{"id":4638,"date":"2011-01-05T12:45:50","date_gmt":"2011-01-05T20:45:50","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4638"},"modified":"2020-05-06T10:31:44","modified_gmt":"2020-05-06T17:31:44","slug":"2011-make-or-break-for-dnssec","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/","title":{"rendered":"2011: Make or Break for DNSSEC"},"content":{"rendered":"<p style=\"font-weight: 300;\">After we published\u00a0<a href=\"http:\/\/dns.measurement-factory.com\/surveys\/201010\/\">the results of the 2010 DNS Survey<\/a>\u00a0last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.\u00a0Many asked how long I felt it would take until we saw widespread adoption of DNSSEC.\u00a0The answer depends, of course, on how you define widespread, and frankly, I&#8217;m not sure any prediction I might hazard is particularly valuable.\u00a0But in thinking about the question, I realized that I do believe strongly that 2011 is a make-or-break year for DNSSEC.<\/p>\n<p style=\"font-weight: 300;\">In just a couple of months,\u00a0<a href=\"http:\/\/domainincite.com\/verisign-to-deploy-dnssec-in-com-next-march\/\">when VeriSign signs .com<\/a>, nearly all of the major impediments to broad implementation of DNSSEC will be gone.\u00a0The root zone and the three big gTLDs, .com, .net and .org, will have been signed.\u00a0Many European ccTLDs have already been signed.\u00a0Stable implementations of DNSSEC are available in multiple name servers, including recursive (<a href=\"http:\/\/www.isc.org\/software\/bind\">BIND<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.unbound.net\/\">Unbound<\/a>) and authoritative (BIND and\u00a0<a href=\"http:\/\/www.nlnetlabs.nl\/projects\/nsd\/\">NSD<\/a>).\u00a0Commercial products, including\u00a0<a href=\"http:\/\/www.infoblox.com\/en\/solutions\/technology-solutions\/dnssec.html\">Infoblox&#8217;s<\/a>, support and simplify DNSSEC, too.\u00a0Documentation on\u00a0<a href=\"http:\/\/www.dnssec.net\/\">DNSSEC<\/a>\u00a0is widely available, in the form of\u00a0<a href=\"http:\/\/www.dnssec.net\/presentations\">presentations<\/a>,\u00a0<a href=\"http:\/\/www.dnssec.net\/rfc\">RFCs<\/a>, and even\u00a0<a href=\"http:\/\/oreilly.com\/catalog\/9780596100575\">books<\/a>.<\/p>\n<p style=\"font-weight: 300;\">And a wide variety of people and organizations have thrown their weight behind DNSSEC. Registries, including\u00a0<a href=\"http:\/\/www.nic.uk\/\">Nominet<\/a>,\u00a0<a href=\"https:\/\/www.sidn.nl\/\">SIDN<\/a>,\u00a0<a href=\"http:\/\/switch.ch\/\">SWITCH<\/a>, and\u00a0<a href=\"http:\/\/www.verisigninc.com\/\">VeriSign<\/a>, are pushing DNSSEC.\u00a0In addition to preaching the importance of DNSSEC, Dan Kaminsky released\u00a0<a href=\"http:\/\/dankaminsky.com\/phreebird\/\">Phreebird<\/a>, which he calls Zero Configuration DNSSEC:\u00a0a DNSSEC proxy that can front-end any DNS server and supplement its responses with DNSSEC records.\u00a0<a href=\"http:\/\/www.practicesafedns.org\/\">Vint Cerf and Steve Crocker are vocal in their support for DNSSEC<\/a>.<\/p>\n<p style=\"font-weight: 300;\">If this isnt enough to spur substantial deployment of DNSSEC, there&#8217;s only regulation and litigation left.<\/p>\n<p style=\"font-weight: 300;\">Currently, only\u00a0<a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/fy2008\/m08-23.pdf\">the U.S. Federal government is mandated to deploy DNSSEC<\/a>.\u00a0But that could change.\u00a0Sens. Lieberman, Collins and Carper introduced\u00a0<a href=\"http:\/\/thehill.com\/blogs\/hillicon-valley\/technology\/102887--cybersecurity-legislation-that-would-put-dhs-in-charge-of-civilian-cybersecurity-to-get-hearing\">a bill last year that would make the Department of Homeland Security responsible for protecting civi&#8230;<\/a>.\u00a0And a gentleman who attended an event I hosted last year in Chicago and is a member of a PCI working group said the organization is strongly considering requiring DNSSEC as a condition for\u00a0<a href=\"http:\/\/www.pcicomplianceguide.org\/pcifaqs.php\">PCI compliance<\/a>.<\/p>\n<p style=\"font-weight: 300;\">Even more intimidating is the prospect of litigation.\u00a0Given the lack of good excuses for not deploying DNSSEC, and the number of learned folks touting it as a best practice, those forgoing implementation are taking a risk.\u00a0I think its simply a matter of time before some enterprising attorney decides to make a test case out of someone&#8217;s falling victim to a cache poisoning attack, and &#8212; looking for deep pockets &#8212; goes after the bank\/online merchant\/brokerage that didn&#8217;t care enough about their customers to sign their zone and the ISP that didn&#8217;t care enough to validate signed responses.<\/p>\n<p style=\"font-weight: 300;\">Maybe its naive of me to hope that we can do the right thing and deploy DNSSEC using only carrots and no sticks, but I still believe we can.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After we published\u00a0the results of the 2010 DNS Survey\u00a0last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.\u00a0Many asked how long I felt it would take until we saw widespread adoption of DNSSEC.\u00a0The answer depends, of course, on how you define widespread, and frankly, I&#8217;m not sure [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2663,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,229,16,15],"class_list":{"0":"post-4638","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnssec","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2011: Make or Break for DNSSEC<\/title>\n<meta name=\"description\" content=\"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2011: Make or Break for DNSSEC\" \/>\n<meta property=\"og:description\" content=\"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-05T20:45:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"2011: Make or Break for DNSSEC\",\"datePublished\":\"2011-01-05T20:45:50+00:00\",\"dateModified\":\"2020-05-06T17:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/\"},\"wordCount\":478,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"keywords\":[\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/\",\"name\":\"2011: Make or Break for DNSSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"datePublished\":\"2011-01-05T20:45:50+00:00\",\"dateModified\":\"2020-05-06T17:31:44+00:00\",\"description\":\"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"width\":660,\"height\":454,\"caption\":\"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/2011-make-or-break-for-dnssec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2011: Make or Break for DNSSEC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2011: Make or Break for DNSSEC","description":"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/","og_locale":"en_US","og_type":"article","og_title":"2011: Make or Break for DNSSEC","og_description":"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/","og_site_name":"Infoblox Blog","article_published_time":"2011-01-05T20:45:50+00:00","article_modified_time":"2020-05-06T17:31:44+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"2011: Make or Break for DNSSEC","datePublished":"2011-01-05T20:45:50+00:00","dateModified":"2020-05-06T17:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/"},"wordCount":478,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","keywords":["DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/","url":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/","name":"2011: Make or Break for DNSSEC","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","datePublished":"2011-01-05T20:45:50+00:00","dateModified":"2020-05-06T17:31:44+00:00","description":"After we published the results of the 2010 DNS Survey last year, I spoke with reporters from several technical magazines and web sites about what the numbers meant.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","width":660,"height":454,"caption":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/2011-make-or-break-for-dnssec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"2011: Make or Break for DNSSEC"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4638"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4638\/revisions"}],"predecessor-version":[{"id":4640,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4638\/revisions\/4640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}