<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
<channel>
<title>CodeStore.net comments on "Hacking Domino: Harvesting Your User's Logins -- Why You Should Take XSS Seriously!"</title>
<description>Replies to blog "Hacking Domino: Harvesting Your User's Logins -- Why You Should Take XSS Seriously!" on codestore.net.</description>
<link>http://www.codestore.net/</link>
<lastBuildDate>Fri, 03 Oct 2008 11:56:02 -0500</lastBuildDate>
<atom:link href="http://www.codestore.net/store.nsf/blog.xml?Open=20080925" rel="self" type="application/rss+xml" />

<item>
	<title>Reply from Rob</title>
	<pubDate>Fri, 03 Oct 2008 11:56:02 -0500</pubDate>
	<author>Rob</author>
	<description><![CDATA[ 
		<p>@Lance,</p>
		<p>&lt;SARCASM&gt;</p>
		<p>That's right. If we tell everyone then too many people will start using the exploit so IBM would have to fix it and spoil the fun for the smart few who can put two and two together on their own.</p>
		<p>&lt;/SARCASM&gt;</p>
		<p>The trouble with what you suggest is that companies have demonstrated over and over that they will not fix these problems unless forced by bad PR.</p>
		<p>Peace,</p>
		<p>Rob:-]</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=81A9295087F4CC87862574D7005D0553"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_81A92950</link>
</item><item>
	<title>Reply from Lance Spellman</title>
	<pubDate>Fri, 03 Oct 2008 09:19:30 -0500</pubDate>
	<author>Lance Spellman</author>
	<description><![CDATA[ 
		<p>Hi Jake,</p>
		<p>Useful discussion going on here.  One thing I've always appreciated about the MythBusters show is that when they get into describing a process that someone could very easily turn into malicious use, they omit an important piece of the equation (and say they've done so).</p>
		<p>I'd kind of like to see that with your posts on these topics.  I don't think we need to be training script kiddies on these techniques.  Point out the issue, explain why it's an issue, perhaps lead down the trail, but a complete working example of an exploit is not really a good idea.</p>
		<p>My 2 cents. </p>
		<p>As always though, love your stuff.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=A1E459E2D1A091DE862574D7004EB09C"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_A1E459E2</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Wed, 01 Oct 2008 09:56:10 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Surely a web server behind a load-balancer would still be aware of the source IP address and not just think the request is from the IP of the balancer itself? I know nothing about that though, so I'll take your word for it that it's not possible. Anyone else?</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=B21615D9ECB4F763862574D500520B96"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_B21615D9</link>
</item><item>
	<title>Reply from Robert N</title>
	<pubDate>Wed, 01 Oct 2008 06:46:06 -0500</pubDate>
	<author>Robert N</author>
	<description><![CDATA[ 
		<p>One problem with tying a session to the IP address is that it will fail in environments where the web server is sitting behing load-balancers, reverse-proxies, etc. The Domino server or any other web server, will see only one IP address.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=4967C7FA9BD4D737862574D50040A53D"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_4967C7FA</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Tue, 30 Sep 2008 11:44:10 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Richard. They can do what they like. It's their server. They send the data (cookie value) to their server using the GET request which the browser thinks is for getting an image (in this case). </p>
		<p>I don't see what you're getting at.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=9D2B14200212F83A862574D4005BEF44"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_9D2B1420</link>
</item><item>
	<title>Reply from Richard C</title>
	<pubDate>Tue, 30 Sep 2008 11:15:48 -0500</pubDate>
	<author>Richard C</author>
	<description><![CDATA[ 
		<p>Re point 1) - I meant the send data via email.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=232CA256A2B65862862574D40059561D"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_232CA256</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Tue, 30 Sep 2008 08:17:42 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Hi Richard,</p>
		<p>1) I don't get what you mean. The hacker is requesting a URL on their own server. Chances are it won't be Domino. It could be anything. They don't need the attacked server's router task to do anything</p>
		<p>2) See 1. No need to use POST. The GET request will do.</p>
		<p>3) Possibly. If applied.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=2CD1BC9329BF32CD862574D400490823"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_2CD1BC93</link>
</item><item>
	<title>Reply from Richard C</title>
	<pubDate>Tue, 30 Sep 2008 07:38:45 -0500</pubDate>
	<author>Richard C</author>
	<description><![CDATA[ 
		<p>Jake,</p>
		<p>1) Does the hacker need the web-query-open agent setup? - I presume this would fail silently if the router task isn't running on the webserver?</p>
		<p>2) Can he/she use some javascript code to post the data silently to another webserver/website?  (instead of using emails)</p>
		<p>3) Would the field's html attribute, max-length, truncate the data put into a field? </p>
		<p>And by having @Left( theField ; MaxLength ) in the field's input translation break the javascript code? (where theField's length is greater than MaxLength).</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=536218CC52EE5C9D862574D400457732"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_536218CC</link>
</item><item>
	<title>Reply from Michael Bourak</title>
	<pubDate>Fri, 26 Sep 2008 09:48:14 -0500</pubDate>
	<author>Michael Bourak</author>
	<description><![CDATA[ 
		<p>FYI, about the [&lt;  &gt;] being interpreted by Domino as passthru or passthru in rich text etc: these types of HTML can be disabled by an ini variable or, if I remember well, form by form via $$HTMLOptions and "DisablePassthruHTML=x" (see here for possible values <a rel="nofollow" href="http://www.slideshare.net/dominion/lotusphere-2007ad302-whats-new-in-the-ibm-lotus-domino-web-server">Link</a> )</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=C533073DA9FC2187862574D0005151A3"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_C533073D</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Fri, 26 Sep 2008 06:34:35 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Yes, that would work Patrick. That's if the user/admin realises though and/or knows about ?logout. You'd like to think so, but can you ever be sure...</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=2BDC866D48D565BA862574D0003F9744"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_2BDC866D</link>
</item><item>
	<title>Reply from Patrick L</title>
	<pubDate>Fri, 26 Sep 2008 06:27:03 -0500</pubDate>
	<author>Patrick L</author>
	<description><![CDATA[ 
		<p>I have one question - once the admin had realised their cookie had been compromised they could use a sign out link - eg:  http://Host/DatabaseDirectory/DatabaseFileName?Logout</p>
		<p>shouldn't this be enough to end the session on the server and make the DomAuthSessId invalid?</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=9177083F14E272B2862574D0003EE68C"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_9177083F</link>
</item><item>
	<title>Reply from Chris Linfoot</title>
	<pubDate>Fri, 26 Sep 2008 05:33:47 -0500</pubDate>
	<author>Chris Linfoot</author>
	<description><![CDATA[ 
		<p>Computer Misuse Act - you should at least consider losing sleep over it. Even as currently enacted it is enforced and it has led to at least one very dodgy conviction.</p>
		<p><a rel="nofollow" href="http://chris-linfoot.net/d6plinks/CWLT-6GXJPS">Link</a></p>
		<p>A chap who thought he had been phished "knocked on the door" of a web site that was accepting donations for tsunami victims and found himself convicted of a breach of the Act.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=0F653A7890743D10862574D0003A063E"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_0F653A78</link>
</item><item>
	<title>Reply from mark bryson</title>
	<pubDate>Thu, 25 Sep 2008 16:38:34 -0500</pubDate>
	<author>mark bryson</author>
	<description><![CDATA[ 
		<p>One way to avoid having your admin level session ID stolen is not to browse using a login with admin privileges - specially if you might be looking at documents entered by users. Ideally, use a web-only account that doesn't even have a Notes ID or mailbox associated with it. </p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=6AF60A6AE636877B862574CF0076E332"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_6AF60A6A</link>
</item><item>
	<title>Reply from Rob</title>
	<pubDate>Thu, 25 Sep 2008 13:56:02 -0500</pubDate>
	<author>Rob</author>
	<description><![CDATA[ 
		<p>Might it be possible to add code to the application to store a logged in user's current IP address in a profile document when they log in. Then, each time they hit the server check that the IP address is identical.</p>
		<p>If the IP address changes then log them out somehow. (The only way I can think of to log them out is to redirect them to the logout URL.) You could also log the hack attempt with the IP address and perhaps use it to ban that IP address somehow.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=CAF44F40191CDCF8862574CF0068018E"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_CAF44F40</link>
</item><item>
	<title>Reply from Tommy Valand</title>
	<pubDate>Thu, 25 Sep 2008 12:26:43 -0500</pubDate>
	<author>Tommy Valand</author>
	<description><![CDATA[ 
		<p>I would believe that this is a problem that Lotus hasn't been aware of/ignored because it hasn't been discussed (until now). As you say, it should't be hard to remedy.</p>
		<p>A simple rewrite of the session key generator to include the IP of the client in the mix should be enough. I'd think all keys are temporarily stored in a registry of some sort. When a cookie is checked, validate it against the IP of the remote host.</p>
		<p>The only open backdoor is that people behind the same router (one ip on the internet) can hack each other, but that is a small problem compared to that the entire Internet can use your session.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=9DDB50A8BC312D3E862574CF005FD43C"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_9DDB50A8</link>
</item><item>
	<title>Reply from Peter LaComb</title>
	<pubDate>Thu, 25 Sep 2008 12:23:17 -0500</pubDate>
	<author>Peter LaComb</author>
	<description><![CDATA[ 
		<p>Never thought about XSS that much, but seeing as I've used domlog.nsf to accomplish the same (taking over a user session for troubleshooting purposes) I guess it's time for some code review.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=0694E5A8A4EA21F2862574CF005F83D4"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_0694E5A8</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Thu, 25 Sep 2008 11:07:27 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Thanks for confirming Andrew. </p>
		<p>I can't imagine it's very hard for Lotus to stop that. It seems odd that the same session is allowed to be accessed from multiple IP addresses. I can't imagine why it would ever need to. I can see the need to login from different PCs but surely the session id would be different for the two sessions in that case?</p>
		<p>Jake</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=ABB76F16EA6D6D7C862574CF005892C5"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_ABB76F16</link>
</item><item>
	<title>Reply from Andrew Pollack</title>
	<pubDate>Thu, 25 Sep 2008 10:54:00 -0500</pubDate>
	<author>Andrew Pollack</author>
	<description><![CDATA[ 
		<p>Confirmed.</p>
		<p>After communicating with Jake, we clearly confirmed that this works from another browser on a totally different IP address.</p>
		<p>Sad.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=57CC30FF5467F745862574CF0057573C"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_57CC30FF</link>
</item><item>
	<title>Reply from Andrew Pollack</title>
	<pubDate>Thu, 25 Sep 2008 10:12:20 -0500</pubDate>
	<author>Andrew Pollack</author>
	<description><![CDATA[ 
		<p>I believe there is a possible flaw here that at least mitigates this risk to some extent.  I will have to test to see before I'm sure.</p>
		<p>Jake, since you've already set up the test code, if you want to ping me and work it out, let me know.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=16798E88E312B9F6862574CF00538691"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_16798E88</link>
</item><item>
	<title>Reply from Dragon Cotterill</title>
	<pubDate>Thu, 25 Sep 2008 09:31:57 -0500</pubDate>
	<author>Dragon Cotterill</author>
	<description><![CDATA[ 
		<p>Hehehe. Glad to see you prevent the execution. I know a few sites that don't.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=63740A42AF61F4CA862574CF004FD424"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_63740A42</link>
</item><item>
	<title>Reply from Dragon Cotterill</title>
	<pubDate>Thu, 25 Sep 2008 09:31:20 -0500</pubDate>
	<author>Dragon Cotterill</author>
	<description><![CDATA[ 
		<p>Yes it's scary. The only solution (within the law) is to provide a secure system in the first place. But if Developers don't know all the tricks that a hacker uses then can you guarantee your system is secure? Even since mentioning stuff yesterday my server has had a few Domino knowledgable people having a go at it. For those who tried I hope you liked my little joke messages which you got.</p>
		<p>As far as I can see there are no Hacking Domino type threads around (well there are now you started 'em!).</p>
		<p>But back to the case in hand.</p>
		<p>There are two Domino problems here. Firstly is allowing user entered data to *execute* when viewing. I allow users to enter HTML. However when data is displayed it is done with the old &lt; &gt; tags. So what is sent to the browser looks just like the HTML entered. Not sure if you do it but if &lt;script&gt;alert('Boo!')&lt;/script&gt; you got a spooky message then you are allowing stuff to execute.</p>
		<p>Secondly is Domino's wierd pass-thru of using the square brackets. I'm sure we've all done it. Added passthru code directly on pages to allow RichText fields to pass the code dircetly. [&lt;script&gt;alert('Boo! (with square brackets)')&lt;/script&gt;] My technique for stopping this is simply a WQS agent which does a search and replace and inserts a space between the two characters, thereby prevent the pass-thru from working.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=2F32BEBC983834AF862574CF004FC5E0"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_2F32BEBC</link>
</item><item>
	<title>Reply from Jake Howlett</title>
	<pubDate>Thu, 25 Sep 2008 08:17:56 -0500</pubDate>
	<author>Jake Howlett</author>
	<description><![CDATA[ 
		<p>Bloody hell Dragon. That's crazy. Not something I'd lose sleep over it though. The only thing that would worry me is their potential to seize all my computer equipment. Not that's a scary thought.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=2EAFA797E1707F00862574CF00490D91"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_2EAFA797</link>
</item><item>
	<title>Reply from Dragon Cotterill</title>
	<pubDate>Thu, 25 Sep 2008 07:50:36 -0500</pubDate>
	<author>Dragon Cotterill</author>
	<description><![CDATA[ 
		<p>This is just one more attack. This attack however is not just the problem of Domino, but *any* server which fails to vaildate it's user entered data.</p>
		<p>There are a lot more possible attacks which are specifically Domino related. However as the saying goes "The law is an ass". There is a Bill going through Parliament at the moment which is an ammendment to the 1990 Computer Misuse Act.</p>
		<p>It reads: </p>
		<p>----</p>
		<p>A person is guilty of an offence if he makes, adapts, supplies or offers to supply any article — </p>
		<p>(a) intending it to be used to commit, or to assist in the commission of, an offence under section 1 or 3 [of the Computer Misuse Act]; or</p>
		<p>(b) believing that it is likely to be so used.</p>
		<p>----</p>
		<p>Telling people about the hack would be considered a breach of the law. However by NOT telling people about the hack you would have commited another breach of civil law by allowing potentially compromised systems to remain in service.</p>
		<p>So what it all boils down to is don't write or release any system which can be misused. Here we have a whole can of worms that can really upset things.</p>
		<p>Lets hope the Police and Justice Bill gets re-written properly or thrown out. Otherwise we're all in deep do-do.</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=0AAEA788E867B1D9862574CF00468D0E"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_0AAEA788</link>
</item><item>
	<title>Reply from Dan Soares</title>
	<pubDate>Thu, 25 Sep 2008 07:34:05 -0500</pubDate>
	<author>Dan Soares</author>
	<description><![CDATA[ 
		<p>Wow... That is scarily easy. Looking forward to seeing the solution.</p>
		<p>Dan</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=6D467F88E27B6886862574CF004509FA"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_6D467F88</link>
</item><item>
	<title>Reply from andy</title>
	<pubDate>Thu, 25 Sep 2008 07:23:37 -0500</pubDate>
	<author>andy</author>
	<description><![CDATA[ 
		<p>Excellent Tip ... </p>
		<p>also intriguing is copy the following line of code into the address bar of any website, and be able to change the layout / text / images etc within it ....</p>
		<p>javascript:document.body.contentEditable='true'; document.designMode='on'; void 0</p>
		<p>enjoy !</p>

		<p><a href="http://www.codestore.net/store.nsf/reply?OpenForm&ParentUNID=B72D6E92A5C44BB2862574CF00441438"><img border="0" src="http://www.codestore.net/store.nsf/images/rss_reply.gif" alt="Click here to post a response" /></a></p>
	]]></description>
	<link>http://www.codestore.net/store.nsf/unid/BLOG-20080925?OpenDocument#DOC_B72D6E92</link>
</item>

</channel>
</rss> 
