<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP 443 becoming more prevelant in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259129#M73476</link>
    <description>&lt;P&gt;You mean something like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://code.fb.com/android/building-zero-protocol-for-fast-secure-mobile-connections/" target="_blank" rel="noopener"&gt;https://code.fb.com/android/building-zero-protocol-for-fast-secure-mobile-connections/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also just started noticing this mobile facebook traffic as "unknown-udp" in my logs in the last week or two. Not sure if they flipped a switch or I just missed it previously (only a Palo customer for 3 months now and still getting the hang of things!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a custom implementation based off of QUIC according to the documentation, and blocking all UDP/443 traffic seems like the wrong way to solve this issue.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2019 19:02:25 GMT</pubDate>
    <dc:creator>Plattinum</dc:creator>
    <dc:date>2019-04-29T19:02:25Z</dc:date>
    <item>
      <title>UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258632#M73342</link>
      <description>&lt;P&gt;Today I have discovered that the latest Facebook App for Apple IOS is using udp/443 for communication. This behavior seems similar to the Google Quic protocol. I also caught a glimpse of an article referencing the move to a http2/api WWW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is going to be the direction the industry goes, does anyone know how long it takes Palo Alto to signature these applications?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way your organization has handled these new applications that traditionally are "sanctioned"? Right now on the current APP\Thread DB it is classified as unknown-udp&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 15:58:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258632#M73342</guid>
      <dc:creator>DShofkom33x</dc:creator>
      <dc:date>2019-04-24T15:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258653#M73345</link>
      <description>&lt;P&gt;Can you provide anymore reference documentation on this?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 17:48:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258653#M73345</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-04-24T17:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258673#M73350</link>
      <description>&lt;P&gt;Brandon,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have offical documentation. But it was what I have observed in our production environment within my organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What further documentation are you looking for?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 19:44:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258673#M73350</guid>
      <dc:creator>DShofkom33x</dc:creator>
      <dc:date>2019-04-24T19:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258674#M73351</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45579"&gt;@DShofkom33x&lt;/a&gt;if you want to control webtraffic then you should still follow the recommendation of PaloAlto and block 443/udp. So far I have not heard of any plans that this traffic can be decrypted or properly identified.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 19:50:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258674#M73351</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-04-24T19:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258675#M73352</link>
      <description>&lt;P&gt;Google Quic protocol is already widely used for google chrome based applications&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ma.ttias.be/googles-quic-protocol-moving-web-tcp-udp/" target="_blank"&gt;https://ma.ttias.be/googles-quic-protocol-moving-web-tcp-udp/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I observed today that traffic hitting the Palo Alto in our environment ,when using my iPhone 7 running 12.2 with the latest Facebook app, was udp/443&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 20:03:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258675#M73352</guid>
      <dc:creator>DShofkom33x</dc:creator>
      <dc:date>2019-04-24T20:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258676#M73353</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45579"&gt;@DShofkom33x&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Brandon,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have offical documentation. But it was what I have observed in our production environment within my organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What further documentation are you looking for?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something that says the vendors are coding for this...We don't allow QUIC in our environment&amp;nbsp;and we haven't heard of any users (mobile platform or otherwise) complaining about service issues.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 20:07:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258676#M73353</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-04-24T20:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258898#M73425</link>
      <description>&lt;P&gt;Yes, you should be blocking QUIC as well as UDP 443.&amp;nbsp; Blocking Quic will retransmit over TCP and let the applications be identified properly.&amp;nbsp; This is what Palo recommends.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClarCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClarCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 16:34:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/258898#M73425</guid>
      <dc:creator>OGMaverick</dc:creator>
      <dc:date>2019-04-26T16:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259129#M73476</link>
      <description>&lt;P&gt;You mean something like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://code.fb.com/android/building-zero-protocol-for-fast-secure-mobile-connections/" target="_blank" rel="noopener"&gt;https://code.fb.com/android/building-zero-protocol-for-fast-secure-mobile-connections/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also just started noticing this mobile facebook traffic as "unknown-udp" in my logs in the last week or two. Not sure if they flipped a switch or I just missed it previously (only a Palo customer for 3 months now and still getting the hang of things!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a custom implementation based off of QUIC according to the documentation, and blocking all UDP/443 traffic seems like the wrong way to solve this issue.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 19:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259129#M73476</guid>
      <dc:creator>Plattinum</dc:creator>
      <dc:date>2019-04-29T19:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259131#M73478</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/104274"&gt;@Plattinum&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;It's a custom implementation based off of QUIC according to the documentation, and blocking all UDP/443 traffic seems like the wrong way to solve this issue.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It depends on your needs. If you want to control and decrypt any connections then you need to force the traffic to a way that makes it possible. If you allow any connections to the internet then go ahead and allow 443/udp. Another possibility is you can write a custom application to at least detect the application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If now every big player in the cloud starts to write their own protocol then it could be difficult (not impossible) for security vendors to support full control features for all of these.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could also ask your SE to create a feature request so others can add their vodmtes to the FR because I think you are not the only one who thinks this would be a need feature.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2019 19:23:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259131#M73478</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-04-29T19:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259153#M73486</link>
      <description>Yeah I saw this article too. I think this is exactly it. It seems to be something FB has turned up recently. Even though the application should switch over to TCP the user experience on an enterprise network is much more painful, as you can imagine. If other applications are moving to this protocol, it would be nice to know how long it takes for Palo Alto to profile something that is widely used (i.e Facebook application).</description>
      <pubDate>Mon, 29 Apr 2019 20:51:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259153#M73486</guid>
      <dc:creator>DShofkom33x</dc:creator>
      <dc:date>2019-04-29T20:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259259#M73519</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45579"&gt;@DShofkom33x&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Yeah I saw this article too. I think this is exactly it. It seems to be something FB has turned up recently. Even though the application should switch over to TCP the user experience on an enterprise network is much more painful, as you can imagine. If other applications are moving to this protocol, it would be nice to know how long it takes for Palo Alto to profile something that is widely used (i.e Facebook application).&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think your last question has already been answered from Palo documentation...They don't support it.&amp;nbsp; Their documentation says to block QUIC and allow the traffic to naturally use other native TCP protocols/applications. (Yes 'double' protocol used for clarity.)&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 12:30:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/259259#M73519</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-04-30T12:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261668#M74187</link>
      <description>&lt;P&gt;So it looks like the update on the 16th Content version 8153 has facebook-base as 443/UDP as default port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="443.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20084i96F7B1BA525803F7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="443.PNG" alt="443.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 16:04:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261668#M74187</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-05-20T16:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261675#M74189</link>
      <description>I understand it's recommended to block (and we did) but the user experience is horrible. I hope this isn't the new norm for these type of applications.</description>
      <pubDate>Mon, 20 May 2019 16:58:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261675#M74189</guid>
      <dc:creator>DShofkom33x</dc:creator>
      <dc:date>2019-05-20T16:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261676#M74190</link>
      <description>&lt;P&gt;On our network of &amp;gt;30k devices, we have not had one single complaint after blocking QUIC a couple years ago.&amp;nbsp; What kind of horrible user experience are you running into?&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45579"&gt;@DShofkom33x&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 17:00:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261676#M74190</guid>
      <dc:creator>OGMaverick</dc:creator>
      <dc:date>2019-05-20T17:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261677#M74191</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84842"&gt;@OGMaverick&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;On our network of &amp;gt;30k devices, we have not had one single complaint after blocking QUIC a couple years ago.&amp;nbsp; What kind of horrible user experience are you running into?&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45579"&gt;@DShofkom33x&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah QUIC has always been blocked for us as well and we have had no issues regarding impact to user performance either.&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 17:02:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261677#M74191</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-05-20T17:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261704#M74202</link>
      <description>&lt;P&gt;Just going to throw in with the last few comments; I have udp/443 blocked across every network I manage and nobody has ever noticed it wasn't working, let alone brought up any user experiance issues.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 20:32:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261704#M74202</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-20T20:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 443 becoming more prevelant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261961#M74239</link>
      <description>&lt;P&gt;Same here ... 443/udp blocked outgoing ... 0 problems and 0 users complaining about a bad user experiance&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 17:04:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-443-becoming-more-prevelant/m-p/261961#M74239</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-05-22T17:04:33Z</dc:date>
    </item>
  </channel>
</rss>

