniki&lt;/a&gt; for students of the &lt;a href="http://www.csd.auth.gr/en/"&gt;Computer Science / Informatics Department&lt;/a&gt;. It was co-organized by me, &lt;a href="https://spanagiot.gr/"&gt;Spyridon Rafail Panagiotopoulos&lt;/a&gt;, and &lt;a href="https://degex.gr/"&gt;Kostas Mpenos&lt;/a&gt;, and supervised by &lt;a href="http://www.csd.auth.gr/en/staff/faculty?view=user&amp;amp;ro=1&amp;amp;id=28"&gt;Dr. Konstantinos Draziotis&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Organizing a Capture the Flag competition is not easy, especially in our situation where we had almost 3 days to do everything. This included coming up with challenges, designing and setting up the infrastructure, publishing information about the event, and in general doing everything that&amp;rsquo;s needed. For those familiar with such things, this is a very difficult thing to accomplish. Luckily, we managed to pull it off, with something like 4-5 hours of sleep total during these days.&lt;/p&gt;</description></item><item><title>Setting up EdgeMAX Devices for OTE IPv6</title><link>https://blog.daknob.net/setting-up-edgemax-devices-for-ote-ipv6/</link><pubDate>Thu, 07 Jul 2016 21:30:00 +0000</pubDate><guid>https://blog.daknob.net/setting-up-edgemax-devices-for-ote-ipv6/</guid><description>&lt;p&gt;I spent some time yesterday trying to make an EdgeMAX device, namely the &lt;a href="https://www.ubnt.com/edgemax/edgerouter-x-sfp/"&gt;EdgeRouter X SFP&lt;/a&gt; work in an &lt;a href="https://www.cosmote.gr/"&gt;OTE&lt;/a&gt; ADSL connection. Setting it up is very easy, however I found IPv6 a little bit trickier to implement properly, therefore I am writing this as a documentation (for future {generations, reference}).&lt;/p&gt;
&lt;p&gt;This tutorial is simple and works on all EdgeMAX Devices like the &lt;a href="https://www.ubnt.com/edgemax/edgerouter-x/"&gt;EdgeRouter X&lt;/a&gt;, &lt;a href="https://www.ubnt.com/edgemax/edgerouter-lite/"&gt;EdgeRouter Lite&lt;/a&gt;, &lt;a href="https://www.ubnt.com/edgemax/edgerouter-poe/"&gt;EdgeRouter PoE&lt;/a&gt;, &lt;a href="https://www.ubnt.com/edgemax/edgerouter/"&gt;EdgeRouter&lt;/a&gt;, and the amazing &lt;a href="https://www.ubnt.com/edgemax/edgerouter-pro/"&gt;EdgeRouter Pro&lt;/a&gt;. The only thing it needs is the CPE provided by the ISP, in this example a ZTE H108NS by OTE, and PPPoE credentials with support for IPv6.&lt;/p&gt;</description></item><item><title>Get eBay Users' Personal Info for free!</title><link>https://blog.daknob.net/get-ebay-users-personal-info-for-free/</link><pubDate>Thu, 07 Jul 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/get-ebay-users-personal-info-for-free/</guid><description>&lt;p&gt;&lt;a href="https://www.ebay.com"&gt;eBay&lt;/a&gt; is one of the largest e-commerce websites available, especially to people in countries without &lt;a href="https://www.amazon.com/"&gt;Amazon&lt;/a&gt;. It does not sell its products directly, but instead relies on its users, therefore making an important distinction between sellers and buyers.&lt;/p&gt;
&lt;p&gt;Technically speaking there is not any restriction, which means a buyer can sell an item, and, of course, a seller can buy something, however usually you find accounts that only do one thing. Each user has a score on their profile as a seller and as a buyer, which means the reviews of every transaction are not merged.&lt;/p&gt;</description></item><item><title>In Transparency, Size Matters</title><link>https://blog.daknob.net/size-matters/</link><pubDate>Thu, 23 Jun 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/size-matters/</guid><description>&lt;p&gt;In my &lt;a href="https://blog.daknob.net/a-secure-week/"&gt;previous post&lt;/a&gt; I spent one week without access to non-HTTPS websites. It was difficult, but I managed it. It was a challenge to determine how much of the web is HTTPS yet. It went well, mostly thanks to &lt;a href="https://cloudflare.com/"&gt;CloudFlare&lt;/a&gt;, but got me thinking about HTTPS again.&lt;/p&gt;
&lt;p&gt;See, one of the three benefits of using this, more secure, protocol is authenticity. When a website has a valid certificate, there&amp;rsquo;s a Certificate Authority out there somewhere that has explicitly marked this public/private key pair as trusted, and therefore your device inherently trusts it. More specifically, it marked this as trusted for only a specific domain or collection of domains, not for everything.&lt;/p&gt;</description></item><item><title>A Secure Week</title><link>https://blog.daknob.net/a-secure-week/</link><pubDate>Tue, 21 Jun 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/a-secure-week/</guid><description>&lt;p&gt;As an engineer, I am genuinely interested in challenges. Not necessarily the problem-solving challenges that we can face daily as a profession, but others forms as well. This is why I decided to challenge myself in a computer security related way.&lt;/p&gt;
&lt;p&gt;For some of my daily Internet browsing, I make use of Google Chrome, and I have the &lt;a href="https://www.eff.org/https-everywhere"&gt;HTTPS Everywhere&lt;/a&gt; extension installed. What this browser extension (claims it) does is check every website I visit and determine whether there is an HTTPS version available, and if there is, it redirects me there.&lt;/p&gt;</description></item><item><title>The callback</title><link>https://blog.daknob.net/the-callback/</link><pubDate>Tue, 15 Mar 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/the-callback/</guid><description>&lt;p&gt;Every two years my phone contract expires. This is the maximum duration of a phone contract for an individual so I have to spend some time on updating it every now and then. The problem is that every time there are new offers and usually your old plan is not available. So you have to find a new one.&lt;/p&gt;
&lt;p&gt;After looking at the new plan catalogue of my carrier, I figured that for the same specs (talk time, SMS and bandwidth) I need to pay a little bit over 2.5x more money than before. Of course, that is something no sane person would do. So I started looking at the competition for solutions.&lt;/p&gt;</description></item><item><title>Now on Tor!</title><link>https://blog.daknob.net/now-on-tor/</link><pubDate>Thu, 07 Jan 2016 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/now-on-tor/</guid><description>&lt;p&gt;The &lt;a href="https://torproject.org"&gt;Tor Project&lt;/a&gt; is a famous network with an anonymizing alternative routing protocol called &lt;strong&gt;T&lt;/strong&gt;he &lt;strong&gt;O&lt;/strong&gt;nion &lt;strong&gt;R&lt;/strong&gt;outing Protocol. The way it works is several people run Tor nodes around the world and your traffic is being routed through at least three of them, before reaching its destination.&lt;/p&gt;
&lt;p&gt;Its intended use is to avoid censorship in countries like China, with the Great Firewall, and in general provide unrestricted and anonymous access to websites.&lt;/p&gt;</description></item><item><title>Grab some popcorn and launch Popcorn Time</title><link>https://blog.daknob.net/grab-some-popcorn-and-launch-popcorn-time/</link><pubDate>Sun, 02 Aug 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/grab-some-popcorn-and-launch-popcorn-time/</guid><description>&lt;p&gt;Movie and TV Show Piracy has been going on for years. There are many websites that offer movie streaming online for free, as well as many torrent sites that provide you with links to download and watch anything. However, even pirates want simplicity and friendly user interfaces from time to time. This is where &lt;a href="https://popcorntime.io"&gt;Popcorn Time&lt;/a&gt; comes to play. It provides an easy-to-use, Netflix-style UI for people to browse for Movies, TV Series and Anime.&lt;/p&gt;</description></item><item><title>Password Managers and Security Questions</title><link>https://blog.daknob.net/password-managers-and-security-questions/</link><pubDate>Fri, 24 Jul 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/password-managers-and-security-questions/</guid><description>&lt;p&gt;Nowadays, with all the website hacks the user credentials leaked, a password manager is one of the most valuable assets. It allows you to use a different, ridiculously long and completely random string as a password for every website you visit.&lt;/p&gt;
&lt;p&gt;That way, even if a website is actually hacked, and the hackers retrieve the password hashes, it would take them billions of times the age of the universe to crack your password. But even if they managed to do that, or if the website stored the passwords in a plain-text format, getting the password would serve them of no use.&lt;/p&gt;</description></item><item><title>e-Voting: Math vs. Implementation</title><link>https://blog.daknob.net/e-voting-math-vs-implementation/</link><pubDate>Thu, 09 Jul 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/e-voting-math-vs-implementation/</guid><description>&lt;p&gt;Technology has a deep impact in most people&amp;rsquo;s lives today. We all use the Internet when possible and we seem to do almost all we can online. We pay bills, we buy food and goods, etc.&lt;/p&gt;
&lt;p&gt;One of the things we don&amp;rsquo;t do yet is vote electronically for critical elections, like Government / Presidential Elections or a Referendum.&lt;/p&gt;
&lt;p&gt;In the traditional voting process, millions of euros are invested in a single voting event because we think more people can walk up to a certain place and vote than can vote using an Internet-connected computer. We also don&amp;rsquo;t completely understand the technologies behind e-voting and we don&amp;rsquo;t trust them. This can be the case because we still have a fear for technology.&lt;/p&gt;</description></item><item><title>The Best HTTPS Configuration</title><link>https://blog.daknob.net/the-best-https-configuration/</link><pubDate>Mon, 22 Jun 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/the-best-https-configuration/</guid><description>&lt;p&gt;Nowadays, the web is moving towards making HTTPS mandatory across all websites. Initiatives like &lt;a href="https://letsencrypt.org/"&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt; that offer dead-simple https installation, or Root CAs like &lt;a href="https://www.startssl.com/"&gt;StartSSL&lt;/a&gt; that offer unlimited free certificates or even browsers like &lt;a href="https://www.google.com/chrome/browser/desktop/index.html"&gt;Google Chrome&lt;/a&gt; that already started deprecating HTTP all contribute into going towards this direction. Many of us think this is the correct way. An HTTPS-only web provides a lot of great advantages over the traditional, HTTP one.
However, just because you can see that little green &lt;code&gt;https://&lt;/code&gt; in your address bar doesn&amp;rsquo;t mean you&amp;rsquo;re secure. There is a vast amount of possible SSL/TLS configurations that a system administrator can make that range from the most secure one yet, all the way to &amp;ldquo;Rebranded HTTP&amp;rdquo;. Currently, configuring a web server to be really secure is increasingly difficult and requires the administrator to always watch the latest news for the upcoming attacks and deprecations that may require a change in the configuration.
Fortunately, tools like &lt;a href="https://www.ssllabs.com/ssltest/"&gt;Qualys&amp;rsquo; SSL Server Test&lt;/a&gt; make the job a little bit easier, as you can run that test against your (or anybody else&amp;rsquo;s) servers and see a little nice grade on how well you did. This grade can range from &lt;code&gt;A+&lt;/code&gt; all the way to &lt;code&gt;F&lt;/code&gt;, or even &lt;code&gt;T&lt;/code&gt;. At least that&amp;rsquo;s how low I&amp;rsquo;ve seen it go. Maybe you can make an even worse configuration.. &lt;a href="https://www.ssllabs.com/ssltest/analyze.html?d=uoc.gr"&gt;;-)&lt;/a&gt;
Now getting an &lt;code&gt;A+&lt;/code&gt; is not really difficult and ensures that your website is relatively secure, at least as far as HTTPS is concerned. Let&amp;rsquo;s see how we can get this grade in &lt;code&gt;Apache 2.2.22&lt;/code&gt; on &lt;code&gt;Debian Jessie 8.0&lt;/code&gt; with &lt;code&gt;mod_ssl&lt;/code&gt;. For this to work, you need a valid HTTPS Certificate from a Trusted Certificate Authority. In order to start for free, you can use StartSSL. Now you need to make sure this certificate is signed with &lt;code&gt;SHA-2&lt;/code&gt; or &lt;code&gt;SHA-256&lt;/code&gt; (actually the latter is a part of the first). After that, you can create a &lt;code&gt;VritualHost&lt;/code&gt; for your secure website:&lt;/p&gt;</description></item><item><title>Chrome, Chromium, and Certificate Caching</title><link>https://blog.daknob.net/chrome-chromium-and-certificate-caching/</link><pubDate>Thu, 18 Jun 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/chrome-chromium-and-certificate-caching/</guid><description>&lt;p&gt;Just like a good System Administrator, I set on one day to replace the current
certificate for the &lt;a href="https://daknob.net/"&gt;main site&lt;/a&gt; that&amp;rsquo;s used for HTTPS. I
issue a new CSR, I send it to the Certificate Authority, I get the Signed
Certificate, Revoke the old one and after a total of 5-10 minutes I have the
web server serving the new certificate to all connecting clients.&lt;/p&gt;
&lt;p&gt;Of course, I need to verify that I do indeed serve the new certificate and
everything went correctly. I had the website open in Google Chrome on Mac OS X
and I had not refresh it yet after the certificate change. I click the
&lt;code&gt;https://&lt;/code&gt; before the URL and I examine the certificate. Everything is fine,
since the certificate is the old one. I press &lt;code&gt;⌘+R&lt;/code&gt;, which is refresh for all
you Windows / Linux / BSD users to refresh the page, I click the certificate
and I still see the old version. I ssh into the web server again, reload the
configuration, refresh again, and still it shows the old certificate. I even
try restarting the entire web server, still nothing. I go to Chrome, press
&lt;code&gt;⌘+Shift+R&lt;/code&gt;, which is Force Refresh (purge cache), and I still see the same
certificate. I type the URL again, press &lt;code&gt;Enter&lt;/code&gt;, still the same. I open a new
Tab, a new Window, still the old certificate. Every other browser could
perfectly see the new certificate so it must be something with caching.&lt;/p&gt;</description></item><item><title>Physical Security - Bad Design Practices</title><link>https://blog.daknob.net/physical-security-bad-practice/</link><pubDate>Thu, 18 Jun 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/physical-security-bad-practice/</guid><description>&lt;p&gt;Today I happened to visit a store that had the front desk, and a designated
area in the back that was only accessible to employees. It had a nice big lock
that only opened after successful RFID Authentication. It seemed like a system
that may not be trivial to bypass unless you get a card cloner, get the card
content and hope it&amp;rsquo;s not dynamic, and in general it seemed secure.&lt;/p&gt;</description></item><item><title>Authentication In File Uploader</title><link>https://blog.daknob.net/authentication-in-file-uploader/</link><pubDate>Wed, 17 Jun 2015 00:00:00 +0000</pubDate><guid>https://blog.daknob.net/authentication-in-file-uploader/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In my Department at the &lt;a href="http://www.uoc.gr"&gt;University Of Crete&lt;/a&gt; we have a set
of computers where you can login using &lt;code&gt;ssh(1)&lt;/code&gt; and access all your files,
write code, run programs, and in general perform all tasks you may need without
having to &lt;del&gt;install linux on&lt;/del&gt; remove Windows from your computer. For
&amp;ldquo;Security&amp;rdquo; reasons, these computers are behind two stripped, chrooted &amp;ldquo;Gates&amp;rdquo;.
You cannot ssh into one of the computers directly, you first have to ssh to one
of the gates and then from there ssh into your desired computer. Pretty much
the only thing in the gates is &lt;code&gt;ssh(1)&lt;/code&gt; and &lt;code&gt;enable&lt;/code&gt;, the second of which does
a port forward to the computer you need.&lt;/p&gt;</description></item></channel></rss>