<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMTP Signature Help in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170648#M191</link>
    <description>&lt;P&gt;No, but I was able to get the signature to work using the (or) | and adding frivolous text.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the issue is when adding a combo signature to include the one I just created, I get an error "Threat 41001 is not known -- cannot be added to this signature."&amp;nbsp; Not sure if this is a bug (Panorama 7.1.11) but even trying to recreate the Wordpress brute-force example document from 2016 just to verify if that works -- I still get the same error.&amp;nbsp; *sigh*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Aug 2017 01:11:05 GMT</pubDate>
    <dc:creator>NickAssar</dc:creator>
    <dc:date>2017-08-09T01:11:05Z</dc:date>
    <item>
      <title>SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170394#M185</link>
      <description>&lt;P&gt;We have been slammed with random Chinese IP addresses attemping to brute-force accounts via SMTP.&amp;nbsp; Amusingly enough, our gateway doesn't even support that feature but the amount of traffic attempting it is consuming all available ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was able to make a signature to catch it when the server responds back with a "502 Unsupported" command but the problem is this alone makes Palo Alto think the attacker is always the server and not the client.&amp;nbsp; So I need to add something to detect the client's traffic first...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The clients are sending an "AUTH LOGIN" command.&amp;nbsp; I can create a rule to detect the AUTH part but the string for "LOGIN" has to be at least 7 characters, which is impossible to meet those requirements.&amp;nbsp; I then tried to create a negate rule but that didn't work and it wouldn't detect the rule at all.&amp;nbsp; So any ideas how to get this to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the time being I just created a DOS resource policy to only allow 5 concurrent source-IP connections.&amp;nbsp; It works but I'd rather have a rule to actually block-IP the attacker for 30 minutes then just let them continue attacking us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I contacted support and they redirected my case to the threat team.&amp;nbsp; The threat team then sent me here saying they do not offer help on custom signatures and to post any questions in the forums...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 20:34:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170394#M185</guid>
      <dc:creator>NickAssar</dc:creator>
      <dc:date>2017-08-07T20:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170398#M186</link>
      <description>&lt;P&gt;Why are you making a custom signature for this? &amp;nbsp;You can modify the action for the built-in SMTP brute force, assuming it's triggering. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="smtp.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10667iC59F5FBFBC2F1356/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="smtp.png" alt="smtp.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can make the change in your Vulnerability Protection object, under Exceptions. &amp;nbsp;Add an exception for the SMTP Brute Force and change the action. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="exception.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10668iA06D59DB2109F254/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="exception.png" alt="exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 21:07:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170398#M186</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-08-07T21:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170399#M187</link>
      <description>&lt;P&gt;The built-in filter only looks for the 535 response.&amp;nbsp; Our appliance doesn't support the AUTH command so it doesn't respond with a 535, only 502 (Unsupported command).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"If a session has the same source and destination but triggers our child signature, 31709, 10 times in 60 seconds, we call it is a brute force attack.&lt;/P&gt;&lt;P&gt;The child signature, 31709, works on 3 apps, smtp, pop3 and imap.&lt;/P&gt;&lt;P&gt;The trigger condition is found in response code 535 in smtp, "No/bad logon/login failure" pattern in imap and "-ERR" on pop3 PASS command."&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 21:19:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170399#M187</guid>
      <dc:creator>NickAssar</dc:creator>
      <dc:date>2017-08-07T21:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170400#M188</link>
      <description>&lt;P&gt;Can you share a packet capture&amp;nbsp;from one of these&amp;nbsp;events? &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Aug 2017 21:46:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170400#M188</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-08-07T21:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170648#M191</link>
      <description>&lt;P&gt;No, but I was able to get the signature to work using the (or) | and adding frivolous text.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the issue is when adding a combo signature to include the one I just created, I get an error "Threat 41001 is not known -- cannot be added to this signature."&amp;nbsp; Not sure if this is a bug (Panorama 7.1.11) but even trying to recreate the Wordpress brute-force example document from 2016 just to verify if that works -- I still get the same error.&amp;nbsp; *sigh*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 01:11:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170648#M191</guid>
      <dc:creator>NickAssar</dc:creator>
      <dc:date>2017-08-09T01:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Signature Help</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170649#M192</link>
      <description>&lt;P&gt;Definitely a bug.&amp;nbsp; I was able to create it on the firewall itself without that error coming up, then exported the rule and imported it back into Panorama just fine.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2017 01:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/smtp-signature-help/m-p/170649#M192</guid>
      <dc:creator>NickAssar</dc:creator>
      <dc:date>2017-08-09T01:26:00Z</dc:date>
    </item>
  </channel>
</rss>

