<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS sinkhole not blocking malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216616#M62734</link>
    <description>&lt;P&gt;The best security is always layered, just in case one layer fails&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The external DNS service may provide 'better' coverage as the sinkhole signatures are updated periodically and run on a optimized database to address the most active malware domains where the external service's database could be larger, but slower (sinkhole runs on-device and intercepts all DNS while the external DNS service requires lookups and &lt;EM&gt;properly configured clients&lt;/EM&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to the sinkhole signatures, URL filtering provides a larger repository of malware (and other 'bad') classified domains (pandb) that do support live cloud lookups so when a malware is detected through any one of our many mechanisms, that database will be updated immediately and the verdict will be permeated down to the other services (sinkhole signature, among others)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and lastly, there's still the content scanning of actual malware where we can identify and block all kinds of malware (signature, heuristics, ..)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While the firewall offers many layers of protection, it's never a bad thing to add more &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; Then if the external service doesn't have a domain listed as malware, at least the firewall will protect the network &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jun 2018 08:53:41 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2018-06-05T08:53:41Z</dc:date>
    <item>
      <title>DNS sinkhole not blocking malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216349#M62674</link>
      <description>&lt;P&gt;PC does DNS query, which gets inspected and is not sinkholed. PC then sends traffic to resolved address which gets inspected and blocked as malware. This is the pattern i am seeing right now and this is not for a single domain.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not saying sinkhole is not working, it is working but not for all destinations. Below is the example of both sinkhole and threat block. Source IP's are in the same subnet using same rule when quering for DNS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems even though firewall has knowledge of destination associated with malware it will still not block it at the&amp;nbsp;DNS phase.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15365iE15C7DFF2202ACEF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15366i2BA14DCF5A224763/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 18:58:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216349#M62674</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-06-01T18:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole not blocking malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216411#M62685</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are two different databases behind there two features, which means that something that is categorized as malware in URL filtering does not need to be also in the DNS signatures. In addition with URL filtering it is possible that the domain is categorized as business-and-economy while a subfolder is categorized as malware. Another difference is also that the DNS signatures are more "static" than URL filtering. DNS signatures are updated with the antivirus updates and contain always the full list of DNS signatures which is&amp;nbsp; limited in the way this feature is designed. This DNS signatures simply cannot contain ALL malware, phishing, spyware domains as the list would simply be too big. With urlfiltering the firewall has a local cache of URL and if it does not know the category for a particular URL, it queries the cloud for the category.&lt;/P&gt;&lt;P&gt;So what you saw in your logs is actually expected behaviour. If you want to request a change here for something like a cloud lookup for the DNS sinkhole feature, ask your SE to create a feature request for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Sun, 03 Jun 2018 08:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216411#M62685</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-06-03T08:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole not blocking malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216528#M62722</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I as an administrator can see that firewall is blocking malware either through DNS / URL filtering. There are&amp;nbsp;DNS solutions which claim to stop malware just based on DNS. So when we pointed our DNS to them, PA is not doing sinkhole while this DNS provider is blocking them. PA&amp;nbsp;is&amp;nbsp;blocking them but at a later step. For higher management this third party DNS solution is working well over PA.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jun 2018 17:03:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216528#M62722</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2018-06-04T17:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole not blocking malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216616#M62734</link>
      <description>&lt;P&gt;The best security is always layered, just in case one layer fails&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The external DNS service may provide 'better' coverage as the sinkhole signatures are updated periodically and run on a optimized database to address the most active malware domains where the external service's database could be larger, but slower (sinkhole runs on-device and intercepts all DNS while the external DNS service requires lookups and &lt;EM&gt;properly configured clients&lt;/EM&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to the sinkhole signatures, URL filtering provides a larger repository of malware (and other 'bad') classified domains (pandb) that do support live cloud lookups so when a malware is detected through any one of our many mechanisms, that database will be updated immediately and the verdict will be permeated down to the other services (sinkhole signature, among others)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and lastly, there's still the content scanning of actual malware where we can identify and block all kinds of malware (signature, heuristics, ..)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While the firewall offers many layers of protection, it's never a bad thing to add more &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; Then if the external service doesn't have a domain listed as malware, at least the firewall will protect the network &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 08:53:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-not-blocking-malware/m-p/216616#M62734</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-06-05T08:53:41Z</dc:date>
    </item>
  </channel>
</rss>

