{"id":4712,"date":"2010-02-01T16:39:40","date_gmt":"2010-02-02T00:39:40","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4712"},"modified":"2020-05-06T10:31:46","modified_gmt":"2020-05-06T17:31:46","slug":"quantifying-dnssec-overhead-part-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/","title":{"rendered":"Quantifying DNSSEC Overhead, Part 2"},"content":{"rendered":"<p>Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD. This time, I want to look at the actual computation involved.<\/p>\n<p>This isn&#8217;t really a comparison, of course, because in the case of an unsigned zone, there&#8217;s no heavy computing involved: The nameserver simply reads responses from the network and unmarshals their content into discrete resource records&#8211;simple! In the case of a signed zone under a signed TLD, there&#8217;s lots of work to do.<\/p>\n<p>Let&#8217;s start with a count of the unique records returned and their types. We need to be a little careful here, though, since sometimes identical records are returned in more than one response. Here&#8217;s our census:<\/p>\n<ol>\n<li>6 NS RRsfor org<\/li>\n<li>6 corresponding A RRs (the org name servers&#8217; addresses)<\/li>\n<li>6 corresponding AAAA RRs (the org name servers&#8217; IPv6 addresses)<\/li>\n<li>4 NS RRsfor isc.org<\/li>\n<li>2 corresponding DS RRs<\/li>\n<li>1 RRSIG RR(covering the DS RRs)<\/li>\n<li>3 corresponding A RRs (the isc.org name servers&#8217; addresses)<\/li>\n<li>1 A RR (theanswer!)<\/li>\n<li>2 RRSIG RRs(covering the A RR)<\/li>\n<li>4 NS RRsfor isc.org (same as in 4.)<\/li>\n<li>2 RRSIG RRs(covering the NS RRs)<\/li>\n<li>3 corresponding A RRs (same as in 7.)<\/li>\n<li>1 corresponding AAAA RR<\/li>\n<li>8 RRSIGRRs, covering the name servers&#8217; 3 A RRs and 1 AAAA RR)<\/li>\n<li>4 DNSKEYRRs for isc.org<\/li>\n<li>4 RRSIG RRs(covering the DNSKEY RRs)<\/li>\n<li>4 NS RRs(same as in 4.)<\/li>\n<li>2 RRSIG RRs(same as in 11.)<\/li>\n<li>3 corresponding A RRs (same as in 12.)<\/li>\n<li>1 corresponding AAAA RR (same as in 13.)<\/li>\n<li>8 RRSIG RRs(same as in 14.)<\/li>\n<li>4 DNSKEYRRs for org<\/li>\n<li>2 RRSIG RRs(covering the DNSKEY RRs)<\/li>\n<li>6 NS RRsfor org (same as in 1.)<\/li>\n<li>1 RRSIG RR(covering the NS RRs)<\/li>\n<li>2 corresponding A RRs (subset of 2.)<\/li>\n<li>2 corresponding AAAA RRs (subset of 3.)<\/li>\n<\/ol>\n<p>Whew! Now, to keep things simple, let&#8217;s just say:<\/p>\n<ul>\n<li>Each DS RR requires one cryptographic hashing operation to check (because you run the corresponding DNSKEY RR though SHA-1 or SHA-256 to compare it to the value in the DS record)<\/li>\n<li>Each RRSIG RR requires one hashing operation and one asymmetric decryption operation to validate (because you run the RRset you&#8217;re validating through SHA-1 and then decrypt the ostensible signature from the RRSIG RR and make sure they match)<\/li>\n<\/ul>\n<p>That means that, in total, we&#8217;ll need 22 hashing operations and an even 20 asymmetric decryption operations to completely validate\u00a0<a href=\"http:\/\/www.isc.org%27s\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org&#8217;s<\/a>\u00a0A RR and its chain of trust.Yikes! (This is actually a worst case, since it assumes that we validate all the RRSIG records, when in fact we likely don&#8217;t need to. For example, checking the signature of any one isc.org DNSKEY RR covering the full set of keys is enough to validate all four keys.)<\/p>\n<p>Luckily, our name server will cache the results of the validation. If we were to subsequently look up ftp.isc.org&#8217;s A RR, the name server would only have a single hashing operation and a single decryption to do, which now doesn&#8217;t seem bad at all.<\/p>\n<p>This is the reason I&#8217;ve recommended that organizations deploying DNSSEC watch the CPU load on their recursive name servers carefully: As the proportion of responses that are signed increases, so will the load on their recursors.<\/p>\n<p>Ultimately, though, the ever-increasing speed of processors and networks will trump the burden DNSSEC adds. Years from now &#8211; assuming DNSSEC becomes widely deployed &#8211; we&#8217;ll look back at our concerns about the overhead of DNSSEC and chuckle. I hope.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD. This time, I want to look at the actual computation involved. This isn&#8217;t really a comparison, of course, because [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,229,16,15],"class_list":{"0":"post-4712","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnssec","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quantifying DNSSEC Overhead, Part 2<\/title>\n<meta name=\"description\" content=\"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantifying DNSSEC Overhead, Part 2\" \/>\n<meta property=\"og:description\" content=\"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-02-02T00:39:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Quantifying DNSSEC Overhead, Part 2\",\"datePublished\":\"2010-02-02T00:39:40+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/\"},\"wordCount\":583,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/proxy-dns-malware.jpg\",\"keywords\":[\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/\",\"name\":\"Quantifying DNSSEC Overhead, Part 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/proxy-dns-malware.jpg\",\"datePublished\":\"2010-02-02T00:39:40+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"description\":\"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/proxy-dns-malware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/proxy-dns-malware.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantifying DNSSEC Overhead, Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quantifying DNSSEC Overhead, Part 2","description":"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Quantifying DNSSEC Overhead, Part 2","og_description":"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/","og_site_name":"Infoblox Blog","article_published_time":"2010-02-02T00:39:40+00:00","article_modified_time":"2020-05-06T17:31:46+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Quantifying DNSSEC Overhead, Part 2","datePublished":"2010-02-02T00:39:40+00:00","dateModified":"2020-05-06T17:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/"},"wordCount":583,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg","keywords":["DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/","url":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/","name":"Quantifying DNSSEC Overhead, Part 2","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg","datePublished":"2010-02-02T00:39:40+00:00","dateModified":"2020-05-06T17:31:46+00:00","description":"Last time, I compared the number and size of the response messages involved in resolving a record in an unsigned zone to those involved in resolving a record in a signed zone under a signed TLD.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/proxy-dns-malware.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Quantifying DNSSEC Overhead, Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4712"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4712\/revisions"}],"predecessor-version":[{"id":4713,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4712\/revisions\/4713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2206"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}