DNS Security Behaviour in PAN-OS when There Is Connectivity Issue to DNS Security Cloud Service
4888
Created On 10/17/24 02:55 AM - Last Modified 04/10/25 20:46 PM
Symptom
When there is connectivity issue to DNS Security cloud service, the following symptom is seen,
[a] If there is no DNS response received within DNS signature lookup timeout,
- On the packet capture,
- DNS request is forwarded by firewall to the destination DNS server.
- DNS request from client is present in drop pcap after the DNS signature lookup timeout expired.
- On the global counter, ctd_dns_wait_pkt_drop is incremented.
[b] If DNS response is received within DNS signature lookup timeout,
- On the packet capture,
- DNS request is forwarded by firewall to the destination DNS server.
- DNS response received within DNS signature lookup timeout will be dropped and present in drop pcap.
- DNS request from client is re-transmitted (seen in transmit pcap).
- The next DNS response received after DNS signature lookup timeout expired is forwarded to client.
- On the global counter, ctd_dns_wait_pkt_drop is incremented.
Environment
- Palo Alto Firewalls
- Supported PAN-OS
- Valid DNS Security license
- DNS Security is enabled under Anti-Spyware security profile
Cause
The working of DNS security is explained under the resolution section.
Resolution
The behavior of DNS Security in PAN-OS is as follows:
- When there is no cloud verdict AND no DNS response received within DNS signature lookup timeout (default is 100ms).
- DP will receive a not-resolved message from MP at 100ms.
- PAN-OS will not re-transmit the DNS request because there is no DNS response received and dropped.
- DNS request from client will be dropped. This is a copy of the one received from client so it is not a real drop.
- When the DNS response is received within DNS signature lookup timeout and no cloud verdict is received (e.g. due to DNS Security cloud service connectivity issue).
- DNS response will be dropped and PAN-OS will re-transmit the original DNS request (extra DNS request in the transmit stage).
- If the next DNS response is received after DNS signature lookup timeout expired, DNS response will be forwarded to the client as the fail open mechanism.
- When DNS response is received before the cloud verdict (cloud verdict is eventually received, i.e. no connectivity issue to DNS Security cloud service but delay),
- if DNS response is received within the DNS signature lookup timeout, DNS response is dropped.
- If cloud verdict is malicious, the session is marked blocked, no further processing and no further forwarding of queries nor response.
- If cloud verdict is benign, PAN-OS will re-transmit the original DNS request (extra DNS request in the transmit stage). Cached benign signature will allow the following DNS response to pass through.
- If DNS response is received beyond the DNS signature lookup timeout, then the DNS response is forwarded to client.
- If cloud verdict is malicious, a threat log is triggered.
- If cloud verdict is benign, no further action required.
- When cloud verdict is received before the DNS response:
- If the cloud verdict is malicious, the session is marked blocked, no further processing and no further forwarding of queries nor response.
- if cloud verdict is benign, no further action required. Future DNS traffic pass through normally.