<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<link rel="self" type="application/atom+xml" href="https://forum.eggheads.org/app.php/feed/topic/12202" />

	<title>egghelp/eggheads community</title>
	<subtitle>Discussion of eggdrop bots, shell accounts and tcl scripts.</subtitle>
	<link href="https://forum.eggheads.org/index.php" />
	<updated>2006-08-05T09:13:11-04:00</updated>

	<author><name><![CDATA[egghelp/eggheads community]]></name></author>
	<id>https://forum.eggheads.org/app.php/feed/topic/12202</id>

		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2006-08-05T09:13:11-04:00</updated>

		<published>2006-08-05T09:13:11-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65179#p65179</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65179#p65179"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65179#p65179"><![CDATA[
In this case I can only assume they've gone even further in code modifications, since that's what I generally use one those rare occasions when I *cough*forget*cough* which passwd I used...<br><br>md5sums on channels-file would be a good idea, as it's read (atleast in plain eggies) using "readtclprog"..<br>Then again, injecting evil code in the very short window of oppertunity from where the bot saves the channels-settings at the start of the rehash, until it's re-read, would be quite difficult (but not impossible)<br><br>I do admit I was wrong on strace<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Sat Aug 05, 2006 9:13 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[KrzychuG]]></name></author>
		<updated>2006-08-05T02:36:55-04:00</updated>

		<published>2006-08-05T02:36:55-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65175#p65175</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65175#p65175"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65175#p65175"><![CDATA[
<blockquote class="uncited"><div>Config-file is or +nevaluated like any other script... <br><br>Try this at the end of your config-file: <br>adduser haxxor "haxxor!*@haxxors.host.com" <br>setuser haxxor pass haxxor <br>chattr haxxor +n</div></blockquote>That won't work. Config file isn't just a tcl script and it's quite limited:<br><div class="codebox"><p>Code: </p><pre><code>.tcl exec cat cfg/test.cfgTcl: #Evangeline: Config File (For Evangeline v1.0+)Tcl:Tcl: nick "test"Tcl: altnick "test?"Tcl: botnet-nick "test"Tcl: realname "-=test=-"Tcl: username "test"Tcl: listenport 1024Tcl: ircservers { poznan.irc.pl:6663 lublin.irc.pl:7776 warszawa.irc.pl:6667 krakow.irc.pl:6667 }Tcl: #my-ip ""Tcl: #my-hostname ""Tcl:Tcl:Tcl: ## DON'T TOUCH ANYTHING BELOW ##Tcl: loadstart [clock clicks]Tcl: servers $ircserversTcl: logfile mcobxsk * "logs/${botnet-nick}.log"Tcl: userfile "${datadir}${botnet-nick}.uf"Tcl: chanfile "${datadir}${botnet-nick}.cf"Tcl: adduser haxxor "haxxor!*@haxxors.host.com"Tcl: setuser haxxor pass haxxorTcl: chattr haxxor +nTcl: #Evangeline: IPV4 Config.rehash[08:22:29] #KrzychuG# rehashRehashing.[08:22:29] Rehashing ...[08:22:29] * IRC NICK CHANGE: e222 -&gt; test[08:22:29] Loaded Evangeline Config: 'cfg/test.cfg'[08:22:29] Trying to open telnet port(s)...[08:22:29] Listening at telnet port 1024 (all)[08:22:29][08:22:29]  --------&lt; Bot's Info &gt;---------[08:22:29]  Version....: 1.1.2, 1.3.3[08:22:29]  Name.......: test[08:22:29]  IP Address.: System Default IP[08:22:29]  Port.......: 1024[08:22:29][08:22:29]  Completed loading in 0.121338s[08:22:29]  -------------------------------[08:22:29][08:22:29] Loaded Evangeline Userfile: '.data/.bdata/test.uf'.[08:22:31] NICK IN USE: test (keeping 'e222')..match *[08:22:41] #KrzychuG# match **** Matching '*':HANDLE          PASS NOTES FLAGS           LASTKrzychuG        yes      0 jmnoptx         08:20 (partyline)  HOSTS: -telnet!*@*--- Found 1 match.</code></pre></div><blockquote class="uncited"><div>Then just kill -SIGHUP pidofbot</div></blockquote>And what should happend? It won't rehash since 'kill on hup' is enabled.<br><br>With chanfile you may be right, i never checked it but AFAIR it's MD5 checksum protected so should be secure as well.<br><br>With strace you won't be able to see anything about userfile except that it's writted or read. With gdb you may even not connect to already running bot (if ptrace protection is enabled) and even if you'll be able to do that you won't see plaintext userfile.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3672">KrzychuG</a> — Sat Aug 05, 2006 2:36 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[rosc2112]]></name></author>
		<updated>2006-08-05T02:02:47-04:00</updated>

		<published>2006-08-05T02:02:47-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65174#p65174</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65174#p65174"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65174#p65174"><![CDATA[
<blockquote class="uncited"><div>2. strace won't help too much. You won't be able to see the key and even if you stop process in the middle of writing you won't get clear userfile. It's saved line by line. There is no raw data stored anywhere (except memory for a short ammount of time).</div></blockquote>Hm..maybe I'm naieve, but if there's raw data stored in memory, wouldn't you be able to simply run this through debug and get it?<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7395">rosc2112</a> — Sat Aug 05, 2006 2:02 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2006-08-04T19:50:03-04:00</updated>

		<published>2006-08-04T19:50:03-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65162#p65162</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65162#p65162"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65162#p65162"><![CDATA[
Config-file is evaluated like any other script...<br><br>Try this at the end of your config-file:<br>adduser haxxor "haxxor!*@haxxors.host.com"<br>setuser haxxor pass haxxor<br>chattr haxxor +n<br><br>Then just kill -SIGHUP pidofbot<br><br>You'll find it behaving much like if putting it in any other script...<br>Same thing goes for channels-file...<br><br>As for strace, password would still be encrypted yes (since it's encrypted in a checksum-fashion), rest of the output would still be in plaintext, giving evil haxxor a login-name and a passwdhash to use for bruteforce/dictionary cracking. And there's quite a few script-kiddie programs out there for just that sinlge purpose :/<br><br>And once again, there's nothing wrong with adding extra encryptions, as long as you keep in mind it does not improve security against any malicious hacker with atleast some programming/debugging experience..<br><br>Checksumming do however provide some security; not by guaranteeing that all files are untouch, but that any file failing checksumming is certainly compromized (taken granted that the tools and list of correct checksums are properly protected)<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Fri Aug 04, 2006 7:50 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[KrzychuG]]></name></author>
		<updated>2006-08-04T19:21:38-04:00</updated>

		<published>2006-08-04T19:21:38-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65160#p65160</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65160#p65160"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65160#p65160"><![CDATA[
1. In my case userfile is also protected by MD5 checksum set in encrypted file hidden in tcpro compiled script ;) Config file isn't a tcl script, channel file is left almost untouched (except MD5 checksum check). If user will enable possibility to load custom tcl scripts that's the small security risk he have to agree with ;)<br>2. strace won't help too much. You won't be able to see the key and even if you stop process in the middle of writing you won't get clear userfile. It's saved line by line. There is no raw data stored anywhere (except memory for a short ammount of time).<br>3. Point.<br><br>Well, usually you don't have any affect on shell security since you're just a client (in most cases), not an admin and even if encrypted files aren't 100% secure (because they aren't) it's always better than nothing in case of any unexpected visitors. That's my personal oppionion, no matter if it causes some troubles with updating that software and can be cracked.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3672">KrzychuG</a> — Fri Aug 04, 2006 7:21 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[nml375]]></name></author>
		<updated>2006-08-04T14:33:56-04:00</updated>

		<published>2006-08-04T14:33:56-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65145#p65145</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65145#p65145"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65145#p65145"><![CDATA[
A few things worth mentioning on the subject:<ol style="list-style-type:decimal"><li>Encrypting your userfile does'nt help much unless you also encrypt/checksum any file parsed as a tcl-script (such as config-file, channels, file, scripts).</li><li>In many cases strace is available (and as stated by some poster above, this is entirely up to the shell-admin setting up the kernel). Makes a nice dump of the userfile every time it's saved (prior encryption).</li><li>Security by obscurity many times have the downside of making you believe your system/application/service is secure when it really is'nt</li></ol>This said, there's nothing wrong with applying encryption/checksums.. Just don't think it'll make a great contribution to your bot's security/integrity.<br>Personally tho, I'd put more effort into preventing intrusion/shell compromize in the first place...<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=8052">nml375</a> — Fri Aug 04, 2006 2:33 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[KrzychuG]]></name></author>
		<updated>2006-08-01T14:32:35-04:00</updated>

		<published>2006-08-01T14:32:35-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65077#p65077</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65077#p65077"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65077#p65077"><![CDATA[
<blockquote class="uncited"><div>not me (although 10 years ago I might have given it a try), but the crack monkey who broke into your shell account and stole the binary; what makes you think that cracking a known protection scheme (you made your code public, remember?) is harder than cracking, say, Windows apps that you don't have source code of? and such are being cracked each and every day by the dozens</div></blockquote>Just give it a try and feel free to post results. I suggest you to check <a href="http://friends.polibuda.info/~grusin/src/psotnic-current.tar.gz" class="postlink">psotnic source code</a> as well. You may be suprised.<br><br>You assume that every person who gain access to shell account and steal binary is a a good cracker? Don't forget that quite a lot of people playing those stupid wars, bots are using popular exploits and doesn't really know much about cracking. They're mostly a kids who want to have fun. At least that's how IRCnet looks like today. Some of them can't even handle compressed file without proper extension or header. That's the real word, not everyone is a proffesionalist and such, let's say, protection is always better that pure, fully viewable and editable userfile. There is always a chance that thief will give up tryin'.<br><br>In evangeline case even non-ecrypted userfile won't help you to add users since bot won't load file with diffrent MD5 checksum.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3672">KrzychuG</a> — Tue Aug 01, 2006 2:32 pm</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[demond]]></name></author>
		<updated>2006-08-01T00:22:51-04:00</updated>

		<published>2006-08-01T00:22:51-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65054#p65054</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65054#p65054"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65054#p65054"><![CDATA[
<blockquote class="uncited"><div>The only way to give encryption some little use would be to make the key used to be entered on start up (and therefore be only avaible in memory and not on hard disc). Of course that way your bot will nolonger be able to restart via cron <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_biggrin.gif" width="15" height="15" alt=":D" title="Very Happy">. The possibility to read the eggdrops memory will most likely depend on the kernel used.</div></blockquote>you got that right - "little use" - but not because of the reason you think<br><br>the bad guys, after breaking into your shell, would typically get root and install sniffer and terminal logger, so typing in the key will be, as you put it, of little use<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=5056">demond</a> — Tue Aug 01, 2006 12:22 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[demond]]></name></author>
		<updated>2006-08-01T00:11:53-04:00</updated>

		<published>2006-08-01T00:11:53-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65053#p65053</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65053#p65053"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65053#p65053"><![CDATA[
<blockquote class="uncited"><div>Who said that key is public?</div></blockquote>I meant your source code that you provide to a public forum, not the key<blockquote class="uncited"><div>Yes, it's stored somewhere in binary but you won't get it out so easly as you think.</div></blockquote>not me (although 10 years ago I might have given it a try), but the crack monkey who broke into your shell account and stole the binary; what makes you think that cracking a known protection scheme (you made your code public, remember?) is harder than cracking, say, Windows apps that you don't have source code of? and such are being cracked each and every day by the dozens<blockquote class="uncited"><div>Besides, the point of uf encryption method i presented is to show how can it be done now how it should be done. That's one of the simplest and nicest solution, but not the only one.</div></blockquote>I'd concur the point of all that is mostly educational - and not much more than that<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=5056">demond</a> — Tue Aug 01, 2006 12:11 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[De Kus]]></name></author>
		<updated>2006-07-31T11:10:15-04:00</updated>

		<published>2006-07-31T11:10:15-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=65037#p65037</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=65037#p65037"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=65037#p65037"><![CDATA[
The only way to give encryption some little use would be to make the key used to be entered on start up (and therefore be only avaible in memory and not on hard disc). Of course that way your bot will nolonger be able to restart via cron <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_biggrin.gif" width="15" height="15" alt=":D" title="Very Happy">. The possibility to read the eggdrops memory will most likely depend on the kernel used.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=2382">De Kus</a> — Mon Jul 31, 2006 11:10 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[KrzychuG]]></name></author>
		<updated>2006-07-29T11:53:19-04:00</updated>

		<published>2006-07-29T11:53:19-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=64988#p64988</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=64988#p64988"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=64988#p64988"><![CDATA[
Who said that key is public? In case i presented it's random (generated by another program) or set by user (up to 32 chars as far as i remember). Yes, it's stored somewhere in binary but you won't get it out so easly as you think. Besides, the point of uf encryption method i presented is to show how can it be done now how it should be done. That's one of the simplest and nicest solution, but not the only one.<br><br>There is always a chance that such userfile will be decrypted and because there are no 100% sure methods Eggdrop will not support userfile encryption by default. No matter what i don't see a reason to forget about it and abandon that topic. It is still a problem for some lamers who usually taking part in IRC wars and believe me, it helps.<br><br>I my old botpack i used compressed chanfiles just for fun or to save few bytes on HDD (reason is not really important). Quite a lot of peole who used that botpack had troubles with reading it and even though it's encrypted somehow. Since people have troubles with reading doc files (where i mentioned that chanfile is compressed) they won't handle it ;)<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3672">KrzychuG</a> — Sat Jul 29, 2006 11:53 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[demond]]></name></author>
		<updated>2006-07-29T10:07:10-04:00</updated>

		<published>2006-07-29T10:07:10-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=64986#p64986</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=64986#p64986"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=64986#p64986"><![CDATA[
<blockquote class="uncited"><div>Look <a href="http://www.averse.piasta.pl/list/index.php?act=list&amp;op=get&amp;target=evangeline%2Fsrc%2Fevangeline%2Fsrc%2Fuserent.c" class="postlink">here</a> for efprintf references, then download whole (or at least *user*.c files) source code and find rest of code. In userent.c you'll find few function which saves most of user data to userfile. Some parts are in flags.h, some in userrec.c or users.c. You need to dig for it. It's a bot based on Eggdrop 1.6.16 so you should be able to match most of the code with modern eggdrop and find out the diffrences.</div></blockquote>what's the point of public domain encryption that carries its key within itself? <img class="smilies" src="https://forum.eggheads.org/images/smilies/icon_wink.gif" width="15" height="15" alt=";)" title="Wink"> every crackhead out there will break that in a heartbeat<br><br>the whole point of encrypting whatever is NOT to provide the key to unauthorized parties<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=5056">demond</a> — Sat Jul 29, 2006 10:07 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[KrzychuG]]></name></author>
		<updated>2006-07-29T12:14:25-04:00</updated>

		<published>2006-07-29T09:56:59-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=64985#p64985</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=64985#p64985"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=64985#p64985"><![CDATA[
Look <a href="http://www.averse.piasta.pl/list/index.php?act=list&amp;op=get&amp;target=evangeline%2Fsrc%2Fevangeline%2Fsrc%2Fuserent.c" class="postlink">here</a> for efprintf references, then download whole (or at least *user*.c files) source code and find rest of code. In userent.c you'll find few function which saves most of user data to userfile. Some parts are in flags.c, some in userrec.c or users.c. You need to dig for it. It's a bot based on Eggdrop 1.6.16 so you should be able to match most of the code with modern eggdrop and find out the diffrences.<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=3672">KrzychuG</a> — Sat Jul 29, 2006 9:56 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[bisco]]></name></author>
		<updated>2006-07-29T04:24:58-04:00</updated>

		<published>2006-07-29T04:24:58-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=64979#p64979</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=64979#p64979"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=64979#p64979"><![CDATA[
I haven't illegal shell accounts, I want to prevent that if someone has access to one of mine accounts, he can't modify userfile making easy a takeover.<br>I used a private botpack that encrypt all files of eggdrop, but it is an older version and there are many problems to build it; obviously, I'm not able to modify this botpack using new versions of eggdrop.<br><br>On some websites, I read that the blowfish module can encrypt userfile, but there is no explained way to do it.<br><br>can you help me?<br><br>PS: sorry for my english..<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=7983">bisco</a> — Sat Jul 29, 2006 4:24 am</p><hr />
]]></content>
	</entry>
		<entry>
		<author><name><![CDATA[demond]]></name></author>
		<updated>2006-07-28T23:22:06-04:00</updated>

		<published>2006-07-28T23:22:06-04:00</published>
		<id>https://forum.eggheads.org/viewtopic.php?p=64978#p64978</id>
		<link href="https://forum.eggheads.org/viewtopic.php?p=64978#p64978"/>
		<title type="html"><![CDATA[encrypting userfile]]></title>

		
		<content type="html" xml:base="https://forum.eggheads.org/viewtopic.php?p=64978#p64978"><![CDATA[
there are many ways, and many implementations of that, all private, typically developed &amp; used by takeover groups on EFnet/IRCnet to prevent their botnets from being "owned" by other monkeys utilizing cracked shell accounts &amp; forged userfiles/scripts<br><br>this works as long as your enemy don't have a clue what to do with your stolen eggdrop binary - which typically isn't the case - as soon as a programmer loads it into a debugger, it's a simple matter of time until they crack your encryption, since you keep the encryption key embedded into that binary anyway<p>Statistics: Posted by <a href="https://forum.eggheads.org/memberlist.php?mode=viewprofile&amp;u=5056">demond</a> — Fri Jul 28, 2006 11:22 pm</p><hr />
]]></content>
	</entry>
	</feed>
