This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

False positives in log for dns

Attack : PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no authority
 
Receiving thousands of these, coming from my 2 inside DNS servers.... what is causing this alert?


This thread was automatically locked due to age.
  • HI Alex, 

    Thank you for the PCAP , Could you share the logs from the reports that were detected? That should help us analyze the logs. 

    As for the port you may use console>tcpdump filedump verbose count 10000 'port 53 -s0 #where 53 is the port address you would monitor for DNS queries.

    Regards,

    Aditya Patel
    Global Escalation Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.

  • Hi guys,

    I put my XG on line again after adding VLANs and VoIP phones.

    I think you are looking at the wrong place for the DNS errors. My XG is reporting DNS errors for port 53, IMAPS and a host of other ports.

    I have included the daily report, it show the attacking servers as being my ISP DNS. I will change the DNS and see if that reduces the attack reports.

    3806.DNS error report.pdf

    XG115W - v19.5.1 mr-1 - Home

    If a post solves your question please use the 'Verify Answer' button.

  • Further update. Since removing google dns from my XG the DNS attack on my users and on ISP DNS have dropped significantly or has Sophos published updated signatures without telling us in this thread?

    XG115W - v19.5.1 mr-1 - Home

    If a post solves your question please use the 'Verify Answer' button.

  • It seems that the IPS signatures have been repaired. Current version
    3.13.49 since 2.05.2017 does't generate "DNS-PROTOCOL SPOOF ...." messages.
     
    Regards
    Jan