{"id":4689,"date":"2010-06-07T12:55:49","date_gmt":"2010-06-07T19:55:49","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4689"},"modified":"2020-05-06T10:31:46","modified_gmt":"2020-05-06T17:31:46","slug":"whats-in-a-name","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/","title":{"rendered":"What&#8217;s in a Name?"},"content":{"rendered":"<p>Matt and I are fortunate to have an august group of listeners to our\u00a0<a href=\"http:\/\/www.ask-mrdns.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ask Mr. DNS Podcast<\/a>. More often than not, when we don&#8217;t know the answer to a tough DNS question and if you listen, you know that happens alarmingly\u00a0&lt;script src=&#8221;\/admin\/assets\/editors\/tinymce_3\/jscripts\/tiny_mce\/themes\/advanced\/langs\/en.js&#8221; type=&#8221;text\/javascript&#8221;&gt;&lt;\/script&gt;frequently, a listener will send us an email lifeline. Or sometimes a listener will provide insider knowledge about an issue we&#8217;ve commented on.\u00a0Matt and I feel both flattered by and enormously grateful for the attention of so many smart, accomplished people.<\/p>\n<p>I bring this up because we recently received a message from <a href=\"http:\/\/www.caida.org\/home\/seniorstaff\/kclaffy.xml\" target=\"_blank\" rel=\"noopener noreferrer\">kcclaffy<\/a>, who falls squarely into that smart, accomplished demographic.\u00a0kc works at\u00a0<a href=\"http:\/\/www.sdsc.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">SDSC, the San Diego Supercomputing Center<\/a>, which means a) she&#8217;s wicked smart and 2) she has thegood sense to live in the lovely San Diego area.\u00a0She&#8217;s done a lot of work with\u00a0<a href=\"http:\/\/www.caida.org\/home\/\" target=\"_blank\" rel=\"noopener noreferrer\">CAIDA, the Cooperative Association for Internet Data Analysis<\/a>\u00a0and whose acronym I imagine she pronounces very carefully when explaining what she does to a TSA agent including\u00a0<a href=\"http:\/\/www.caida.org\/publications\/papers\/2001\/DNSMeasRoot\/dmr.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">a fascinating study of the crazy mix of useless query traffic received by a root name server<\/a>.<\/p>\n<p>kc asked Matt and me for our opinion on an issue related to the expansion of the top-level namespace. As I&#8217;ve written, ICANN has begun adding more top-level domains.\u00a0We recently saw\u00a0<a href=\"https:\/\/community.infoblox.com\/post.cfm\/idna\" target=\"_blank\" rel=\"noopener noreferrer\">the addition of TLD&#8217;s that use IDNA to encode non-ASCII characters<\/a>, and ICANNs also planning to allow folks to register lots of the plain-Jane, ASCII variety of TLDs, too.<\/p>\n<p>kc asked our thoughts on restricting the TLDs that could be registered.\u00a0Why would ICANN do that?\u00a0Well, there are quite a few reasons:<\/p>\n<ul>\n<li>Some prospective TLD names might be offensive.\u00a0These are not just of the\u00a0<a href=\"http:\/\/www.lyricsbox.com\/george-carlin-lyrics-the-seven-words-you-can-never-say-on-tv-268qwb7.html\" target=\"_blank\" rel=\"noopener noreferrer\">Seven Words You Can&#8217;t Say on Television<\/a>\u00a0variety; some names and even single characters may be offensive to certain groups.\u00a0For example, I learned a few years ago that using the characters that represent the true name of the emperor of Japan is considered blasphemous by many Japanese.<\/li>\n<li>Some prospective TLD names might interfere with DNS infrastructure in some way. How?\u00a0Well, here&#8217;s one:\u00a0Some stub resolvers aren&#8217;t smart enough to recognize IP addresses when they&#8217;re handed to them and try to look them up as domain names.\u00a0They&#8217;ll wastefully send a query to a recursive name server for the A record for the domain name 10.0.0.1, for example. (In the root name server study kc herself worked on, the researchers found a remarkable percentage of the queries to the roots were these A-for-A queries.)\u00a0Today, of course, such aquery is answered with No such domain, and presumably the resolver either returns that error to the application or realizes the error of its ways and uses the address as an address. Imagine the havoc that a TLD registrant could wreak, then, if he we&#8217;re allowed to register 1 as a TLD. He could answer that query for the A record for 10.0.0.1 with another address.\u00a0I shudder to think of the consequences.<\/li>\n<li>The search list can also generate queries in (what are currently) nonexistent TLDs. For example, when I ran hp.com, we had a corp.hp.com subdomain that served our corporate offices in Palo Alto.\u00a0Since almost every stub resolver at HP had hp.com in its search list by default, we could instruct employees to access a server with a name like winnie.corp, knowing the search list would canonicalize that string to the servers real domain name, winnie.corp.hp.com.\u00a0Nowadays, however, modern resolvers typically look up any string that contains a dot as-is before applying the search list, meaning that users typing winnie.corp will actually cause a query for winnie.corp before the resolver ever gets around to trying winnie.corp.hp.com.\u00a0So if someone were to register corp as a TLD, well, that could have surprising results.<\/li>\n<\/ul>\n<p>I&#8217;m sure there are other possibilities I&#8217;m not considering, which is actually why I&#8217;m writing this blog entry.\u00a0What other issues can you see with opening up registration of TLDs? What potential conflicts are significant enough or threatening enough to warrant denying a registration? Add your thoughts as a comment and I&#8217;ll collect the best and forward them along to KC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Matt and I are fortunate to have an august group of listeners to our\u00a0Ask Mr. DNS Podcast. More often than not, when we don&#8217;t know the answer to a tough DNS question and if you listen, you know that happens alarmingly\u00a0&lt;script src=&#8221;\/admin\/assets\/editors\/tinymce_3\/jscripts\/tiny_mce\/themes\/advanced\/langs\/en.js&#8221; type=&#8221;text\/javascript&#8221;&gt;&lt;\/script&gt;frequently, a listener will send us an email lifeline. Or sometimes a listener [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":1149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,16,15,223],"class_list":{"0":"post-4689","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-infoblox","10":"tag-security","11":"tag-tld","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What&#039;s in a Name?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s in a Name?\" \/>\n<meta property=\"og:description\" content=\"Matt and I are fortunate to have an august group of listeners to our\u00a0Ask Mr. DNS Podcast. More often than not, when we don&#8217;t know the answer to a tough DNS question and if you listen, you know that happens alarmingly\u00a0&lt;script src=&#8221;\/admin\/assets\/editors\/tinymce_3\/jscripts\/tiny_mce\/themes\/advanced\/langs\/en.js&#8221; type=&#8221;text\/javascript&#8221;&gt;&lt;\/script&gt;frequently, a listener will send us an email lifeline. Or sometimes a listener [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-07T19:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"What&#8217;s in a Name?\",\"datePublished\":\"2010-06-07T19:55:49+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/\"},\"wordCount\":738,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"keywords\":[\"DNS\",\"Infoblox\",\"Security\",\"TLD\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/\",\"name\":\"What's in a Name?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"datePublished\":\"2010-06-07T19:55:49+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/whats-in-a-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What&#8217;s in a Name?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What's in a Name?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/","og_locale":"en_US","og_type":"article","og_title":"What's in a Name?","og_description":"Matt and I are fortunate to have an august group of listeners to our\u00a0Ask Mr. DNS Podcast. More often than not, when we don&#8217;t know the answer to a tough DNS question and if you listen, you know that happens alarmingly\u00a0&lt;script src=&#8221;\/admin\/assets\/editors\/tinymce_3\/jscripts\/tiny_mce\/themes\/advanced\/langs\/en.js&#8221; type=&#8221;text\/javascript&#8221;&gt;&lt;\/script&gt;frequently, a listener will send us an email lifeline. Or sometimes a listener [&hellip;]","og_url":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/","og_site_name":"Infoblox Blog","article_published_time":"2010-06-07T19:55:49+00:00","article_modified_time":"2020-05-06T17:31:46+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"What&#8217;s in a Name?","datePublished":"2010-06-07T19:55:49+00:00","dateModified":"2020-05-06T17:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/"},"wordCount":738,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","keywords":["DNS","Infoblox","Security","TLD"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/","url":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/","name":"What's in a Name?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","datePublished":"2010-06-07T19:55:49+00:00","dateModified":"2020-05-06T17:31:46+00:00","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","width":660,"height":454,"caption":"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/whats-in-a-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What&#8217;s in a Name?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4689"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4689\/revisions"}],"predecessor-version":[{"id":4690,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4689\/revisions\/4690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1149"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}