<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS flag day and DNS inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20686#M58195</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I said, I used the aforementioned site thru a Check Point gateway configured with an IPS Optimized profile and did not see any errors/drops in the logs.&lt;/P&gt;&lt;P&gt;I also saw results that varied depending on the domain I was checking, so I assume these checks are not being blocked.&lt;/P&gt;&lt;P&gt;If you have evidence otherwise, please provide it (exact domains, screenshots of logs, etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To the question you asked about the size of DNS packets, there is an&amp;nbsp;Inspection Setting (IPS in R77.30 and earlier) called DNS Maximum Request Length.&lt;/P&gt;&lt;P&gt;This is set to Inactive by default (at least in R80.20).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Jan 2019 05:42:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-01-03T05:42:56Z</dc:date>
    <item>
      <title>DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20683#M58192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://dnsflagday.net/" title="https://dnsflagday.net/"&gt;DNS flag day&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: #373737; background-color: #ffffff; border: 0px; font-size: 16px; margin: 10px 0px 15px;"&gt;If there is a problem, the ednscomp tool displays an explanation for each failed test. Failures in these tests are typically caused by:&lt;/P&gt;&lt;UL style="color: #373737; background-color: #ffffff; border: 0px; font-size: 16px; margin: 0px 0px 15px; padding: 0px 0px 0px 20px;"&gt;&lt;LI style="border: 0px;"&gt;broken DNS software&lt;/LI&gt;&lt;LI style="border: 0px;"&gt;broken firewall configuration&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG style="color: #373737; background-color: #ffffff; border: 0px; font-weight: bold; font-size: 16px;"&gt;Firewalls must not drop DNS packets&lt;/STRONG&gt;&lt;SPAN style="color: #373737; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with EDNS extensions, including unknown extensions.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #373737; background-color: #ffffff;"&gt;How to prevent this impact on CheckPoint firewall ?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2019 03:40:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20683#M58192</guid>
      <dc:creator>Kosin_Usuwanthi</dc:creator>
      <dc:date>2019-01-03T03:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20684#M58193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran this test from behind a Check Point gateway running IPS Optimized profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76669_pastedImage_1.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also checked some other domains and got different results.&lt;/P&gt;&lt;P&gt;What specific results are you seeing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2019 04:20:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20684#M58193</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-03T04:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20685#M58194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have concern about firewall will drop reply packet more than 512 bytes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2019 04:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20685#M58194</guid>
      <dc:creator>Kosin_Usuwanthi</dc:creator>
      <dc:date>2019-01-03T04:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20686#M58195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I said, I used the aforementioned site thru a Check Point gateway configured with an IPS Optimized profile and did not see any errors/drops in the logs.&lt;/P&gt;&lt;P&gt;I also saw results that varied depending on the domain I was checking, so I assume these checks are not being blocked.&lt;/P&gt;&lt;P&gt;If you have evidence otherwise, please provide it (exact domains, screenshots of logs, etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To the question you asked about the size of DNS packets, there is an&amp;nbsp;Inspection Setting (IPS in R77.30 and earlier) called DNS Maximum Request Length.&lt;/P&gt;&lt;P&gt;This is set to Inactive by default (at least in R80.20).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2019 05:42:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20686#M58195</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-03T05:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20687#M58196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Dameon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2019 06:45:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20687#M58196</guid>
      <dc:creator>Kosin_Usuwanthi</dc:creator>
      <dc:date>2019-01-03T06:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNS flag day and DNS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20688#M58197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you correctly pointed, one of the reasons for this to fail is a DNS server not updated accordingly. This is&amp;nbsp;surely the most&amp;nbsp;probably reason.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if I'm not wrong...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second option you say is also possible. If you're using R77.30 prior JHFA 345 (or an earlier major version), a Security Gateway with IPS enabled and the protection "Non Compliant DNS" set to Prevent may drop the EDNS&amp;nbsp;queries to/from a corporate DNS server. If the protection status is set to Detect or Inactive, then it would not drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that, in R77.30, there are two predefined profiles and this protection is set to Prevent by default in the "Recommended Profile".&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="77955" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/77955_pastedImage_88.png" /&gt;&lt;/P&gt;&lt;P&gt;This does not happen with R80.10 gateways, whatever the status of the "Non Compliant DNS" protection is. So, in case you're using R77.30 and have this protection in Prevent, you should change it to Detect, or to upgrade the Security Gateway.&amp;nbsp;More info about this last option in the &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112578"&gt;sk112578&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, please check before 1st February if your DNS servers and also your infraestructure is prepared for this change (there is a test option in the link you've sent,&amp;nbsp;&lt;A class="link-titled" href="https://dnsflagday.net/" title="https://dnsflagday.net/"&gt;2019 | DNS flag day&lt;/A&gt;&amp;nbsp;)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2019 18:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-flag-day-and-DNS-inspection/m-p/20688#M58197</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2019-01-25T18:13:04Z</dc:date>
    </item>
  </channel>
</rss>

