<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disney+ domain being sinkholed as DNS tunneling domain in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/325813#M83068</link>
    <description>&lt;P&gt;This morning I starting noticing that my threat logs are filling up with&lt;/P&gt;&lt;P&gt;sinkhole actions for the following&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (search-api-disney.svcs.dssott.co)&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (dssott.com)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="x-grid3-row  x-grid3-row-first "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;spyware&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;DNS Tunneling Domain&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;ID&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;109001001 (&lt;A href="https://threatvault.paloaltonetworks.com/?query=109001001&amp;amp;Suspicious%20DNS%20Query%20(search-api-disney.svcs.dssott.co)" target="_blank" rel="noopener"&gt;View in Threat Vault&lt;/A&gt;)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Category&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;dns-security&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Content Version&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;AppThreat-0-0&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Severity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;high&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Repeat Count&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;URL&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;Suspicious DNS Query (search-api-disney.svcs.dssott.co)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To get the site working again I have added a DNS signature exception for thread-id&amp;nbsp;&lt;SPAN&gt;109001001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to except certain domains rather than the entire threat-id?&amp;nbsp; I fear that I am excepting more than just the domains I'm interested in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 02 May 2020 17:55:01 GMT</pubDate>
    <dc:creator>jlieberman</dc:creator>
    <dc:date>2020-05-02T17:55:01Z</dc:date>
    <item>
      <title>Disney+ domain being sinkholed as DNS tunneling domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/325813#M83068</link>
      <description>&lt;P&gt;This morning I starting noticing that my threat logs are filling up with&lt;/P&gt;&lt;P&gt;sinkhole actions for the following&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (search-api-disney.svcs.dssott.co)&lt;/P&gt;&lt;P&gt;Suspicious DNS Query (dssott.com)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="x-grid3-row  x-grid3-row-first "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;spyware&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;DNS Tunneling Domain&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;ID&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;109001001 (&lt;A href="https://threatvault.paloaltonetworks.com/?query=109001001&amp;amp;Suspicious%20DNS%20Query%20(search-api-disney.svcs.dssott.co)" target="_blank" rel="noopener"&gt;View in Threat Vault&lt;/A&gt;)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Category&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;dns-security&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Content Version&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;AppThreat-0-0&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Severity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;high&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Repeat Count&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;URL&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;Suspicious DNS Query (search-api-disney.svcs.dssott.co)&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To get the site working again I have added a DNS signature exception for thread-id&amp;nbsp;&lt;SPAN&gt;109001001&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to except certain domains rather than the entire threat-id?&amp;nbsp; I fear that I am excepting more than just the domains I'm interested in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 17:55:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/325813#M83068</guid>
      <dc:creator>jlieberman</dc:creator>
      <dc:date>2020-05-02T17:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: Disney+ domain being sinkholed as DNS tunneling domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/325822#M83071</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I have the same issue,&amp;nbsp;I tested&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/87472"&gt;@jlieberman&lt;/a&gt;&amp;nbsp;'s hypothesis about opening too much.&lt;/FONT&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&amp;nbsp;A little wiresharking and I can confirm the FQDN below,&amp;nbsp;&lt;SPAN&gt;search-api-disney.svcs.dssott.com, &lt;STRONG&gt;IS&lt;/STRONG&gt; used for delivering the Disney+ service. The domain is owned by Disney as well.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;After adding an exception using threat-id&amp;nbsp;&lt;SPAN&gt;109001001 to the Anti-Spyware -&amp;gt; DNS Signatures -&amp;gt; Exceptions, service to the site was restored, but I now bypass the DNS security completely it seems, note the test that is supposed to be blocked is now open as well:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Resolves correctly and service is restored:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN class="s1"&gt;fb@GREYSMB ~ % dig @8.8.8.8 search-api-disney.svcs.dssott.com +short&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;search-api-disney.bamgrid.com.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;dgel2a5rs1evz.cloudfront.net.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;143.204.35.80&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;143.204.35.34&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;143.204.35.113&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;143.204.35.125&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;&lt;U&gt;Testing URL provided by Palo Alto-&lt;/U&gt; This should fail and point to sinkhole, but instead resolves.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;fb@GREYSMB ~ % dig @8.8.8.8 test-dnstun.testpanw.com +short&lt;/FONT&gt;&lt;SPAN class="Apple-converted-space"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/FONT&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;72.5.65.115&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN class="s1"&gt;Normally the test URL looks like this and gets "sinkholed":&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN class="s1"&gt;fb@GREYSMB ~ % dig @8.8.8.8 test-dnstun.testpanw.com +short&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;sinkhole.paloaltonetworks.com.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Faulty Rule catching the legitimate domain FQDN:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN class="s1"&gt;fb@GREYSMB ~ % dig @8.8.8.8 search-api-disney.svcs.dssott.com +short&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;sinkhole.paloaltonetworks.com.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 22:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/325822#M83071</guid>
      <dc:creator>flintrock</dc:creator>
      <dc:date>2020-05-02T22:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Disney+ domain being sinkholed as DNS tunneling domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326262#M83156</link>
      <description>&lt;P data-unlink="true"&gt;This was caused by domain&amp;nbsp;dssott[.]com&amp;nbsp;being marked malicious.&lt;/P&gt;&lt;P&gt;The issue was resolved on 5/3, and should no longer be observed.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 00:03:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326262#M83156</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-06T00:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Disney+ domain being sinkholed as DNS tunneling domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326458#M83186</link>
      <description>&lt;P&gt;Given that adding an exception to&amp;nbsp;&lt;SPAN&gt;109001001 would disable the signature altogether if you want to add temporary exceptions you can actually do that per-firewall using CLI commands:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Check the status of the domain verdict by the following command&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; show dns-proxy dns-signature cache | match abc.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;*.abc.com&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 109000001&amp;nbsp;&amp;nbsp; 86327&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Change the status of the domain verdict to benign by the following command.&amp;nbsp;Please note that you are adding this domain as a whitelist on your PaloAlto Firewall on the management plane. This entry will only be effective on your Firewall locally.&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; debug dnsproxyd dns-signature response verdict &amp;lt;new verdict you want&amp;gt; fqdn &amp;lt;FQDN&amp;gt; ttl &amp;lt;Time to live&amp;gt; gtid &amp;lt;preferably higher number&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Example for abc.com&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; debug dnsproxyd dns-signature response verdict Whitelist gtid 420000700 ttl 30758400 fqdn abc.com&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You can confirm&amp;nbsp;the domain is been changed to benign. The last number zero indicates the number of hit to this domain.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; show dns-proxy dns-signature cache | match abc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;*.abc.com &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; White list &amp;nbsp;420000700 &amp;nbsp; 30758373 &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;0 &amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You can also confirm from data plane&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; debug dataplane show dns-cache print | match abc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;abc.com, wildcard: yes, ttl: 0/331353/0, temp: 0, verdict benign, utid: 420000700&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remove entry from the dns-proxy dns-signature cache&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;gt; clear dns-proxy dns-signature cache fqdn abc.com&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 17:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326458#M83186</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-05-06T17:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Disney+ domain being sinkholed as DNS tunneling domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326503#M83191</link>
      <description>&lt;P&gt;I can confirm what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34186"&gt;@mivaldi&lt;/a&gt;&amp;nbsp;has said.&amp;nbsp; After removing the exception, traffic to the domain is no longer being flagged.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 19:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/disney-domain-being-sinkholed-as-dns-tunneling-domain/m-p/326503#M83191</guid>
      <dc:creator>jlieberman</dc:creator>
      <dc:date>2020-05-06T19:54:02Z</dc:date>
    </item>
  </channel>
</rss>

