<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic x.com website api calls classified as twitter-messaging in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/x-com-website-api-calls-classified-as-twitter-messaging/m-p/1240062#M725</link>
    <description>&lt;P&gt;Starting a week or two ago one of my customers started experiencing website issues with x.com. Their current environment allows application "twitter-base" but not "twitter-messaging". It appears that with a recent content update Palo now classifies the internal x.com website api calls as "twitter-messaging" which my customer blocks causing the page to not load. My customer has been blocking "twitter-messaging" for years with no issues. Not until a week or two did the access to x.com break.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone else have this issue and resolution?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Oct 2025 14:43:56 GMT</pubDate>
    <dc:creator>MikeSchrader</dc:creator>
    <dc:date>2025-10-15T14:43:56Z</dc:date>
    <item>
      <title>x.com website api calls classified as twitter-messaging</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/x-com-website-api-calls-classified-as-twitter-messaging/m-p/1240062#M725</link>
      <description>&lt;P&gt;Starting a week or two ago one of my customers started experiencing website issues with x.com. Their current environment allows application "twitter-base" but not "twitter-messaging". It appears that with a recent content update Palo now classifies the internal x.com website api calls as "twitter-messaging" which my customer blocks causing the page to not load. My customer has been blocking "twitter-messaging" for years with no issues. Not until a week or two did the access to x.com break.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone else have this issue and resolution?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 14:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/x-com-website-api-calls-classified-as-twitter-messaging/m-p/1240062#M725</guid>
      <dc:creator>MikeSchrader</dc:creator>
      <dc:date>2025-10-15T14:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: x.com website api calls classified as twitter-messaging</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/x-com-website-api-calls-classified-as-twitter-messaging/m-p/1240126#M727</link>
      <description>&lt;P&gt;You can make a custom app signature based on the host url and a new rule before the blocking rule that allows the custom app limiting the rule to only allowed source ip and the destination servers that host the&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;internal x.com website. Have you seen my article&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/how-to-write-palo-alto-networks-custom-vulnerability-and/ta-p/1228494" target="_blank" rel="noopener"&gt;How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples&lt;/A&gt;&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Outside of that there are other ways as well as allowing traffic for&amp;nbsp;"twitter-messaging" based on the destination url/fqdn and again only for the needed source and destination IP addresses or even App bypass that I don't recommend as that is final solution &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0" target="_blank"&gt;Tips &amp;amp; Tricks: How to Create an Application Override - Knowledge Base - Palo Alto Networks&lt;/A&gt;&amp;nbsp;Maybe you can try to place app overide after the twitter base rule as to stop the app identification for "twitter-messaging" as there should be application shift for palo alto to identify again the traffic from base to messaging but it could have mixed results. For app shift see :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/td-p/577599" target="_blank"&gt;Application Shift and How to allow linkedIn but block specific linkedin-posting application&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm1aCAC" target="_blank"&gt;How to Prevent Application Shift - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-app-id-debugging/ta-p/1232109" target="_blank"&gt;Tips &amp;amp; Tricks: App-ID Debugging&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 07:04:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/x-com-website-api-calls-classified-as-twitter-messaging/m-p/1240126#M727</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2025-10-16T07:04:40Z</dc:date>
    </item>
  </channel>
</rss>

