{"id":3348,"date":"2014-10-13T10:51:29","date_gmt":"2014-10-13T10:51:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3348"},"modified":"2020-05-06T10:31:33","modified_gmt":"2020-05-06T17:31:33","slug":"be-careful-what-you-wish-for","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/","title":{"rendered":"Be Careful What You Wish For"},"content":{"rendered":"<p>As part of\u00a0<a href=\"mailto:http:\/\/www.infoblox.com\/downloads\/resources\/dns-security-best-practices-with-cricket-liu-webinar?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">my standard presentation about DNS security<\/a>, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0<em>think<\/em>\u00a0you\u2019re going to.\u00a0 You enter your credentials, your account information, your credit card information, into the bogus site,\u00a0and the bad guy uses your personal information to drain your account or charge your card.\u00a0 Or the bad guy redirects your email through his mail server, either modifying your messages slightly or simply recording them.\u00a0 These are among the most insidious threats to Internet infrastructure\u00a0because they&#8217;re so difficult to detect. \u00a0The potential damage is massive and after the poisoned records time out of the name server\u2019s cache, there\u2019s no evidence of the attack\u2014except for the credit card charges or outgoing wire transfers.<\/p>\n<p>I then go on to describe what I consider the three major cache poisoning \u201cattacks\u201d over the past twenty years:\u00a0\u00a0<a href=\"mailto:http:\/\/en.wikipedia.org\/wiki\/AlterNIC%23Hijacking_of_InterNIC.27s_website\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the Kashpureff attack<\/a>,\u00a0<a href=\"mailto:http:\/\/www.h-online.com\/security\/news\/item\/New-version-of-BIND-fixes-cache-poisoning-vulnerability-733322.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the Klein vulnerability<\/a>, and\u00a0<a href=\"mailto:http:\/\/en.wikipedia.org\/wiki\/Dan_Kaminsky%23Flaw_in_DNS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the Kaminsky vulnerability<\/a>. These attacks used flaws in the implementation of popular name servers and weaknesses in the design of DNS to induce a name server to accept bogus records. \u00a0Of course<ins cite=\"mailto:Cricket%20Liu\" datetime=\"2014-09-19T09:48\">,<\/ins>\u00a0I also describe how we addressed each of them.<\/p>\n<p>The problem is that, of these three, two weren\u2019t really attacks.\u00a0 Amit Klein\u2019s discovery of the weakness of BIND\u2019s pseudo-random number generator was addressed by grafting in a better one.\u00a0 Dan Kaminsky\u2019s eponymous vulnerability was addressed\u2014at least for the time being\u2014by introducing query port randomization.\u00a0 The Internet community was incredibly fortunate that these two serious vulnerabilities were caught and reported by white hats.\u00a0 Even Eugene Kashpureff, who actually carried out his namesake attack, did it as a protest, not for direct personal gain.\u00a0 It could have been much worse.<\/p>\n<p>But that leaves people like me without a spectacular object lesson to point to, one in which sweet, silver-haired grandmothers are relieved of their life\u2019s savings.\u00a0 But no more.<\/p>\n<p>As the saying goes, \u201cBe careful what you wish for; you might get it.\u201d<\/p>\n<p><a href=\"mailto:https:\/\/twitter.com\/danyork\/status\/510493624598294529\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">A tweet from Dan York<\/a>\u00a0of the Internet Society tipped me off to\u00a0<a href=\"https:\/\/www.cert.org\/blogs\/certcc\/post.cfm?EntryID=206\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a recent blog entry from CERT\/CC describing likely cases of cache poisoning<\/a>\u00a0that repeatedly rerouted email addressed to \u201cthe biggest free webmail providers\u201d over the past year.<\/p>\n<p>CERT\/CC isn\u2019t sure of the mechanism used to poison the name servers\u2019 caches, so they\u2019re trying to enlist the help of the Internet community.\u00a0 In fact, that\u2019s why they\u2019re finally publicizing the case.\u00a0 But now we\u2019re facing the probability that email sent to or from \u201cthe biggest free webmail providers\u201d over the last year was intercepted, possibly modified without our knowledge, or just unceremoniously canned (which might be the least-bad option).<\/p>\n<p><em>Now<\/em>\u00a0<a href=\"mailto:http:\/\/www.infoworld.com\/t\/security\/why-you-need-deploy-dnssec-now-247654\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">can we please get on to the business of deploying DNSSEC<\/a>?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0 You enter your credentials, your account information, your [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":3349,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[36],"class_list":{"0":"post-3348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-threats","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Be Careful What You Wish For<\/title>\n<meta name=\"description\" content=\"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Be Careful What You Wish For\" \/>\n<meta property=\"og:description\" content=\"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-13T10:51:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Be Careful What You Wish For\",\"datePublished\":\"2014-10-13T10:51:29+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"keywords\":[\"Threats\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/\",\"name\":\"Be Careful What You Wish For\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"datePublished\":\"2014-10-13T10:51:29+00:00\",\"dateModified\":\"2020-05-06T17:31:33+00:00\",\"description\":\"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Be Careful What You Wish For\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/be-careful-what-you-wish-for\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Be Careful What You Wish For\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Be Careful What You Wish For","description":"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/","og_locale":"en_US","og_type":"article","og_title":"Be Careful What You Wish For","og_description":"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/","og_site_name":"Infoblox Blog","article_published_time":"2014-10-13T10:51:29+00:00","article_modified_time":"2020-05-06T17:31:33+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Be Careful What You Wish For","datePublished":"2014-10-13T10:51:29+00:00","dateModified":"2020-05-06T17:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","keywords":["Threats"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/","name":"Be Careful What You Wish For","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","datePublished":"2014-10-13T10:51:29+00:00","dateModified":"2020-05-06T17:31:33+00:00","description":"As part of\u00a0my standard presentation about DNS security, I describe the threat of cache poisoning:\u00a0 If a bad guy is able to inject bogus resource records into your name server\u2019s cache, he can redirect you to a visually identical replica of the web site you\u00a0think\u00a0you\u2019re going to.\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","width":660,"height":454,"caption":"Be Careful What You Wish For"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/be-careful-what-you-wish-for\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Be Careful What You Wish For"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3348"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3348\/revisions"}],"predecessor-version":[{"id":3350,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3348\/revisions\/3350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3349"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}