<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EDNS? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49494#M36466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone implemented EDNS on their network? How does the firewall treat it? Is it just as DNS? Does it block it because the packets are too big?&lt;/P&gt;&lt;P&gt;Does anyone know if there is a plan to make it its own discreet application?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the info...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Nov 2013 15:13:29 GMT</pubDate>
    <dc:creator>bgranholm</dc:creator>
    <dc:date>2013-11-22T15:13:29Z</dc:date>
    <item>
      <title>EDNS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49494#M36466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone implemented EDNS on their network? How does the firewall treat it? Is it just as DNS? Does it block it because the packets are too big?&lt;/P&gt;&lt;P&gt;Does anyone know if there is a plan to make it its own discreet application?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the info...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 15:13:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49494#M36466</guid>
      <dc:creator>bgranholm</dc:creator>
      <dc:date>2013-11-22T15:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49495#M36467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/15654"&gt;bgranholm&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Today, we do not support the EDNS RFC 2671. Usually, if DNS servers enabled with EDNS tries to talk to a non-EDNS server, the non-EDNS servers will simply ignore the OPT request and will not negotiate a larger packet size.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;However, I do see a feature request (FR) submitted to our development team to potentially add it to our upcoming releases. You can also request your account's SE to vote for it.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;FR ID : 2315&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Hope that information helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks and regards,&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 15:27:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49495#M36467</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-11-22T15:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49496#M36468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So how does the Firewall classify this traffic now? unknown-udp or unknown-tcp?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 15:39:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49496#M36468</guid>
      <dc:creator>bgranholm</dc:creator>
      <dc:date>2013-11-22T15:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49497#M36469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/15654"&gt;bgranholm&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;The DNS decoder does not enforce a length check for EDNS, and so the traffic should still be identified as DNS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;Thanks and regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Lucida Grande', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12px;"&gt;Kunal Adak&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 15:47:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49497#M36469</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-11-22T15:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49498#M36470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To summarize my findings regarding EDNS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using BIND then add one of these values to your BIND config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;max-udp-size 1460;&lt;/P&gt;&lt;P&gt;edns-udp-size 1460;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;max-udp-size 1280;&lt;/P&gt;&lt;P&gt;edns-udp-size 1280;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whatever floats your boat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;According to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html&lt;/A&gt;&lt;SPAN&gt; one could say that:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Old standard: max 512 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- New standard: max 4096 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Microsoft standard: max 1280 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 1280 seems to be connected to that 1280 is the smallest allowed MTU for IPv6 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;References:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01"&gt;http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;If the IPv6 stack does not support IPV6_USE_MIN_MTU, then steps&lt;/P&gt;&lt;P&gt;should be taken to prevent PMTUD occuring.&amp;nbsp; These include, but are&lt;/P&gt;&lt;P&gt;not limited to, setting the MTU of the interface the packets are&lt;/P&gt;&lt;P&gt;being sent over to the minimum IPv6 MTU (1280 bytes), or restricing&lt;/P&gt;&lt;P&gt;DNS/UDP packets to no more than 1280 bytes including IPv6 headers.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ietf.org/rfc/rfc2671.txt"&gt;http://www.ietf.org/rfc/rfc2671.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;4.5.1.&lt;/P&gt;&lt;P&gt;Note that a 512-octet UDP payload requires a 576-octet IP&lt;/P&gt;&lt;P&gt;reassembly buffer.&amp;nbsp; Choosing 1280 on an Ethernet connected&lt;/P&gt;&lt;P&gt;requestor would be reasonable.&amp;nbsp; The consequence of choosing too&lt;/P&gt;&lt;P&gt;large a value may be an ICMP message from an intermediate&lt;/P&gt;&lt;P&gt;gateway, or even a silent drop of the response message.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02"&gt;http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;1280 bytes of DNS data is chosen as the new default to provide a&lt;/P&gt;&lt;P&gt;generous allowance for IP headers and still be within the highly&lt;/P&gt;&lt;P&gt;prevalent approximately Ethernet size or larger MTU and buffering&lt;/P&gt;&lt;P&gt;generally available today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPv6 server should enable fragmentation on UDP replies.&amp;nbsp; While&lt;/P&gt;&lt;P&gt;fragmentation will not be frequent if the above guidelines are&lt;/P&gt;&lt;P&gt;followed, it may occur on occasion. In principle, IPv6 headers and&lt;/P&gt;&lt;P&gt;options could be huge, resulting in a very large UDP packet even&lt;/P&gt;&lt;P&gt;though the DNS payload is limited, but this should not occur in&lt;/P&gt;&lt;P&gt;practice.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Way to test if you are affected of any EDNS bugs in your infrastructure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;dig +short rs.dns-oarc.net txt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then check the logs of your firewalls etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 18:37:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns/m-p/49498#M36470</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-12-01T18:37:19Z</dc:date>
    </item>
  </channel>
</rss>

