Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.
A couple days ago, the threatvault added threat id 56505, and since then our threat log is getting spammed with the vulnerability type Non-RFC Compliant DNS Traffic on Port 53/5353 (informational). We use dnscrypt, and every single DNS request is now showing up in the threat log. First of all, is this a false positive? And if so, how do I prevent this from inundating my logs?
Solved! Go to Solution.
@Maxstr wrote:First of all, is this a false positive? And if so, how do I prevent this from inundating my logs?
No, it's not a false positive; it also isn't unexpected if you are utilizing dnscrypt. DNSCrypt is not RFC compliant, hence you are hitting a signature that makes perfect sense. If you don't want it to keep showing up in your logs, you'll need to make an exception for 56505 on your Vulnerability profile and set it to allow.
@Maxstr wrote:First of all, is this a false positive? And if so, how do I prevent this from inundating my logs?
No, it's not a false positive; it also isn't unexpected if you are utilizing dnscrypt. DNSCrypt is not RFC compliant, hence you are hitting a signature that makes perfect sense. If you don't want it to keep showing up in your logs, you'll need to make an exception for 56505 on your Vulnerability profile and set it to allow.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!