<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/78165#M13067</link>
    <description>&lt;P&gt;Sorry for delayed response; I do this part-time :-). Did get a response from R&amp;amp;D to some of the follow-up questions.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/42435"&gt;@Valdimar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In the management logs, the relevant traffic that would be detected as DoH would be reflected as DoH.&amp;nbsp; Obviously, HTTPS Inspection must be turned on to correctly identify this traffic.&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; As defined in DoH relevant RFC (RFC 8484), it is compatible with HTTP features, including redirection. PAT is beyond the scope of APPI, and I am not familiar with another relevant capability.&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This traffic would be logged as an application.&amp;nbsp; It would be further categorized as a Network Protocol.&lt;/P&gt;
&lt;P&gt;-&amp;nbsp; have asked if we will add DOH and DOT to the service catalog and make it part of the access control layer too.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6443"&gt;@Bryan_Adams&lt;/a&gt;&amp;nbsp;: looks like the first release of 80.40 has some stuff missing. The AppID is included in a newer application package, but the management code still has older update package and so doesn't download the new package. I presume they will fix this with HF_1, which should be out soon. For now, if you want to, there is a bash script that fixes the issue that can be asked for from R&amp;amp;D.&lt;/P&gt;</description>
    <pubDate>Thu, 12 Mar 2020 23:26:12 GMT</pubDate>
    <dc:creator>VCL001</dc:creator>
    <dc:date>2020-03-12T23:26:12Z</dc:date>
    <item>
      <title>How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11528#M13038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is now a concerted move on part of multiple service providers to offer DNS over HTTPS. Browser vendors are doing it to differentiate their services supposedly addressing privacy issues, (i.e. Google LOL &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;) and now, there is an offering of vendor-independent DNS over HTTPS from Cloudflare that could be found at&amp;nbsp;&lt;A class="jivelink1" href="https://1.1.1.1/" title="https://1.1.1.1/"&gt;https://1.1.1.1/&lt;/A&gt; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since not everyone running HTTPS inspection on their gateways or proxies, probability of evasion for categorized traffic is increasing.&lt;/P&gt;&lt;P&gt;Furthermore, presently the DNS group in services is limited to conventional DNS over UDP and DNS over TCP, so event if we are to inspect the HTTPS traffic, there are no guaranties that we can recognize and act on its DNS payload.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to hear your thoughts on this subject as well as on inspection of the proprietary protocols such as QUIC and PSOM.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2018 19:44:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11528#M13038</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-01T19:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS and DNS over SSL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11529#M13039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm also interested in hearing this topic explored / explained further. For the moment, we have just been blocking QUIC unconditionally in our Firewall Policy. But as this stuff gets more common, I have a feeling that won't be a sustainable solution!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 14:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11529#M13039</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2018-04-02T14:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11530#M13040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Strict outbound filtering will mitigate some of this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Not allowing DNS except from specific, known internal DNS servers&lt;/LI&gt;&lt;LI&gt;Only allowing TCP port 80/443 outbound with some application filtering for good measure&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Of course, stuff tunneled inside HTTPS is still something to potentially worry about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QUIC in particular, is an interim protocol until HTTP/2.0 is ratified (as I understand it).&lt;/P&gt;&lt;P&gt;Hadn't heard of PSOM before.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 19:58:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11530#M13040</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-02T19:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11531#M13041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the thing: in case of DNS over HTTPS the lookup function being performed by the browser engine.&lt;/P&gt;&lt;P&gt;I would like to actually test this in my lab to see if HTTPS inspection is sufficient in recognizing the DNS payload, or if its completely obfuscated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 22:27:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11531#M13041</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-02T22:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11532#M13042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can see how CloudFlare is doing it here:&amp;nbsp;&lt;A class="link-titled" href="https://developers.cloudflare.com/1.1.1.1/dns-over-https/request-structure/" title="https://developers.cloudflare.com/1.1.1.1/dns-over-https/request-structure/"&gt;Making Requests - Cloudflare Resolver&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The funny thing is there is still a traditional DNS request to the site that runs the HTTPS DNS resolver.&lt;/P&gt;&lt;P&gt;I'm sure it can be blocked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 23:05:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11532#M13042</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-02T23:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11533#M13043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nononono, they will resolve the traditional DNS calls at the same address, but if you'll read this:&amp;nbsp;&lt;A class="link-titled" href="https://developers.cloudflare.com/1.1.1.1/dns-over-https/" title="https://developers.cloudflare.com/1.1.1.1/dns-over-https/"&gt;DNS over HTTPS - Cloudflare Resolver&lt;/A&gt;&amp;nbsp;, they are talking about embedding the resolver into the applications, OS' and browsers. That's completely different ball game. Then there is DNS over TLS. Essentially, you are running a local proxy on each machine that intercepts calls to port 53, encrypts them and shows those to cloudflare via HTTPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is interesting to see is if their daemon will play well with substituted certificate, or if it'll buck at it being different than the one it expects to see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm busy for the next few days, but will try to get to setting up their daemon in my lab and running queries through the gateway with HTTPS inspection enabled.&lt;/P&gt;&lt;P&gt;I'll let you know how it looks.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 23:27:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11533#M13043</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-02T23:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11534#M13044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Right, but there is either going to be a traditional DNS lookup to find that https resolver endpoint embedded in the app OR it will go to a known IP like 1.1.1.1.&lt;/P&gt;&lt;P class=""&gt;This will be an interesting cat and mouse game to track.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 23:32:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11534#M13044</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-02T23:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11535#M13045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;DNS over HTTPS update&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, as I have promised to do some more digging, these are my preliminary findings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secure DNS is beginning to take traction with multiple vendors and open source community actively working on&amp;nbsp;number of products intended for this purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For now, it is still feasible to monitor and control this traffic to some degree as it is being forwarded to well known or advertised IPs and is often recognizable by resource names.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if you are not using HTTPS inspection and depending on your company's security posture, you can either block traffic addressed to these servers completely, or implement your own Secure DNS proxies to retain the ability of blacklisting or whitelisting the sites and the categories accessible by users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using HTTPS inspection, you are marginally better off, as it allows you, in the case of a more mainstream secure dns providers, to see that the DNS query is being performed, but the payload of those queries is still invisible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the example of the query performed from the Secure DNS proxy running DNSCRYPT with Cloudflare as a resolver:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;root@CLFRDNSPRXY1:~# dig &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.hackaday.com" rel="nofollow"&gt;https://www.hackaday.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;; &amp;lt;&amp;lt;&amp;gt;&amp;gt; DiG 9.10.3-P4-Ubuntu &amp;lt;&amp;lt;&amp;gt;&amp;gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.hackaday.com" rel="nofollow"&gt;https://www.hackaday.com&lt;/A&gt;&lt;BR /&gt;;; global options: +cmd&lt;BR /&gt;;; Got answer:&lt;BR /&gt;;; -&amp;gt;&amp;gt;HEADER&amp;lt;&amp;lt;- opcode: QUERY, status: NOERROR, id: 41178&lt;BR /&gt;;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1&lt;/P&gt;&lt;P&gt;;; OPT PSEUDOSECTION:&lt;BR /&gt;; EDNS: version: 0, flags:; MBZ: 0257 , udp: 1536&lt;BR /&gt;;; QUESTION SECTION:&lt;BR /&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.hackaday.com" rel="nofollow"&gt;https://www.hackaday.com&lt;/A&gt;&lt;SPAN&gt;. IN A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;;; ANSWER SECTION:&lt;BR /&gt;&lt;A class="jive-link-external-small" href="https://www.hackaday.com" rel="nofollow"&gt;https://www.hackaday.com&lt;/A&gt;&lt;SPAN&gt;. 599 IN CNAME hackaday.com.&lt;/SPAN&gt;&lt;BR /&gt;hackaday.com. 599 IN A 192.0.79.32&lt;BR /&gt;hackaday.com. 599 IN A 192.0.79.33&lt;/P&gt;&lt;P&gt;;; Query time: 175 msec&lt;BR /&gt;;; SERVER: 127.0.0.1#53(127.0.0.1)&lt;BR /&gt;;; WHEN: Tue Apr 10 16:50:02 EDT 2018&lt;BR /&gt;;; MSG SIZE rcvd: 159&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:root@CLFRDNSPRXY1:~"&gt;root@CLFRDNSPRXY1:~#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The gateway sees the request, but not the payload:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Id: c0a8071f-0100-00c0-5acd-23b700000000&lt;BR /&gt;Marker: @A@@B@1523332800@C@112360&lt;BR /&gt;Log Server Origin: 192.168.7.30&lt;BR /&gt;Time: 2018-04-10T20:51:03Z&lt;BR /&gt;Interface Direction: outbound&lt;BR /&gt;Interface Name: eth1&lt;BR /&gt;Connection Direction: Outgoing&lt;BR /&gt;Id Generated By Indexer: false&lt;BR /&gt;First: false&lt;BR /&gt;Sequencenum: 9&lt;BR /&gt;Xlate (NAT) Source IP:&amp;nbsp;XX.XXX.XXX.XXX&lt;BR /&gt;Xlate (NAT) Source Port: 36248&lt;BR /&gt;Xlate (NAT) Destination Port:0&lt;BR /&gt;NAT Rule Number: 16&lt;BR /&gt;NAT Additional Rule Number: 1&lt;BR /&gt;Hll Key: 12784207492398244274&lt;BR /&gt;Context Num: 1&lt;BR /&gt;Source Zone: Internal&lt;BR /&gt;Destination Zone: External&lt;BR /&gt;Service ID: https&lt;BR /&gt;Source: 192.168.7.34&lt;BR /&gt;Source Port: 47494&lt;BR /&gt;Destination: 1.0.0.1&lt;BR /&gt;Destination Port: 443&lt;BR /&gt;IP Protocol: 6&lt;BR /&gt;Security Outzone: ExternalZone&lt;BR /&gt;Protocol: HTTPS&lt;BR /&gt;Sig Id: 0&lt;BR /&gt;Lastupdatetime: 2018-04-10T20:51:03Z&lt;BR /&gt;Action: Accept&lt;BR /&gt;Type: Connection&lt;BR /&gt;Policy Name: MobileAccess_for_GW8010&lt;BR /&gt;Policy Management: SMS8010&lt;BR /&gt;Db Tag: {4FD7C570-BB91-8C47-9F47-12F26CF733F0}&lt;BR /&gt;Policy Date: 2018-04-10T20:37:07Z&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: GW8010&lt;BR /&gt;Service: TCP/443&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 7&lt;BR /&gt;Action: Inspect&lt;BR /&gt;Access Rule Number: 6.2&lt;BR /&gt;Rule UID: ac190fa4-a3d5-48cb-986a-9d4a30a02e5e&lt;BR /&gt;Layer Name: APCL_and_URLF&lt;BR /&gt;Interface: eth1&lt;BR /&gt;Description: https Traffic Accepted from 192.168.7.34 to 1.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64490_pastedImage_35.png" style="width: 457px; height: 355px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interestingly enough, even though the session is clearly identifying client type and user agent as dnscrypt-proxy, the corresponding application filter is not seeing it as such:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Time: 2018-04-10T20:10:35Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: eth0&lt;BR /&gt;Connection Direction: Outgoing&lt;BR /&gt;Id: c0a8071f-2d16-0000-5acd-1a3b00000000&lt;BR /&gt;Sequencenum: 2&lt;BR /&gt;Hll Key: 12784207492398244274&lt;BR /&gt;Duration: 2460&lt;BR /&gt;Last Update Time: 2018-04-10T20:51:33Z&lt;BR /&gt;Update Count: 6&lt;BR /&gt;Connections: 11&lt;BR /&gt;Aggregated Log Count: 42&lt;BR /&gt;Creation Time: 2018-04-10T20:10:35Z&lt;BR /&gt;Source: 192.168.7.34&lt;BR /&gt;Destination: 1.0.0.1&lt;BR /&gt;Destination Port: 443&lt;BR /&gt;IP Protocol: 6&lt;BR /&gt;Client Type Os: Unknown&lt;BR /&gt;Client Type: Other: &lt;SPAN style="color: #ff0000;"&gt;dnscrypt-proxy&lt;/SPAN&gt;&lt;BR /&gt;User Agent: Other: &lt;SPAN style="color: #ff0000;"&gt;dnscrypt-proxy&lt;/SPAN&gt;&lt;BR /&gt;Protocol: HTTPS&lt;BR /&gt;Sig Id: 0&lt;BR /&gt;Service ID: https&lt;BR /&gt;Source Zone: Internal&lt;BR /&gt;Destination Zone: External&lt;BR /&gt;Application ID: 3876370621&lt;BR /&gt;Method: POST&lt;BR /&gt;Action: Accept&lt;BR /&gt;Type: Session&lt;BR /&gt;Policy Name: MobileAccess_for_GW8010&lt;BR /&gt;Policy Management: SMS8010&lt;BR /&gt;Db Tag: {4FD7C570-BB91-8C47-9F47-12F26CF733F0}&lt;BR /&gt;Policy Date: 2018-04-10T20:37:07Z&lt;BR /&gt;Blade: URL Filtering&lt;BR /&gt;Origin: GW8010&lt;BR /&gt;Service: TCP/443&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 320&lt;BR /&gt;Action: Inspect&lt;BR /&gt;Application Name: cloudflare.com&lt;BR /&gt;Primary Category: Computers / Internet&lt;BR /&gt;Matched Category: Computers / Internet&lt;BR /&gt;Additional Categories: Computers / Internet,URL Filtering&lt;BR /&gt;Application Risk: Unknown&lt;BR /&gt;Marker: @A@@B@1523332800@C@112445&lt;BR /&gt;Log Server Origin: 192.168.7.30&lt;BR /&gt;Orig Log Server Ip: 192.168.7.30&lt;BR /&gt;Lastupdatetime: 1523393495000&lt;BR /&gt;Lastupdateseqnum: 2&lt;BR /&gt;Severity: Informational&lt;BR /&gt;Rounded Sent Bytes: 16544&lt;BR /&gt;Confidence Level: N/A&lt;BR /&gt;Rounded Bytes: 61760&lt;BR /&gt;Stored: true&lt;BR /&gt;Rounded Received Bytes: 49024&lt;BR /&gt;URLs: 16&lt;BR /&gt;Packets: 59&lt;BR /&gt;Total Bytes: 61780&lt;BR /&gt;Client Inbound Packets: 28&lt;BR /&gt;Client Outbound Packets:31&lt;BR /&gt;Server Inbound Packets: 22&lt;BR /&gt;Server Outbound Packets:33&lt;BR /&gt;Client Inbound Bytes: 3120&lt;BR /&gt;Client Outbound Bytes: 7503&lt;BR /&gt;Server Inbound Bytes: 8355&lt;BR /&gt;Server Outbound Bytes: 2968&lt;BR /&gt;Received Bytes: 49052&lt;BR /&gt;Sent Bytes: 16552&lt;BR /&gt;Access Rule Number: 6.2&lt;BR /&gt;Rule UID: ac190fa4-a3d5-48cb-986a-9d4a30a02e5e&lt;BR /&gt;Layer Name: APCL_and_URLF&lt;BR /&gt;Interface: eth0&lt;BR /&gt;Description: https Traffic Accepted from 192.168.7.34 to cloudflare.com(1.0.0.1)&lt;BR /&gt;&lt;SPAN&gt;Resource: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://dns.cloudflare.com/dns-query" rel="nofollow"&gt;https://dns.cloudflare.com/dns-query&lt;/A&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://dns.cloudflare.com/dns-query" rel="nofollow"&gt;https://dns.cloudflare.com/dns-query&lt;/A&gt;&lt;BR /&gt;Layer Uuid Rule Uuid: 9457d7fd-104e-494a-bf23-522eae8d2530_3c504c20-576b-4d87-b97b-d51aa5c7f613, 38746d3a-ecc1-459a-a373-e4cecb87e246_ac190fa4-a3d5-48cb-986a-9d4a30a02e5e&lt;BR /&gt;Bytes (sent\received): 60.3 KB (16.2 KB \ 47.9 KB)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the rule defined to log it, does not (DNSCrypt is an object predefined by Check Point):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64491_pastedImage_43.png" style="width: 752px; height: 239px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another little bug here is the absence of hits on the rule that clearly should have some:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64492_pastedImage_44.png" style="width: 747px; height: 264px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By my count, there are some 2,999,982 hits missing &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We cannot expect that all of those working on Secure DNS solutions will be as obliging as Cloudflare and provide us with either convenient target IPs or a resource proclaiming its intent (i.e.&amp;nbsp;&lt;A href="https://dns.cloudflare.com/dns-query)"&gt;https://dns.cloudflare.com/dns-query)&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that there should be a dedicated category created and maintained for DNS obfuscation applications and it should be dynamically updated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interested in hearing your thoughts on this subject.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 21:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11535#M13045</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-10T21:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11536#M13046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am going to bump this topic because&amp;nbsp;a DOH C2 module was released for Cobalt Strike.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://github.com/SpiderLabs/DoHC2" title="https://github.com/SpiderLabs/DoHC2"&gt;GitHub - SpiderLabs/DoHC2: DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2)…&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2018 16:19:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11536#M13046</guid>
      <dc:creator>Ryan_St__Germai</dc:creator>
      <dc:date>2018-10-26T16:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11537#M13047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you mean "until&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;HTTP/3.0 is ratified"?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2019 17:03:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/11537#M13047</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2019-01-29T17:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/57390#M13048</link>
      <description>Google just made DOH GA: &lt;A href="https://security.googleblog.com/2019/06/google-public-dns-over-https-doh.html" target="_blank"&gt;https://security.googleblog.com/2019/06/google-public-dns-over-https-doh.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;@Dameon - any word on us being able to see DNS tunneled through HTTPS at the application layer?</description>
      <pubDate>Wed, 03 Jul 2019 20:19:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/57390#M13048</guid>
      <dc:creator>VCL001</dc:creator>
      <dc:date>2019-07-03T20:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/57713#M13049</link>
      <description>&lt;P&gt;Well, it appears that my worries on this subject were well founded:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www-zdnet-com.cdn.ampproject.org/c/s/www.zdnet.com/google-amp/article/first-ever-malware-strain-spotted-abusing-new-doh-dns-over-https-protocol/" target="_self"&gt;First-ever malware strain spotted abusing new DoH (DNS over HTTPS) protocol&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 14:43:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/57713#M13049</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-07-08T14:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76364#M13050</link>
      <description>&lt;P&gt;Bringing up an older thread.&amp;nbsp; Now that Firefox has announced that it will enable DNS over htttps in the coming weeks, is there a good solution to block such requests on the gateways, especially if https inspection is enabled?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 14:55:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76364#M13050</guid>
      <dc:creator>sanjay_palnitka</dc:creator>
      <dc:date>2020-02-25T14:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76378#M13051</link>
      <description>&lt;P&gt;You could use the ACST to make a custom application that looks for DNS over HTTPS headers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="dns-over-https.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4589iE88950C9D42B2CC0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dns-over-https.png" alt="dns-over-https.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 17:45:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76378#M13051</guid>
      <dc:creator>Steve_Payne</dc:creator>
      <dc:date>2020-02-25T17:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76379#M13052</link>
      <description>&lt;P&gt;We have application signatures for DNS over HTTPS (DOH) and QUIC in the AppWiki; has anyone tried using those? Please update if it works or if it doesn't.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 17:50:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76379#M13052</guid>
      <dc:creator>VCL001</dc:creator>
      <dc:date>2020-02-25T17:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76384#M13053</link>
      <description>&lt;P&gt;Not seeing it. DOH that is.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 18:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76384#M13053</guid>
      <dc:creator>Ryan_St__Germai</dc:creator>
      <dc:date>2020-02-25T18:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76387#M13054</link>
      <description>I am also not seeing it. Is the AppWiki category version specific?</description>
      <pubDate>Tue, 25 Feb 2020 20:00:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76387#M13054</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2020-02-25T20:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76389#M13055</link>
      <description>&lt;P&gt;I don't see it in R80.30.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, checkpoint's online Appwiki has it: &lt;A href="https://appwiki.checkpoint.com/appwikisdb/public.htm" target="_blank"&gt;https://appwiki.checkpoint.com/appwikisdb/public.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 20:03:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76389#M13055</guid>
      <dc:creator>sanjay_palnitka</dc:creator>
      <dc:date>2020-02-25T20:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76391#M13056</link>
      <description>&lt;P&gt;I don't see it in the appwiki. What did I need to look for? dns, doh...I find nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Greetings&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 20:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76391#M13056</guid>
      <dc:creator>JensBauernfeind</dc:creator>
      <dc:date>2020-02-25T20:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to deal with DNS over HTTPS, DNS over TLS, QUIC and PSOM?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76397#M13057</link>
      <description>&lt;P&gt;Quick clarification by R&amp;amp;D:&amp;nbsp;DoH detection was indeed published. The detection is based on R80.40 capabilities (Supporting HTTP 2.0), therefore it is relevant only for this version.&lt;/P&gt;
&lt;P&gt;So will be available in 80.40 when you upgrade. In the meanwhile consider building a custom AppID using the published ports and protocols to block TLS calls to the DNS services published e.g. block HTTPS calls to Google (8.8.4.4 / 8.8.8.8), CloudFlare (1.1.1.1), DNSCurve, DNS Crypt (I think we have a separate AppID for this) and Firefox&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 20:43:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deal-with-DNS-over-HTTPS-DNS-over-TLS-QUIC-and-PSOM/m-p/76397#M13057</guid>
      <dc:creator>VCL001</dc:creator>
      <dc:date>2020-02-25T20:43:50Z</dc:date>
    </item>
  </channel>
</rss>

