<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Sinkhole not triggering for known malicious domains in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74040#M41589</link>
    <description>&lt;P&gt;Yeah, check who is sending those 'no such name' responses. That can't be PA.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Mar 2016 07:56:55 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2016-03-03T07:56:55Z</dc:date>
    <item>
      <title>DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73581#M41468</link>
      <description>&lt;P&gt;Hello, has anyone had any problems with DNS sinkhole not triggering on&amp;nbsp;PAN-OS 6.1.4 ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have created a security policy for DNS traffic between a LAN side DNS server and a WAN side upstream DNS server, the Palo sits at the WAN edge between the two DNS servers. &amp;nbsp; Attached to this security policy is an Anti-spyware security policy with DNS action alert. &amp;nbsp;This works as expected, alerting every time a query for a known malicious domain is seen, so no problem seeing the traffic albeit with the LAN side DNS server as the source IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So with a duplicate (higher) security rule and spyware policy now set to sinkhole, the traffic is seen as "DNS" by this new rule but does not trigger the treat and so does not receive the sinkhole IP address I have set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 16:25:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73581#M41468</guid>
      <dc:creator>Smi12</dc:creator>
      <dc:date>2016-02-25T16:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73598#M41471</link>
      <description>&lt;P&gt;Check out this doc it will surely help if the dns sinkhole is configured properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Articles/Where-to-Get-a-Suspicious-DNS-Query-for-Testing-DNS-Sinkhole/ta-p/66048" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Articles/Where-to-Get-a-Suspicious-DNS-Query-for-Testing-DNS-Sinkhole/ta-p/66048&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 18:10:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73598#M41471</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-02-25T18:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73600#M41472</link>
      <description>&lt;P&gt;Make sure that the&amp;nbsp;&lt;SPAN&gt;antivirus update are consecutive.&amp;nbsp;H&lt;SPAN&gt;ighest and second&amp;nbsp;highest &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 18:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73600#M41472</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-02-25T18:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73601#M41473</link>
      <description>&lt;P&gt;So you've got an Anti-Spyware policy set up like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/2779i46FD6DC7DDC84ED3/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="Anti-Spyware.png" title="Anti-Spyware.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With no logs in threat that look like this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/2780i8F725B68785B8805/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="Threat_Log.png" title="Threat_Log.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have any "Traffic" logs of hosts going to your sinkhole IP?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 18:12:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73601#M41473</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2016-02-25T18:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73768#M41528</link>
      <description>&lt;P&gt;Thanks for the response, for further info as of today we are running AV 1797-2276 and I have performed further tests.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My sinkhole spyware profile is configured like this:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/2822iA3445C31D0ADC64E/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="dns1.JPG" title="dns1.JPG" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then attempt to lookup a known malicious domain. &amp;nbsp;In the traffic logs I can see that my test traffic hits the correct&amp;nbsp;security&amp;nbsp;rule that should apply the dns sinkhole IP address. &amp;nbsp;However it does not sinkhole the traffic and does not trigger a threat log for spyware domain.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/2824i09DFBA39C5E834DE/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="dns3.JPG" title="dns3.JPG" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using packet capture I can see that my query contains the known malicious domain as below:&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/2823iEEEA6719355CDAED/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="dns2.JPG" title="dns2.JPG" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone have any further thoughts that may help please? &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 09:40:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73768#M41528</guid>
      <dc:creator>Smi12</dc:creator>
      <dc:date>2016-02-29T09:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73783#M41532</link>
      <description>&lt;P&gt;If you will check the url cateogry as malicious then it will/may not trigger the sinkhole. Check the link that I have sent you follow it once just for testing.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Threat-Articles/Where-to-Get-a-Suspicious-DNS-Query-for-Testing-DNS-Sinkhole/ta-p/66048" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Articles/Where-to-Get-a-Suspicious-DNS-Query-for-Testing-DNS-Sinkhole/ta-p/66048&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;download and install antivirus&amp;nbsp;&lt;SPAN&gt;1797-2276 and do the dns lookup for "d1e9me*d3jmum*com" replace * with .&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 13:21:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/73783#M41532</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-02-29T13:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74032#M41588</link>
      <description>&lt;P&gt;Not sure how the client is trying to connect to the sinkhole IP addres if it's receiving an error code in the DNS response instead of the sinkhole IP address (unless the packet capture is missing something). By any chance is the client using an internal DNS server?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From RFC 1035 (DNS) the response "no such name"&lt;/P&gt;
&lt;PRE class="newpage"&gt;                3               Name Error - Meaningful only for
                                responses from an authoritative name
                                server, this code signifies that the
                                domain name referenced in the query does
                                not exist.&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 04:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74032#M41588</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2016-03-03T04:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74040#M41589</link>
      <description>&lt;P&gt;Yeah, check who is sending those 'no such name' responses. That can't be PA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 07:56:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74040#M41589</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-03-03T07:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Sinkhole not triggering for known malicious domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74110#M41611</link>
      <description>&lt;P&gt;Hello, &amp;nbsp;it is the remote DNS server sending the "no such name" response. &amp;nbsp;However what I was expecting is that for the reason the lookup contains a known malware domain it would trigger the PA to respond with the Sinkhole IP instead. &amp;nbsp;Instead its not seen as Malware so does not trigger the sinkhole. &amp;nbsp; &amp;nbsp;I'm going to be spending some time next week looking at this again and will update. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2016 08:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-triggering-for-known-malicious-domains/m-p/74110#M41611</guid>
      <dc:creator>Smi12</dc:creator>
      <dc:date>2016-03-04T08:58:20Z</dc:date>
    </item>
  </channel>
</rss>

