<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Old spyware signatures are not sinkholed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226660#M65245</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Is this particular domain listed as DNS signature or "only" as malware URL category? If its the latter one, then this is actually "expected behaviour" because only a small percentage of malware domains are available as DNS signature. This is simply because the DNS signatures are far more static than the URL categories where the firewall is able to do a cloud lookup of an URL. Technically this would also be possible for DNS entries, but so far this isn't implemented this way.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Aug 2018 20:43:55 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-08-09T20:43:55Z</dc:date>
    <item>
      <title>Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226641#M65235</link>
      <description>&lt;P&gt;I have dns sinkhole in place but the issue here is firewall is not stopping dns resolutions of old spyware(previous dynamic update version) sihgnatures/domains at dns level. Palo threat databse shows the domain as malware but no sinkhole action is taking place. Is this a known behaviour?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 18:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226641#M65235</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-08-09T18:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226657#M65243</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;As long as it's still listed on threatvault you should still be seeing the request get sinkholed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:07:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226657#M65243</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-09T20:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226658#M65244</link>
      <description>&lt;P&gt;Thank you. But I am not seeing them. That is the issue. I may create a support cae.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:09:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226658#M65244</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-08-09T20:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226660#M65245</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Is this particular domain listed as DNS signature or "only" as malware URL category? If its the latter one, then this is actually "expected behaviour" because only a small percentage of malware domains are available as DNS signature. This is simply because the DNS signatures are far more static than the URL categories where the firewall is able to do a cloud lookup of an URL. Technically this would also be possible for DNS entries, but so far this isn't implemented this way.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:43:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226660#M65245</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-09T20:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226661#M65246</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That's a really good distinction to make. If it isn't listed as an actual signature then this is fully expected behaviour.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:45:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226661#M65246</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-09T20:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226662#M65247</link>
      <description>&lt;P&gt;Thank you so much for the detailed explanantion.&lt;/P&gt;&lt;P&gt;I tested 2 domains. veedookij.tk and aol.cm&lt;/P&gt;&lt;P&gt;They both are listed as malware but only the first one is being resolved to sinkhole IP. I don't see any logic here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;**aol.cm used to resolve to sinkhole IP 2-3 weeks ago. I assume all signatures timeout after some specific timeperiod?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226662#M65247</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-08-09T20:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226663#M65248</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70284"&gt;@SThatipelly&lt;/a&gt;&lt;/P&gt;&lt;P&gt;This I don't know exactly, but I assume it is something like you wrote (that the signatures time out) and probably also that paloalto makes the most dangerous domains available as DNS signature. As I wrote there is no cloud lookup for these so the capacity is limited. Specially when users can also configure their own domain EDL, the firewall will get to a point where the performance is affected when the firewall has to check hundreds of thousands entries for every DNS request. The cloud obviously scales a lot better with the URL database than a local one.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 21:02:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226663#M65248</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-09T21:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226717#M65267</link>
      <description>&lt;P&gt;I agree about the performance but this for me, seems to be a major hole in security because my DNS sinkhole report omits all those old malicious connection requests(if any)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 12:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226717#M65267</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2018-08-10T12:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Old spyware signatures are not sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226722#M65271</link>
      <description>&lt;P&gt;Unfortunately thats how it works right now. You could create a feature request for this DNS sinkhole cloud enhancement ...&lt;/P&gt;&lt;P&gt;Or build something similar on your internal DNS server where you sinkhole alle the public lists of malware domains... I know, not really what your looking for...&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:00:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/old-spyware-signatures-are-not-sinkholed/m-p/226722#M65271</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-10T13:00:26Z</dc:date>
    </item>
  </channel>
</rss>

