<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat log spammed with &amp;quot;Non-RFC Compliant DNS Traffic on Port 53/5353&amp;quot; in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/460037#M102030</link>
    <description>&lt;P&gt;&lt;SPAN class=""&gt;Name: Non-RFC Compliant DNS Traffic on Port 53/5353&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;56505&lt;/P&gt;&lt;P class=""&gt;What is the solution for this, and what RFC standard it is not cpmpliant?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jan 2022 05:18:48 GMT</pubDate>
    <dc:creator>mss-ops</dc:creator>
    <dc:date>2022-01-21T05:18:48Z</dc:date>
    <item>
      <title>Threat log spammed with "Non-RFC Compliant DNS Traffic on Port 53/5353"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/306155#M79552</link>
      <description>&lt;P&gt;A couple days ago, the threatvault added &lt;A href="https://threatvault.paloaltonetworks.com/?query=56505" target="_self"&gt;threat id 56505&lt;/A&gt;, and since then our threat log is getting spammed with the vulnerability type&amp;nbsp;&lt;STRONG&gt;Non-RFC Compliant DNS Traffic on Port 53/5353 &lt;/STRONG&gt;(informational). We use dnscrypt, and every single DNS request is now showing up in the threat log. First of all, is this a false positive? And if so, how do I prevent this from inundating my logs?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 16:31:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/306155#M79552</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2020-01-09T16:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log spammed with "Non-RFC Compliant DNS Traffic on Port 53/5353"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/306183#M79561</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/25857"&gt;@Maxstr&lt;/a&gt;,&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/25857"&gt;@Maxstr&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;First of all, is this a false positive? And if so, how do I prevent this from inundating my logs?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;No, it's not a false positive; it also isn't unexpected if you are utilizing dnscrypt. DNSCrypt is not RFC compliant, hence you are hitting a signature that makes perfect sense. If you don't want it to keep showing up in your logs, you'll need to make an exception for 56505 on your Vulnerability profile and set it to allow.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 19:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/306183#M79561</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-01-09T19:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log spammed with "Non-RFC Compliant DNS Traffic on Port 53/5353"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/441732#M100026</link>
      <description>&lt;P&gt;Helo All,&lt;/P&gt;&lt;P&gt;In my case I dont have DNSDecry and I see&amp;nbsp; &lt;A href="https://threatvault.paloaltonetworks.com/?query=56505" target="_self" rel="nofollow noopener noreferrer"&gt;threat id 56112 .&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It is possible I consider a false positive ?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 18:31:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/441732#M100026</guid>
      <dc:creator>felcor</dc:creator>
      <dc:date>2021-10-18T18:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log spammed with "Non-RFC Compliant DNS Traffic on Port 53/5353"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/441816#M100028</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138216"&gt;@felcor&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is not false positive. It is information message only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/?query=56505" target="_blank"&gt;https://threatvault.paloaltonetworks.com/?query=56505&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 01:38:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/441816#M100028</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-10-19T01:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log spammed with "Non-RFC Compliant DNS Traffic on Port 53/5353"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/460037#M102030</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Name: Non-RFC Compliant DNS Traffic on Port 53/5353&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;56505&lt;/P&gt;&lt;P class=""&gt;What is the solution for this, and what RFC standard it is not cpmpliant?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 05:18:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-spammed-with-quot-non-rfc-compliant-dns-traffic-on/m-p/460037#M102030</guid>
      <dc:creator>mss-ops</dc:creator>
      <dc:date>2022-01-21T05:18:48Z</dc:date>
    </item>
  </channel>
</rss>

