<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How Does DNS Sinkholing Work? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/63356#M38139</link>
    <description>&lt;P&gt;I am testing using an internal IP that runs netsink. Netsink basically emulates DNS,HTTP, HTTPS,SMTP,SMTPS,FTP and has functionality to redirect any tcp connection to a listener which then determines which of the above protocols the request is for and emulates it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason we do this is to allow for more detailed analysis of the client and the malware.&amp;nbsp; Having the headers from an HTTP/S request (yes netsink will strip the SSL as it servers its own cert) or the SMTP headers improves your situational awareness around these incidents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far so good.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Aug 2015 23:41:25 GMT</pubDate>
    <dc:creator>resuna</dc:creator>
    <dc:date>2015-08-19T23:41:25Z</dc:date>
    <item>
      <title>How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37480#M27475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anybody offer a detailed explanation of how DNS Sinkholing works and possibly a real world example of it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only find this documenation: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-6220"&gt;How to Configure DNS Sinkholing on PAN-OS 6.0&lt;/A&gt; and it doesn't provide a lot of details on how it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like the DNS request is allowed but when traffic starts to flow the firewall notices the destination is a malicious URL and re-routes to the configured loopback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct and enlighten me. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 19:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37480#M27475</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-02-04T19:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37481#M27476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I found the answer I was looking for in the 6.0 Web Interface Ref Guide. (Why not in the Admin Guide?) It says the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The following is the sequence of events that will occur when the sinkhole&lt;/P&gt;&lt;P&gt;feature is enabled:&lt;/P&gt;&lt;P&gt;1. Malicious software on an infected client computer sends a DNS&lt;/P&gt;&lt;P&gt;query to resolve a malicious host on the Internet.&lt;/P&gt;&lt;P&gt;2. The client's DNS query is sent to an internal DNS server, which then&lt;/P&gt;&lt;P&gt;queries a public DNS server on the other side of the firewall.&lt;/P&gt;&lt;P&gt;3. The DNS query matches a DNS entry in the DNS signatures&lt;/P&gt;&lt;P&gt;database, so the sinkhole action will be performed on the query.&lt;/P&gt;&lt;P&gt;4. The infected client then attempts to start a session with the host, but&lt;/P&gt;&lt;P&gt;uses the forged IP address instead. The forged IP address is the&lt;/P&gt;&lt;P&gt;address defined in the Anti-Spyware profile DNS Signatures tab&lt;/P&gt;&lt;P&gt;when the sinkhole action is selected.&lt;/P&gt;&lt;P&gt;5. The administrator is alerted of a malicious DNS query in the threat&lt;/P&gt;&lt;P&gt;log, and can then search the traffic logs for the sinkhole IP address&lt;/P&gt;&lt;P&gt;and can easily locate the client IP address that is trying to start a&lt;/P&gt;&lt;P&gt;session with the sinkhole IP address."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I can configure whatever IP I want, in theory I could build a simple website that informs the user what happened and inform them to contact desktop support?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 19:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37481#M27476</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-02-04T19:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37482#M27477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;So if I can configure whatever IP I want, in theory I could build a simple website that informs the user what happened and inform them to contact desktop support?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hello mario,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Building a simple website would not work to inform end users in the event of malicious software. The malicious software would generally make background calls either for command and control or for payload delivery and the end user would not see this (unless they were browsing to a malicious site) traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A DNS sinkhole works by 'spoofing' the DNS servers response for malicious or unwanted hosts/domains. You configure to return a false IP for these request. When a users machine request to resolve a malicious address the sinkhole returns a non-routable address. This would deny the client a connection. Logs would then indicate source and destination of sinkhole address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:28:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37482#M27477</guid>
      <dc:creator>dmaynard7</dc:creator>
      <dc:date>2014-02-05T17:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37483#M27478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome! Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:35:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37483#M27478</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-02-05T17:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37484#M27479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mario,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are a couple more points: &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;You can just add the IP address you use for your sinkhole to a custom block URL category and for web requests you will deliver the block page you may already have&amp;nbsp; (providing your network will route that IP address to the firewall) and thus you don't need to have a webserver.&amp;nbsp; The caveat is that some of the sinkhole traffic may be client based and thus the user will not see the web page.&amp;nbsp; You would still have a specific rule blocking non browser application traffic.&amp;nbsp; You would use this to assist you in easily identifying a problematic host.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another point to remember is that the sinkhole response applies to Palo Alto defined malicious dns signatures only.&amp;nbsp; I have not found a way to add your own malicious dns entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 00:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37484#M27479</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2014-02-06T00:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37485#M27480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for that explanation.&amp;nbsp; I kept seeing the DNS records being marked as bad, but never crossed my mind to search the logs for the other traffic to the sinkhole address!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"can then search the traffic logs for the sinkhole IP address&lt;/P&gt;&lt;P&gt;and can easily locate the client IP address that is trying to start a&lt;/P&gt;&lt;P&gt;session with the sinkhole IP address."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 19:57:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/37485#M27480</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2014-02-08T19:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: How Does DNS Sinkholing Work?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/63356#M38139</link>
      <description>&lt;P&gt;I am testing using an internal IP that runs netsink. Netsink basically emulates DNS,HTTP, HTTPS,SMTP,SMTPS,FTP and has functionality to redirect any tcp connection to a listener which then determines which of the above protocols the request is for and emulates it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason we do this is to allow for more detailed analysis of the client and the malware.&amp;nbsp; Having the headers from an HTTP/S request (yes netsink will strip the SSL as it servers its own cert) or the SMTP headers improves your situational awareness around these incidents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far so good.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 23:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-dns-sinkholing-work/m-p/63356#M38139</guid>
      <dc:creator>resuna</dc:creator>
      <dc:date>2015-08-19T23:41:25Z</dc:date>
    </item>
  </channel>
</rss>

