{"id":7108,"date":"2021-10-18T08:00:44","date_gmt":"2021-10-18T15:00:44","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7108"},"modified":"2021-10-18T09:51:06","modified_gmt":"2021-10-18T16:51:06","slug":"some-thoughts-on-dns-for-cybersecurity-awareness-month","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/","title":{"rendered":"Some Thoughts on DNS for Cybersecurity Awareness Month"},"content":{"rendered":"<p>As I\u2019m fond of saying, back in the early days of BIND name servers\u2014when I got my start in DNS\u2014they had a whopping two security features: They didn\u2019t accept responses from IP addresses they hadn\u2019t queried (colorfully known as \u201cMartian responses\u201d) and they stuck a random, 16-bit number into outbound queries and verified that the number came back in responses.<sup>[1]<\/sup><\/p>\n<p>For a very long time, DNS servers were mostly the target of attacks. There were the \u201cthree K\u2019s\u201d: cache poisoning attacks dreamed up by Eugene Kashpureff, Amit Klein and Dan Kaminsky. (I should point out that only one of them, Kashpureff\u2019s, was ever used in anger. Klein and Kaminsky discovered theirs and reported them responsibly.) There was the Li0n worm, which capitalized on a vulnerability in BIND. And of course, DNS servers of all stripes are commonly both used as amplifiers in DDoS attacks and are themselves the targets of DDoS attacks.<\/p>\n<p>Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates. We began running DNS servers in chrooted environments, using the principle of \u201cleast privilege .\u201d And we introduced Transaction Signatures (TSIG) and the DNS Security Extensions (DNSSEC) to help safeguard DNS data.<\/p>\n<p>It\u2019s only been very recently in DNS\u2019s history that we\u2019ve realized the potential of DNS servers as security tools. With the advent of Response Policy Zones in 2008, we could instrument our DNS servers to issue \u201cbenevolent lies\u201d when queried for information we knew could harm the querier and, perhaps equally importantly, we could tell when someone queried our DNS servers for data we knew was malicious.<\/p>\n<p>This begat a blossoming of companies that produce DNS threat intelligence in the form of RPZs and distribute them to subscribers, either for a fee or free of charge (Infoblox does this, as do partners including Farsight Security). Now you can plug a variety of RPZ \u201cfeeds\u201d into your DNS infrastructure and enable your DNS servers to protect your users and systems from known malware distribution sites, command-and-control infrastructure, and much more.<\/p>\n<p>RPZs are also enormously useful in helping detect infections and breaches. A laptop that sends a query for a domain name uniquely used by a particular species of malware is almost certainly infected with that malware.<\/p>\n<p>This is in addition to the ancillary role that DNS servers can play in tracking those same infections and breaches. Many security-conscious companies now archive all DNS query logs so that, if a breach is uncovered, they can determine which other systems the bad guy accessed and how he moved through the network. Without this supporting data, IT organizations may not be able to reconstruct that activity.<\/p>\n<p>The most advanced companies and vendors feed DNS telemetric data\u2014what we in the biz call \u201cpassive DNS\u201d\u2014into data stores and then run machine learning algorithms over it. Sophisticated ML algorithms can detect all kinds of malicious activity in passive DNS data: queries sent by malware\u2019s Domain Generation Algorithms (DGAs), for example, or queries for lookalike domain names masquerading as well-known, legitimate destinations.<\/p>\n<p>All of this, I think, proves that DNS is an indispensable part of a modern security toolkit, playing both an active and a supporting role in keeping networks secure and tracking malicious activity. This month\u2014Cybersecurity Awareness Month\u2014I hope that you\u2019ll take a look at your own DNS infrastructure and think about how you could enhance it to tighten your defenses.<\/p>\n<p><sup>[1]<\/sup>Also, we later found out that the number wasn\u2019t particularly random.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As I\u2019m fond of saying, back in the early days of BIND name servers\u2014when I got my start in DNS\u2014they had a whopping two security features: They didn\u2019t accept responses from IP addresses they hadn\u2019t queried (colorfully known as \u201cMartian responses\u201d) and they stuck a random, 16-bit number into outbound queries and verified that the [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":7110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,577,360,361],"class_list":{"0":"post-7108","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-cybersecurity-awareness-month","10":"tag-dns-security","11":"tag-network-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Some Thoughts on DNS for Cybersecurity Awareness Month | Infoblox<\/title>\n<meta name=\"description\" content=\"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Some Thoughts on DNS for Cybersecurity Awareness Month\" \/>\n<meta property=\"og:description\" content=\"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T15:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-18T16:51:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"Some Thoughts on DNS for Cybersecurity Awareness Month\",\"datePublished\":\"2021-10-18T15:00:44+00:00\",\"dateModified\":\"2021-10-18T16:51:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"keywords\":[\"DNS\",\"Cybersecurity awareness month\",\"DNS Security\",\"Network Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/\",\"name\":\"Some Thoughts on DNS for Cybersecurity Awareness Month | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"datePublished\":\"2021-10-18T15:00:44+00:00\",\"dateModified\":\"2021-10-18T16:51:06+00:00\",\"description\":\"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg\",\"width\":612,\"height\":350,\"caption\":\"Automatic software technology system for efficient work with the most advanced technology, business process concepts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/some-thoughts-on-dns-for-cybersecurity-awareness-month\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Some Thoughts on DNS for Cybersecurity Awareness Month\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Some Thoughts on DNS for Cybersecurity Awareness Month | Infoblox","description":"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/","og_locale":"en_US","og_type":"article","og_title":"Some Thoughts on DNS for Cybersecurity Awareness Month","og_description":"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/","og_site_name":"Infoblox Blog","article_published_time":"2021-10-18T15:00:44+00:00","article_modified_time":"2021-10-18T16:51:06+00:00","og_image":[{"width":612,"height":350,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"Some Thoughts on DNS for Cybersecurity Awareness Month","datePublished":"2021-10-18T15:00:44+00:00","dateModified":"2021-10-18T16:51:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","keywords":["DNS","Cybersecurity awareness month","DNS Security","Network Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/","url":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/","name":"Some Thoughts on DNS for Cybersecurity Awareness Month | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","datePublished":"2021-10-18T15:00:44+00:00","dateModified":"2021-10-18T16:51:06+00:00","description":"Within the DNS community, we concentrated largely on the security of DNS servers and the DNS system. BIND was enhanced to support access control lists on almost everything: queries, recursive queries, zone transfers, and dynamic updates.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/some-thoughts-on-dns-for-cybersecurity-awareness-month.jpg","width":612,"height":350,"caption":"Automatic software technology system for efficient work with the most advanced technology, business process concepts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/some-thoughts-on-dns-for-cybersecurity-awareness-month\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Some Thoughts on DNS for Cybersecurity Awareness Month"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7108"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7108\/revisions"}],"predecessor-version":[{"id":7125,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7108\/revisions\/7125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/7110"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}