<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking specific DNS lookups via Custom threats - solved! in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29237#M744</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So after a lot of messing around &amp;amp; finally talking to the righ person, have managed to create the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A custom app that uses a specific dns name in the signature for identification&lt;/LI&gt;&lt;LI&gt;A custom threat/vulnerability profile using a dns name in the signature for identification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In both cases, I can use this new custom signature to allow/block traffic successfully &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It turns out that it's quite simple to do really, and I take no credit for figuring it out as the information is on the Palo Alto site (it just wasn't that easy to find). You need to write the pattern match in hex taken from a Wireshark trace under the dns-req-section context as per the details in this link: &lt;A __default_attr="1971" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used it last night &amp;amp; had my custom signature working within about 20 minutes of me getting this information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Mar 2013 23:04:43 GMT</pubDate>
    <dc:creator>markeating</dc:creator>
    <dc:date>2013-03-14T23:04:43Z</dc:date>
    <item>
      <title>Blocking specific DNS lookups via Custom threats - solved!</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29233#M740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got a bit of a challenge that I'm hoping someone may be able to assist me with. We use GloblaProtect (always on) and it's playing havoc with a few of our apps that can access both internal &amp;amp; external servers (eg: Outlook Anywhere, Lync etc..).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The biggest challenge we face is that once GP connects, it is able to resolve the internal DNS entries for those services, and attempts to connect via the vpn. Although we block this traffic, it takes quite a while for the servcies to fail over to use the external access points which can cause user perception issues. The simplest way to get around this is if the client is unable to resolve 3 specific DNS entries on our internal domain, but not block DNS lookups to the whole domain. I believe that we may be able to do this via a custom threat signature, but can't for the life of me get it working &amp;amp; was hoping that someone would be able to help me identify how to write the reg expression &amp;amp; which specific DNS decoder to use as its driving me nuts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for info, I've seen the other similar thread (&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/22931#22931"&gt;https://live.paloaltonetworks.com/message/22931#22931&lt;/A&gt;), but not sure it's quite the same - although happy to be told otherwise.&lt;/P&gt;&lt;P&gt;thanks very much,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 12:11:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29233#M740</guid>
      <dc:creator>markeating</dc:creator>
      <dc:date>2013-03-14T12:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking specific DNS lookups via Custom threats</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29234#M741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you not able to use the DNS Proxy feature of Palo Alto to write up some static DNS entries, and essentially "force" DNS resolution to specific IP addresses, only on traffic that is coming from your GlobalProtect zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. - it's a bit funny that you're referencing my thread, and the suggestion I have is basically based on what I learned from that thread &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 15:46:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29234#M741</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-03-14T15:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking specific DNS lookups via Custom threats</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29235#M742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;I guess thats a different way of approaching it - instead of blocking/dropping the specific requests, have static dns entries pointing to the alternate IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll have a go, however not sure of the impact due to the use of certificates &amp;amp; encryption of the comms between client &amp;amp; server, so it may break if the client is connecting to something else. It's worth a try though as I'm struggling to get anything else working right now &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In theory though, we shoudl be abel to make use of the dns decoders in the custom vulnerability signatures, however I'm yet to find any decent documentation on the use of the decoders &amp;amp; regular expressions, but will keep looking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 15:56:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29235#M742</guid>
      <dc:creator>markeating</dc:creator>
      <dc:date>2013-03-14T15:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking specific DNS lookups via Custom threats</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29236#M743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;&lt;A class="jive-link-email-small" href="mailto:markeating@deloitte.co.uk"&gt;markeating@deloitte.co.uk&lt;/A&gt;&lt;SPAN&gt; wrote:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In theory though, we shoudl be abel to make use of the dns decoders in the custom vulnerability signatures, however I'm yet to find any decent documentation on the use of the decoders &amp;amp; regular expressions, but will keep looking.&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;^^ that says it all... at my shop we would have liked to take advantage of a custom DNS app as well, but the docs were lacking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 16:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29236#M743</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-03-14T16:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking specific DNS lookups via Custom threats - solved!</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29237#M744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So after a lot of messing around &amp;amp; finally talking to the righ person, have managed to create the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A custom app that uses a specific dns name in the signature for identification&lt;/LI&gt;&lt;LI&gt;A custom threat/vulnerability profile using a dns name in the signature for identification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In both cases, I can use this new custom signature to allow/block traffic successfully &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It turns out that it's quite simple to do really, and I take no credit for figuring it out as the information is on the Palo Alto site (it just wasn't that easy to find). You need to write the pattern match in hex taken from a Wireshark trace under the dns-req-section context as per the details in this link: &lt;A __default_attr="1971" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used it last night &amp;amp; had my custom signature working within about 20 minutes of me getting this information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 23:04:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/blocking-specific-dns-lookups-via-custom-threats-solved/m-p/29237#M744</guid>
      <dc:creator>markeating</dc:creator>
      <dc:date>2013-03-14T23:04:43Z</dc:date>
    </item>
  </channel>
</rss>

