infoblox:rpz_feeds
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox:rpz_feeds [2024/06/14 21:37] – [List of RPZ Feeds from Infoblox] bstafford | infoblox:rpz_feeds [2024/12/27 15:18] (current) – bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Infoblox RPZ Threat | + | ====== Infoblox RPZ Feeds ====== |
| - | + | Page moved to here [[infoblox_threat_defense:rpz_feeds|here]]. | |
| - | ===== Official List of RPZ Feeds ===== | + | |
| - | [[https:// | + | |
| - | + | ||
| - | [[https:// | + | |
| - | + | ||
| - | ===== Test RPZ Queries ===== | + | |
| - | Test data [[infoblox: | + | |
| - | + | ||
| - | + | ||
| - | ===== Best Practice ===== | + | |
| - | When creating a security policy using RPZ feeds, the following is best practice in general. | + | |
| - | + | ||
| - | * Applications being allowed | + | |
| - | * Custom allow lists. e.g. internal domain list and a SOC override/ | + | |
| - | * Custom block lists. e.g. SOC list of domains to block based on internal Threat Intelligence and list of domains the company prohibits access to. | + | |
| - | * Infoblox RPZ feeds that have action set to block. | + | |
| - | * Applications to block. (B1TD Cloud only - not NIOS) | + | |
| - | * Web Categories to block. (B1TD Cloud only - not NIOS) | + | |
| - | * Infoblox RPZ feeds that have action set to allow with log. | + | |
| - | * Set RPZ feed to TTL of no more than 600 seconds (5 minutes). | + | |
| - | + | ||
| - | Do not add Web Categories "allow with log" or Application "allow with log" rules unless you really know what you are doing. The data gets logged anyway and populates the Web Category and Application Insight reports anyway without the need for a rule to explicitly log. Also, "Allow - With Log" as an action for web content can impact Threat Insight in the cloud. | + | |
| - | + | ||
| - | Where you have a number of RPZ feeds that are going to perform the same action (block or allow), then put the IP address based feeds at the bottom and FQDN based feeds at the top. Infoblox does not mix FQDN data and IP data in any feed other than the " | + | |
| - | + | ||
| - | For Infoblox, if the RPZ feed name does not have _IP in it, it is a FQDN only feed. Generally, alert on _IP rules rather than block. The Extreme/ | + | |
| - | + | ||
| - | If using the -block and -log combination feeds, always put -log underneath the -block feed and only pick a single severity. | + | |
| - | + | ||
| - | Remember, RPZ feeds are for recursive DNS only. They can't be used on a DNS server that is authoritative only. ADP and [[https:// | + | |
| - | + | ||
| - | In the list below " | + | |
| - | ===== RPZ Sizing ===== | + | |
| - | As of NIOS 9.0.1 in Dec 2023: ([[https:// | + | |
| - | ^ Model ^ RPZ Rule Count ^ Notes ^ | + | |
| - | | TE-815 | 1.5 million RPZ entries | Everything except for " | + | |
| - | | TE-825 | 2 million RPZ entries | Everything except for " | + | |
| - | | **TE-926**/ | + | |
| - | | TE-1425 | 8 million RPZ entries | Everything except " | + | |
| - | | **TE-1516**/ | + | |
| - | | TE-2215/ | + | |
| - | | **TE-2326**/ | + | |
| - | + | ||
| - | + | ||
| - | OLD data | + | |
| - | ^ Model ^ Records at 100% DNS rate ^ Records at 50% DNS rate ^ | + | |
| - | | TE-815 | 2,000,000 | 2,500,000 | | + | |
| - | | TE-825 | 4,500,000 | 5,000,000 | | + | |
| - | | TE-1415/ | + | |
| - | | TE-2215/ | + | |
| - | + | ||
| - | ===== Suggested Best Practice for Cloud Based Security Policies ===== | + | |
| - | + | ||
| - | ^ Stage ^ Name ^ Action ^ B1TD License ^ Location ^ | + | |
| - | | FQDN Allow | custom-list-corporate-domains | Allow No-Log | Any | Cloud or NIOS | | + | |
| - | | FQDN Allow | custom-list-global-override | Allow No-Log | Any | Cloud or NIOS | | + | |
| - | | FQDN Allow | Default Allow | Allow No-Log | Any | Cloud only | | + | |
| - | | FQDN Block | custom-block-list-network-team | Block With-Log | Any | Cloud or NIOS | | + | |
| - | | FQDN Block | custom-block-list-soc-team | Block With-Log | Any | Cloud or NIOS | | + | |
| - | | FQDN Block | Default Block | Block With-Log | Any | Cloud only | | + | |
| - | | FQDN Block | Infoblox Base | Block With-Log | Essentials | Cloud or NIOS | | + | |
| - | | FQDN Block | Infoblox High | Block With-Log | Advanced | Cloud or NIOS | | + | |
| - | | FQDN Block | Infoblox Medium | Block With-Log | Advanced | Cloud or NIOS | | + | |
| - | | FQDN Block | Infoblox Base IP | Block With-Log | Business | Cloud or NIOS | | + | |
| - | | FQDN Block | Threat Insight - Data Exfiltration | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | Threat Insight - DGA | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | Threat Insight - DNS Messenger | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | Threat Insight - Fast Flux | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | Threat Insight - Zero Day DNS | Block With-Log | Advanced | Cloud only | | + | |
| - | | FQDN Block | Threat Insight - Notional Data Exfiltration | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | Public_DoH | Block With-Log | Essentials | Cloud or NIOS | | + | |
| - | | FQDN Block | DHS_AIS | Block With-Log | Essentials | Cloud or NIOS | | + | |
| - | | FQDN Block | Cryptocurrency | Block With-Log | Business | Cloud or NIOS | | + | |
| - | | FQDN Block | custom-webcategory-list | Block With-Log | Business | Cloud only | | + | |
| - | | FQDN Block | custom-application-list | Block With-Log | Business | Cloud only | | + | |
| - | | IP Block | Bogon | Block - With-Log | Essentials | Cloud or NIOS | | + | |
| - | | IP Block | Public_DoH_IP | Block With-Log | Essentials | Cloud or NIOS | | + | |
| - | | IP Block | DHS_AIS_IP | Block With-Log | Essentials | Cloud or NIOS | | + | |
| - | | IP Block | TOR_Exit_Node_IP | Block With-Log | Advanced | Cloud or NIOS | | + | |
| - | | IP Block | EECN_IP | According to Policy | Business | Cloud or NIOS | | + | |
| - | | IP Block | US_OFAC_Sanctions_IP_Embargoed | According to Policy | Business | Cloud or NIOS | | + | |
| - | | IP Block | US_OFAC_Sanctions_IP_High | According to Policy | Business | Cloud or NIOS | | + | |
| - | | IP Block | US_OFAC_Sanctions_IP_Med | According to Policy | Business | Cloud or NIOS | | + | |
| - | | FQDN Log | Infoblox Low | Allow With-Log | Advanced | Cloud or NIOS | | + | |
| - | | FQDN Log | Infoblox Informational | Allow With-Log | Business | Cloud or NIOS | | + | |
| - | + | ||
| - | NOTE: For on-prem NIOS security policies, follow something similar to the above. Threat Insight on NIOS will need its own feed below the custom block list near the top. | + | |
| - | + | ||
| - | NOTE: for US_OFAC_Sanctions_IP, | + | |
| - | ===== Practical Tips===== | + | |
| - | * After changing the TSIG key in NIOS, NIOS doesn' | + | |
| - | * FastFlux not seen in wild for years. | + | |
| - | * DNS Messenger not seen in wild for years. | + | |
| - | * Remember, smaller threat databases are not necessarily worse. If a threat has not been seen in the wild for over 5 years, why keep the entry in the database? | + | |
| - | * Remember, when a FQDN is matched to an allow rule, we don't check the returned IP. Thus, avoid ' | + | |
| - | * If you are going to add Ext_ feeds in a high risk environment, | + | |
| - | * Security policy rules should be ordered to give most specific reason why content was blocked. In general, choose your level of protection requirement - high, medium or low. | + | |
| - | * Keep in mind that all DNS requests going through the BloxOne cloud get logged under DNS. So there is still a log. Thus, you should only log actions in security policy if you actually need a log. e.g. Consider carefully before logging the custom allow list at the top of the security policy. Do you really need " | + | |
| - | * The logic of the " | + | |
| - | * Block bogon. Large organizations should be blocking access to these IP ranges at their border routers. Note that there are some (rare) applications that use bogons in DNS responses for legitimate uses. | + | |
| - | * The "Allow - Local Resolution" | + | |
| - | * Keep in mind, if there is a duplication between customers block list and Infoblox RPZ, does the customer want to see their feed listed in the security log or Infoblox' | + | |
| - | * If NIOS forwards to B1TD anycast IP and has "copy source IP" enabled, it will include internal source IP. However, be aware that this will permit ISP to see private IP if they do deep packet inspection on DNS traffic. | + | |
| - | + | ||
| - | + | ||
| - | ===== NIOS RPZ Actions ===== | + | |
| - | REMEMBER! When creating local RPZ feeds, example.local is NOT equal to *.example.local. | + | |
| - | + | ||
| - | + | ||
| - | When setting a " | + | |
| - | * None (Given) - This means do not apply a policy wide override. Allow the individual rules in the policy to dictate what they are doing. Mainly use this on custom feeds. | + | |
| - | * Log Only (Disable) - Log in syslog that the RPZ would have been match but don't actually match. Keep moving down the list of RPZ feeds and look for another match (there may or may not be one). | + | |
| - | * Passthru - Override any action and just match the rule but permit the traffic without modification. | + | |
| - | * Block (No Such Domain) - Override any action and just match the rule but block the traffic with NXDOMAIN. | + | |
| - | * Block (No Data) - Override any action and just match the rule but permit the block the traffic. | + | |
| - | * Substitute (Domain Name) - Override any action and just match the rule but block the traffic by responding with a substitute domain. | + | |
| - | + | ||
| - | ===== RPZ Logs ===== | + | |
| - | Log " | + | |
| - | + | ||
| - | Facility = " | + | |
| - | ==== PASSTHRU ==== | + | |
| - | * CEF:0 | + | |
| - | * Infoblox | + | |
| - | * NIOS | + | |
| - | * 9.0.0-48842-de455822b346 | + | |
| - | * RPZ-QNAME | + | |
| - | * PASSTHRU | + | |
| - | * 4 | + | |
| - | * app=DNS | + | |
| - | * dst=192.168.53.53 | + | |
| - | * src=192.168.1.1 | + | |
| - | * spt=60476 | + | |
| - | * view=_default | + | |
| - | * qtype=A | + | |
| - | * msg=" | + | |
| - | * CAT=RPZ | + | |
| - | + | ||
| - | ====Disabled==== | + | |
| - | * CEF:0 | + | |
| - | * Infoblox | + | |
| - | * NIOS | + | |
| - | * 9.0.0-48842-de455822b346 | + | |
| - | * RPZ-QNAME | + | |
| - | * PASSTHRU | + | |
| - | * 4 | + | |
| - | * app=DNS | + | |
| - | * dst=192.168.53.53 | + | |
| - | * src=192.168.1.1 | + | |
| - | * spt=52904 | + | |
| - | * view=_default | + | |
| - | * qtype=A | + | |
| - | * msg=" | + | |
| - | * CAT=RPZ | + | |
| - | + | ||
| - | ====Block ==== | + | |
| - | (this one is blocking based on an IP block list) | + | |
| - | * CEF:0 | + | |
| - | * Infoblox | + | |
| - | * NIOS | + | |
| - | * 9.0.0-48842-de455822b346 | + | |
| - | * RPZ-IP | + | |
| - | * NXDOMAIN | + | |
| - | * 7 | + | |
| - | * app=DNS | + | |
| - | * dst=192.168.53.53 | + | |
| - | * src=192.168.1.1 | + | |
| - | * spt=52904 | + | |
| - | * view=_default | + | |
| - | * qtype=A | + | |
| - | * msg=" | + | |
| - | * CAT=RPZ | + | |
| - | + | ||
| - | ==== RPZ Being Incrementally Updated ==== | + | |
| - | * Facility: daemon | + | |
| - | * Level: INFO | + | |
| - | * Server: named | + | |
| - | + | ||
| - | * zone ransomware.rpz.infoblox.local/ | + | |
| - | * zone ransomware.rpz.infoblox.local/ | + | |
| - | * transfer of ' | + | |
| - | * zone ransomware.rpz.infoblox.local/ | + | |
| - | * transfer of ' | + | |
| - | * transfer of ' | + | |
| - | * rpz: ransomware.rpz.infoblox.local: | + | |
| - | * (re)loaded policy zone ' | + | |
| - | * rpz: ransomware.rpz.infoblox.local: | + | |
| - | * zone ransomware.rpz.infoblox.local/ | + | |
| - | + | ||
| - | ===== Feed Source ===== | + | |
| - | Summary of how different feeds work: | + | |
| - | * SURBL – 3 days, newly registered (data from DNS registries) | + | |
| - | * Farsight – 3 days, first query seen in their pDNS | + | |
| - | * Infoblox – 7 days, first seen active in multiple sources | + | |
| - | * PaloAlto – 32 days, first seen in multiple sources | + | |
| - | * Cisco – 1 day, 2nd query seen in sampled OpenDNS traffic | + | |
| - | + | ||
| - | So, where possible, combine SURBL Fresh, Farsight NOD, Infoblox NOED and Infoblox Suspicious NOED. | + | |
| - | + | ||
| - | ===== RPZ Size ===== | + | |
| - | * 20,000 records in an RPZ file (IP ranges only) can equate to a 20Mb CSV file when exported. | + | |
| - | * 115,000 records in an RPZ file can equate to 6Mb CSV file when exported. | + | |
| - | * 407,000 records in an RPZ file can equate to 21Mb CSV file when exported. | + | |
| - | + | ||
| - | So a RPZ feed with 2.8 Million records could equate to about 150Mb for a CSV file. | + | |
| - | + | ||
| - | If you are creating a combination RPZ, the three to avoid (as they will max out the limit) are | + | |
| - | * Policy_NewlyObservedDomains | + | |
| - | * Suspicious_EmergentDomain | + | |
| - | * Suspicious_Generic | + | |
| - | + | ||
| - | ===== Examples ===== | + | |
| - | 20K employees running on 2 or 4 TE-1415 appliances will all RPZ feeds from B1TD Advanced and with Threat Insight. | + | |
| - | + | ||
| - | + | ||
| - | ===== Check List ===== | + | |
| - | + | ||
| - | Data configured under Policies > On-Prem DNS Firewall. | + | |
| - | + | ||
| - | * For each Grid: | + | |
| - | * Version of NIOS | + | |
| - | * Appliance count, model, form factor and licences | + | |
| - | * Grid wide licences | + | |
| - | * What name server groups exist already? | + | |
| - | * Use lead secondary? (Other NIOS devices will use Zone Transfers to get data from lead secondary) | + | |
| - | * NTP already configured and device synced? | + | |
| - | * Block threats on the appliances/ | + | |
| - | * If forwarding to BloxOne cloud, apply URL filtering and/or application filtering? | + | |
| - | * What threat feeds should be used? Block or Log? | + | |
| - | * Send notifications to secondary servers? | + | |
| - | * Full list of internal domains? We need to add them to the whitelist. | + | |
| - | + | ||
| - | + | ||
| - | * Configure Distribution Server. TSIG keys can take an hour to create. | + | |
| - | * US West: '' | + | |
| - | * US East: '' | + | |
| - | * TSIG Algorithm | + | |
| - | * Name: | + | |
| - | * Key: | + | |
| - | + | ||
| - | + | ||
| - | For local RPZ zones, always make the name end with a .rpz to be nice to the admins in the future. | + | |
| - | + | ||
| - | NIOS will only every download from the External Primary. NOT the External Secondary. | + | |
| - | + | ||
| - | If using DFP on NIOS, enable " | + | |
| - | + | ||
| - | '' | + | |
| - | + | ||
| - | If using "Lead secondary", | + | |
| - | + | ||
| - | For custom allow and block RPZ lists, remember the '' | + | |
| - | + | ||
| - | What Public IP addresses will be used? What public IP addresses will we use for receiving notifications of updates? | + | |
| - | + | ||
| - | You can have local RPZ as well as forward to BloxOne (e.g. for URL logging) | + | |
| - | Outbound is tcp/udp on 53 to the two IP addresses above. | + | |
| - | + | ||
| - | ===== CDN Domains ===== | + | |
| - | + | ||
| - | + | ||
| - | In theory an attacker might use a CDN (e.g. *.azureedge.net) for C2 and all Web Proxy categorizations will be " | + | |
| - | * Exfiltration will be detected (would we detect and block subdomains of a CDN if tunneling is detected? | + | |
| - | * If the domain the CDN CNAME points to is bad it is still a candidate for suspicious/ | + | |
| - | * Infoblox will block hostnames that they know are bad or suspicious, and that aren't shared hosting with other sites. For example, a number of other intel providers over the past year have repeatedly blocked Cloudflare endpoints that are in CNAMEs. This might seem cool, but indeed it is a bad idea. The Cloudflare endpoints are shared and because they contain phishing doesn' | + | |
| - | + | ||
| - | ===== RPZ Forwarding to Another NIOS RPZ ===== | + | |
| - | If you have internal NIOS appliances forwarding to a DMZ NIOS appliance caching server, and if the caching server is doing the RPZ feeds, you will find that it will not work by default. This is because, by default, the first NIOS box to receive the query till tell the box it forwards to to not do RPZ. When configuring an internal DNS forwarder to point at a DMZ Infoblox RPZ server, you must go (in the Grid manager) to Data Management > DNS > Member > Edit > General > Advanced and then untick "Apply RPZ rules only on this member if possible" | + | |
| - | + | ||
| - | Officially: //Select this check box if the forwarders must not apply RPZ rules to the responses that is returned to the other member, when this RPZ member queries other Grid member details" | + | |
| - | + | ||
| - | =====Custom List VS Custom RPZ===== | + | |
| - | Custom list is good for shorter lists of data such as " | + | |
| - | + | ||
| - | Custom RPZ feeds are meant more for working with TIDE data, combining TIDE data with your own uploads. The data should always have expiry dates on it which is why custom lists can be better for stuff that never changes (e.g. domains you always allow). You can easily merge things like country IP data, etc. | + | |
| - | + | ||
| - | Another nice thing about custom RPZ feeds is that you can pull the data easily to other tool. e.g. dig with correct commands to do a zone transfer. Put that through a small shell script to filter the data into host file format and you can put it on a PiHole. | + | |
| - | + | ||
| - | ===== RPZ Source ===== | + | |
| - | ^ Distribution Server ^ IPv4 ^ IPv4 Notify ^ IPv6 ^ | + | |
| - | | US West | 54.69.93.185 | 44.224.71.15 | 2600: | + | |
| - | | US East | 52.2.30.79 | 3.221.42.234 | 2600: | + | |
| - | + | ||
| - | + | ||
| - | Be aware that '' | + | |
| - | + | ||
| - | NIOS 8.6 connects to '' | + | |
| - | + | ||
| - | ===== Feed Type Percentage ===== | + | |
| - | May 2023 > Oct 2023 | + | |
| - | * Suspicious = 65% > 74% | + | |
| - | * NOED = 30% > 12% | + | |
| - | * Other = 5% > 14% | + | |
| - | + | ||
| - | + | ||
| - | ===== RPZ Query Name Recursion ===== | + | |
| - | From [[https:// | + | |
| - | In previous NIOS releases, RPZ query name recursion was enabled by default. The DNS recursive name server performed RPZ recursive lookups for the fully qualified domain name that was part of an RPZ. Starting with NIOS 7.1.0, RPZ query name recursion is disabled by default. When RPZ query name recursion is disabled, the DNS recursive name server sends responses for the domains being queried, without forwarding queries to the authoritative name servers. This can speed up recursive RPZ lookups by eliminating unnecessary recursions for domains that are known to be malicious, possibly caused by internal DDoS attacks on the recursive server. | + | |
| - | You can enable RPZ query name recursion by selecting the Enable RPZ query name recursion (qname-wait-recurse) check box. When you select this check box, the appliance performs RPZ query name recursions. You can configure this at the Grid, member, and DNS view levels. | + | |
| - | + | ||
| - | + | ||
| - | ====== RPZ Syslog ====== | + | |
| - | In NIOS, you get the following syslog on the member doing the RPZ feed | + | |
| - | * Facility = daemon | + | |
| - | * Level = INFO | + | |
| - | * Server = named | + | |
| - | + | ||
| - | Under Data Management > DNS > Response Policy Zones you can check "Last Updated" | + | |
| - | + | ||
| - | You can filter with " | + | |
| - | + | ||
| - | To look for all successful transfers, filter on " | + | |
| - | + | ||
| - | The following is an example syslog output when adding ib-extreme-block.rpz.infoblox.local | + | |
| - | < | + | |
| - | transfer of ' | + | |
| - | transfer of ' | + | |
| - | transfer of ' | + | |
| - | transfer of ' | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | zone ib-extreme-block.rpz.infoblox.local/ | + | |
| - | transfer of ' | + | |
| - | zone ib-extreme-block.rpz.infoblox.local/ | + | |
| - | transfer of ' | + | |
| - | transfer of ' | + | |
| - | (re)loaded policy zone ' | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | (re)loaded policy zone ' | + | |
| - | rpz: ib-extreme-block.rpz.infoblox.local: | + | |
| - | + | ||
| - | + | ||
| - | ====== List of RPZ Feeds from Infoblox ====== | + | |
| - | This is from August 2021. Just under 2 million records in total. | + | |
| - | + | ||
| - | * **SURBL** = "Spam Uniform Resource Identifier (URI) Real-time Block List (BRI)" | + | |
| - | * **EXT** = Extended. This is for feeds that take the " | + | |
| - | * **NCCIC** = National Cybersecurity & Communications Integration Center | + | |
| - | * **DHC** AIS = Department of Homeland | + | |
| - | * **OFAC** = US Treasury Office of Foreign Assets Control | + | |
| - | * **LITE** = Smaller version of the main RPZ so that smaller appliances can load it. | + | |
| - | * **EECN** = Eastern Europe (non-EU) and China. | + | |
| - | + | ||
| - | + | ||
| - | ^ Subscription ^ Feed Name ^ Feed Type ^ Risk ^ Confidence ^ RPZ ^ Objects ^ | + | |
| - | | Essentials | Infoblox Base| FQDN | Low | Low | infoblox-base.rpz.infoblox.local | 1 Million June 2024 | | + | |
| - | | Essentials | Bogon | IP | Low | Low | bogon.rpz.infoblox.local | 16 June 2024 | | + | |
| - | | Essentials | DHS_AIS_Domain | FQDN | High | Medium | dhs-ais-domain.rpz.infoblox.local | 11 June 2024 | | + | |
| - | | Essentials | DHS_AIS_IP | IP | High | Low | dhs-ais-ip.rpz.infoblox.local | 94 June 2024 | | + | |
| - | | Essentials | Public_DoH | FQDN | Low | High | public-doh.rpz.infoblox.local | 117 June 2024 | | + | |
| - | | Essentials | Public_DoH_IP | IP | Low | High | public-doh-ip.rpz.infoblox.local | 208 June 2024 | | + | |
| - | | Business | Infoblox Base IP | IP | | | infoblox-base-ip.rpz.infoblox.local | 100 June 2024 | | + | |
| - | | Business | Infoblox Informational | FQDN | | | infoblox-informational.rpz.infoblox.local | 1.5 Million June 2024 | | + | |
| - | | Business | US_OFAC_Sanctions_IP_Embargoed | IP | Low | Low | sanctions-ip.rpz.infoblox.local | 5 Thousand June 2024 | | + | |
| - | | Business | US_OFAC_Sanctions_IP_High | IP | Low | Low | sanctions-high.rpz.infoblox.local | 31 Thousand June 2024 | | + | |
| - | | Business | US_OFAC_Sanctions_IP_Med | IP | Low | Low | sanctions-med.rpz.infoblox.local | 32 Thousand June 2024 | | + | |
| - | | Business | EECN_IP | IP | Low | Low | eecn-ip.rpz.infoblox.local | 32 Thousand June 2024 | | + | |
| - | | Business | Cryptocurrency | FQDN | Low | Low | cryptocurrency.rpz.infoblox.local | 100 June 2024 | | + | |
| - | | Business | TOR_Exit_Node_IP | IP | Low| Low | tor-exit-node-ip.rpz.infoblox.local | 4 Thousand June 2024 | | + | |
| - | | Advanced | Infoblox Low | FQD N| | | infoblox-low.rpz.infoblox.local | 0.5 Million June 2024 | | + | |
| - | | Advanced | Infoblox Medium | FQDN | | | infoblox-medium.rpz.infoblox.local | 10 Million June 2024 | | + | |
| - | | Advanced | Infoblox High | FQDN | | | infoblox-high.rpz.infoblox.local | 6.5 Million June 2024 | | + | |
| - | + | ||
| - | Cloud Only Feeds for Threat Insight. | + | |
| - | + | ||
| - | ^ Subscription ^ Feed Name ^ Feed Type ^ Risk ^ Confidence ^ RPZ ^ Objects ^ | + | |
| - | | Business | BloxOne Threat Defense Cloud Hits | | | | 208.rpz.infoblox.local | | | + | |
| - | | Business | Threat Insight - Zero Day DNS| FQDN | High | High| | | | + | |
| - | | Business | Threat Insight - DGA | FQDN | High | Medium | | | | + | |
| - | | Business | Threat Insight - DNS Messenger | FQDN | High | Medium | | | | + | |
| - | | Business | Threat Insight - Fast Flux | FQDN | High | Medium | | | | + | |
| - | | Business | Threat Insight - Data Exfiltration | FQDN | High | Medium | | | | + | |
| - | | Business | Threat Insight - Notional Data Exfiltration | FQDN | Low | Low | | | | + | |
| - | + | ||
| - | + | ||
| - | ====Extra Feeds for On-Prem Only==== | + | |
| - | + | ||
| - | These are called " | + | |
| - | + | ||
| - | + | ||
| - | These feeds are accessible for NIOS only (not for CSP Security Policy). The reason is because prior to NIOS 9.0, the version of BIND used on NIOS was limited to 32 RPZ feeds. This meant that users could not import all the available feeds and also use custom feeds. To get around this, a group of feeds were developed that would allow users to aggregate several feeds into one and uses can choose which feed based on their approach to risk. Version 9.0 of NIOS allows up to 64 RPZ feeds and the CSP never had this limitation. | + | |
| - | + | ||
| - | Note that there is no overlap between what ends up in a level' | + | |
| - | + | ||
| - | * **Extreme** - Not suitable for most users. | + | |
| - | * **High** - For environments where it is more important to block potential malicious behavior than it is to avoid blocking the occasional non-malicious site. | + | |
| - | * **Medium** - For most organizations. | + | |
| - | * **Low** - For organizations that are more concerned about accidental blocks than allowing the occasional threat. Examples: Service Providers, Universities, | + | |
| - | + | ||
| - | * **Block** - Contains entries that should be blocked with confidence given the level of protection needed (e.g. low protection for public wifi and extream protection for the military) | + | |
| - | * **Log** - Goes along with the aligned **Block** list but contains entries that don't have as high a confidence level. | + | |
| - | + | ||
| - | ^ Feed Name ^ RPZ ^ Description ^ | + | |
| - | | Extream_Block | ib-extreme-block.rpz.infoblox.local | This feed is designed to block the most malicious behaviors. This feed is not appropriate for most users, and is not recommended unless your specific environment has a unique need. Use at your own risk. It is a companion to the Extreme Log feed. | | + | |
| - | | Extream_Log | ib-extreme-log.rpz.infoblox.local | This feed is designed to log potentially malicious indicators that are too low confidence to include in the Extreme Block list. This feed is not appropriate for most uses, and is not recommended unless your specific environment has a unique need. Use at your own risk. It is a companion to the Extreme Block feed. | | + | |
| - | | High_Block | ib-high-block.rpz.infoblox.local | This is a best practice feed to block possibly risky sites, and is for environments where it is more important to block potential malicious behavior than it is to avoid blocking the occasional non-malicious site. This is primarily used in environments where behavior is predictable, | + | |
| - | | High_Log | ib-high-log.rpz.infoblox.local | This is a best practice feed to log potentially malicious behavior. While these feeds are the most sensitive to blocking malicious behavior, these indicators still have a confidence level that run the risk of occasionally blocking benign sites. It is a companion to the High Block feed. | | + | |
| - | | Med_Block | ib-med-block.rpz.infoblox.local | This is a best practice feed to block malicious sites that is balanced in its approach regarding threat enforcement. It is appropriate for most organizations. It is a companion feed to the Medium Log feed. | | + | |
| - | | Med_Log | ib-med-log.rpz.infoblox.local | This is a best practice feed to log potentially malicious sites. It logs malicious behavior that is suspicious, but does not have a confidence score high enough to warrant blocking. It is a companion to the Medium Block feed. | | + | |
| - | | Low_Block | ib-low-block.rpz.infoblox.local | This is a best practice feed to block malicious sites for organizations that are more concerned about accidental blocks than allowing the occasional threat. Examples: Service Providers, Universities, | + | |
| - | | Low_Log | ib-low-log.rpz.infoblox.local | This is a best practice feed to log potentially malicious sites for organizations that are more concerned about accidental blocks than allowing the occasional threat. This is a companion to the Low Block feed. | | + | |
| - | + | ||
| - | ===== Old Feeds===== | + | |
| - | For the following reasons, the following feeds have been removed | + | |
| - | * IP addresses are frequently reused for multiple sites, and blocking the ones associated with such systems ran the high risk of inadvertent blocking (I.E. False Positive). | + | |
| - | * The curation process for these feeds (I.E. removing false positives) frequently left these feeds empty. | + | |
| - | + | ||
| - | * Spambot IPs (Deprecated on 1 April 2023) | + | |
| - | * Bot_IP (Deprecated on 1 April 2023) | + | |
| - | * ExploitKit_IP (Deprecated on 27 July 2023) | + | |
| - | * Ext_ExploitKit_IP (Deprecated on 27 July 2023) | + | |
| - | * Ext_TOR_Exit_Node_IP (Deprecated on 27 July 2023) | + | |
| - | * NCCIC_Host (Deprecated on 27 July 2023) | + | |
| - | * NCCIC_IP (Deprecated on 27 July 2023) | + | |
| - | * SURBL_Fresh (Deprecated on 22 August 2023) | + | |
| - | * SURBL_Multi (Deprecated on 22 August 2023) | + | |
| - | * SURBL_Multi_Lite (Deprecated on 22 August 2023) | + | |
| - | * Base (Deprecated on 31st Dec 2024) | + | |
| - | * AntiMalware | + | |
| - | * Ransomware (Deprecated on 31st Dec 2024) | + | |
| - | * AntiMalware_IP | + | |
| - | * Malware_DGA | + | |
| - | * NOED (Deprecated on 31st Dec 2024) | + | |
| - | * Suspicious_Domains (Deprecated on 31st Dec 2024) | + | |
| - | * Suspicious_Emergent_Domains (Deprecated on 31st Dec 2024) | + | |
| - | * Suspicious_Lookalikes (Deprecated on 31st Dec 2024) | + | |
| - | * Ext_Base_AntiMalware (Deprecated on 31st Dec 2024) | + | |
| - | * Ext_AntiMalware_IP (Deprecated on 31st Dec 2024) | + | |
| - | * Ext_Ransomware | + | |
| - | * Spambot_DNSBL_IP (Deprecated on 31st Dec 2024) | + | |
| - | + | ||
| - | + | ||
infoblox/rpz_feeds.1718401072.txt.gz · Last modified: by bstafford
