{"id":4748,"date":"2009-06-10T16:35:48","date_gmt":"2009-06-10T23:35:48","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4748"},"modified":"2020-05-06T10:31:47","modified_gmt":"2020-05-06T17:31:47","slug":"answers-to-your-webinar-questions-3","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/","title":{"rendered":"Answers to Your Webinar Questions 3"},"content":{"rendered":"<p>Here are a few more answers:<\/p>\n<address>How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?<\/address>\n<p>The stub resolver doesn&#8217;t usually set the DO bit. A recursive name server with a trust anchor for a zone or following a delegation from a secure zone to a secure subzone sets the DO bit. (It makes no sense, after all, for a recursive name server to set the DO bit on a query for an RRset in a zone that isn&#8217;t signed.) So if you want to make sure that a recursive name server sets DO for queries in a particular zone, configure a trust anchor for that zone.<\/p>\n<address>Do these DNS keys come across in zone transfers?<\/address>\n<p>Yes, DNSKEY records are just normal zone data, included in zone transfers. (A DNSKEY record specifies a public key for a zone.) The private key is not published in the zone data (because then it wouldn&#8217;t be private, would it?).<\/p>\n<address>What is going on outside the U.S. with respect to DNSSEC implementation?<\/address>\n<p>A lot. Quite a few top-level zones have already been signed: Bulgaria&#8217;s .bg, Brazil&#8217;s .br, the Czech Republic&#8217;s .cz, Puerto Rico&#8217;s .pr (though I guess you could argue that that&#8217;s really part of the U.S.), Sweden&#8217;s .se, and Thailand&#8217;s .th. For a complete list, see the\u00a0<a href=\"https:\/\/itar.iana.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Interim Trust Anchor Repository<\/a>. In my personal experience, there&#8217;s also a higher level of interest in and greater understanding of DNSSEC outside of the U.S., particularly in Europe.<\/p>\n<address>How quickly did Infoblox patch the Kaminsky vulnerability?<\/address>\n<p>We had patches available to our customers the day Dan publicly announced that the vulnerability existed. Dan deserves much of the credit for this. He exercised responsible disclosure, working within the DNS community to ensure that patches were developed before the details of the vulnerability were publicized. And we&#8217;re members of\u00a0<a href=\"https:\/\/www.isc.org\/software\/guild\/bf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the BIND Forum<\/a>, so we got early notification of the existence of the vulnerability and early access to patches, and could begin integration and testing right away.<\/p>\n<address>When will Microsoft DNS Servers support DNSSEC?<\/address>\n<p>In\u00a0<a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd378952%28WS.10%29.aspx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Windows Server 2008 R2<\/a>. Note that, as Scott pointed out in the webinar, the name server doesn&#8217;t support NSEC3 or dynamic updates to signed zones.<\/p>\n<address>Is the root signed yet?<\/address>\n<p>No, but it will be before the end of the year,\u00a0<a href=\"http:\/\/www.ntia.doc.gov\/press\/2009\/OIA_DNSSEC_090603.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">according to the National Telecommunications and Information Administration<\/a>.<\/p>\n<p>More to come!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are a few more answers: How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients? The stub resolver doesn&#8217;t usually set the DO bit. A recursive name server with a trust anchor for a zone or following [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,229,16,15],"class_list":{"0":"post-4748","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnssec","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Answers to Your Webinar Questions 3<\/title>\n<meta name=\"description\" content=\"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Answers to Your Webinar Questions 3\" \/>\n<meta property=\"og:description\" content=\"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-06-10T23:35:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Answers to Your Webinar Questions 3\",\"datePublished\":\"2009-06-10T23:35:48+00:00\",\"dateModified\":\"2020-05-06T17:31:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/\"},\"wordCount\":425,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg\",\"keywords\":[\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/\",\"name\":\"Answers to Your Webinar Questions 3\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg\",\"datePublished\":\"2009-06-10T23:35:48+00:00\",\"dateModified\":\"2020-05-06T17:31:47+00:00\",\"description\":\"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg\",\"width\":660,\"height\":454,\"caption\":\"How Many IPv6 Nodes Can You Have on a LAN?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/answers-to-your-webinar-questions-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Answers to Your Webinar Questions 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Answers to Your Webinar Questions 3","description":"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/","og_locale":"en_US","og_type":"article","og_title":"Answers to Your Webinar Questions 3","og_description":"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?","og_url":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/","og_site_name":"Infoblox Blog","article_published_time":"2009-06-10T23:35:48+00:00","article_modified_time":"2020-05-06T17:31:47+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Answers to Your Webinar Questions 3","datePublished":"2009-06-10T23:35:48+00:00","dateModified":"2020-05-06T17:31:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/"},"wordCount":425,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg","keywords":["DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/","url":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/","name":"Answers to Your Webinar Questions 3","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg","datePublished":"2009-06-10T23:35:48+00:00","dateModified":"2020-05-06T17:31:47+00:00","description":"Here are a few more answers:How does a host or client request a DO bit? Or how do I force my caching name server to set DO on behalf of their clients?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Many-IPv6-Nodes-Can-You-Have-on.jpg","width":660,"height":454,"caption":"How Many IPv6 Nodes Can You Have on a LAN?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/answers-to-your-webinar-questions-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Answers to Your Webinar Questions 3"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4748"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4748\/revisions"}],"predecessor-version":[{"id":4749,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4748\/revisions\/4749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2833"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}