{"id":3090,"date":"2015-08-31T17:59:35","date_gmt":"2015-08-31T17:59:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3090"},"modified":"2020-05-06T10:30:10","modified_gmt":"2020-05-06T17:30:10","slug":"uncle-sam-wants-you-to-control-outbound-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/","title":{"rendered":"Uncle Sam Wants You&#8230; To Control Outbound DNS"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3091\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/uncle-sam.jpg\" alt=\"\" width=\"567\" height=\"390\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam-300x206.jpg 300w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/p>\n<p>The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A<\/a>). In particular, US-CERT notes an increase in the number of client systems sending queries directly to Internet name servers, and stresses the need to prevent this, both for security\u2019s and efficiency\u2019s sake.<\/p>\n<p>I\u2019ve been saying this for years!<\/p>\n<p>There are two common security policies with respect to outbound Domain Name System (DNS) access.\u00a0 Some organizations allow any internal Internet Protocol (IP) address to send DNS queries to any name server on the Internet.\u00a0 In fact, that\u2019s the default policy in some Internet firewalls.\u00a0 This provides a lot of flexibility, of course:\u00a0 Users can configure their clients to use OpenDNS or Google Public DNS instead of their IT department\u2019s name servers, and an experienced user can use a DNS query tool such as dig or nslookup to troubleshoot DNS resolution problems.<\/p>\n<p>Other organizations only permit a limited set of authorized internal name servers to send DNS queries to Internet IP addresses.\u00a0 Users must use the approved set of internal name servers to resolve domain names; they can\u2019t just opt to use OpenDNS or Google Public DNS, and troubleshooting DNS problems is more cumbersome.<\/p>\n<p>Admittedly, I was a little late to the \u201climited DNS access\u201d party, requiring a nudge from my friend\u00a0<a href=\"http:\/\/www.amazon.com\/Nate-Campi\/e\/B002Y03B0A\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Nate Campi<\/a>\u00a0to accept the wisdom of not allowing internal stub resolvers and name servers to query any old Internet name server they like (see this 2012\u00a0<a href=\"https:\/\/community.infoblox.com\/blogs\/2012\/07\/08\/lesson-nate-and-dns-changer\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>\u00a0for my\u00a0<i>mea culpa<\/i>).\u00a0 The last straw was DNSChanger, a Trojan that reconfigured stub resolvers to point them to hostile open recursive name servers on the Internet, which would substitute, uh, legitimate web advertising with advertising from another company (see this Wikipedia\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/DNSChanger\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">article<\/a>\u00a0for details).<\/p>\n<p>Given that the DNSChanger infrastructure has been taken down, what\u2019s the danger of allowing queries from internal clients to any Internet name server?<\/p>\n<ul>\n<li><i>Subverting DNS security mechanisms, such as Response Policy Zones.\u00a0\u00a0<\/i>More and more often, enterprise name servers employ security mechanisms such as RPZ to protect internal clients from the resolution of known malicious domain names or resolution to known malicious IP addresses.\u00a0 Sending queries directly to Internet name servers circumvents these mechanisms.<\/li>\n<\/ul>\n<ul>\n<li><i>DNS tunneling.<\/i>\u00a0 Allowing traffic directly between internal clients and Internet addresses makes DNS tunneling trivial.\u00a0 If your firewall isn\u2019t smart enough to distinguish legitimate DNS traffic from, say, file transfers, malware may be able to easily exfiltrate your data to servers on the Internet masquerading as name servers by running on UDP or TCP port 53.\u00a0 Even if your fancy-schmancy, application-smart Internet firewall does recognize DNS traffic, malware can use sophisticated techniques for tunneling data in DNS queries or responses that your firewall may not catch.<\/li>\n<\/ul>\n<ul>\n<li><i>Loss of visibility.<\/i>\u00a0 If you log name resolution requests from your internal clients, you\u2019ve got a goldmine of forensic data&amp;colon;\u00a0 If there\u2019s a breach, you can determine where the bad guys went, what internal resources they accessed, and more.\u00a0 If your clients use an external name server, you\u2019ve lost that data.<\/li>\n<\/ul>\n<ul>\n<li><i>Loss of efficiency.<\/i>\u00a0 One of the operational benefits of funneling queries through a set of well-connected internal name servers is that your clients can take advantage of the rich cache of data those name servers accumulate.\u00a0 If all your clients independently resolve domain names using different Internet name servers (or even local name servers), they can\u2019t capitalize on that shared cache.<\/li>\n<\/ul>\n<p>For all these reasons, it\u2019s a best practice to restrict outbound DNS queries to only authorized internal name servers. Generally speaking, this is a subset of your internal name servers designated as forwarders, to which other internal name servers forward DNS queries they can\u2019t answer, including queries for Internet domain names.\u00a0 That\u2019s just a simple firewall rule, but adding it can have wide-ranging positive effect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A). In particular, US-CERT notes an increase in the number of client systems sending queries directly to Internet name servers, and stresses the need to prevent this, both for [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":3091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[30,15],"class_list":{"0":"post-3090","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-dns","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Uncle Sam Wants You... To Control Outbound DNS<\/title>\n<meta name=\"description\" content=\"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uncle Sam Wants You... To Control Outbound DNS\" \/>\n<meta property=\"og:description\" content=\"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-31T17:59:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Uncle Sam Wants You&#8230; To Control Outbound DNS\",\"datePublished\":\"2015-08-31T17:59:35+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/\"},\"wordCount\":669,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/uncle-sam.jpg\",\"keywords\":[\"DNS\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/\",\"name\":\"Uncle Sam Wants You... To Control Outbound DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/uncle-sam.jpg\",\"datePublished\":\"2015-08-31T17:59:35+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"description\":\"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\\\/\\\/www.us-cert.gov\\\/ncas\\\/alerts\\\/TA15-240A).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/uncle-sam.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/uncle-sam.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/uncle-sam-wants-you-to-control-outbound-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Uncle Sam Wants You&#8230; To Control Outbound DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Uncle Sam Wants You... To Control Outbound DNS","description":"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/","og_locale":"en_US","og_type":"article","og_title":"Uncle Sam Wants You... To Control Outbound DNS","og_description":"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A).","og_url":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2015-08-31T17:59:35+00:00","article_modified_time":"2020-05-06T17:30:10+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Uncle Sam Wants You&#8230; To Control Outbound DNS","datePublished":"2015-08-31T17:59:35+00:00","dateModified":"2020-05-06T17:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/"},"wordCount":669,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg","keywords":["DNS","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/","url":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/","name":"Uncle Sam Wants You... To Control Outbound DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg","datePublished":"2015-08-31T17:59:35+00:00","dateModified":"2020-05-06T17:30:10+00:00","description":"The U.S. Department of Homeland Security\u2019s Computer Emergency Readiness Team (US-CERT) released an alert on Aug. 28, 2015, regarding the importance of controlling outbound DNS access (https:\/\/www.us-cert.gov\/ncas\/alerts\/TA15-240A).","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/uncle-sam.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/uncle-sam-wants-you-to-control-outbound-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Uncle Sam Wants You&#8230; To Control Outbound DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3090"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3090\/revisions"}],"predecessor-version":[{"id":3092,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3090\/revisions\/3092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3091"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}