{"id":4714,"date":"2010-01-14T16:43:09","date_gmt":"2010-01-15T00:43:09","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4714"},"modified":"2020-05-06T10:31:46","modified_gmt":"2020-05-06T17:31:46","slug":"quantifying-dnssec-overhead","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/","title":{"rendered":"Quantifying DNSSEC Overhead"},"content":{"rendered":"<p>I realized last week that I&#8217;d never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC. I decided to trace the recursive resolution of an RRset in a signed top-level domain, since I wanted to see the &#8220;chain of trust&#8221; in action. I knew .org was signed and figured isc.org (the Internet Systems Consortium&#8217;s domain) would probably already have a DS (Delegation Signer) record. Sure enough, a quick query using dig verified that:<\/p>\n<p>% dig ds isc.org. +dnssec<\/p>\n<p>I chose\u00a0<a href=\"http:\/\/www.isc.org\/IN\/A\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org\/IN\/A<\/a>\u00a0as the RRset I&#8217;d look up.<\/p>\n<p>I started by clearing the cache on my BIND name server (running BIND 9.7.0rc1), so that I could watch my name server query the .org name servers and see the records returned:<\/p>\n<p>% sudo rndc flush<\/p>\n<p>Then I fired up tcpdump to capture DNS traffic:<\/p>\n<p>% sudo tcpdump -w\u00a0<a href=\"http:\/\/www.isc.org.cap\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org.cap<\/a>\u00a0port 53<\/p>\n<p>And then sent the query:<\/p>\n<p>% dig\u00a0<a href=\"http:\/\/www.isc.org.\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org.<\/a>\u00a0+dnssec<\/p>\n<p>This turned out not to capture enough data when the responses were long, so I refined my tcpdump command by specifying the option &#8220;-s 4096&#8221;. Then I found out I wasn&#8217;t catching all fragments of really long responses, so I dumped the &#8220;port 53&#8221; argument (since fragments don&#8217;t carry port information) and used Wireshark to filter out all the non-DNS traffic. Now I actually had a complete record of the queries my name server sent and the responses it received.<\/p>\n<p>The results surprised me: I saw five queries and five resulting responses, when resolution of a domain name from an unsigned zone, such as\u00a0<a href=\"http:\/\/www.cert.org%2C\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.cert.org,<\/a>\u00a0would usually require at most just three roundtrips. And, of course, the signed responses were much larger than most unsigned responses.<\/p>\n<p>This isn&#8217;t a perfect comparison&#8211;isc.org has four authoritative name servers, while cert.org only has two, which would make isc.org responses larger even without DNSSEC&#8211;but it gives you a sense of how much more traffic DNSSEC will use: In this case, over 6.5 times as much!<\/p>\n<p>Now, not all resolutions of RRsets in signed zones will require this many roundtrips: Once our name server has validated the signature of\u00a0<a href=\"http:\/\/www.isc.org%27s\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org&#8217;s<\/a>\u00a0A record, as well as the public keys for isc.org and org, it&#8217;ll cache those results. Still, even the individual response that contained\u00a0<a href=\"http:\/\/www.isc.org%27s\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.isc.org&#8217;s<\/a>\u00a0A record (Response 3) was a whopping 17 times as large as the response containing the address of\u00a0<a href=\"http:\/\/www.cert.org%2C\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.cert.org,<\/a>\u00a0and that record&#8217;s TTL is just ten minutes, so we might have to look it up frequently.<\/p>\n<p>Of course, the workload involved in sending and receiving those UDP datagrams pales in comparison with all the hashing and decryption that needs to be done to validate the records received. Here&#8217;s what those five responses contained:<\/p>\n<ul>\n<li>Response 1: 6 NS records, 6 A records, 6 AAAA records<\/li>\n<li>Response 2: 4 NS records, 2 DS records, 1 RRSIG record<\/li>\n<li>Response 3: 4 A records, 1 AAAA record, 4 NS records, 12 RRSIG records<\/li>\n<li>Response 4: 4 DNSKEY records, 14 RRSIG records, 4 NS records, 3 A records, 1 AAAA record,<\/li>\n<li>Response 5: 4 DNSKEY records, 2 RRSIG records, 6 NS records, 1 RRSIG record, 2 A records, 2 AAAA records<\/li>\n<\/ul>\n<p>Now, some of these are duplicates, and some RRSIG records aren&#8217;t needed in the validation process, but each RRSIG record requires one cryptographic hashing operation and one asymmetric encryption operation to check, and each DS record requires one cryptographic hashing operation to check. Compare that with the resolution of\u00a0<a href=\"http:\/\/www.cert.org%2C\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.cert.org,<\/a>\u00a0which would require all of, er, zero hashing operations and no asymmetric encryption operations.<\/p>\n<p>As a consequence, we should expect to see CPU overhead go up dramatically as our name servers start handling more DNSSEC-signed responses. After you configure validation, you&#8217;d be well advised to begin monitoring your name server&#8217;s CPU utilization, too, so you aren&#8217;t caught by surprise when your recursive name server pegs the processor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I realized last week that I&#8217;d never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC. I decided to trace the recursive resolution of an RRset in a signed top-level domain, since I wanted to see the &#8220;chain of trust&#8221; [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":3349,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,229,16,15],"class_list":{"0":"post-4714","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnssec","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quantifying DNSSEC Overhead<\/title>\n<meta name=\"description\" content=\"I realized last week that I&#039;d never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantifying DNSSEC Overhead\" \/>\n<meta property=\"og:description\" content=\"I realized last week that I&#039;d never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-15T00:43:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Quantifying DNSSEC Overhead\",\"datePublished\":\"2010-01-15T00:43:09+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"keywords\":[\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/\",\"name\":\"Quantifying DNSSEC Overhead\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"datePublished\":\"2010-01-15T00:43:09+00:00\",\"dateModified\":\"2020-05-06T17:31:46+00:00\",\"description\":\"I realized last week that I'd never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Be Careful What You Wish For\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/quantifying-dnssec-overhead\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantifying DNSSEC Overhead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quantifying DNSSEC Overhead","description":"I realized last week that I'd never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/","og_locale":"en_US","og_type":"article","og_title":"Quantifying DNSSEC Overhead","og_description":"I realized last week that I'd never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/","og_site_name":"Infoblox Blog","article_published_time":"2010-01-15T00:43:09+00:00","article_modified_time":"2020-05-06T17:31:46+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Quantifying DNSSEC Overhead","datePublished":"2010-01-15T00:43:09+00:00","dateModified":"2020-05-06T17:31:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/"},"wordCount":652,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","keywords":["DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/","url":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/","name":"Quantifying DNSSEC Overhead","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","datePublished":"2010-01-15T00:43:09+00:00","dateModified":"2020-05-06T17:31:46+00:00","description":"I realized last week that I'd never actually traced all the queries sent and responses received by a recursive name server resolving a domain name in a zone signed with DNSSEC.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1.jpg","width":660,"height":454,"caption":"Be Careful What You Wish For"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/quantifying-dnssec-overhead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Quantifying DNSSEC Overhead"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4714"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4714\/revisions"}],"predecessor-version":[{"id":4715,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4714\/revisions\/4715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3349"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}