<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Non-RFC Compliant DNS Traffic on Port 53/5353 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555835#M112877</link>
    <description>&lt;P&gt;you can enable packetcapture in the threat log so you can capture one of these DNS queries to see what they look like&lt;/P&gt;
&lt;P&gt;that pcap can then be used to report a false positive with Palo TAC or get back to vodafone and let them know about potentially malformed dns queries&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;
&lt;P&gt;T&lt;/P&gt;</description>
    <pubDate>Wed, 30 Aug 2023 11:43:21 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2023-08-30T11:43:21Z</dc:date>
    <item>
      <title>Non-RFC Compliant DNS Traffic on Port 53/5353</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555830#M112876</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;Continuously receiving vulnerability threat events (&lt;SPAN title="ID: Non-RFC Compliant DNS Traffic on Port 53/5353(56538) Desc: Non-RFC Compliant DNS Traffic on Port 53/5353(56538)"&gt;&lt;SPAN title=""&gt;Non-RFC Compliant DNS Traffic on Port 53/5353(56538))&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt; form the same source IP towards our PA public IP addresses.&amp;nbsp; The source is also clean and belongs to Vodafone ISP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I could not find any other trace to resolve the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please assist how I can proceed to resolve it.&amp;nbsp; What action I should take to find the root cause?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sample Log:&lt;/P&gt;
&lt;P&gt;&amp;lt;14&amp;gt;Aug 30 13:34:07 PA-FW-SEC LEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|10.2.3-h4|Non-RFC Compliant DNS Traffic on Port 53/5353(56538)|x7C|ReceiveTime=2023/08/30 13:34:07|SerialNumber=016301009873|cat=THREAT|Subtype=vulnerability|devTime=Aug 30 2023 08:04:07 GMT|src=123.63.124.44|dst=x.x.246.105|srcPostNAT=0.0.0.0|dstPostNAT=0.0.0.0|RuleName=DNS-Inbound|usrName=|SourceUser=|DestinationUser=|Application=dns-base|VirtualSystem=vsys1|SourceZone=OUTSIDE-WAN|DestinationZone=DMZ|IngressInterface=ethernet1/17|EgressInterface=ethernet1/19|LogForwardingProfile=Qradar|SessionID=534411|RepeatCount=1|srcPort=52731|dstPort=53|srcPostNATPort=0|dstPostNATPort=0|Flags=0x2000|proto=tcp|action=alert|Miscellaneous=|ThreatID=Non-RFC Compliant DNS Traffic on Port 53/5353(56538)|URLCategory=any|sev=1|Severity=informational|Direction=client-to-server|sequence=7269186445734632983|ActionFlags=0x8000000000000000|SourceLocation=India|DestinationLocation=India|ContentType=|PCAP_ID=0|FileDigest=|Cloud=|URLIndex=0|RequestMethod=|Subject=|DeviceGroupHierarchyL1=97|DeviceGroupHierarchyL2=0|DeviceGroupHierarchyL3=0|DeviceGroupHierarchyL4=0|vSrcName=|DeviceName=ALCOB-PA-FW-SEC|SrcUUID=|DstUUID=|TunnelID=0|MonitorTag=|ParentSessionID=0|ParentStartTime=|TunnelType=N/A|ThreatCategory=protocol-anomaly|ContentVer=AppThreat-8749-8252&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 10:17:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555830#M112876</guid>
      <dc:creator>Arunkumar27</dc:creator>
      <dc:date>2023-08-30T10:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: Non-RFC Compliant DNS Traffic on Port 53/5353</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555835#M112877</link>
      <description>&lt;P&gt;you can enable packetcapture in the threat log so you can capture one of these DNS queries to see what they look like&lt;/P&gt;
&lt;P&gt;that pcap can then be used to report a false positive with Palo TAC or get back to vodafone and let them know about potentially malformed dns queries&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;
&lt;P&gt;T&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 11:43:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555835#M112877</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-08-30T11:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Non-RFC Compliant DNS Traffic on Port 53/5353</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555836#M112878</link>
      <description>&lt;P&gt;you can enable packetcapture in the threat log so you can capture one of these DNS queries to see what they look like&lt;/P&gt;
&lt;P&gt;that pcap can then be used to report a false positive with Palo TAC or get back to vodafone and let them know about potentially malformed dns queries&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;
&lt;P&gt;T&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 11:43:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-rfc-compliant-dns-traffic-on-port-53-5353/m-p/555836#M112878</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-08-30T11:43:27Z</dc:date>
    </item>
  </channel>
</rss>

