<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detect random sub-domain DNS query in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/detect-random-sub-domain-dns-query/m-p/73710#M44</link>
    <description>&lt;P&gt;Hi Yarianto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think from aspect of device OS and custom signatures you could probably craft something that would work for that purpose... you would match dns-req-section with regex pattern, but I am not sure where to start with this signature - you can ask them to give you regex of what they want to block and than test it as custom signature. I am not sure this would be my first approach for problem as you describe it, but I guess it could work, why not. What is their actual complaint, can't it be resolved on the DNS server itself?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0" target="_self"&gt;Here is manual&lt;/A&gt; for custom signatures that explains dns-req-section. Note that at the end of the document you have reference to PAN-OS regex characters - it is a subset of what you would expect and there are no greedy expressions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Luciano&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jul 2023 21:38:51 GMT</pubDate>
    <dc:creator>Lucky</dc:creator>
    <dc:date>2023-07-13T21:38:51Z</dc:date>
    <item>
      <title>Detect random sub-domain DNS query</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detect-random-sub-domain-dns-query/m-p/73523#M42</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like know if anyone has succesfull creating a custom signature either Custom spyware object or custom vulnerability signature to detect random sub-domain in DNS query.&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;We don't want to block &lt;A href="http://www.yahoo.com" target="_blank"&gt;www.yahoo.com&lt;/A&gt; or yahoo.com domain query.&lt;/P&gt;
&lt;P&gt;But if there are query something like abcd1234.yahoo.com, we should detect and alert using Anti-spyware profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you recommend any solutions on how to solve this issue ?&lt;/P&gt;
&lt;P&gt;This is particularly happened in ISP where they need to block this kind of sub-domain query which is not exist actually and consume DNS resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;yarijanto&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 08:34:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detect-random-sub-domain-dns-query/m-p/73523#M42</guid>
      <dc:creator>yarijanto</dc:creator>
      <dc:date>2016-02-25T08:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Detect random sub-domain DNS query</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/detect-random-sub-domain-dns-query/m-p/73710#M44</link>
      <description>&lt;P&gt;Hi Yarianto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think from aspect of device OS and custom signatures you could probably craft something that would work for that purpose... you would match dns-req-section with regex pattern, but I am not sure where to start with this signature - you can ask them to give you regex of what they want to block and than test it as custom signature. I am not sure this would be my first approach for problem as you describe it, but I guess it could work, why not. What is their actual complaint, can't it be resolved on the DNS server itself?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0" target="_self"&gt;Here is manual&lt;/A&gt; for custom signatures that explains dns-req-section. Note that at the end of the document you have reference to PAN-OS regex characters - it is a subset of what you would expect and there are no greedy expressions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Luciano&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 21:38:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/detect-random-sub-domain-dns-query/m-p/73710#M44</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2023-07-13T21:38:51Z</dc:date>
    </item>
  </channel>
</rss>

