<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=33&amp;t=1542" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-12-17T12:36:03+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=33&amp;t=1542</id>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2014-12-17T12:36:03+01:00</updated>
<published>2014-12-17T12:36:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6553#p6553</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6553#p6553"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6553#p6553"><![CDATA[
Will lock here then.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Wed Dec 17, 2014 12:36 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rnewson]]></name></author>
<updated>2014-12-17T11:17:04+01:00</updated>
<published>2014-12-17T11:17:04+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6550#p6550</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6550#p6550"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6550#p6550"><![CDATA[
done <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br /><em><strong>[Edited by moderator]: The new topic can be found <a href="http://forum.yubico.com/viewtopic.php?f=33&amp;t=1666" class="postlink">here</a>.</strong></em><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3383">rnewson</a> — Wed Dec 17, 2014 11:17 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[henrik]]></name></author>
<updated>2014-12-17T11:15:57+01:00</updated>
<published>2014-12-17T11:15:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6548#p6548</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6548#p6548"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6548#p6548"><![CDATA[
<div class="quotetitle">rnewson wrote:</div><div class="quotecontent"><br />To Yubico: rather than respond to the tail of this thread, I'm going to start a new one with a better title, coalescing what's been said here. It'll make it easier to find.<br /></div><br />Thanks, please do! This is an interesting discussion.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2968">henrik</a> — Wed Dec 17, 2014 11:15 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rnewson]]></name></author>
<updated>2014-12-17T11:05:39+01:00</updated>
<published>2014-12-17T11:05:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6547#p6547</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6547#p6547"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6547#p6547"><![CDATA[
One thing to note: I see for privacy reasons that the attestation certificate does not identify a single token, but a particular (large?) batch of them. It therefore can't be directly coupled to the unique per-device secret. I wonder if those two things are entirely uncoupled? That is, it's possible to verify you have a legitimate signed-by-yubico key independently of the device secret.<br /><br />Your two notes are very helpful, thanks for those.<br /><br />To Yubico: rather than respond to the tail of this thread, I'm going to start a new one with a better title, coalescing what's been said here. It'll make it easier to find.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3383">rnewson</a> — Wed Dec 17, 2014 11:05 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[darco]]></name></author>
<updated>2014-12-17T03:23:33+01:00</updated>
<published>2014-12-17T03:23:33+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6542#p6542</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6542#p6542"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6542#p6542"><![CDATA[
Correct, I don't represent, nor am I affiliated with, Yubico. I speak only for myself.<br /><br />And, for the record, I agree that we need to hear from Yubico on how the keys are generated, as evidenced by me saying '<em>&quot;Yubico should probably elaborate on how the U2F &quot;device master secret&quot; is generated'</em>.<br /><br />That being said, I believe the idea is that the secret is intended to only exist on the token and nowhere else. I wouldn't be surprised if it is actually a FIDO U2F certification requirement.<br /><br />The attestation certificate is actually to address this very issue. The idea is that the attestation certificate is a certification of the security of the device. If you trust who signed the attestation certificate (who presumably has performed a full security audit for that batch), then you can have an equivalently high trust that the U2F token has not been compromised. It is expected that certain types of services will only accept U2F tokens with attestation certificates signed by known trusted attesters.<br /><br />The U2F attestation certificates used in Yubico's U2F tokens are signed by Yubico's own attestation CA, so we should hear from Yubico about how they audit their manufacturing process and secure element code per batch.<br /><br />U2F is superior to OTP in a number of ways.<br /><br /><ol style="list-style-type: decimal"><li>Using a U2F token is unphishable. OTPs can be phished. This isn't just a theoretical attack: such attacks are now occurring relatively frequently in the field.</li><li>Using a U2F token makes it almost impossible to execute a man-in-the-middle attack, even if Malory has control of a trusted CA and can forge trusted certificates. An OTP will offer zero defense for such an attack.</li></ol><br />Not saying your concerns aren't valid, though. Let's see what Yubico says.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3288">darco</a> — Wed Dec 17, 2014 3:23 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rnewson]]></name></author>
<updated>2014-12-17T01:23:29+01:00</updated>
<published>2014-12-17T01:23:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6535#p6535</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6535#p6535"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6535#p6535"><![CDATA[
I'm new to these forums, but I'm correct that you don't represent Yubico?<br /><br />As a consumer or as an administrator considering using YubiKey's U2F to secure access to a server farm, I'm not comfortable with Yubico having (or potentially having) the ability to decrypt all my private keys (aka keyhandles), and that ability is not stated (indeed, the opposite is implied in the U2F datasheets as &quot;no shared secrets&quot;). In both cases, the OTP feature appears more secure than U2F.<br /><br />As for whether banks would allow third-party access tokens anyway, I am somewhat skeptical. My bank used to issue its own physical devices, but now uses its own smartphone app instead. I don't see them supporting a device where the secret key was generated by someone else.<br /><br />I hope to hear from Yubico themselves. They've clearly recognized that the OTP mechanism can be repurposed from the default settings to wholly (and verifiably) private ones.<br /><br />As for attestation certificates, I don't understand all the details or ramifications but it would appear to be the same category of validation that we get from the pre-installed OTP in slot 1 (namely, that Yubico know that AES key too). Validation, of course, that the personalization tools let us blow away (and later restore with an upload button).<br /><br />Perhaps the point is that U2F support in YubiKey is aimed firmly (solely?) at the mass market, making the typical Web user's life a lot safer and that I'm barking up the wrong tree. I can get what I want from the OTP protocol (and, heck, I already implemented the verification code) but I remain a little puzzled that U2F here means that someone else knows the device secret besides the device. If that's really true, then I won't be using U2F myself.<br /><br />To finish a long post (to an already [SOLVED] thread), I'd love to hear Yubico's explanation of how device secrets are kept secret even from Yubico (if they even are). And, if they're not, how we're supposed to reconcile that with the claim that U2F is superior to OTP by no longer sharing a secret value, when it clearly does in this case.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3383">rnewson</a> — Wed Dec 17, 2014 1:23 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[darco]]></name></author>
<updated>2014-12-16T19:53:48+01:00</updated>
<published>2014-12-16T19:53:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6523#p6523</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6523#p6523"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6523#p6523"><![CDATA[
Note that, if yubico ever gave you the ability to do such a thing (and I doubt they would), the attestation certificate would be void. Some sites, like banking websites, will likely balk at using a U2F key with a self-signed (or totally bogus even) attestation certificate. They could theoretically allow you to wipe the &quot;device master secret&quot; and generate a new key in the secure element, but someone could tamper with the device during this process to lower the entropy of the resulting key (glitching, etc), so I doubt they would ever do that, either --- at least not for their consumer-oriented products.<br /><br />That being said, Yubico should probably elaborate on how the U2F &quot;device master secret&quot; is generated. Is it generated in the secure element when the device first starts up (which has pros and cons, but as long as the on-chip RNG is verified as operating properly then it should be ideal)? Or is it generated by a computer on the assembly line and loaded onto the device(Less ideal because yubico <em>could</em> theoretically be storing the keys without our knowledge)?<br /><br />Keep in mind that the only identifying information in the registration info is which batch the key came from, so someone would have to have *all* of the security key &quot;device master secrets&quot; for that particular batch in order to be able to identify which secret is associated with some random registration info. This doesn't seem like an easy attack vector unless Yubico is a total push-over, which I find doubtful.<br /><br />It is absolutely in yubico's best interest to not have any physical access to the &quot;device master secret&quot; in their U2F security keys. They are too much of a liability to the company's reputation.<br /><br />Also, read this post for more info: <!-- m --><a class="postlink" href="https://www.yubico.com/2014/11/yubicos-u2f-key-wrapping/">https://www.yubico.com/2014/11/yubicos- ... -wrapping/</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3288">darco</a> — Tue Dec 16, 2014 7:53 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rnewson]]></name></author>
<updated>2014-12-16T02:18:59+01:00</updated>
<published>2014-12-16T02:18:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6515#p6515</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6515#p6515"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6515#p6515"><![CDATA[
Answering the second half of my own question with a &quot;yes&quot; (<!-- m --><a class="postlink" href="https://developers.yubico.com/U2F/Protocol_details/Key_generation.html">https://developers.yubico.com/U2F/Proto ... ation.html</a><!-- m -->)<br /><br />But I still need to be able to overwrite the 'device secret' in that diagram to use U2F over OTP.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3383">rnewson</a> — Tue Dec 16, 2014 2:18 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rnewson]]></name></author>
<updated>2014-12-16T00:44:52+01:00</updated>
<published>2014-12-16T00:44:52+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6514#p6514</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6514#p6514"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=6514#p6514"><![CDATA[
Well, that's surprising and disappointing. I had just gotten into YubiKey (including implement OTP verification functions in erlang). <br /><br />I was particularly impressed that I could write my own AES keys for OTP, and thus control the entire process, no need to trust a third party. Now it seems I have to trust that Yubico don't have a copy of the embedded and unchangeable key used to encrypt all my U2F keyhandles? Wow, I'm astonished at this mistake, can it really be true? Yubico obviously needs a copy of the AES key it installs in slot 1 for OTP, but it has absolutely no reason at all to care what key is used for the U2F. &quot;No shared secrets&quot;... except this one, the most important one!<br /><br />Will this change in a future update?<br /><br />Somewhat moot, given the above, but is the encrypted private key in U2F keyhandles also signed or MAC'ed?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3383">rnewson</a> — Tue Dec 16, 2014 12:44 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2014-10-24T02:00:40+01:00</updated>
<published>2014-10-24T02:00:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5980#p5980</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5980#p5980"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5980#p5980"><![CDATA[
<div class="quotetitle">ridale wrote:</div><div class="quotecontent"><br />Thanks for that, I figured there was a symmetric key somewhere, not being able to set that key makes the FIDO not usable in certain environments for internal policy reasons.<br /></div><br /><br />Hmm...even though Yubico has supported local configuration of keys for large customers pre-FIDO...that might be problematic for the FIDO part of the device with the Attestation requirements of the FIDO standard.<br /><br />I suspect FIDO isn't a good solution in general for the environments with the policies you are alluding to.<br /><br />B<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Fri Oct 24, 2014 2:00 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ridale]]></name></author>
<updated>2014-10-24T00:27:42+01:00</updated>
<published>2014-10-24T00:27:42+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5977#p5977</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5977#p5977"/>
<title type="html"><![CDATA[Re: [SOLVED] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5977#p5977"><![CDATA[
Thanks for that, I figured there was a symmetric key somewhere, not being able to set that key makes the FIDO not usable in certain environments for internal policy reasons.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=650">ridale</a> — Fri Oct 24, 2014 12:27 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2014-10-23T13:31:39+01:00</updated>
<published>2014-10-23T13:31:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5957#p5957</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5957#p5957"/>
<title type="html"><![CDATA[Re: [QUESTION] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5957#p5957"><![CDATA[
<div class="quotetitle">erikie wrote:</div><div class="quotecontent"><br />Tom,<br /><br />is this really true? Something (whatever it is) must be retained and tied to the key or how else will the key I use for a specific PIN/secret transaction key for some specific website be identified amongst all other U2F keys?<br />Or (I have not read all U2F documentation so I could have missed the point) are all U2F keys in fact interchangeable (so I could use any key in pace of the one I own) and it just ensures that a secret login token is generated in a secure way?<br />Where by this key and it's action is somewhat like a TPM module?<br />In short - if I login &amp; register to an U2F site using one particular U2F key can I then login another time with same with another U2F key with the same PIN/password(phrase)?<br />Pardon me for posing these questions which may seem obvious to you but I am just trying to understand this device.<br /><br />Thx in advance for your reply &amp; kind regards, Erik...<br /></div><br /><br />For all intents and purposes, the only unique identifier for a U2F device is the securely stored internal symmetric key, which cannot be read from outside the device. <br /><br />Effectively, to identify a particular key, it must be used to attempt to validate a previous registration it was used for [see my layman's description here which should be close to correct: <!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?f=33&amp;t=1530&amp;p=5956#p5956">viewtopic.php?f=33&amp;t=1530&amp;p=5956#p5956</a><!-- l --> ]. If the validation works, then you know that was the key used to generate the public/encrypted-private keys used to register with that origin/site, sent to that origin/site and remote-stored at that origin/site.<br /><br />Otherwise, there's no way via software to tell one u2f device from another.<br /><br />In theory, this means that use of the device across multiple unrelated origins/sites should not lead to disclosure concerns. However, I'd like to see a professional cryptographer release a public analysis of the standard and examine some implementations. <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br />B<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Thu Oct 23, 2014 1:31 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[erikie]]></name></author>
<updated>2014-10-23T13:15:48+01:00</updated>
<published>2014-10-23T13:15:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5955#p5955</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5955#p5955"/>
<title type="html"><![CDATA[Re: [QUESTION] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5955#p5955"><![CDATA[
Just to be clear on my understanding: there is no ID to get or to identify on the key - it is just that another key will generate a different output if presented to the same website with the same PIN (or password or whatever 2nd factor one my have).<br />And that makes it unique and tied to the user/account/website/key.<br />Correct me if I am wrong on this assessment...<br /><br />Kind regards, Erik...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2888">erikie</a> — Thu Oct 23, 2014 1:15 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[erikie]]></name></author>
<updated>2014-10-23T13:09:01+01:00</updated>
<published>2014-10-23T13:09:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5953#p5953</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5953#p5953"/>
<title type="html"><![CDATA[Re: [QUESTION] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5953#p5953"><![CDATA[
I think this seems to answer my question (stated in this link - <!-- m --><a class="postlink" href="https://www.yubico.com/products/yubikey-hardware/fido-u2f-security-key/">https://www.yubico.com/products/yubikey ... urity-key/</a><!-- m -->):<br />&lt;&lt;&lt;&gt;&gt;&gt;<br />More about the FIDO U2F Security Key<br /><br />Each Security Key has an<span style="color: #FF0000"><span style="text-decoration: underline"><strong> individualized secure chip </strong></span></span>which performs cryptographic functions triggered by a simple touch of the key. You never see the details, but behind the scenes FIDO U2F Security Key provides a unique public and private key pair for each application it protects. Only those keys can correctly complete the cryptographic challenge required for login.<br />The secure chip is of the same class as those used in SIM Cards, electronic passports, military electronic IDs and chip-and-pin credit cards. Like those devices, the chip is specially “hardened” so it’s extremely difficult to steal the secrets hidden inside. <span style="color: #FF0000"><span style="text-decoration: underline"><strong>The secrets contained in the Security Key</strong></span></span> belong to the end-user exclusively and are never transferred, copied or stored by a service provider or any other application provider.<br />&lt;&lt;&lt;&gt;&gt;&gt;<br />As I read this it appears that indeed something unique is stored on the key but apparently these are not user alterable (unlike Yubico OTP, OATH-HOTP etc.).<br /><br />Thx &amp; kind regards, Erik...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2888">erikie</a> — Thu Oct 23, 2014 1:09 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[erikie]]></name></author>
<updated>2014-10-23T12:54:10+01:00</updated>
<published>2014-10-23T12:54:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5952#p5952</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5952#p5952"/>
<title type="html"><![CDATA[Re: [QUESTION] Key personalization]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1542&amp;p=5952#p5952"><![CDATA[
Tom,<br /><br />is this really true? Something (whatever it is) must be retained and tied to the key or how else will the key I use for a specific PIN/secret transaction key for some specific website be identified amongst all other U2F keys?<br />Or (I have not read all U2F documentation so I could have missed the point) are all U2F keys in fact interchangeable (so I could use any key in pace of the one I own) and it just ensures that a secret login token is generated in a secure way?<br />Where by this key and it's action is somewhat like a TPM module?<br />In short - if I login &amp; register to an U2F site using one particular U2F key can I then login another time with same with another U2F key with the same PIN/password(phrase)?<br />Pardon me for posing these questions which may seem obvious to you but I am just trying to understand this device.<br /><br />Thx in advance for your reply &amp; kind regards, Erik...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2888">erikie</a> — Thu Oct 23, 2014 12:54 pm</p><hr />
]]></content>
</entry>
</feed>