<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS tunneling seems it's not recognized as &amp;quot;tcp-over-dns&amp;quot; in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/105923#M44773</link>
    <description>&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried updating your apps &amp;amp; threats to make sure it is running on the latest version?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also as you are seeing only DNS application traffic then it is possible that the firewall is detecting the tunnelled application of DNS after protocol decoding and putting this into the session end app, you could try setting your security rule to log at session start as well and see if there is an initially discovered application of tcp-over-dns. Though watch out on turning this on as it will increasing your logging a fair bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still have trouble with the firewall not recognising the app then it would be worth opening a support case for further investigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Tue, 23 Aug 2016 11:57:08 GMT</pubDate>
    <dc:creator>bmorris1</dc:creator>
    <dc:date>2016-08-23T11:57:08Z</dc:date>
    <item>
      <title>DNS tunneling seems it's not recognized as "tcp-over-dns"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/105892#M44771</link>
      <description>&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Since some weeks, we are suspecting DNS Tunneling usage.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;We saw a specific "application" being present on applipedia for this kind of action: tcp-over-dns&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Applipedia description states:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;"DNS Tunneling is a technique to encapsulate any binary data within DNS queries and replies and tunnel it to any remote system and the Internet. There are several tools currently available on the Internet that perform DNS tunneling. This application identifies traffic from the following tools, tcp-over-dns, dns2tcp, Iodine, Heyoka, OzymanDNS, and NSTX."&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;But on our firewall with PAN-os version 6.0.9 we did not find that application "recognized":&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;a) from suspected networks we do not find any "tcp-over-dns" reference inside logs (only plain "dns")&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;b) explicitly testing from a PC behind our firewall with both "dns2tcp" and "Iodine" tools no "tcp-over-dns" reference is recognized&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;c) in both previous cases we found instead presences about strangely big DNS sessions&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Any kind of suggestions related to the functionality from Applipedia "tcp-over-dns" application?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luca&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 07:46:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/105892#M44771</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2016-08-23T07:46:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS tunneling seems it's not recognized as "tcp-over-dns"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/105923#M44773</link>
      <description>&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried updating your apps &amp;amp; threats to make sure it is running on the latest version?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also as you are seeing only DNS application traffic then it is possible that the firewall is detecting the tunnelled application of DNS after protocol decoding and putting this into the session end app, you could try setting your security rule to log at session start as well and see if there is an initially discovered application of tcp-over-dns. Though watch out on turning this on as it will increasing your logging a fair bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you still have trouble with the firewall not recognising the app then it would be worth opening a support case for further investigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 11:57:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/105923#M44773</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-08-23T11:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: DNS tunneling seems it's not recognized as "tcp-over-dns"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/106068#M44784</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5403"&gt;@bmorris1﻿&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have collected a pcap and we found that there a lot of TYPE NULL queries.&lt;/P&gt;&lt;P&gt;In your opinion is it possible to block this type of query creating a custom-app?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Query_Type_NULL.JPG" style="width: 632px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5296i31E359DE175F2F30/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Query_Type_NULL.JPG" alt="Query_Type_NULL.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 14:12:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/106068#M44784</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2016-08-23T14:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: DNS tunneling seems it's not recognized as "tcp-over-dns"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/106084#M44786</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38382"&gt;@TheRealDiz﻿&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I reckon if you create two conditions matching on the contexts of 'dns-req-section' &amp;amp; 'dns-rsp-queries-section' and the pattern of the string 'TYPE: NULL RR' (not 100% sure on the pattern, would need to test) then you could block/identify this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check out this doc for more context defintions if you want to increase the conditions in the signature:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Documentation-Articles/Creating-Custom-Threat-Signatures/ta-p/58569?attachment-id=1097" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Documentation-Articles/Creating-Custom-Threat-Signatures/ta-p/58569?attachment-id=1097&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 14:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/106084#M44786</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-08-23T14:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: DNS tunneling seems it's not recognized as "tcp-over-dns"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/107660#M44904</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5403"&gt;@bmorris1﻿&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for you response, I have tested better with another panOS and now it's recognized.&lt;/P&gt;&lt;P&gt;Probably this issue is due to panOS version (I have tested with 7.1.4-h2).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 07:53:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-tunneling-seems-it-s-not-recognized-as-quot-tcp-over-dns/m-p/107660#M44904</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2016-08-26T07:53:50Z</dc:date>
    </item>
  </channel>
</rss>

