<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS TXT records, use and implications of blocking? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46664#M34295</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, there are valid DNS txt records.&amp;nbsp; the most common would be the SPF records for SMTP services.&amp;nbsp; These are used to help prevent some types of spam bots by identifying the valid SMTP outbound servers in a domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your better approach may be to see which DNS Amplification signatures the attacks are hitting and change the threat id responses from default alert to a block action.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 29 Nov 2014 00:33:46 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-11-29T00:33:46Z</dc:date>
    <item>
      <title>DNS TXT records, use and implications of blocking?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46663#M34294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the recent past my organization was hit with a relatively new DNS Amplification attack which uses a botnet hosting DNS services with a specifically crafted DNS TXT record.&amp;nbsp; The spoofed requests specifically requested this record hosted on the botnet.&amp;nbsp; After investigating I found articles online of the attack being used but with different TXT records.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is this, are DNS TXT records used legitimately in practice over the internet and what could be the implications of blocking requests/replys for TXT records all-together?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any insight you can provide.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2014 15:51:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46663#M34294</guid>
      <dc:creator>Dz3015</dc:creator>
      <dc:date>2014-11-28T15:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: DNS TXT records, use and implications of blocking?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46664#M34295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, there are valid DNS txt records.&amp;nbsp; the most common would be the SPF records for SMTP services.&amp;nbsp; These are used to help prevent some types of spam bots by identifying the valid SMTP outbound servers in a domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your better approach may be to see which DNS Amplification signatures the attacks are hitting and change the threat id responses from default alert to a block action.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Nov 2014 00:33:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46664#M34295</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-11-29T00:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: DNS TXT records, use and implications of blocking?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46665#M34296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since amplification attacks are typically fragmented UDP packets one option would be to enable zone protection on your Internet facing interface(s). Selecting 'Fragmented Traffic" and/or configuring UDP flood parameters in a zone protection profile and applying it to these interfaces will drop UDP DNS fragments commonly used in amp attacks. I don't recommend using this profile internally unless you've determined if your own DNS implementations are configured correctly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This avoids having to block a specific record type altogether while still dropping the attack traffic. It will also drop UDP responses from resolvers that are not configured to truncate responses 512+ bytes and resume over TCP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Nov 2014 18:30:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-txt-records-use-and-implications-of-blocking/m-p/46665#M34296</guid>
      <dc:creator>lwheelock</dc:creator>
      <dc:date>2014-11-29T18:30:59Z</dc:date>
    </item>
  </channel>
</rss>

