<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA incorrectly matching rule, lets C&amp;C traffic out in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50872#M37437</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of our other IDS tools detected C&amp;amp;C traffic outbound.&amp;nbsp; After further investigation, this traffic was allowed out through the Palo Alto because it matched on a rule that should have allowed ONLY the App-ID "github".&amp;nbsp; The App-IDs that the PA was detecting and allowing were...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-incomplete&lt;/P&gt;&lt;P&gt;-insufficient-data&lt;/P&gt;&lt;P&gt;-non-syn-tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...why did this C&amp;amp;C traffic match this rule which specifies ONLY the "github" App-ID?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Policy-Screenshot.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9822_Policy-Screenshot.JPG.jpg" style="width: 620px; height: 35px;" /&gt;&lt;IMG alt="Traffic-Log-Screenshot.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9823_Traffic-Log-Screenshot.JPG.jpg" style="width: 620px; height: 98px;" /&gt;&lt;IMG alt="github-app-id.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9824_github-app-id.JPG.jpg" style="width: 620px; height: 329px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Nov 2013 17:00:23 GMT</pubDate>
    <dc:creator>jambulo</dc:creator>
    <dc:date>2013-11-18T17:00:23Z</dc:date>
    <item>
      <title>PA incorrectly matching rule, lets C&amp;C traffic out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50872#M37437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of our other IDS tools detected C&amp;amp;C traffic outbound.&amp;nbsp; After further investigation, this traffic was allowed out through the Palo Alto because it matched on a rule that should have allowed ONLY the App-ID "github".&amp;nbsp; The App-IDs that the PA was detecting and allowing were...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-incomplete&lt;/P&gt;&lt;P&gt;-insufficient-data&lt;/P&gt;&lt;P&gt;-non-syn-tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...why did this C&amp;amp;C traffic match this rule which specifies ONLY the "github" App-ID?&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Policy-Screenshot.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9822_Policy-Screenshot.JPG.jpg" style="width: 620px; height: 35px;" /&gt;&lt;IMG alt="Traffic-Log-Screenshot.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9823_Traffic-Log-Screenshot.JPG.jpg" style="width: 620px; height: 98px;" /&gt;&lt;IMG alt="github-app-id.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9824_github-app-id.JPG.jpg" style="width: 620px; height: 329px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 17:00:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50872#M37437</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2013-11-18T17:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: PA incorrectly matching rule, lets C&amp;C traffic out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50873#M37438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a few things that need to happen for an application to be identified, mainly for TCP traffic there needs to be at least the TCP handshake and another packet or more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"non-syn-tcp" is blocked by default, so your firewall seems to have that enabled. Check the Device &amp;gt; Setup &amp;gt; Sessions tab. If you've got it set to allow, the firewall will let a connection be established, and if it's possible to identify the traffic it will do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"incomplete" is traffic that did not actually complete the TCP handshake. That you likely don't have to worry about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"insufficient-data" is traffic that has not had enough packets to identify what it is. Some traffic can be identified easily on the 4th packet (web-browsing, for example has an HTTP GET or similar as soon as the TCP handshake is done), but other traffic may take some time to identify. In the case of github, if it's going on port 80 as your traffic log shows, there has to be some additional traffic before it can be identified. It will have to go through git-base initially, and then be identified as github after git-base is identified. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your screenshot, it never gets that far. Likely there are only a couple packets, which is common for C&amp;amp;C traffic, and so the firewall is unable to identify it positively as github by the time the traffic is done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My recommendation is to disable non-syn-tcp in the session to start, but that may impact other applications so check to see why that was enabled to begin with. The rule in your screenshot doesn't have the last 2 columns, so if there is no AV/Vuln scanning, you'll want to add that as well. Beyond that, if you want to restrict the rule further by adding a URL category or a specific URL for the destination traffic, that may help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 17:19:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50873#M37438</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-11-18T17:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: PA incorrectly matching rule, lets C&amp;C traffic out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50874#M37439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/4850"&gt;jambulo&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Yes this is expected for incomplete, insufficient data and non-syn-tcp.&amp;nbsp; Before the 3-way handshake completes and the session's application is detected as incomplete the security policy lookup for the session will match the first security policy which matches all attributes except application.&amp;nbsp; Once the 3-way handshake completes and the firewall sees a data packet which can be used to identify the app the session will shift the application to the appropriate value and do another security policy lookup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;If a session never completes the 3-way handshake the application will stay as incomplete and the session will be logged after the timeout with the policy which the session first hit.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Maybe an easier way to explain it.&amp;nbsp; When the first TCP packet is received (SYN), the firewall must setup a session.&amp;nbsp; Since the application can not be detected on a TCP session until at least one data packet traverses the device the application will be incomplete.&amp;nbsp; For the firewall to determine if it should even allow the SYN packet through it must do a security policy lookup. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Because the application is not known when the SYN packet is received the application portion of the security policies can not be applied.&amp;nbsp; As a result, the security policy lookup is performed against the 6 tuples of the session, source and destination IP and port, ingress interface (actually zone) and protocol.&amp;nbsp; The first policy which matches these 6 tuples will be used to allow the SYN and any additional packets that traverse the firewall before the application is identified.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Hope that helps!&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks and regards,&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 17:21:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50874#M37439</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-11-18T17:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA incorrectly matching rule, lets C&amp;C traffic out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50875#M37440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually any ip based filters should be able to kick in BEFORE the handshake is completed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 18:06:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-incorrectly-matching-rule-lets-c-c-traffic-out/m-p/50875#M37440</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-12-01T18:06:11Z</dc:date>
    </item>
  </channel>
</rss>

