{"id":1411,"date":"2019-02-22T22:04:15","date_gmt":"2019-02-22T22:04:15","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1411"},"modified":"2021-01-28T08:47:19","modified_gmt":"2021-01-28T16:47:19","slug":"dns-dot-doh-for-service-providers-and-regulators","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/","title":{"rendered":"DNS DoT\/DoH for Service Providers and Regulators"},"content":{"rendered":"<p>In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.\u00a0 You should read that post before reading <a href=\"\/company\/dot-doh-and-the-dns-last-mile-security-problem\/\" target=\"_blank\" rel=\"noopener noreferrer\">this post <\/a>.\u00a0 This blog post will cover the security risks, competitive, user experience, and legal impacts to Service Providers and Regulators and Enumerate Infoblox recommendations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/image001.png\" alt=\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\" width=\"600\" height=\"413\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-300x207.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Concerns for Service Providers and Regulators<\/strong><\/p>\n<p>LTE networks are not immune to the last-mile security problem in DNS.\u00a0 Last year a team of academics at Ruhr University Bochum and NYU demonstrated an attack that can hijack DNS on LTE networks.\u00a0 DoT and DoH are both possible solutions to this.\u00a0 The full writeup of the attack is posted at\u00a0<a href=\"https:\/\/alter-attack.net\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">https:\/\/alter-attack.net\/<\/a><\/p>\n<p>Cloud DNS providers create numerous competitive, user experience and legal concerns.\u00a0 Some are owned by content delivery networks and other large technology companies.\u00a0 The cloud DNS providers may be direct competitors to the service provider or each other.\u00a0 The SP and regulator may have little or no influence over commercial issues between the cloud DNS provider and their competitors or customers.\u00a0 Competitors could choose to route each other\u2019s traffic to slower-responding sites or take other liberties with the user experience. DNS is the first message in most IP conversations, so low latency is critical to user experience.\u00a0 Routing DNS off the SP network will always make the DNS experience slower. Several cloud DNS providers are being actively misleading in their marketing of DNS response time.\u00a0 Service providers could address this by publishing comparative DNS latency statistics.\u00a0 Cloud DNS services are implemented worldwide.\u00a0 This means the DNS traffic can be subject to observation, spying or other alteration based on legal orders from governments outside of the service provider\u2019s territory.\u00a0 Blocking resolution of malicious and illegal content is a major concern.\u00a0 Implementing these regulatory obligations is challenging or impossible when there is no business relationship or legal authority over a company outside of the service provider\u2019s network or legal territory.\u00a0 Customer use of cloud DNS services also prevents the service provider from offering subscriber-facing services like parental control or security services over DNS.<\/p>\n<p>DNS over HTTPS creates unique support problems for the service provider.\u00a0 DoH traffic is indistinguishable from regular HTTPS traffic. \u00a0The most common implementation of DoH occurs between the browser and a cloud DNS provider, not the OS resolver and the SP\u2019s DNS service.\u00a0 \u00a0It\u2019s important to have support teams trained to identify if DoH clients are installed or browser-level settings have been altered.\u00a0 This could result in an app on User Equipment(UE) that behaves differently when run via the browser or in the UE OS.\u00a0 The SP\u2019s support team could also examine local and network-based logging systems to determine if known DoH server addresses have been accessed by the UE recently.<\/p>\n<p><strong>Recommendations for Service Providers<\/strong><\/p>\n<p>For the above reasons, Infoblox recommends direct implementation of DoT by mobile and fixed providers.\u00a0 Now is the time to start planning for CY 2020 implementation.\u00a0 To prepare for this, Infoblox suggests working with UE software and hardware makers in the following areas:<\/p>\n<ul>\n<li>DoT support in UE operating systems according to RFC 7858 and RFC 8094.\u00a0\u00a0 Thus far, the only OS-level implementations of DoT are in systemd-resolved and Android 9.<\/li>\n<li>DoT support in UE profiles, per RFC 8310.\u00a0This requirement should be extended to network equipment vendors via DHCP or other device profiles. \u00a0When this is enacted, it should override any user-based settings for DoT or DoH while the device is on the SP\u2019s network and not connected to outside WiFi or other alternate connectivity.<\/li>\n<li>Allow blocking of unapproved DoH\/DoT applications as a part of the carrier profile.<\/li>\n<li>These requirements should be a part of the service provider\u2019s UE certification process and should be addressed before a new UE is allowed on the network.<\/li>\n<li>Special attention should be given to IoT device makers.\u00a0 IoT devices can have extended lives and be the most susceptible to attack and misuse.<\/li>\n<\/ul>\n<p><strong>Recommendations for Regulators<\/strong><\/p>\n<p>Infoblox recommends regulators work with the service providers and their vendors to ensure adoption of DNS over TLS.\u00a0 Unlike with enterprises, it is not often feasible or realistic to block access to known cloud DNS providers.\u00a0 What can be done is to actively support standards that are beneficial to the citizens under your oversight.\u00a0 Direct influence of the user and network equipment makers doing business in your territory is critical.\u00a0 Regulators should directly support the adoption of standards favorable to the privacy of your citizens, that are supportable by your service providers, and don\u2019t prevent the service provider from blocking access to illegal or malicious content.\u00a0 In some cases, it may be appropriate to block specific cloud DNS services at the territory level.\u00a0 Infoblox recommendations for enterprises cover the specifics of that\u00a0<a href=\"\/company\/dot-doh-and-the-dns-last-mile-security-problem\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>The last-mile problems with DNS exist even on service provider networks.\u00a0 Cloud-based DNS competitors pushing DoH adoption present many concerns.\u00a0 Direct DoT adoption by service providers with the support of local regulations is the best response.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.\u00a0 You should read that post before reading this post .\u00a0 This blog post will cover the security risks, competitive, user experience, and legal impacts to Service Providers and Regulators and Enumerate [&hellip;]<\/p>\n","protected":false},"author":242,"featured_media":114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,90,16,63,372,395,427],"class_list":{"0":"post-1411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dot-doh","10":"tag-infoblox","11":"tag-service-provider","12":"tag-service-providers","13":"tag-technology","14":"tag-nios-8-x","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS DoT\/DoH for Service Providers and Regulators<\/title>\n<meta name=\"description\" content=\"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS DoT\/DoH for Service Providers and Regulators\" \/>\n<meta property=\"og:description\" content=\"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-22T22:04:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:47:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Adair\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Adair\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/\"},\"author\":{\"name\":\"Paul Adair\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98e0668931350df76d421a0f39a51a72\"},\"headline\":\"DNS DoT\\\/DoH for Service Providers and Regulators\",\"datePublished\":\"2019-02-22T22:04:15+00:00\",\"dateModified\":\"2021-01-28T16:47:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/\"},\"wordCount\":838,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"keywords\":[\"DNS\",\"DoT\\\/DoH\",\"Infoblox\",\"Service provider\",\"Service providers\",\"technology\",\"NIOS 8.x\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/\",\"name\":\"DNS DoT\\\/DoH for Service Providers and Regulators\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"datePublished\":\"2019-02-22T22:04:15+00:00\",\"dateModified\":\"2021-01-28T16:47:19+00:00\",\"description\":\"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"width\":600,\"height\":413,\"caption\":\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-dot-doh-for-service-providers-and-regulators\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS DoT\\\/DoH for Service Providers and Regulators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98e0668931350df76d421a0f39a51a72\",\"name\":\"Paul Adair\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/rsa-speaker-paul-adair-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/rsa-speaker-paul-adair-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/rsa-speaker-paul-adair-96x96.jpg\",\"caption\":\"Paul Adair\"},\"description\":\"Paul Adair is a Director of Product Management, Autodidact, Father, Blogger, and DNS Geek. For the past 7 years at Infoblox he has focused on DNS security and the evolution of 3G\\\/4G\\\/LTE to 5G. When he isn\u2019t at home in Texas you can probably find him at a conference or in an exit row seat in the aisle.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/paul-adair\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS DoT\/DoH for Service Providers and Regulators","description":"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/","og_locale":"en_US","og_type":"article","og_title":"DNS DoT\/DoH for Service Providers and Regulators","og_description":"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/","og_site_name":"Infoblox Blog","article_published_time":"2019-02-22T22:04:15+00:00","article_modified_time":"2021-01-28T16:47:19+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","type":"image\/png"}],"author":"Paul Adair","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Paul Adair","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/"},"author":{"name":"Paul Adair","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98e0668931350df76d421a0f39a51a72"},"headline":"DNS DoT\/DoH for Service Providers and Regulators","datePublished":"2019-02-22T22:04:15+00:00","dateModified":"2021-01-28T16:47:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/"},"wordCount":838,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","keywords":["DNS","DoT\/DoH","Infoblox","Service provider","Service providers","technology","NIOS 8.x"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/","name":"DNS DoT\/DoH for Service Providers and Regulators","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","datePublished":"2019-02-22T22:04:15+00:00","dateModified":"2021-01-28T16:47:19+00:00","description":"In a separate blog post, Cricket covered the last-mile security problem for DNS, solutions developed by the IETF, and our recommendations to enterprise administrators.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","width":600,"height":413,"caption":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-dot-doh-for-service-providers-and-regulators\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS DoT\/DoH for Service Providers and Regulators"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98e0668931350df76d421a0f39a51a72","name":"Paul Adair","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rsa-speaker-paul-adair-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rsa-speaker-paul-adair-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/rsa-speaker-paul-adair-96x96.jpg","caption":"Paul Adair"},"description":"Paul Adair is a Director of Product Management, Autodidact, Father, Blogger, and DNS Geek. For the past 7 years at Infoblox he has focused on DNS security and the evolution of 3G\/4G\/LTE to 5G. When he isn\u2019t at home in Texas you can probably find him at a conference or in an exit row seat in the aisle.","url":"https:\/\/www.infoblox.com\/blog\/author\/paul-adair\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/242"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1411"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1411\/revisions"}],"predecessor-version":[{"id":3802,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1411\/revisions\/3802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/114"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}