<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has anyone done a custom APP to block recursive DNS queries? in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/513158#M439</link>
    <description>&lt;P&gt;Just create a 4 conditions that match a string and the specify the text.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-pattern-requirements" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-pattern-requirements&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think that the dns request header context should do the job:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/dns-req-header" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/dns-req-header&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also match on a reqex but you will need a reqex that matches 4 strings/words and they all should be in the pact (AND &amp;amp;&amp;amp;) but maybe better just add 4 conditions joined with a&amp;nbsp;‘AND&lt;LI-WRAPPER&gt;’ t&lt;/LI-WRAPPER&gt;hat have the four patters as I said.&lt;/P&gt;</description>
    <pubDate>Fri, 26 Aug 2022 21:49:38 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2022-08-26T21:49:38Z</dc:date>
    <item>
      <title>Has anyone done a custom APP to block recursive DNS queries?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/507954#M432</link>
      <description>&lt;P&gt;&amp;nbsp;I've built two signatures for DNS.&amp;nbsp; One to indicate recursive lookup and not recursive lookup.&amp;nbsp;&amp;nbsp; When I test,&amp;nbsp; the app that is evaluated first is triggered.&amp;nbsp; reverse the order and the formerly 2nd app triggers.&amp;nbsp;&amp;nbsp; It is like the expressions are not evaluated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone done this before?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a case open with paloalto about this, but it has been open for almost a year.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2022 13:16:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/507954#M432</guid>
      <dc:creator>mcannady</dc:creator>
      <dc:date>2022-07-05T13:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done a custom APP to block recursive DNS queries?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/508112#M433</link>
      <description>&lt;P&gt;what does your signature look like?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 20:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/508112#M433</guid>
      <dc:creator>P.Jacob</dc:creator>
      <dc:date>2022-07-06T20:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done a custom APP to block recursive DNS queries?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/509213#M434</link>
      <description>&lt;P&gt;I want to block the request traffic that this wireshark display filter would select:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(((dns.flags.response == 0) &amp;amp;&amp;amp; (dns.flags.recdesired == 1)) &amp;amp;&amp;amp; (dns.flags.opcode == 0)) &amp;amp;&amp;amp; (ip.proto == 17)&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; and only looking at port 53 traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mcannady_0-1658171659179.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/42538i7BE7234D50CA3602/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mcannady_0-1658171659179.png" alt="mcannady_0-1658171659179.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2022 19:15:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/509213#M434</guid>
      <dc:creator>mcannady</dc:creator>
      <dc:date>2022-07-18T19:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done a custom APP to block recursive DNS queries?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/513158#M439</link>
      <description>&lt;P&gt;Just create a 4 conditions that match a string and the specify the text.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-pattern-requirements" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-pattern-requirements&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think that the dns request header context should do the job:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/dns-req-header" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/dns-req-header&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also match on a reqex but you will need a reqex that matches 4 strings/words and they all should be in the pact (AND &amp;amp;&amp;amp;) but maybe better just add 4 conditions joined with a&amp;nbsp;‘AND&lt;LI-WRAPPER&gt;’ t&lt;/LI-WRAPPER&gt;hat have the four patters as I said.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 21:49:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/513158#M439</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-08-26T21:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone done a custom APP to block recursive DNS queries?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/522039#M450</link>
      <description>&lt;P&gt;Did you manage to resolve this ? Also as a note you can do app flow debug to see if you are matching the correct app to get the idea if Palo Alto is not matching the wrong app:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe try also switching between DNS UDP to TCP or vice versa as this could be related&amp;nbsp; to the issue who knows (maybe TCP DNS and UDP DNS are seen differently by the palo alto device) as maybe you will need to use custom app with unknown tcp/udp context (CPU intensive just for info):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/unknown-req-udp-payload" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/unknown-req-udp-payload&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/udp-context-free" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/udp-context-free&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/unknown-req-udp-payload" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/unknown-req-udp-payload&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can play also with using the Palo Alto DNS proxy feature as this may help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 13:31:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/has-anyone-done-a-custom-app-to-block-recursive-dns-queries/m-p/522039#M450</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-11-22T13:31:07Z</dc:date>
    </item>
  </channel>
</rss>

