<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking punycode URLs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-punycode-urls/m-p/299990#M78442</link>
    <description>&lt;P&gt;We have PA-820's and I have been looking for a way to leverage them to block punycode attacks.&amp;nbsp; In fact, we'd be pretty OK with blocking punycode URLs altogether.&amp;nbsp; I just haven't been able to puzzle out a way to do it.&amp;nbsp; If I add xn--* to the URL filter block list, it complains that I have multiple wildcards.&amp;nbsp; If it add just xn-- the firewall accepts it, but it just doesn't work, nothing is blocked.&amp;nbsp; It was the same result when I tried to create a custom URL category.&amp;nbsp; Is this something that can even be done at the firewall level, or should I look to address this on the DNS side?&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2019 17:31:38 GMT</pubDate>
    <dc:creator>g2o-admin</dc:creator>
    <dc:date>2019-11-21T17:31:38Z</dc:date>
    <item>
      <title>Blocking punycode URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-punycode-urls/m-p/299990#M78442</link>
      <description>&lt;P&gt;We have PA-820's and I have been looking for a way to leverage them to block punycode attacks.&amp;nbsp; In fact, we'd be pretty OK with blocking punycode URLs altogether.&amp;nbsp; I just haven't been able to puzzle out a way to do it.&amp;nbsp; If I add xn--* to the URL filter block list, it complains that I have multiple wildcards.&amp;nbsp; If it add just xn-- the firewall accepts it, but it just doesn't work, nothing is blocked.&amp;nbsp; It was the same result when I tried to create a custom URL category.&amp;nbsp; Is this something that can even be done at the firewall level, or should I look to address this on the DNS side?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 17:31:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-punycode-urls/m-p/299990#M78442</guid>
      <dc:creator>g2o-admin</dc:creator>
      <dc:date>2019-11-21T17:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking punycode URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-punycode-urls/m-p/300029#M78447</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am going to assume this is for outbound traffic. If yes then there are several things to do in conjunction.&lt;/P&gt;&lt;P&gt;In your Vulnerability profile, enable DNSSink hole.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next I would block by web category, blocking the obvious bad stuff.&lt;/P&gt;&lt;P&gt;abused-drugs, adult, alcohol-tobacco, command and control, copyright-infingment, crypto-currency, dynamic-dns, hacking, high-risk, insufficient-content, malware, medium-risk, newly-registered-domin, not-resolved, parked, phishing, private-ip-address, proxy avoidance and anonymizers, questionable, shareware and freeware, unknown, web-advertisements&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Externally have only your DNS servers be able to go our and get external DNS requests. Also use a secure service such as OpenDNS, cloudflare, Quad9, etc. And block the end users from exiting your environment over DNS externally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setup external dynamic lists, along with the PAN builtin ones, i have the following setup.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Source on PAN support:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/54183#54183" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/message/54183#54183&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sans notes on this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://isc.sans.edu/forums/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365/" target="_blank" rel="noopener"&gt;https://isc.sans.edu/forums/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others listed on this site:&lt;/P&gt;&lt;P&gt;&lt;A href="http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt" target="_blank" rel="noopener"&gt;http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://malc0de.com/bl/IP_Blacklist.txt" target="_blank" rel="noopener"&gt;http://malc0de.com/bl/IP_Blacklist.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://panwdbl.appspot.com/lists/openbl.txt" target="_blank" rel="noopener"&gt;http://panwdbl.appspot.com/lists/openbl.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://panwdbl.appspot.com/" target="_blank" rel="noopener"&gt;http://panwdbl.appspot.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://cinsscore.com/list/ci-badguys.txt" target="_blank" rel="noopener"&gt;http://cinsscore.com/list/ci-badguys.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure you are performing SSL decrypt to ensure you are seeing the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This should get you started and not having to use a wildcard to block everything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 20:44:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-punycode-urls/m-p/300029#M78447</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-11-21T20:44:41Z</dc:date>
    </item>
  </channel>
</rss>

