<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BlackNurse Denial of Service Attack in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126038#M46478</link>
    <description>&lt;P&gt;Tested here on internal interface just with Anti-spoofing and no Flood protections.&lt;/P&gt;&lt;P&gt;It would be nice to test in time with our lab on an interface that has the icmp flood protection options on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full dataplane shutdown after about 30secs on a 5050&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had to reboot firewall as well to recover as dataplane restart also would not fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;case logged with Palo about mitigation or code release steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 13 Nov 2016 22:46:49 GMT</pubDate>
    <dc:creator>paul.stinson</dc:creator>
    <dc:date>2016-11-13T22:46:49Z</dc:date>
    <item>
      <title>BlackNurse Denial of Service Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/125760#M46455</link>
      <description>&lt;P&gt;&lt;A href="http://www.netresec.com/?page=Blog&amp;amp;month=2016-11&amp;amp;post=BlackNurse-Denial-of-Service-Attack" target="_blank"&gt;http://www.netresec.com/?page=Blog&amp;amp;month=2016-11&amp;amp;post=BlackNurse-Denial-of-Service-Attack&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Has anyone here tested the effect of this on any PAN-devices ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://blacknurse.dk" target="_blank"&gt;http://blacknurse.dk&lt;/A&gt; says:&lt;BR /&gt;LIST OF REPORTED AFFECTED PRODUCTS :&lt;BR /&gt;Cisco ASA 5515, 5525 (default settings)&lt;BR /&gt;Cisco ASA 5550 (Legacy) and 5515-X (latest generation)&lt;BR /&gt;SonicWall&lt;BR /&gt;&lt;STRONG&gt;Some unverified Palo Alto&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;Can't find any more info on what&amp;nbsp;PANs&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2016 07:02:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/125760#M46455</guid>
      <dc:creator>Dulle</dc:creator>
      <dc:date>2016-11-11T07:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: BlackNurse Denial of Service Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126038#M46478</link>
      <description>&lt;P&gt;Tested here on internal interface just with Anti-spoofing and no Flood protections.&lt;/P&gt;&lt;P&gt;It would be nice to test in time with our lab on an interface that has the icmp flood protection options on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full dataplane shutdown after about 30secs on a 5050&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had to reboot firewall as well to recover as dataplane restart also would not fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;case logged with Palo about mitigation or code release steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2016 22:46:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126038#M46478</guid>
      <dc:creator>paul.stinson</dc:creator>
      <dc:date>2016-11-13T22:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: BlackNurse Denial of Service Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126039#M46479</link>
      <description>&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Note to Customers Regarding BlackNurse Report&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://researchcenter.paloaltonetworks.com/2016/11/note-customers-regarding-blacknurse-report/" target="_blank"&gt;http://researchcenter.paloaltonetworks.com/2016/11/note-customers-regarding-blacknurse-report/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2016 00:50:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126039#M46479</guid>
      <dc:creator>spiromruen</dc:creator>
      <dc:date>2016-11-14T00:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: BlackNurse Denial of Service Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126814#M46554</link>
      <description>&lt;P&gt;I'm still trying to figure out how this attack is possible if the PaloAlto doesn't have a session associated with the attack traffic. In order for the PA to allow ICMP Type3, Code3, it would have to be associated with an Echo-Request in order to build a session. if there is no session, the PA should silent drop the traffic.&lt;BR /&gt;&lt;BR /&gt;Am I correct or is there something I am missing?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 18:06:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/126814#M46554</guid>
      <dc:creator>rlowe_mfnsec</dc:creator>
      <dc:date>2016-11-16T18:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: BlackNurse Denial of Service Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/131539#M46968</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/BlackNurse-Denial-of-Service-Attack/m-p/125760/highlight/true#M46455" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/BlackNurse-Denial-of-Service-Attack/m-p/125760/highlight/true#M46455&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When testing an attack at a rate of about 6Mbps (all I could get out of my old Ubuntu box) with hping3 -1 -C 3 -K 3 --flood &amp;lt;target ip&amp;gt;, I saw an increase of about 10% CPU on a PA-3020. It was high enough PPS rate that it triggered a drop following the PA recommendation for a 3020's max ICMP PPS&amp;nbsp;of 8000 but had&amp;nbsp;an activate a little lower than 8000. As stated in my above post, it caused severe problems on the network I was originating the attack from.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2016 18:43:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blacknurse-denial-of-service-attack/m-p/131539#M46968</guid>
      <dc:creator>bspilde</dc:creator>
      <dc:date>2016-12-06T18:43:57Z</dc:date>
    </item>
  </channel>
</rss>

