<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: false-positive: DNS Tunneling in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471850#M95195</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes, I know how to tune signatures. &lt;/P&gt;&lt;P&gt;The problem here is, DNS tunneling uses the "normal" DNS servers. So I can filter signature 6066 for src or dst of my DNS servers but than I will never see any DNS tunneling again. &lt;/P&gt;&lt;P&gt;Any other suggestion?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Oct 2005 15:01:16 GMT</pubDate>
    <dc:creator>m.rainer</dc:creator>
    <dc:date>2005-10-31T15:01:16Z</dc:date>
    <item>
      <title>false-positive: DNS Tunneling</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471848#M95184</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a problem regarding signature 6066. We got immens numbers of false-positives. The description of that signature tells:&lt;/P&gt;&lt;P&gt;This signature fires upon detecting an excessively large number of DNS TXT record lookups originating from a single source. This may indicate the presence of a DNS tunneling tool in operation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I turned on "trigger packets" for that signtature and found out that the DNS servers are communicating normal and the TXT record only shows some "standard query TXT [domain].com (I don't want to write down the real domain here!) &lt;/P&gt;&lt;P&gt;So in my opinion it's a false positiv. But how can I tune that signature not to see any false poitives? &lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471848#M95184</guid>
      <dc:creator>m.rainer</dc:creator>
      <dc:date>2019-03-10T09:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: false-positive: DNS Tunneling</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471849#M95190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are sure that it is a false positive you can modify whatever you are using to monitor the IPS to ignore that signature when the source IP is that particular one.  You don't have to turn it off globally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to rate all replies&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2005 13:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471849#M95190</guid>
      <dc:creator>travis-dennis_2</dc:creator>
      <dc:date>2005-10-31T13:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: false-positive: DNS Tunneling</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471850#M95195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes, I know how to tune signatures. &lt;/P&gt;&lt;P&gt;The problem here is, DNS tunneling uses the "normal" DNS servers. So I can filter signature 6066 for src or dst of my DNS servers but than I will never see any DNS tunneling again. &lt;/P&gt;&lt;P&gt;Any other suggestion?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2005 15:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471850#M95195</guid>
      <dc:creator>m.rainer</dc:creator>
      <dc:date>2005-10-31T15:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: false-positive: DNS Tunneling</title>
      <link>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471851#M95199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No one out there ever had problems with DNS tunneling in his/her network? How did you solve that problems?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Nov 2005 08:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/false-positive-dns-tunneling/m-p/471851#M95199</guid>
      <dc:creator>m.rainer</dc:creator>
      <dc:date>2005-11-04T08:06:24Z</dc:date>
    </item>
  </channel>
</rss>

