<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS-Sinkhole Injection in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239930#M6391</link>
    <description>&lt;P&gt;Outstanding research!&lt;/P&gt;</description>
    <pubDate>Mon, 13 Oct 2025 17:21:35 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2025-10-13T17:21:35Z</dc:date>
    <item>
      <title>DNS-Sinkhole Injection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1238869#M6334</link>
      <description>&lt;P&gt;The DNS sinkhole option works perfectly well with a Microsoft DNS environment. Unfortunately, it fails if you try to perform DNS-sinkhole injection in front of a BIND DNS server running on Red Hat Linux. Requests to malicious domains simply time out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test-Domain from PaloAlto (works fine):&lt;BR /&gt;nslookup -query=cname test-c2.testpanw.com&lt;BR /&gt;test-c2.testpanw.com canonical name = sinkhole.paloaltonetworks.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malicious-Domain (should display the sinkhole cname instead of a timeout):&lt;BR /&gt;nslookup -query=cname apleona.co&lt;BR /&gt;DNS request timed out&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone else experienced anything similar?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Sep 2025 06:09:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1238869#M6334</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2025-09-26T06:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-Sinkhole Injection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239121#M6354</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/901194817"&gt;@HeinzP&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a related discussion.&amp;nbsp;&amp;nbsp;&lt;A href="https://www.reddit.com/r/dns/comments/p6g2lq/cant_resolve_some_sites_using_our_internal/" target="_blank"&gt;https://www.reddit.com/r/dns/comments/p6g2lq/cant_resolve_some_sites_using_our_internal/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That person also had the same issue.&amp;nbsp; Unless someone else posts the solution, you will need to open a TAC case.&amp;nbsp; At least my response will put this thread on the top of the queue so others may see it.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 15:32:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239121#M6354</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-09-30T15:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-Sinkhole Injection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239679#M6381</link>
      <description>&lt;P&gt;After several hours of debugging, I finally found the root cause of this problem.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;DNSSEC validation is enabled by default on a BIND DNS server (dnssec-validation auto).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case, the DNS server is configured as a resolver, so every DNS request will query the root DNS server for the corresponding top-level DNS servers etc. All these requests are intercepted by Palo's sinkhole feature. Therefore, DNSSEC validation fails and does not return an answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To mitigate this problem, there are several options:&lt;/P&gt;
&lt;P&gt;1.) Disable DNSSEC validation on the Bind server.&lt;BR /&gt;2.) Instead of using the resolver, configure your DNS server to forward to an external DNS server (e.g. Google).&lt;BR /&gt;3.) Disable the sinkhole feature on all root and top-level DNS servers, because DNSSEC is primarily used at this level and is not very popular in user domains.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I used option 3 and generated an IP list of all root and top-level DNS &lt;SPAN&gt;servers (&lt;A href="https://www.internic.net/domain/root.zone" target="_blank"&gt;internic.net/domain/root.zone&lt;/A&gt;) using PowerShell. This list was configured as an EDL in a firewall rule as the destination with the DNS security feature disabled.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 16:53:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239679#M6381</guid>
      <dc:creator>HeinzP</dc:creator>
      <dc:date>2025-10-10T16:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: DNS-Sinkhole Injection</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239930#M6391</link>
      <description>&lt;P&gt;Outstanding research!&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2025 17:21:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/dns-sinkhole-injection/m-p/1239930#M6391</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-10-13T17:21:35Z</dc:date>
    </item>
  </channel>
</rss>

