<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic App-ID to trap iodine (DNS tunneling) in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35253#M842</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to create a custom signature to block iodine usage of DNS.&lt;/P&gt;&lt;P&gt;while doing a packet capture on it i spotted a returning set of values in the hex that would allow me to capture this traffic.&lt;/P&gt;&lt;P&gt;but i am not experienced enough to get this into an App-ID and am looking for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as can be seen below in the screenshot my goal would be to capture on the query (udp/53) to block the initial setup (client, server based) of the DNS tunneling.&lt;/P&gt;&lt;P&gt;the "Type: NULL" and "Class: IN" are always the same giving a hex string of "00 0a 00 01" in every data packet used by iodine.&lt;/P&gt;&lt;P&gt;would there be a way to configure this into a App-ID?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG" class="image-0 jive-image" height="318" src="https://live.paloaltonetworks.com/legacyfs/online/20401_Capture.PNG" style="height: 318px; width: 425.247058823529px;" width="425" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the support,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jul 2015 13:29:48 GMT</pubDate>
    <dc:creator>BastiaanBoutmans</dc:creator>
    <dc:date>2015-07-22T13:29:48Z</dc:date>
    <item>
      <title>App-ID to trap iodine (DNS tunneling)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35253#M842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to create a custom signature to block iodine usage of DNS.&lt;/P&gt;&lt;P&gt;while doing a packet capture on it i spotted a returning set of values in the hex that would allow me to capture this traffic.&lt;/P&gt;&lt;P&gt;but i am not experienced enough to get this into an App-ID and am looking for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as can be seen below in the screenshot my goal would be to capture on the query (udp/53) to block the initial setup (client, server based) of the DNS tunneling.&lt;/P&gt;&lt;P&gt;the "Type: NULL" and "Class: IN" are always the same giving a hex string of "00 0a 00 01" in every data packet used by iodine.&lt;/P&gt;&lt;P&gt;would there be a way to configure this into a App-ID?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.PNG" class="image-0 jive-image" height="318" src="https://live.paloaltonetworks.com/legacyfs/online/20401_Capture.PNG" style="height: 318px; width: 425.247058823529px;" width="425" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the support,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 13:29:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35253#M842</guid>
      <dc:creator>BastiaanBoutmans</dc:creator>
      <dc:date>2015-07-22T13:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID to trap iodine (DNS tunneling)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35254#M843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi - Iodine activity should be covered by a couple of items already: 1. the application 'tcp-over-dns' (&lt;A href="https://applipedia.paloaltonetworks.com/" title="https://applipedia.paloaltonetworks.com/"&gt;Application Research Center&lt;/A&gt;) and 2. A threat ID to detect additional TCP-over-DNS evasion (&lt;A href="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/37518" title="https://threatvault.paloaltonetworks.com/Home/ThreatDetail/37518"&gt;https://threatvault.paloaltonetworks.com/Home/ThreatDetail/37518&lt;/A&gt;). Please try including these in the test ruleset and look for triggers against these initially.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jul 2015 16:04:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35254#M843</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2015-07-23T16:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID to trap iodine (DNS tunneling)</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35255#M844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Goku123,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;indeed tcp-over-dns should capture these and it does once the stream is generating packets that are out of size for dns queries,&amp;nbsp; i have this blocked by a rule.&lt;/P&gt;&lt;P&gt;However if the iodine data stays within the field length of the host name field, therefor not generating additional (truncated) data, the PAN-OS will just see it as dns and allow it to flow out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jul 2015 06:19:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/app-id-to-trap-iodine-dns-tunneling/m-p/35255#M844</guid>
      <dc:creator>BastiaanBoutmans</dc:creator>
      <dc:date>2015-07-27T06:19:40Z</dc:date>
    </item>
  </channel>
</rss>

