<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Sinkholing subdomains of known bad domains in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/157957#M13</link>
    <description>&lt;P&gt;I tried to find an answer for this, but I couldn't find it. If someone has already posted this question, apologies...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just turned DNS sinkholing and it works as expected for root domains, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup kntsv.nl&amp;nbsp;&lt;/STRONG&gt;returns the DNS sinkhole IP of 71.19.152.112.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I do an nslookup of any subdomain of kntsv.nl, it returns a valid A record, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup testing.kntsv.nl&amp;nbsp;&lt;/STRONG&gt;returns the IP of 109.72.85.37.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question... Why did the dns lookup for the subdomain work but not the root? I would think the Palo would mark *.kntsv.nl as malicious and return with the sinkhole IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for the help.&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2017 19:28:47 GMT</pubDate>
    <dc:creator>grumpycat</dc:creator>
    <dc:date>2017-05-23T19:28:47Z</dc:date>
    <item>
      <title>DNS Sinkholing subdomains of known bad domains</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/157957#M13</link>
      <description>&lt;P&gt;I tried to find an answer for this, but I couldn't find it. If someone has already posted this question, apologies...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just turned DNS sinkholing and it works as expected for root domains, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup kntsv.nl&amp;nbsp;&lt;/STRONG&gt;returns the DNS sinkhole IP of 71.19.152.112.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I do an nslookup of any subdomain of kntsv.nl, it returns a valid A record, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nslookup testing.kntsv.nl&amp;nbsp;&lt;/STRONG&gt;returns the IP of 109.72.85.37.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question... Why did the dns lookup for the subdomain work but not the root? I would think the Palo would mark *.kntsv.nl as malicious and return with the sinkhole IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:28:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/157957#M13</guid>
      <dc:creator>grumpycat</dc:creator>
      <dc:date>2017-05-23T19:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkholing subdomains of known bad domains</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/158544#M14</link>
      <description>When a root domain is malicious, it does not mean that automatically all subdomains are malicious.&lt;BR /&gt;As far as I know in the DNS signatures there are only FQDN's and not wildcard entries.</description>
      <pubDate>Sat, 27 May 2017 10:28:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/158544#M14</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-27T10:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkholing subdomains of known bad domains</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/160261#M16</link>
      <description>FYI, You should be able to create your own External Dynamic block list and add it to your DNS Sinkhole policy and wildcard the sub-domains if you want.</description>
      <pubDate>Thu, 08 Jun 2017 18:38:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-sinkholing-subdomains-of-known-bad-domains/m-p/160261#M16</guid>
      <dc:creator>murphyj</dc:creator>
      <dc:date>2017-06-08T18:38:08Z</dc:date>
    </item>
  </channel>
</rss>

