<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNSSEC broken for updates.paloaltonetworks.com in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/489165#M104867</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206721"&gt;@SSargent_ICTWA&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd honestly bypass support with this and push this through your account team instead. Your not likely to have a good time going through TAC to get this passed to the right internal teams since most of the front-line likely doesn't even understand what your asking.&lt;/P&gt;
&lt;P&gt;While your SE might not know where to put a ticket like this, they could pass it along through their channels and hopefully get it to someone that&amp;nbsp;&lt;EM&gt;does&amp;nbsp;&lt;/EM&gt;know what internal team handles PANs DNS records.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 21 May 2022 02:49:52 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2022-05-21T02:49:52Z</dc:date>
    <item>
      <title>DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/487960#M104766</link>
      <description>&lt;P&gt;&lt;SPAN&gt;My organization uses the MS-ISAC MDBR public DNS resolver service. I received reports that this service was unexpectedly blocking resolution of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://updates.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;updates.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;. I inquired and received the following explanation:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;"The DNSSEC for that domain is broken. Since that means the records couldn’t be confirmed to be legitimate, the MDBR service was blocking them for security. We had to institute a manual work around to allow our partners to regain access until the DNSSEC can be fixed."&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I verified the problem in the DNSSEC chain using&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://dnssec-analyzer.verisignlabs.com/updates.paloaltonetworks.com" target="_blank" rel="noopener"&gt;https://dnssec-analyzer.verisignlabs.com/updates.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://updates.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;updates.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;is a CNAME to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://updates.gslb.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;updates.gslb.paloaltonetworks.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;2.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://updates.gslb.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;updates.gslb.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;is a CNAME to&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://updates.gcp.gslb.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;updates.gcp.gslb.paloaltonetworks.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;3. No DS records found for&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://gslb.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;gslb.paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://paloaltonetworks.com/" target="_blank" rel="noopener"&gt;paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;zone&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;4. No DNSKEY records found&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;This was preventing us from receiving PAN-OS Dynamic Updates and Software Upgrades until MDBR instituted the temporary workaround. I submitted customer support case&amp;nbsp;02181213 on April 28th and have had two Technical Support Engineers ask me for remote sessions in my network to continue addressing the issue despite my explanation that it needs to be escalated to the team at Palo Alto responsible for managing the domain's public DNS records. Is anybody listening here that can save me further aggravation?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 21:03:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/487960#M104766</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-05-17T21:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/487984#M104770</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Not with DNSSec, however the same thing happened to zoomgov.com a few weeks back. I do face the occasional cloud can be hit for whatever generic reason, but thats just cloud being cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 21:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/487984#M104770</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-05-17T21:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/488855#M104856</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm not sure what you mean. Someone at Palo Alto is responsible for configuring DNSSEC for their domains and should fix this specific problem. It may not be trivial, but it's part of the responsible implementation of DNS. Broken DNSSEC is worse that no DNSSEC.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 12:14:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/488855#M104856</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-05-20T12:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/489165#M104867</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206721"&gt;@SSargent_ICTWA&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd honestly bypass support with this and push this through your account team instead. Your not likely to have a good time going through TAC to get this passed to the right internal teams since most of the front-line likely doesn't even understand what your asking.&lt;/P&gt;
&lt;P&gt;While your SE might not know where to put a ticket like this, they could pass it along through their channels and hopefully get it to someone that&amp;nbsp;&lt;EM&gt;does&amp;nbsp;&lt;/EM&gt;know what internal team handles PANs DNS records.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 May 2022 02:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/489165#M104867</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-05-21T02:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/503179#M105400</link>
      <description>&lt;P&gt;I'm having the same issue with DNSSEC and support run around.&amp;nbsp; Using staticupdates.paloaltonetworks.com as an alternative.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 15:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/503179#M105400</guid>
      <dc:creator>DonJarmon</dc:creator>
      <dc:date>2022-06-13T15:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/504057#M105475</link>
      <description>&lt;P&gt;I have been told this will automagically get fixed tomorrow night.&amp;nbsp; Please stand-by&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 04:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/504057#M105475</guid>
      <dc:creator>DonJarmon</dc:creator>
      <dc:date>2022-06-16T04:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/504553#M105515</link>
      <description>&lt;P&gt;I haven't seen any evidence of this being fixed yet.&amp;nbsp;&lt;A href="https://dnssec-analyzer.verisignlabs.com/updates.paloaltonetworks.com" target="_blank"&gt;DNSSEC Analyzer - updates.paloaltonetworks.com (verisignlabs.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 19:33:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/504553#M105515</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-06-17T19:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/505195#M105559</link>
      <description>&lt;P&gt;We are seeing the same thing, just FYI. I informed our SE and account manager.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 15:59:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/505195#M105559</guid>
      <dc:creator>phite_cpso</dc:creator>
      <dc:date>2022-06-21T15:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: DNSSEC broken for updates.paloaltonetworks.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/513737#M106679</link>
      <description>&lt;P&gt;A few weeks ago, I was notified by support that this had been resolved. I verified the DNSSEC chain is correct and I worked with our DNS provider to test removing the DNSSEC bypass, and confirmed correct resolution of updates.paloaltonetworks.com.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 14:39:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dnssec-broken-for-updates-paloaltonetworks-com/m-p/513737#M106679</guid>
      <dc:creator>SSargent_ICTWA</dc:creator>
      <dc:date>2022-09-01T14:39:39Z</dc:date>
    </item>
  </channel>
</rss>

