<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS sinkhole database view or test in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308530#M80033</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This is why a multi layered approach is the best approach. As to why, that is for PAN to answer as to what is and is not sinkholed. URL filtering should also be used for this. In addition to this use the the Palo Alto EBL's and a secure DNS provider.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only allow DNS servers to go out over DNS/53UDP and block local machine to do so. Also point your DNS servers to a secure provider. While Palo Alto has a service, there are others out there, some at no charge, OpenDNS, TitanHQ, Quad9.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to this follow the PAN best practices and decrypt SSL where you can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2020 16:19:10 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2020-01-29T16:19:10Z</dc:date>
    <item>
      <title>DNS sinkhole database view or test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308511#M80029</link>
      <description>&lt;P&gt;We are finding that even domains configured as malware/c2 are not getting sinkholed.&amp;nbsp; &amp;nbsp;I'm aware from other posts, that these are not the same database on the firewall.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why are these not persistent?&amp;nbsp; Why would you not flag on a DNS lookup that is out to resolve a malware/c2 domain - and NOT sinkhole it?&amp;nbsp; Is the DNS database something that get's updated with the code release version, and is this why Palo came out with the DNS security service?&amp;nbsp; &amp;nbsp;We have other products that are flagging on domains that are clearly marked as malware- but palo is letting them resolve.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 15:32:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308511#M80029</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2020-01-29T15:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole database view or test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308530#M80033</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This is why a multi layered approach is the best approach. As to why, that is for PAN to answer as to what is and is not sinkholed. URL filtering should also be used for this. In addition to this use the the Palo Alto EBL's and a secure DNS provider.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only allow DNS servers to go out over DNS/53UDP and block local machine to do so. Also point your DNS servers to a secure provider. While Palo Alto has a service, there are others out there, some at no charge, OpenDNS, TitanHQ, Quad9.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to this follow the PAN best practices and decrypt SSL where you can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 16:19:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308530#M80033</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-29T16:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole database view or test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308565#M80044</link>
      <description>&lt;P&gt;Thank you for the reply.&amp;nbsp; &amp;nbsp;I just don't understand why the palo would allow resolution requests over udp/53 - for known malware domains? - What good is sinkholing if it doesn't sinkhole?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 18:58:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308565#M80044</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2020-01-29T18:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole database view or test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308598#M80048</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;So here could be the reason:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Suspicious DNS Query signatures are looking for DNS resolution to domains potentially associated with C2 traffic, which could be an indication of a breached machine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So what the sinkhole is looking for and blocking, are C2 communications, not really all bad domains.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5kCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5kCAC&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clk2CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clk2CAC&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope that helps clarify things.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 22:40:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308598#M80048</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-29T22:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole database view or test</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308614#M80053</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp; &amp;nbsp;One of the domains was marked as c2.&amp;nbsp; I could still get a resolution on it though.&amp;nbsp; Even though other domains I could confirm were getting sinkholed.&amp;nbsp; &amp;nbsp; &amp;nbsp; So i'm not sure now they are missing that?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Either way, Props&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; for the good reply on how this works, and how to setup secure DNS services.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 03:33:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole-database-view-or-test/m-p/308614#M80053</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2020-01-30T03:33:03Z</dc:date>
    </item>
  </channel>
</rss>

