{"id":9449,"date":"2024-01-31T08:00:24","date_gmt":"2024-01-31T16:00:24","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9449"},"modified":"2024-03-19T22:09:01","modified_gmt":"2024-03-20T06:09:01","slug":"securing-dns-and-dhcp-best-practices-to-prevent-spoofing","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/","title":{"rendered":"Securing DNS and DHCP: Best Practices to Prevent Spoofing"},"content":{"rendered":"<h3>Introduction<\/h3>\n<p>How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of\u00a0 network connectivity for a modern business. Without question, secure, reliable DDI is crucial to almost every function in today\u2019s modern world; some might consider it as important as water or electricity in their day-to-day lives. Due to how critical DDI is, a proper security-first DDI solution with proper configuration is key. A correctly configured DDI infrastructure can help avoid attacks, data breaches, and outages, all of which mean lost money and reputation for a business.\u00a0<\/p>\n<p>DDI is often forgotten about, despite its criticality to business functions. DDI may only be considered when IT professionals update the occasional DHCP range or perhaps create a DNS record for a newly provisioned device. When something goes wrong, that\u2019s when everyone thinks about DDI; not only is it a massive inconvenience, the business is likely losing money.<\/p>\n<p>Akamai recently put a spotlight on a long-known issue among DDI professionals that can arise when using Microsoft Windows Server as both your Domain Controller and DDI provider. The blog series can be found <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/spoofing-dns-by-abusing-dhcp\">here<\/a>. Out of curiosity, I wanted to see how easy it was to reproduce their findings, and it was shockingly easy.<\/p>\n<p>If you\u2019re using Microsoft servers as your primary DDI solution, there are likely vulnerabilities in your DDI infrastructure that you haven\u2019t considered. If you are running DNS and DHCP on Domain Controllers, these vulnerabilities become even more risky, providing a potential opening for attackers to gain complete access to your Active Directory domain. Your chances of having an outage, or even the likelihood of a successful attack on your infrastructure increase dramatically. Unfortunately, insecure default configurations and a \u201cset it and forget it\u201d mentality around DDI are commonplace. In some situations, DDI services may be configured, and left sitting untouched for years. This can be harmful as DDI is dynamic by nature, as clients, and hosts move around your networks. A lack of attention towards the maintenance and security of DDI is dangerous and makes your Microsoft Servers attractive targets for malicious actors.<\/p>\n<p>In this blog, we\u2019ll take a closer look at a potential attack vector involving DDNS updates via DHCP, and how a secure, modern DDI solution from Infoblox can protect your critical infrastructure against this and many other potential vulnerabilities.<\/p>\n<h3>DDNS and DDNS updates via DHCP<\/h3>\n<p>Dynamic DNS (DDNS) is used to automatically update DNS records in real time. When properly implemented, DDNS can be a useful tool that saves time for administrators and reduces errors caused by manual processes. DDNS updates can also be sent by DHCP servers on behalf of the DHCP client. DHCP <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc4702.html\">Option 81<\/a>, or the FQDN option, facilitates this process. When a DHCP change occurs, clients can request that a fully qualified domain name (FQDN) be created or updated on their behalf, or the DHCP server can be configured to do this for all clients, regardless of whether they request it. While this appears to be a time-saving feature, with the default configuration, it is inherently insecure. By default, the Microsoft DHCP Server doesn\u2019t verify <i>which<\/i> device is updating <i>which<\/i> record. Furthermore, the Microsoft DHCP Server that is requesting the update to the DNS record uses its own machine account for authentication, giving it access to records that should be outside the scope of DHCP and DDNS.<\/p>\n<h3>Spoofing DHCP Requests and Rewriting DNS Records<\/h3>\n<p>I\u2019ve deployed a new, unprovisioned, Microsoft Windows Server 2022 in my lab and tested this feature of the Microsoft DHCP Server.\u00a0 It&#8217;s shocking how easy it is to rewrite records\u2014any record, whether belonging to a\u00a0 server, random PC, or the Domain Controller itself. Let&#8217;s look at a couple common configuration issues found with the default settings on my new Microsoft server. In the screenshot below, we can see an option to configure Name Protection. Enabling Name Protection adds some security, preventing a record for one device from being overwritten by a different device. Unfortunately, it is disabled by default (and often left that way), as in the screenshot below.<\/p>\n<p style=\"text-align:center;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-one-v2.png\" \/><\/p>\n<p>Furthermore, in Microsoft Server\u2019s DNS settings, a setting named Dynamic Updates is set to <i>Secure only<\/i> by default.\u00a0 The text below this setting could mislead IT professionals into thinking that setting this setting as <i>Secure only<\/i> would offer name protection of DNS records by other clients, however, this is not the case. When set to <i>Secure only<\/i> this setting only allows authorized clients to make changes to a zone or record; that said, it doesn\u2019t matter which record is being changed. In this case the authorized client is the DHCP Server itself; therefore this setting does nothing to protect records in this use case.<\/p>\n<p style=\"text-align:center;\"><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-two.png\" \/><\/p>\n<p>The DHCP server is also using its own account to request DNS updates on the client\u2019s behalf. With DHCP running on the Domain Controller (DC), the DHCP server\u2019s account is in the Enterprise Domain Controllers group, which has full control over all DNS records in the zone (in this case the DNS domain dhcpv.dc). The image below shows a static A Record in our zone. Because our DHCP server is the DC, it can update this record to point wherever it chooses.<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-three.png\" \/><\/p>\n<p>So, how can this misconfiguration be used as an opening to attack our infrastructure? There are many tools that can spoof DHCP and DDNS requests. To make it simple, I\u2019ve opted to use the command-line tool <a href=\"https:\/\/github.com\/akamai\/DDSpoof\">DDSpoof<\/a>, which was created by Akamai. This tool automates a lot of the process.<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-four.png\" \/><\/p>\n<p>The tool searches for DHCP servers on the local area network via the IPv4 broadcast address, 255.255.255.255. When a server is found, it steps through the DHCP DORA process (Discover, Offer, Request, Acknowledge), which allows for the automatic assignment of IP addresses to clients that request them. When DDSpoof discovers a DHCP server on our network, it asks us what our desired IP address is.\u00a0<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-five.png\" \/><\/p>\n<p>To start writing DNS records, we leverage <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc4702.html\">option 81<\/a>. With this tool we request that the server use DDNS\u00a0 to create an FQDN on behalf of the client as part of the DHCP lease request.<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-six.png\" \/>\u00a0<\/p>\n<p><i>A quick aside: DHCP options allow clients and servers to specify individual parameters associated with their DHCP lease. A common example: DHCP option 6 provides clients the IP address of a DNS server and option 3 provides a router when a client gets its IP address. <\/i>\u00a0<\/p>\n<p>By checking the Windows Server DNS Manager, I can see that an A record for the name \u2018testing\u2019 was created as requested.<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-seven.png\" \/><\/p>\n<p>Of course, this is a new DNS record. What about existing DNS records? What happens if I target the record for a server in our lab? The A record\u00a0 \u2018exampleserver.dhcpv.dc\u2019 is a DNS record for a server in my lab. Let\u2019s see what happens. <b style=\"color:red;\">Warning:\u00a0 Do not try this at home (or anywhere else\u2013except maybe an isolated lab environment).<\/b><\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-eight.png\" \/><\/p>\n<p>Back on the Windows Server, we can see the result.\u00a0<\/p>\n<p><img decoding=\"async\" style=\"text-align:center;\" src=\"\/wp-content\/uploads\/infoblox-blog-securing-dns-and-dhcp-best-practices-to-prevent-spoofing-nine.png\" \/><\/p>\n<p>As expected, I was able to overwrite this already-existing record.<\/p>\n<p>In just a few steps, I was able to successfully spoof a few DHCP transactions, create a new A record, and <b>overwrite an existing A record<\/b>. Again, this is possible on any Microsoft server running DHCP and DNS with their default configurations. Any record could be rewritten, including those of the Domain Controller itself. If malicious actors discover a Microsoft server with this configuration, they could easily perform a man-in-the-middle attack, stealing credentials and potentially gaining the keys to your organization.\u00a0<\/p>\n<p>There are ways to mitigate some of the risk of these types of attacks by changing defaults to a more secure configuration, but even with those changes, not all risks are eliminated. However, there\u2019s a much better way to harden and secure your DDI infrastructure while simultaneously providing greater resiliency options and advanced feature capabilities.<\/p>\n<h3>Solution<\/h3>\n<p>So what can you do? As Akamai\u2019s blog states, Microsoft acknowledges some of the risks pointed out here, but <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/spoofing-dns-by-abusing-dhcp#:~:text=We%20reported%20all%20our%20findings%20to%20Microsoft%2C%20which%20responded%20that%20all%20the%20above%2Dmentioned%20problems%20are%20either%20by%20design%2C%20or%20not%20severe%20enough%20to%20receive%20a%20fix.\">doesn\u2019t plan to make any changes<\/a> to the existing state of Microsoft Server on behalf of them. But how does an administrator mitigate them? The first option is to move your DDI services off of the Microsoft Server Domain Controller onto a separate server or servers dedicated to DDI services. This helps alleviate some of the issues discussed in this blog by way of siloing these business critical services. Simply moving DHCP off of the Domain Controller means the DHCP server is no longer a member of the Enterprise Domain Controller group, with its associated permissions.\u00a0<\/p>\n<p>For some temporary fixes, you should strongly consider configuring non-default options such as name protection. Other protections are available such as DNS dynamic update credentials, which forces the server to utilize the provided credentials in lieu of the machine account. These settings should, however, only be seen as band-aid fixes as there\u2019s ways to get around them either via brute force, or other means. If you\u2019re curious about these settings, and how they can be bypassed, they are covered more extensively in the Akamai blog referenced earlier, and Microsoft\u2019s documentation.\u00a0<\/p>\n<p>If moving your DDI services off of your Microsoft Server Domain Controllers is at the top of your mind, what other measures should you consider to strengthen your DDI infrastructure? One of the best ways to enhance the security of DDI infrastructure is to use a dedicated DDI solution, such as Infoblox. Infoblox is a secure, purpose-built, modern DDI solution. Infoblox\u00a0 provides additional ways to secure DDNS, such as restricting updates to static records, marking critical records as protected, and restricting allowed names based on FQDN patterns.<\/p>\n<p>In addition to securing DDNS, Infoblox <a href=\"https:\/\/www.infoblox.com\/solutions\/infoblox-and-microsoft\/\">makes Microsoft better<\/a> by expanding visibility across platforms, providing role-based access control, delivering unparalleled reliability and scalability, and enhancing automation capabilities with a fully-featured API. It provides a non-intrusive overlay of Microsoft servers, providing complete visibility across Microsoft and non-Microsoft domains from a single interface and allowing you to enhance existing Microsoft investments. Designing your infrastructure with Infoblox provides secure and best-in-class DNS, DHCP, and IPAM.\u00a0 If you\u2019re interested in hearing more, contact Infoblox <a href=\"https:\/\/info.infoblox.com\/contact-sales.html\">here<\/a>.<\/p>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Securing DNS and DHCP:<\/span> Best Practices to Prevent Spoofing');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of\u00a0 network connectivity for a modern business. Without question, secure, reliable DDI is [&hellip;]<\/p>\n","protected":false},"author":350,"featured_media":6729,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[163,164,98,52,153,361,973],"class_list":{"0":"post-9449","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-ddi","9":"tag-saas","10":"tag-microsoft","11":"tag-nios","12":"tag-bloxone","13":"tag-network-security","14":"tag-dhcp-spoofing","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox<\/title>\n<meta name=\"description\" content=\"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox\" \/>\n<meta property=\"og:description\" content=\"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-31T16:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-20T06:09:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"323\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Zenone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Zenone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/\"},\"author\":{\"name\":\"David Zenone\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\"},\"headline\":\"Securing DNS and DHCP: Best Practices to Prevent Spoofing\",\"datePublished\":\"2024-01-31T16:00:24+00:00\",\"dateModified\":\"2024-03-20T06:09:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/\"},\"wordCount\":1724,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-22.jpg\",\"keywords\":[\"BloxOne\u00ae DDI\",\"SaaS\",\"Microsoft\",\"NIOS\",\"BloxOne\u00ae\",\"Network Security\",\"DHCP Spoofing\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/\",\"name\":\"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-22.jpg\",\"datePublished\":\"2024-01-31T16:00:24+00:00\",\"dateModified\":\"2024-03-20T06:09:01+00:00\",\"description\":\"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-22.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-22.jpg\",\"width\":612,\"height\":323,\"caption\":\"FRAUD Button on Computer Keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing DNS and DHCP: Best Practices to Prevent Spoofing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\",\"name\":\"David Zenone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"caption\":\"David Zenone\"},\"description\":\"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-zenone\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox","description":"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/","og_locale":"en_US","og_type":"article","og_title":"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox","og_description":"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/","og_site_name":"Infoblox Blog","article_published_time":"2024-01-31T16:00:24+00:00","article_modified_time":"2024-03-20T06:09:01+00:00","og_image":[{"width":612,"height":323,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","type":"image\/jpeg"}],"author":"David Zenone","twitter_card":"summary_large_image","twitter_title":"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox","twitter_description":"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","twitter_misc":{"Written by":"David Zenone","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/"},"author":{"name":"David Zenone","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7"},"headline":"Securing DNS and DHCP: Best Practices to Prevent Spoofing","datePublished":"2024-01-31T16:00:24+00:00","dateModified":"2024-03-20T06:09:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/"},"wordCount":1724,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","keywords":["BloxOne\u00ae DDI","SaaS","Microsoft","NIOS","BloxOne\u00ae","Network Security","DHCP Spoofing"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/","url":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/","name":"Securing DNS and DHCP: Best Practices to Prevent Spoofing | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","datePublished":"2024-01-31T16:00:24+00:00","dateModified":"2024-03-20T06:09:01+00:00","description":"How often do you think about the critical network services DNS, DHCP, and IPAM (DDI)? DDI is a collection of core network services that make the Internet work. From on-premises to hybrid cloud to remote users, DDI touches nearly every facet of network connectivity for a modern business.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-22.jpg","width":612,"height":323,"caption":"FRAUD Button on Computer Keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/securing-dns-and-dhcp-best-practices-to-prevent-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Securing DNS and DHCP: Best Practices to Prevent Spoofing"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7","name":"David Zenone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","caption":"David Zenone"},"description":"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.","url":"https:\/\/www.infoblox.com\/blog\/author\/david-zenone\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9449"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9449\/revisions"}],"predecessor-version":[{"id":9748,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9449\/revisions\/9748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6729"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}