{"id":4610,"date":"2011-08-31T11:44:00","date_gmt":"2011-08-31T18:44:00","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4610"},"modified":"2020-05-06T10:31:44","modified_gmt":"2020-05-06T17:31:44","slug":"a-pretty-lively-week-for-a-middle-aged-protocol","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/","title":{"rendered":"A Pretty Lively Week for a Middle-Aged Protocol"},"content":{"rendered":"<p>Boy, in just the last week, I&#8217;ve seen a number of notable developments in the world of DNS. You&#8217;d think that, after 25+ years, activity would die down a little!<\/p>\n<p>First, OpenDNS and Google Public DNS announced that they&#8217;re going to start trials of the extension described in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/draft-vandergaast-edns-client-subnet-00\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">draft-vandergaast-edns-client-subnet-00<\/a>. Basically, that Internet Draft proposes a new EDNS0 option that would allow a recursive name server to include the IP address of the original stub resolver in the queries it sends to authoritative name servers. While at first blush that may not make sense &#8211; why would an authoritative name server care what the original querier&#8217;s IP address was? &#8211; recall that &#8220;authoritative name servers&#8221; are in many cases fancy global server load balancers run by content delivery networks, and that they want to decide where to direct you based on whereabouts on the Internet you live. Until now, if you used big recursive name servers in the sky such as OpenDNS or Google Public DNS, you&#8217;d always look to a CDN like you were coming from whichever anycast instance you&#8217;d happened to be directed to. Now you can actually get a response that&#8217;s meant for you.<\/p>\n<p>There&#8217;s a little bit of controversy over this because the trials are using an EDNS0 &#8220;code point&#8221; that isn&#8217;t officially allocated for this purpose. There is no such code point yet, because to get one the folks behind the proposal need to have their Internet Draft advanced to an RFC. You can&#8217;t blame the authors for wanting to get their trial going, but we can&#8217;t just be grabbing any old code points we want, can we? That way lies madness.<\/p>\n<p>In other DNS news, a Sri Lankan branch of Anonymous claims to have hacked the name servers of Apple, Microsoft and Symantec. The press was a little vague about what actually happened, referring to it as a &#8220;DNS Cache Snoop Poisoning&#8221; attack, which sounds like a portmanteau of two very different DNS attacks to me. I found\u00a0<a href=\"http:\/\/pastebin.com\/FfDALSq8\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the group&#8217;s claims online<\/a>\u00a0and what they actually did seems innocuous: They tried reverse-mapping IP addresses in networks registered to the companies and, when they got results, they printed them. So the end result of their shenanigans appears to be a snippet of the old host table; for example:<\/p>\n<p>17.254.3.35 guidejp2-n.apple.com<\/p>\n<p>17.254.3.31 guide1-n.apple.com<\/p>\n<p>17.254.3.26 rsis-ws01.apple.com<\/p>\n<p>17.254.3.22 gcrmbzp11.apple.com<\/p>\n<p>There&#8217;s no evidence that the companies&#8217; name servers or the hosts identified were breached. As an AAPL shareholder, I&#8217;m not going to sweat this.<\/p>\n<div>And that&#8217;s just some of the DNS news over the last week (Paxfire and NXDOMAIN redirection lawsuits, anyone?). I can&#8217;t wait to see what next week brings.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Boy, in just the last week, I&#8217;ve seen a number of notable developments in the world of DNS. You&#8217;d think that, after 25+ years, activity would die down a little! First, OpenDNS and Google Public DNS announced that they&#8217;re going to start trials of the extension described in\u00a0draft-vandergaast-edns-client-subnet-00. Basically, that Internet Draft proposes a new [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":1892,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,16,15],"class_list":{"0":"post-4610","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Pretty Lively Week for a Middle-Aged Protocol<\/title>\n<meta name=\"description\" content=\"Boy, in just the last week, I&#039;ve seen a number of notable developments in the world of DNS. You&#039;d think that, after 25+ years, activity would die down a little!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Pretty Lively Week for a Middle-Aged Protocol\" \/>\n<meta property=\"og:description\" content=\"Boy, in just the last week, I&#039;ve seen a number of notable developments in the world of DNS. You&#039;d think that, after 25+ years, activity would die down a little!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-31T18:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"A Pretty Lively Week for a Middle-Aged Protocol\",\"datePublished\":\"2011-08-31T18:44:00+00:00\",\"dateModified\":\"2020-05-06T17:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/\",\"name\":\"A Pretty Lively Week for a Middle-Aged Protocol\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"datePublished\":\"2011-08-31T18:44:00+00:00\",\"dateModified\":\"2020-05-06T17:31:44+00:00\",\"description\":\"Boy, in just the last week, I've seen a number of notable developments in the world of DNS. You'd think that, after 25+ years, activity would die down a little!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14-1.jpg\",\"width\":600,\"height\":413,\"caption\":\"Podcast Episode #5: Carrier Grade NAT, Security, and IPv6\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/a-pretty-lively-week-for-a-middle-aged-protocol\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Pretty Lively Week for a Middle-Aged Protocol\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Pretty Lively Week for a Middle-Aged Protocol","description":"Boy, in just the last week, I've seen a number of notable developments in the world of DNS. You'd think that, after 25+ years, activity would die down a little!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/","og_locale":"en_US","og_type":"article","og_title":"A Pretty Lively Week for a Middle-Aged Protocol","og_description":"Boy, in just the last week, I've seen a number of notable developments in the world of DNS. You'd think that, after 25+ years, activity would die down a little!","og_url":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/","og_site_name":"Infoblox Blog","article_published_time":"2011-08-31T18:44:00+00:00","article_modified_time":"2020-05-06T17:31:44+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"A Pretty Lively Week for a Middle-Aged Protocol","datePublished":"2011-08-31T18:44:00+00:00","dateModified":"2020-05-06T17:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/"},"wordCount":470,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","keywords":["DNS","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/","url":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/","name":"A Pretty Lively Week for a Middle-Aged Protocol","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","datePublished":"2011-08-31T18:44:00+00:00","dateModified":"2020-05-06T17:31:44+00:00","description":"Boy, in just the last week, I've seen a number of notable developments in the world of DNS. You'd think that, after 25+ years, activity would die down a little!","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14-1.jpg","width":600,"height":413,"caption":"Podcast Episode #5: Carrier Grade NAT, Security, and IPv6"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/a-pretty-lively-week-for-a-middle-aged-protocol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"A Pretty Lively Week for a Middle-Aged Protocol"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4610"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4610\/revisions"}],"predecessor-version":[{"id":4611,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4610\/revisions\/4611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1892"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}