<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exact threat details in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377758#M1011</link>
    <description>&lt;P&gt;&amp;nbsp; Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have seen 4 different threat IDs so far for non-RFC compliant SMTP traffic, so it's not like you have a very broad set of criteria that classifies traffic under one ID and that there could be a gazillion reasons. As I noted in my OP the sending server is a Postfix (SMTP) server, although an old one (7+ years), so I don't think it sends corrupt messages in any way and that it sent SMTP traffic, not something else. I used Thunderbird (latest as of OP's date) to send the mails via this server. Server adds a DKIM signature, which is validated OK by Google, so I don't see where the problem comes from. The problem started when we enabled SSL inspection and I believe my server was using STARTTLS with a valid certificate to encrypt traffic.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Jan 2021 21:23:53 GMT</pubDate>
    <dc:creator>KozbeszHat</dc:creator>
    <dc:date>2021-01-04T21:23:53Z</dc:date>
    <item>
      <title>Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/371636#M993</link>
      <description>&lt;P&gt;&amp;nbsp; Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Is there a way to know what a specific threat ID checks for? We enabled SSL inspection for SMTP traffic and Palo started to flag every e-mail with threat ID 56951 (non-RFC compliant SMTP traffic), but ThreatDB does not provide anything useful as to what/how it is non-compliant. E-mails were received from a proper e-mail server running an older version of Postfix and using an older OpenSSL version for SSL encryption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Morc&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 14:59:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/371636#M993</guid>
      <dc:creator>KozbeszHat</dc:creator>
      <dc:date>2020-12-10T14:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/373482#M995</link>
      <description>&lt;P&gt;Thanks for the information&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 10:56:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/373482#M995</guid>
      <dc:creator>Millender12</dc:creator>
      <dc:date>2020-12-10T10:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/376157#M1005</link>
      <description>&lt;P&gt;You would need to open a case with Support.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2020 22:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/376157#M1005</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-12-24T22:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377685#M1009</link>
      <description>&lt;P&gt;But why? Other threat IDs have links for more information, but these non-RFC SMTP ones don't have anything.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 16:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377685#M1009</guid>
      <dc:creator>KozbeszHat</dc:creator>
      <dc:date>2021-01-04T16:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377687#M1010</link>
      <description>&lt;P&gt;Hello Laszlo,&lt;/P&gt;
&lt;P&gt;As you can see in ThreatVault, "&lt;SPAN data-reactid=".0.1.1:$kqWlj.2.0.0.1.0.1.0.2.1:0.0.0.0"&gt;This signature detects suspicious and non-RFC compliant SMTP traffic on port 25. This could be associated with applications sending non SMTP traffic using port 25 or indicate possible malicious activity.&lt;/SPAN&gt;&lt;SPAN data-reactid=".0.1.1:$kqWlj.2.0.0.1.0.1.0.2.1:0.0.0.1"&gt;&amp;nbsp;&amp;nbsp;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-reactid=".0.1.1:$kqWlj.2.0.0.1.0.1.0.2.1:0.0.0.1"&gt;This signature is alerting on port 25 traffic that is not valid SMTP traffic per&amp;nbsp;RFC 5321 - Simple Mail Transfer Protocol. Security best practices recommend not allowing non SMTP traffic via port 25. Identifying the specific issue requires investigation into the actual traffic and/or hosts sending the traffic. Due to the broad category of non-rfc compliance, we are unable to provide a more specific description, as this signature simply detects if the traffic is not compliant with the RFC.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 17:17:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377687#M1010</guid>
      <dc:creator>brcook</dc:creator>
      <dc:date>2021-01-04T17:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Exact threat details</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377758#M1011</link>
      <description>&lt;P&gt;&amp;nbsp; Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have seen 4 different threat IDs so far for non-RFC compliant SMTP traffic, so it's not like you have a very broad set of criteria that classifies traffic under one ID and that there could be a gazillion reasons. As I noted in my OP the sending server is a Postfix (SMTP) server, although an old one (7+ years), so I don't think it sends corrupt messages in any way and that it sent SMTP traffic, not something else. I used Thunderbird (latest as of OP's date) to send the mails via this server. Server adds a DKIM signature, which is validated OK by Google, so I don't see where the problem comes from. The problem started when we enabled SSL inspection and I believe my server was using STARTTLS with a valid certificate to encrypt traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 21:23:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/exact-threat-details/m-p/377758#M1011</guid>
      <dc:creator>KozbeszHat</dc:creator>
      <dc:date>2021-01-04T21:23:53Z</dc:date>
    </item>
  </channel>
</rss>

