<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/utm-firewall/f/network-protection-firewall-nat-qos-ips/41580/9-202-33-tcp-session-resumed-by-reply-packet-after-utm-reboot</link><description>Moved from general discussion as this is firewall-specific problem; original thread was https://community.sophos.com/products/unified-threat-management/astaroorg/f/51/t/22262   Situation: Connect to SSH server through UTM and then reboot UTM. The SSH</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146204?ContentTypeID=1</link><pubDate>Wed, 11 Jun 2014 10:48:46 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:d76eac14-4cf9-4568-8fe7-12d8c6647d8b</guid><dc:creator>BAlfson</dc:creator><description>He&amp;nbsp;said&amp;nbsp;that&amp;nbsp;he&amp;nbsp;has&amp;nbsp;strict&amp;nbsp;TCP.&amp;nbsp;&amp;nbsp;I&amp;nbsp;suspect&amp;nbsp;that&amp;nbsp;there&amp;#39;s&amp;nbsp;a&amp;nbsp;firewall&amp;nbsp;rule&amp;nbsp;allowing&amp;nbsp;the&amp;nbsp;traffic.&lt;br /&gt;&lt;br /&gt;Cheers&amp;nbsp;-&amp;nbsp;Bob&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146203?ContentTypeID=1</link><pubDate>Tue, 10 Jun 2014 16:45:41 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:5b350fc7-be17-4624-a321-915630ecfa98</guid><dc:creator>BarryG</dc:creator><description>Hi,&amp;nbsp;would&amp;nbsp;enabling&amp;nbsp;the&amp;nbsp;strict&amp;nbsp;TCP&amp;nbsp;options&amp;nbsp;be&amp;nbsp;a&amp;nbsp;solution&amp;nbsp;or&amp;nbsp;workaround&amp;nbsp;for&amp;nbsp;this?&lt;br /&gt;&lt;br /&gt;Barry&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146202?ContentTypeID=1</link><pubDate>Tue, 10 Jun 2014 11:18:25 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:98eb051c-2c28-4330-a9fa-a78c8c89d0c6</guid><dc:creator>ondrej.holas</dc:creator><description>Bob,&amp;nbsp;as&amp;nbsp;far&amp;nbsp;as&amp;nbsp;I&amp;nbsp;know&amp;nbsp;netfilter/iptables,&amp;nbsp;conntrack&amp;nbsp;is&amp;nbsp;involved&amp;nbsp;always,&amp;nbsp;including&amp;nbsp;configuration&amp;nbsp;without&amp;nbsp;NAT/masq.&amp;nbsp;(To&amp;nbsp;be&amp;nbsp;exact:&amp;nbsp;You&amp;nbsp;must&amp;nbsp;explicitly&amp;nbsp;use&amp;nbsp;&amp;quot;notrack&amp;quot;&amp;nbsp;target&amp;nbsp;to&amp;nbsp;exclude&amp;nbsp;packet&amp;nbsp;from&amp;nbsp;connection&amp;nbsp;tracking;&amp;nbsp;however,&amp;nbsp;in&amp;nbsp;UTM&amp;nbsp;there&amp;#39;s&amp;nbsp;only&amp;nbsp;one&amp;nbsp;rule&amp;nbsp;using&amp;nbsp;&amp;quot;notrack&amp;quot;&amp;nbsp;for&amp;nbsp;localhost&amp;nbsp;communication.)&lt;br /&gt;&lt;br /&gt;There&amp;nbsp;is&amp;nbsp;only&amp;nbsp;one&amp;nbsp;rule&amp;nbsp;in&amp;nbsp;the&amp;nbsp;lab:&amp;nbsp;192.168.21.2/32&amp;nbsp;-&amp;gt;&amp;nbsp;192.168.20.2/32&amp;nbsp;:&amp;nbsp;22/tcp&lt;br /&gt;&lt;br /&gt;There&amp;#39;s&amp;nbsp;no&amp;nbsp;rule&amp;nbsp;in&amp;nbsp;UTM&amp;nbsp;config&amp;nbsp;allowing&amp;nbsp;communication&amp;nbsp;from&amp;nbsp;SSH&amp;nbsp;server&amp;nbsp;to&amp;nbsp;client.&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146201?ContentTypeID=1</link><pubDate>Tue, 10 Jun 2014 09:01:22 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:5f15a567-f776-4c60-bf6f-693a7a9149f1</guid><dc:creator>BAlfson</dc:creator><description>&lt;blockquote&gt;With&amp;nbsp;masquerading&amp;nbsp;in&amp;nbsp;place,&amp;nbsp;packet&amp;nbsp;from&amp;nbsp;outside&amp;nbsp;server&amp;nbsp;is&amp;nbsp;replied&amp;nbsp;by&amp;nbsp;RST&lt;/blockquote&gt;&lt;br /&gt;Ahhh&amp;nbsp;-&amp;nbsp;conntrack&amp;nbsp;wasn&amp;#39;t&amp;nbsp;involved!&amp;nbsp;&amp;nbsp;So,&amp;nbsp;it&amp;#39;s&amp;nbsp;not&amp;nbsp;clear&amp;nbsp;that&amp;nbsp;this&amp;nbsp;is&amp;nbsp;a&amp;nbsp;bug.&amp;nbsp;&amp;nbsp;What&amp;nbsp;firewall&amp;nbsp;rules&amp;nbsp;do&amp;nbsp;you&amp;nbsp;have&amp;nbsp;between&amp;nbsp;192.168.20.0/24&amp;nbsp;and&amp;nbsp;192.168.20.1/24?&lt;br /&gt;&lt;br /&gt;Cheers&amp;nbsp;-&amp;nbsp;Bob&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146200?ContentTypeID=1</link><pubDate>Mon, 09 Jun 2014 12:28:37 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:fda639f1-a3dc-42fe-9221-c5efc9e1b529</guid><dc:creator>ondrej.holas</dc:creator><description>Confirmed&amp;nbsp;in&amp;nbsp;lab&amp;nbsp;on&amp;nbsp;test&amp;nbsp;VM&amp;nbsp;with&amp;nbsp;fresh&amp;nbsp;install&amp;nbsp;of&amp;nbsp;UTM&amp;nbsp;9.202-33&amp;nbsp;and&amp;nbsp;minimal&amp;nbsp;configuration.&lt;br /&gt;&lt;br /&gt;192.168.20.2&amp;nbsp;=&amp;nbsp;SSH&amp;nbsp;server&lt;br /&gt;192.168.21.2&amp;nbsp;=&amp;nbsp;client&lt;br /&gt;&lt;br /&gt;After&amp;nbsp;UTM&amp;nbsp;reboot:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;utm-test:/root&amp;nbsp;#&amp;nbsp;iptables-save&amp;nbsp;-c&amp;nbsp;|&amp;nbsp;grep&amp;nbsp;-E&amp;nbsp;&amp;quot;FORWARD.+confirmed&amp;quot;&amp;nbsp;;&amp;nbsp;cat&amp;nbsp;/proc/net/ip_conntrack&amp;nbsp;|&amp;nbsp;grep&amp;nbsp;192.168.20.2&lt;br /&gt;[0:0]&amp;nbsp;-A&amp;nbsp;FORWARD&amp;nbsp;!&amp;nbsp;-d&amp;nbsp;224.0.0.0/4&amp;nbsp;-m&amp;nbsp;confirmed&amp;nbsp;-j&amp;nbsp;ACCEPT&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;Keepalive&amp;nbsp;packet&amp;nbsp;from&amp;nbsp;SSH&amp;nbsp;server:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;19:21:17.107553&amp;nbsp;IP&amp;nbsp;192.168.20.2.22&amp;nbsp;&amp;gt;&amp;nbsp;192.168.21.2.54617:&amp;nbsp;Flags&amp;nbsp;[.],&amp;nbsp;ack&amp;nbsp;1579353482,&amp;nbsp;win&amp;nbsp;1563,&amp;nbsp;options&amp;nbsp;[nop,nop,TS&amp;nbsp;val&amp;nbsp;926336&amp;nbsp;ecr&amp;nbsp;774430],&amp;nbsp;length&amp;nbsp;0&lt;br /&gt;19:21:17.108358&amp;nbsp;IP&amp;nbsp;192.168.21.2.54617&amp;nbsp;&amp;gt;&amp;nbsp;192.168.20.2.22:&amp;nbsp;Flags&amp;nbsp;[.],&amp;nbsp;ack&amp;nbsp;1,&amp;nbsp;win&amp;nbsp;2389,&amp;nbsp;options&amp;nbsp;[nop,nop,TS&amp;nbsp;val&amp;nbsp;924444&amp;nbsp;ecr&amp;nbsp;776322],&amp;nbsp;length&amp;nbsp;0&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;Final&amp;nbsp;state:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;utm-test:/root&amp;nbsp;#&amp;nbsp;iptables-save&amp;nbsp;-c&amp;nbsp;|&amp;nbsp;grep&amp;nbsp;-E&amp;nbsp;&amp;quot;FORWARD.+confirmed&amp;quot;&amp;nbsp;;&amp;nbsp;cat&amp;nbsp;/proc/net/ip_conntrack&amp;nbsp;|&amp;nbsp;grep&amp;nbsp;192.168.20.2&lt;br /&gt;[2:104]&amp;nbsp;-A&amp;nbsp;FORWARD&amp;nbsp;!&amp;nbsp;-d&amp;nbsp;224.0.0.0/4&amp;nbsp;-m&amp;nbsp;confirmed&amp;nbsp;-j&amp;nbsp;ACCEPT&lt;br /&gt;tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;6&amp;nbsp;292&amp;nbsp;ESTABLISHED&amp;nbsp;src=192.168.20.2&amp;nbsp;dst=192.168.21.2&amp;nbsp;sport=22&amp;nbsp;dport=54617&amp;nbsp;packets=1&amp;nbsp;bytes=52&amp;nbsp;src=192.168.21.2&amp;nbsp;dst=192.168.20.2&amp;nbsp;sport=54617&amp;nbsp;dport=22&amp;nbsp;packets=1&amp;nbsp;bytes=52&amp;nbsp;mark=528384&amp;nbsp;use=2&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;UTM&amp;nbsp;must&amp;nbsp;be&amp;nbsp;configured&amp;nbsp;with&amp;nbsp;no&amp;nbsp;NAT/masquerading.&amp;nbsp;With&amp;nbsp;masquerading&amp;nbsp;in&amp;nbsp;place,&amp;nbsp;packet&amp;nbsp;from&amp;nbsp;outside&amp;nbsp;server&amp;nbsp;is&amp;nbsp;replied&amp;nbsp;by&amp;nbsp;RST&amp;nbsp;(expected&amp;nbsp;behavior).&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146199?ContentTypeID=1</link><pubDate>Mon, 09 Jun 2014 00:58:11 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:67ea70d4-b1f7-4b93-8fc0-c5a300ea4255</guid><dc:creator>ondrej.holas</dc:creator><description>I&amp;nbsp;have&amp;nbsp;home&amp;nbsp;license&amp;nbsp;only,&amp;nbsp;no&amp;nbsp;paid&amp;nbsp;license.&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146198?ContentTypeID=1</link><pubDate>Sun, 08 Jun 2014 17:18:06 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:935e2c6a-b6af-4508-9afe-d8fe2b851828</guid><dc:creator>BAlfson</dc:creator><description>Ondrej,&amp;nbsp;do&amp;nbsp;you&amp;nbsp;have&amp;nbsp;a&amp;nbsp;paid&amp;nbsp;license&amp;nbsp;that&amp;nbsp;will&amp;nbsp;allow&amp;nbsp;you&amp;nbsp;to&amp;nbsp;submit&amp;nbsp;a&amp;nbsp;bug&amp;nbsp;report&amp;nbsp;to&amp;nbsp;Support?&lt;br /&gt;&lt;br /&gt;Cheers&amp;nbsp;-&amp;nbsp;Bob&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146197?ContentTypeID=1</link><pubDate>Sun, 08 Jun 2014 14:51:23 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:2edd1e2b-2254-4360-91bf-a06e8fd9a319</guid><dc:creator>ondrej.holas</dc:creator><description>Bob,&amp;nbsp;the&amp;nbsp;box&amp;nbsp;surely&amp;nbsp;rebooted,&amp;nbsp;as&amp;nbsp;seen&amp;nbsp;in&amp;nbsp;&amp;quot;last&amp;quot;.&lt;br /&gt;&lt;br /&gt;Where&amp;nbsp;to&amp;nbsp;send&amp;nbsp;that&amp;nbsp;ack:&amp;nbsp;this&amp;nbsp;UTM&amp;nbsp;does&amp;nbsp;not&amp;nbsp;perform&amp;nbsp;any&amp;nbsp;NAT,&amp;nbsp;so&amp;nbsp;it&amp;nbsp;does&amp;nbsp;not&amp;nbsp;need&amp;nbsp;active&amp;nbsp;conntrack&amp;nbsp;entry&amp;nbsp;to&amp;nbsp;forward&amp;nbsp;that&amp;nbsp;reply&amp;nbsp;packet,&amp;nbsp;UTM&amp;nbsp;simply&amp;nbsp;forwards&amp;nbsp;the&amp;nbsp;packet&amp;nbsp;by&amp;nbsp;destination&amp;nbsp;IP&amp;nbsp;address&amp;nbsp;(which&amp;nbsp;is&amp;nbsp;untouched&amp;nbsp;by&amp;nbsp;UTM&amp;nbsp;in&amp;nbsp;this&amp;nbsp;scenario).&lt;br /&gt;&lt;br /&gt;My&amp;nbsp;further&amp;nbsp;ivestigation&amp;nbsp;showed&amp;nbsp;iptables&amp;nbsp;rule&amp;nbsp;responsible&amp;nbsp;for&amp;nbsp;accepting&amp;nbsp;the&amp;nbsp;reply&amp;nbsp;packet:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;-A&amp;nbsp;FORWARD&amp;nbsp;!&amp;nbsp;-d&amp;nbsp;224.0.0.0/4&amp;nbsp;-m&amp;nbsp;confirmed&amp;nbsp;-j&amp;nbsp;ACCEPT&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;This&amp;nbsp;can&amp;nbsp;be&amp;nbsp;seen&amp;nbsp;in&amp;nbsp;rule&amp;nbsp;counters,&amp;nbsp;green&amp;nbsp;rules&amp;nbsp;were&amp;nbsp;inserted&amp;nbsp;manually,&amp;nbsp;state&amp;nbsp;just&amp;nbsp;after&amp;nbsp;keepalive&amp;nbsp;ACK/ACK:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;&lt;span&gt;[1:40]&amp;nbsp;-A&amp;nbsp;FORWARD&amp;nbsp;-s&amp;nbsp;*SSH_SERVER*/32&amp;nbsp;-m&amp;nbsp;confirmed&lt;br /&gt;[1:40]&amp;nbsp;-A&amp;nbsp;FORWARD&amp;nbsp;-s&amp;nbsp;*CLIENT*/32&amp;nbsp;-m&amp;nbsp;confirmed&lt;/span&gt;&lt;br /&gt;[2:80]&amp;nbsp;-A&amp;nbsp;FORWARD&amp;nbsp;!&amp;nbsp;-d&amp;nbsp;224.0.0.0/4&amp;nbsp;-m&amp;nbsp;confirmed&amp;nbsp;-j&amp;nbsp;ACCEPT&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;So&amp;nbsp;the&amp;nbsp;problem&amp;nbsp;seems&amp;nbsp;to&amp;nbsp;be&amp;nbsp;somewhere&amp;nbsp;inside&amp;nbsp;&amp;quot;confirmed&amp;quot;&amp;nbsp;match/&amp;quot;CONFIRMED&amp;quot;&amp;nbsp;target&amp;nbsp;logic.&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146196?ContentTypeID=1</link><pubDate>Fri, 06 Jun 2014 16:13:45 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:20366475-297b-48d0-b0fb-239dee47b864</guid><dc:creator>BAlfson</dc:creator><description>OK,&amp;nbsp;I&amp;nbsp;had&amp;nbsp;misunderstood&amp;nbsp;your&amp;nbsp;explanation.&amp;nbsp;&amp;nbsp;Yeah,&amp;nbsp;that&amp;nbsp;does&amp;nbsp;look&amp;nbsp;like&amp;nbsp;a&amp;nbsp;potential&amp;nbsp;bug.&amp;nbsp;&amp;nbsp;Still,&amp;nbsp;I&amp;nbsp;don&amp;#39;t&amp;nbsp;understand&amp;nbsp;how&amp;nbsp;conntrack&amp;nbsp;knew&amp;nbsp;where&amp;nbsp;to&amp;nbsp;send&amp;nbsp;that&amp;nbsp;ack&amp;nbsp;-&amp;nbsp;it&amp;#39;s&amp;nbsp;as&amp;nbsp;if&amp;nbsp;there&amp;nbsp;was&amp;nbsp;no&amp;nbsp;reboot&amp;nbsp;of&amp;nbsp;the&amp;nbsp;UTM.&amp;nbsp;&amp;nbsp;Can&amp;nbsp;you&amp;nbsp;confirm&amp;nbsp;from&amp;nbsp;the&amp;nbsp;logs&amp;nbsp;that&amp;nbsp;a&amp;nbsp;reboot&amp;nbsp;took&amp;nbsp;place?&lt;br /&gt;&lt;br /&gt;Cheers&amp;nbsp;-&amp;nbsp;Bob&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146195?ContentTypeID=1</link><pubDate>Fri, 06 Jun 2014 14:59:15 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ff8c1af5-32e3-4cbc-9e39-8903a2ce0f51</guid><dc:creator>ondrej.holas</dc:creator><description>Bob,&amp;nbsp;there&amp;#39;s&amp;nbsp;no&amp;nbsp;such&amp;nbsp;rule.&amp;nbsp;The&amp;nbsp;SSH&amp;nbsp;server&amp;nbsp;is&amp;nbsp;on&amp;nbsp;the&amp;nbsp;internet&amp;nbsp;and&amp;nbsp;it&amp;nbsp;is&amp;nbsp;present&amp;nbsp;only&amp;nbsp;in&amp;nbsp;destination&amp;nbsp;side&amp;nbsp;of&amp;nbsp;some&amp;nbsp;rules.&amp;nbsp;It&amp;nbsp;is&amp;nbsp;neither&amp;nbsp;itself&amp;nbsp;as&amp;nbsp;a&amp;nbsp;source&amp;nbsp;nor&amp;nbsp;matching&amp;nbsp;source&amp;nbsp;side&amp;nbsp;in&amp;nbsp;any&amp;nbsp;wider&amp;nbsp;rule.&lt;br /&gt;&lt;br /&gt;And&amp;nbsp;hypothetically,&amp;nbsp;if&amp;nbsp;there&amp;nbsp;were&amp;nbsp;such&amp;nbsp;rule,&amp;nbsp;UTM&amp;nbsp;should&amp;nbsp;not&amp;nbsp;accept&amp;nbsp;that&amp;nbsp;session&amp;nbsp;by&amp;nbsp;ACK&amp;nbsp;packet,&amp;nbsp;if&amp;nbsp;&amp;quot;Strict&amp;nbsp;TCP&amp;quot;&amp;nbsp;is&amp;nbsp;turned&amp;nbsp;on.&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: 9.202-33: TCP session resumed BY REPLY PACKET after UTM reboot</title><link>https://community.sophos.com/thread/146194?ContentTypeID=1</link><pubDate>Fri, 06 Jun 2014 14:16:10 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:40857750-6137-4b58-8b3e-cc0110b61e1c</guid><dc:creator>BAlfson</dc:creator><description>Ondrej,&amp;nbsp;my&amp;nbsp;guess&amp;nbsp;would&amp;nbsp;be&amp;nbsp;that&amp;nbsp;there&amp;#39;s&amp;nbsp;a&amp;nbsp;firewall&amp;nbsp;rule&amp;nbsp;that&amp;nbsp;allows&amp;nbsp;outbound&amp;nbsp;traffic&amp;nbsp;from&amp;nbsp;your&amp;nbsp;internal&amp;nbsp;SSH&amp;nbsp;server.&lt;br /&gt;&lt;br /&gt;Cheers&amp;nbsp;-&amp;nbsp;Bob&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>