<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: application dns and action reset both in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235863#M67606</link>
    <description>&lt;P&gt;it is for IDF 54122&lt;/P&gt;&lt;P&gt;Exim DKIM DNS Decoding Buffer Overflow Vulnerability&lt;/P&gt;</description>
    <pubDate>Wed, 17 Oct 2018 19:12:57 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2018-10-17T19:12:57Z</dc:date>
    <item>
      <title>application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235832#M67596</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;need to understand deeply reset both action by PA for dns query in threat logs&lt;/P&gt;&lt;P&gt;I know PA send the tcp fin to both ends.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But client who is doing dns query if it does not get reply what does it shows there ?&lt;/P&gt;&lt;P&gt;does the client again makes query?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or does PA allow some traffic and drops some?&lt;/P&gt;&lt;P&gt;how can i fgure this out?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 17:18:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235832#M67596</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-17T17:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235857#M67602</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The client makes the request a set number of times (depends on platform) and&amp;nbsp;since it's not recieving a request will eventually time-out. The client can attempt to make the same query many times attempting to get a response, but it depends on the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Generally speaking you won't really set the action to reset-both for DNS signatures; you would drop them or sinkhole the request.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 18:07:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235857#M67602</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-17T18:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235863#M67606</link>
      <description>&lt;P&gt;it is for IDF 54122&lt;/P&gt;&lt;P&gt;Exim DKIM DNS Decoding Buffer Overflow Vulnerability&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 19:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235863#M67606</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-17T19:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235867#M67609</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you check your Applications and Threats version for me real quick; I'm pretty sure that 54122 was pulled a while back.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 19:25:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235867#M67609</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-17T19:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235901#M67620</link>
      <description>&lt;P&gt;i am running 8080-5081&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 22:21:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235901#M67620</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-17T22:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235996#M67643</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using the reset-both action the behaviour is different depending on whether the protocol is UDP or TCP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For TCP:&lt;/P&gt;&lt;P&gt;A TCP-RST (reset) packet is sent to both the client and the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For UDP:&lt;/P&gt;&lt;P&gt;The firewall simply drops or discards the session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since DNS is UDP, in this scenario the DNS request will be dropped. From the client perspective, it would look something like a timeout or no response. It is then application dependant on whether the DNS query is attempted again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 15:13:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/235996#M67643</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-18T15:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236026#M67650</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Specific to your Threat ID you have listed,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;&amp;nbsp;could you look at one of your firewalls and see if you have the specified threat ID?&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ID that you've specified isn't present on any of my appliances, or a fresh VM install. I'm kind of wondering if you someone didn't get a signature "stuck" on your firewall that has since been pulled.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 16:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236026#M67650</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-18T16:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236029#M67653</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I couldn't find that TID on any of the firewalls I checked. I'm looking at the Threat Vault for that TID and also "DNS Decoding Buffer Overflow Vulnerability" but I'm finding nothing - so I definitely think you're right in saying that this has been pulled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get emailed every time there is a new content update, and I'm not able to find anything by searching through my emails either.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 16:55:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236029#M67653</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-18T16:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236030#M67654</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That's what I was running into as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;, You might want to reach out to support and see if there is a way to re-base the signature database. Off hand I can't think of how you would go about doing so. You could also safetly exclude this signature from your threat profiles, as I&amp;nbsp;&lt;EM&gt;pretty positive&lt;/EM&gt; the signature should have been removed from your system.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 17:03:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236030#M67654</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-18T17:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236031#M67655</link>
      <description>&lt;P&gt;yes you are right unable to find this signature any more.&lt;/P&gt;&lt;P&gt;Seems it is pulled back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good to know that updates can also remove the signature if not needed any more.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 17:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236031#M67655</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-18T17:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236032#M67656</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You'll sometimes see the threats get pulled back for various reasons. Whether the threat campaign is no longer active, or if the signature was too broad and caught traffic that it wasn't designed/supposed to.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 17:12:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236032#M67656</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-18T17:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: application dns and action reset both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236033#M67657</link>
      <description>&lt;P&gt;learned something new.&lt;/P&gt;&lt;P&gt;Many thanks for answering the questions.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 17:14:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dns-and-action-reset-both/m-p/236033#M67657</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2018-10-18T17:14:39Z</dc:date>
    </item>
  </channel>
</rss>

