{"id":1647,"date":"2019-01-23T17:43:12","date_gmt":"2019-01-23T17:43:12","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1647"},"modified":"2020-12-05T17:59:54","modified_gmt":"2020-12-06T01:59:54","slug":"dhs-issues-emergency-directive-following-dns-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/","title":{"rendered":"DHS Issues Emergency Directive Following DNS Attacks"},"content":{"rendered":"<p>On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released\u00a0<u><a class=\" bf_ungated_init\" href=\"https:\/\/cyber.dhs.gov\/assets\/report\/ed-19-01.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Emergency Directive 19-01<\/a><\/u>, \u201c<em>Mitigate DNS Infrastructure Tampering,<\/em>\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.\u00a0 In these attacks, malicious actors used compromised credentials for DNS registrar and DNS hosting accounts to modify the victims\u2019 DNS data and redirect mail and web traffic to servers impersonating the legitimate ones.\u00a0 Also using their control of the victims\u2019 DNS data, the attackers were able to use the\u00a0<a href=\"https:\/\/letsencrypt.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Let\u2019s Encrypt<\/a>\u00a0service to issue TLS certificates to install on the impersonating servers, tricking visitors into believing they were accessing the web or mail servers securely.\u00a0 The attackers\u2019 servers then acted as \u201cmen in the middle,\u201d connecting to the correct, legitimate servers on behalf of visitors, but observing all traffic passing through them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-121\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/EDNS-and-CDNs.jpg\" alt=\"Infoblox announces industry-first cloud-managed DDI for the branch office\" width=\"600\" height=\"338\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs-300x169.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The emergency directive requires U.S. government agencies audit all \u201cagency-managed domains\u201d to:<\/p>\n<ul>\n<li>Determine whether their data has been modified<\/li>\n<li>Change passwords on all accounts with the ability to modify agencies\u2019 DNS data<\/li>\n<li>Enable multi-factor authentication on those same accounts, if possible<\/li>\n<li>Monitor logs to determine if unauthorized certificates have been issued for their agencies<\/li>\n<\/ul>\n<p>According to the directive, these measures must be completed by February 5, 2019. (I sure hope the Federal government isn\u2019t still shut down then.)<\/p>\n<p>I\u2019d note that these precautions are useful not just for U.S. government domains, but for any important domains run by organizations around the world, government or not. For all the attention that we give to cache poisoning attacks, it\u2019s much more common for attackers to gain control of a victim\u2019s DNS data using stolen or guessed credentials to a registrar or DNS hosting account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released\u00a0Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,102,16,15,367,368],"class_list":{"0":"post-1647","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dns-issues","10":"tag-infoblox","11":"tag-security","12":"tag-government","13":"tag-federal","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DHS Issues Emergency Directive Following DNS Attacks<\/title>\n<meta name=\"description\" content=\"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DHS Issues Emergency Directive Following DNS Attacks\" \/>\n<meta property=\"og:description\" content=\"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T17:43:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-06T01:59:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"DHS Issues Emergency Directive Following DNS Attacks\",\"datePublished\":\"2019-01-23T17:43:12+00:00\",\"dateModified\":\"2020-12-06T01:59:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/\"},\"wordCount\":321,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/EDNS-and-CDNs.jpg\",\"keywords\":[\"DNS\",\"DNS Issues\",\"Infoblox\",\"Security\",\"Government\",\"Federal\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/\",\"name\":\"DHS Issues Emergency Directive Following DNS Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/EDNS-and-CDNs.jpg\",\"datePublished\":\"2019-01-23T17:43:12+00:00\",\"dateModified\":\"2020-12-06T01:59:54+00:00\",\"description\":\"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/EDNS-and-CDNs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/EDNS-and-CDNs.jpg\",\"width\":600,\"height\":338,\"caption\":\"Infoblox announces industry-first cloud-managed DDI for the branch office\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dhs-issues-emergency-directive-following-dns-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DHS Issues Emergency Directive Following DNS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DHS Issues Emergency Directive Following DNS Attacks","description":"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/","og_locale":"en_US","og_type":"article","og_title":"DHS Issues Emergency Directive Following DNS Attacks","og_description":"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2019-01-23T17:43:12+00:00","article_modified_time":"2020-12-06T01:59:54+00:00","og_image":[{"width":600,"height":338,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"DHS Issues Emergency Directive Following DNS Attacks","datePublished":"2019-01-23T17:43:12+00:00","dateModified":"2020-12-06T01:59:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/"},"wordCount":321,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg","keywords":["DNS","DNS Issues","Infoblox","Security","Government","Federal"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/","name":"DHS Issues Emergency Directive Following DNS Attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg","datePublished":"2019-01-23T17:43:12+00:00","dateModified":"2020-12-06T01:59:54+00:00","description":"On January 22, 2019, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released Emergency Directive 19-01, \u201cMitigate DNS Infrastructure Tampering,\u201d in response to recent reports by FireEye and Cisco\u2019s Talos Intelligence Group indicating that \u201cdozens of domains belonging to government, telecommunications, and internet infrastructure entities across the Middle East and North Africa, Europe and North America\u201d had been victims of a series of sophisticated attacks.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/EDNS-and-CDNs.jpg","width":600,"height":338,"caption":"Infoblox announces industry-first cloud-managed DDI for the branch office"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dhs-issues-emergency-directive-following-dns-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DHS Issues Emergency Directive Following DNS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1647"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1647\/revisions"}],"predecessor-version":[{"id":5456,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1647\/revisions\/5456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/121"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}