{"id":4703,"date":"2010-03-12T15:46:03","date_gmt":"2010-03-12T23:46:03","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4703"},"modified":"2020-05-06T10:31:46","modified_gmt":"2020-05-06T17:31:46","slug":"paul-vixie-on-dnssec-vs-dnscurve","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/","title":{"rendered":"Paul Vixie on DNSSEC vs. DNSCurve"},"content":{"rendered":"<p>When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn&#8217;t aware that Paul Vixie had already written\u00a0<a href=\"http:\/\/www.isc.org\/community\/blog\/201002\/whither-dnscurve\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">his own blog entry on the same subject<\/a>. It also explains ISC&#8217;s stance on DNSCurve. Recommended reading.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn&#8217;t aware that Paul Vixie had already written\u00a0his own blog entry on the same subject. It also explains ISC&#8217;s stance on DNSCurve. Recommended reading.<\/p>\n","protected":false},"author":178,"featured_media":2663,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,241,229,16,15],"class_list":{"0":"post-4703","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnscurve","10":"tag-dnssec","11":"tag-infoblox","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Paul Vixie on DNSSEC vs. DNSCurve<\/title>\n<meta name=\"description\" content=\"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn&#039;t aware that Paul Vixie had already written his own blog entry on the same subject.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paul Vixie on DNSSEC vs. DNSCurve\" \/>\n<meta property=\"og:description\" content=\"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn&#039;t aware that Paul Vixie had already written his own blog entry on the same subject.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-03-12T23:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Paul Vixie on DNSSEC vs. DNSCurve\",\"datePublished\":\"2010-03-12T23:46:03+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/\"},\"wordCount\":45,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"keywords\":[\"DNS\",\"DNSCurve\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/\",\"name\":\"Paul Vixie on DNSSEC vs. DNSCurve\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"datePublished\":\"2010-03-12T23:46:03+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"description\":\"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn't aware that Paul Vixie had already written his own blog entry on the same subject.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"width\":660,\"height\":454,\"caption\":\"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/paul-vixie-on-dnssec-vs-dnscurve\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paul Vixie on DNSSEC vs. DNSCurve\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Paul Vixie on DNSSEC vs. DNSCurve","description":"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn't aware that Paul Vixie had already written his own blog entry on the same subject.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/","og_locale":"en_US","og_type":"article","og_title":"Paul Vixie on DNSSEC vs. DNSCurve","og_description":"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn't aware that Paul Vixie had already written his own blog entry on the same subject.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/","og_site_name":"Infoblox Blog","article_published_time":"2010-03-12T23:46:03+00:00","article_modified_time":"2020-05-06T17:31:46+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Paul Vixie on DNSSEC vs. DNSCurve","datePublished":"2010-03-12T23:46:03+00:00","dateModified":"2020-05-06T17:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/"},"wordCount":45,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","keywords":["DNS","DNSCurve","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/","url":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/","name":"Paul Vixie on DNSSEC vs. DNSCurve","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","datePublished":"2010-03-12T23:46:03+00:00","dateModified":"2020-05-06T17:31:46+00:00","description":"When I wrote my recent blog posting on DNSSEC vs. DNSCurve, I wasn't aware that Paul Vixie had already written his own blog entry on the same subject.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","width":660,"height":454,"caption":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/paul-vixie-on-dnssec-vs-dnscurve\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Paul Vixie on DNSSEC vs. DNSCurve"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4703"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4703\/revisions"}],"predecessor-version":[{"id":4705,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4703\/revisions\/4705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}