<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Comcast domain suffix getting appended into DNS requests over Global Protect in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comcast-domain-suffix-getting-appended-into-dns-requests-over/m-p/511633#M3075</link>
    <description>&lt;P&gt;I ran a packet capture on PAN to try and figure out an intermittent problem with one of my GP 5.2.5.66 users (Windows, Surface Pro) where certain web based or internal applications will just start working. The external are Outlook O365, Teams for example. If he disables GP then everything starts working again. We verified he's connected to VPN during these periods of failure and narrowed to a DNS problem. When I ran a pcap on the PAN, I could see that his system was first sending a query for the expected domain&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with the host - say scooper-p01.acme.com. But then the next packet would be trying to resolve scooper.hdcl.fl.comcast.net.&amp;nbsp;&lt;BR /&gt;So while his system was clearly connected to GP VPN (I couldn't have grabbed the packets otherwise), the presumed suffix&amp;nbsp;&lt;BR /&gt;was changing one DNS lookup to another. Has anyone seen anything like this? Any recommended fix?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Aug 2022 22:24:12 GMT</pubDate>
    <dc:creator>MichaelMedwid</dc:creator>
    <dc:date>2022-08-11T22:24:12Z</dc:date>
    <item>
      <title>Comcast domain suffix getting appended into DNS requests over Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comcast-domain-suffix-getting-appended-into-dns-requests-over/m-p/511633#M3075</link>
      <description>&lt;P&gt;I ran a packet capture on PAN to try and figure out an intermittent problem with one of my GP 5.2.5.66 users (Windows, Surface Pro) where certain web based or internal applications will just start working. The external are Outlook O365, Teams for example. If he disables GP then everything starts working again. We verified he's connected to VPN during these periods of failure and narrowed to a DNS problem. When I ran a pcap on the PAN, I could see that his system was first sending a query for the expected domain&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with the host - say scooper-p01.acme.com. But then the next packet would be trying to resolve scooper.hdcl.fl.comcast.net.&amp;nbsp;&lt;BR /&gt;So while his system was clearly connected to GP VPN (I couldn't have grabbed the packets otherwise), the presumed suffix&amp;nbsp;&lt;BR /&gt;was changing one DNS lookup to another. Has anyone seen anything like this? Any recommended fix?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2022 22:24:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comcast-domain-suffix-getting-appended-into-dns-requests-over/m-p/511633#M3075</guid>
      <dc:creator>MichaelMedwid</dc:creator>
      <dc:date>2022-08-11T22:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: Comcast domain suffix getting appended into DNS requests over Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comcast-domain-suffix-getting-appended-into-dns-requests-over/m-p/511912#M3082</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132469"&gt;@MichaelMedwid&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Since 5.2.5 is relatively older at this point and a brief glance through the latest release notes show a few suffix fixes alongside split tunnel fixes that saw split DNS requesting DNS across both interfaces, I would highly recommend allowing this user to just try running 5.2.12 and seeing if they run into the same issue. It's possible that they're running into a bug that has been fixed in a later release, and since 5.2.12 fixes the OpenSSL infinite loop vulnerability I would recommend getting it deployed to everyone anyways.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2022 01:50:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/comcast-domain-suffix-getting-appended-into-dns-requests-over/m-p/511912#M3082</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-08-16T01:50:49Z</dc:date>
    </item>
  </channel>
</rss>

