<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EDNS0 Packet blocked in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6790#M4982</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A href="https://live.paloaltonetworks.com/u1/12029"&gt;BSadozai&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Today, we do not support the EDNS RFC 2671. Usually, if DNS servers enabled with EDNS tries to talk to a non-EDNS server, the non-EDNS servers will simply ignore the OPT request and will not negotiate a larger packet size. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I do see a feature request (FR) submitted to our development team to potentially add it to our upcoming releases. You can also request your account's SE to vote for it.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;STRONG&gt;FR ID : 2315&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that information helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Nov 2013 17:05:56 GMT</pubDate>
    <dc:creator>kadak</dc:creator>
    <dc:date>2013-11-18T17:05:56Z</dc:date>
    <item>
      <title>EDNS0 Packet blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6789#M4981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have internal DNS’s that send query EDNS packets and&lt;BR /&gt;those packets apparently are blocked by our Firewall (PA-3050 IOS Version&lt;BR /&gt;5.0.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn’t find any doc or discussion here about this issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone help me to allow those packets pass through&lt;BR /&gt;our FW. (increase the DNS packet size as described for example below for a&lt;BR /&gt;juniper FW)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0px 0px 1pt;"&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="mso-bidi-font-family: 'Times New Roman'; text-transform: uppercase; font-size: 16pt; mso-hansi-theme-font: minor-latin; mso-ascii-theme-font: minor-latin; font-family: 'Calibri','sans-serif'; mso-bidi-theme-font: minor-bidi;"&gt;Summary:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This article provides information how to allow the EDNS&lt;BR /&gt;queries pass through the SRX firewall, with DNS ALG enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="mso-bidi-font-family: 'Times New Roman'; text-transform: uppercase; font-size: 16pt; mso-hansi-theme-font: minor-latin; mso-ascii-theme-font: minor-latin; font-family: 'Calibri','sans-serif'; mso-bidi-theme-font: minor-bidi;"&gt;Problem&lt;BR /&gt;or Goal:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt; &lt;LI&gt;The basic DNS protocol is&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; not sufficient to support some required features. Moreover, DNS messages&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; carried by UDP were restricted to 512 bytes; not considering the Internet&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol (IP) and Transport Layer headers.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt; &lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt; &lt;LI&gt;EDNS (Extension mechanisms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for DNS) is a specification for expanding the size of several parameters&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; of the Domain Name System (DNS) protocol, which had prior size&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; restrictions.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt; &lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt; &lt;LI&gt;In practice, difficulties&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; can arise when using EDNS to traverse firewalls, as certain firewalls&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; assume a maximum DNS message length of 512 bytes and block longer DNS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packets.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt; &lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt; &lt;LI&gt;EDNS (as per &lt;A href="http://www.ietf.org/rfc/rfc2671.txt" target="_blank"&gt;RFC 2671&lt;/A&gt;)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; queries are dropped by the SRX firewall, with DNS ALG enabled.&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="mso-bidi-font-family: 'Times New Roman'; text-transform: uppercase; font-size: 16pt; mso-hansi-theme-font: minor-latin; mso-ascii-theme-font: minor-latin; font-family: 'Calibri','sans-serif'; mso-bidi-theme-font: minor-bidi;"&gt;Cause:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="mso-bidi-font-family: 'Times New Roman'; text-transform: uppercase; font-size: 16pt; mso-hansi-theme-font: minor-latin; mso-ascii-theme-font: minor-latin; font-family: 'Calibri','sans-serif'; mso-bidi-theme-font: minor-bidi;"&gt;Solution:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow EDNS queries to pass through the SRX firewall, with DNS ALG&lt;BR /&gt;enabled, run the following command from the configuration mode:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 10pt;"&gt;user# set security alg dns&lt;BR /&gt;maximum-message-length 8192&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: The above setting is valid only from 10.1 or later, to&lt;BR /&gt;10.2. From 10.2 onwards, the limitation of 512 bytes will be removed; so the&lt;BR /&gt;above command will no longer be required from 10.2 or later.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 16:58:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6789#M4981</guid>
      <dc:creator>BSadozai</dc:creator>
      <dc:date>2013-11-18T16:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS0 Packet blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6790#M4982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A href="https://live.paloaltonetworks.com/u1/12029"&gt;BSadozai&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Today, we do not support the EDNS RFC 2671. Usually, if DNS servers enabled with EDNS tries to talk to a non-EDNS server, the non-EDNS servers will simply ignore the OPT request and will not negotiate a larger packet size. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I do see a feature request (FR) submitted to our development team to potentially add it to our upcoming releases. You can also request your account's SE to vote for it.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;STRONG&gt;FR ID : 2315&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that information helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 17:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6790#M4982</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-11-18T17:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: EDNS0 Packet blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6791#M4983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To summarize my findings regarding EDNS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using BIND then add one of these values to your BIND config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;max-udp-size 1460;&lt;/P&gt;&lt;P&gt;edns-udp-size 1460;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;max-udp-size 1280;&lt;/P&gt;&lt;P&gt;edns-udp-size 1280;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whatever floats your boat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;According to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/ddns.html&lt;/A&gt;&lt;SPAN&gt; one could say that:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Old standard: max 512 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- New standard: max 4096 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Microsoft standard: max 1280 bytes for UDP (DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 1280 seems to be connected to that 1280 is the smallest allowed MTU for IPv6 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;References:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01"&gt;http://tools.ietf.org/html/draft-andrews-dnsext-udp-fragmentation-01&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;If the IPv6 stack does not support IPV6_USE_MIN_MTU, then steps&lt;/P&gt;&lt;P&gt;should be taken to prevent PMTUD occuring.&amp;nbsp; These include, but are&lt;/P&gt;&lt;P&gt;not limited to, setting the MTU of the interface the packets are&lt;/P&gt;&lt;P&gt;being sent over to the minimum IPv6 MTU (1280 bytes), or restricing&lt;/P&gt;&lt;P&gt;DNS/UDP packets to no more than 1280 bytes including IPv6 headers.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ietf.org/rfc/rfc2671.txt"&gt;http://www.ietf.org/rfc/rfc2671.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;4.5.1.&lt;/P&gt;&lt;P&gt;Note that a 512-octet UDP payload requires a 576-octet IP&lt;/P&gt;&lt;P&gt;reassembly buffer.&amp;nbsp; Choosing 1280 on an Ethernet connected&lt;/P&gt;&lt;P&gt;requestor would be reasonable.&amp;nbsp; The consequence of choosing too&lt;/P&gt;&lt;P&gt;large a value may be an ICMP message from an intermediate&lt;/P&gt;&lt;P&gt;gateway, or even a silent drop of the response message.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02"&gt;http://tools.ietf.org/html/draft-ietf-dnsind-udp-size-02&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;1280 bytes of DNS data is chosen as the new default to provide a&lt;/P&gt;&lt;P&gt;generous allowance for IP headers and still be within the highly&lt;/P&gt;&lt;P&gt;prevalent approximately Ethernet size or larger MTU and buffering&lt;/P&gt;&lt;P&gt;generally available today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPv6 server should enable fragmentation on UDP replies.&amp;nbsp; While&lt;/P&gt;&lt;P&gt;fragmentation will not be frequent if the above guidelines are&lt;/P&gt;&lt;P&gt;followed, it may occur on occasion. In principle, IPv6 headers and&lt;/P&gt;&lt;P&gt;options could be huge, resulting in a very large UDP packet even&lt;/P&gt;&lt;P&gt;though the DNS payload is limited, but this should not occur in&lt;/P&gt;&lt;P&gt;practice.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Way to test if you are affected of any EDNS bugs in your infrastructure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;dig +short rs.dns-oarc.net txt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then check the logs of your firewalls etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Dec 2013 18:36:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edns0-packet-blocked/m-p/6791#M4983</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-12-01T18:36:34Z</dc:date>
    </item>
  </channel>
</rss>

