{"id":3675,"date":"2021-06-16T23:30:43","date_gmt":"2021-06-17T07:30:43","guid":{"rendered":"https:\/\/ideoname.com\/blog\/?p=3675"},"modified":"2022-11-28T00:14:08","modified_gmt":"2022-11-28T08:14:08","slug":"how-to-enable-dnssec","status":"publish","type":"post","link":"https:\/\/ideoname.com\/blog\/how-to-enable-dnssec\/","title":{"rendered":"How To Enable and Set Up DNSSEC on an Authoritative Bind DNS Server?"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Indeed, DNS is the sort of protocol, and following the context, it is necessary to know\u00a0<\/span><strong><span data-preserver-spaces=\"true\">how to enable DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0for the perfect user convenience. It is the protocol to revolve around the main domain names concerning the IP addresses, and it is essential to know the procedure in detail.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">It is pretty easy for an attacker to tamper with the DNS response or poison the DNS cache. It will take the user straight to the malicious site and the perfect domain identification mentioned in the address bar. The DNS security extensions are specific and aim to maintain the kind of data integrity of the DNS response.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">There are essential steps to follow for learning\u00a0<\/span><strong><span data-preserver-spaces=\"true\">how to set up DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">. The DNS extension&#8217;s job is to maintain the integrity of data and DNS responses. In the usual case, DNSSEC will sign in matters of the DNS resource records as part of the zone using the PKI, which stands for &#8220;Public Key Infrastructure.&#8221;<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">In this case, DNSSEC will enable the DNS resolvers like the Google Public DNS. Now it becomes easy to check the DNS authenticity as part of the DNS reply consisting of the IP address with the application of the Public DNSKEY record.<\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"readmore\">Related: <a title=\"what is dns\" href=\"\/blog\/what-is-dns\/\" target=\"_blank\" rel=\"noopener\">what does dns mean<\/a><\/div>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\"><strong>14 Steps on How To Enable DNSSEC<\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">It is not easy to configure DNSSEC. It is necessary to know\u00a0<\/span><strong><span data-preserver-spaces=\"true\">how to configure DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0for the better functioning of things. In the following, we will guide you through the process step by step:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">1. First, it is necessary to setting up dnssec with the adding of the perfect configuration directives inside options{ } as part of the subject matter.<\/span><\/p>\n<pre class=\"code-pre \"><code>\r\nnano \/etc\/bind\/named.conf.options\r\n<\/code><\/pre>\n<pre class=\"code-pre \"><code>\r\ndnssec-enable yes;\r\ndnssec-validation yes;\r\ndnssec-lookaside auto;\r\n<\/code><\/pre>\n<p><em>If you aim to know <strong><a href=\"\/blog\/what-is-a-subdomain\/\" target=\"_blank\" rel=\"noopener\">subdomain meaning<\/a><\/strong> , click on the link provided!<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>2. It may be so that these have already been added in certain distributions. For this, it is necessary to navigate the location of the zone files.<\/p>\n<pre class=\"code-pre \"><code>\r\ncd \/var\/cache\/bind\r\n<\/code><\/pre>\n<p>3. It is important to construct the Zone Signing Key, which is shortly known as ZSK. This happens with the following specific commands.<\/p>\n<pre class=\"code-pre \"><code>\r\ndnssec-keygen -a NSEC3RSASHA1 -b 2048 -n ZONE example.com\r\n<\/code><\/pre>\n<p><em>If you are willing to know <strong><a href=\"\/blog\/what-is-dnssec-and-how-it-works\/\" target=\"_blank\" rel=\"noopener\">how does dnssec work<\/a><\/strong> , this article can help you!<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>4. With the installation of the haveged it will not take more than a few seconds for the key to get started. Or else it is sure to take a very long time for the sampling output.<\/p>\n<pre class=\"code-pre \"><code>\r\nroot@master:\/var\/cache\/bind# dnssec-keygen -a NSEC3RSASHA1 -b 2048 -n ZONE example.com\r\nGenerating key pair..................+++ .............+++\r\nKexample.com.+007+40400\r\n<\/code><\/pre>\n<p>5. Create a Key Signing Key (KSK) with the following command:<\/p>\n<pre class=\"code-pre \"><code>\r\ndnssec-keygen -f KSK -a NSEC3RSASHA1 -b 4096 -n ZONE example.com\r\n<\/code><\/pre>\n<p><strong>Sample output:<\/strong><\/p>\n<pre class=\"code-pre \"><code>\r\nroot@master:\/var\/cache\/bind# dnssec-keygen -f KSK -a NSEC3RSASHA1 -b 4096 -n ZONE example.com\r\nGenerating key pair......................++ .............................................................................................................................................................................................................++\r\nKexample.com.+007+62910\r\n<\/code><\/pre>\n<p>6. Now, the Directory will come with the four essential keys. These are the public and private pairs of ZSK and even of KSK. Now, it is necessary to add the public keys containing the DNSKEY record to the location of the zone file. There is a loop for specific functionality.<\/p>\n<pre class=\"code-pre \"><code>\r\nfor key in `ls Kexample.com*.key`\r\ndo\r\necho \"\\$INCLUDE $key\"&gt;&gt; example.com.zone\r\ndone\r\n<\/code><\/pre>\n<p>7. It is necessary to sign the zone using the dnssec-sign zone command in specific.<\/p>\n<pre class=\"code-pre \"><code>\r\ndnssec-signzone -3  -A -N INCREMENT -o  -t \r\n<\/code><\/pre>\n<p>8. Now it is time to replace the salt with something random. In this case, you can go through the example with the output.<\/p>\n<pre class=\"code-pre \"><code>\r\nroot@master:\/var\/cache\/bind# dnssec-signzone -A -3 $(head -c 1000 \/dev\/random | sha1sum | cut -b 1-16) -N INCREMENT -o example.com -t example.com.zone\r\nVerifying the zone using the following algorithms: NSEC3RSASHA1.\r\nZone signing complete:\r\nAlgorithm: NSEC3RSASHA1: KSKs: 1 active, 0 stand-by, 0 revoked\r\n                        ZSKs: 1 active, 0 stand-by, 0 revoked\r\nexample.com.zone.signed\r\nSignatures generated:                       14\r\nSignatures retained:                         0\r\nSignatures dropped:                          0\r\nSignatures successfully verified:            0\r\nSignatures unsuccessfully verified:          0\r\nSigning time in seconds:                 0.046\r\nSignatures per second:                 298.310\r\nRuntime in seconds:                      0.056\r\n<\/code><\/pre>\n<p>9. One can make use of the 16 character string to enter as the salt with the following command.<\/p>\n<pre class=\"code-pre \"><code>\r\nhead -c 1000 \/dev\/random | sha1sum | cut -b 1-16\r\n<\/code><\/pre>\n<p>10. This will help create the new file with the new name of example.com.zone.signed. This is sure to include the RRGIS records in case of the DNS recording. Here it is necessary to tell BIND in loading the &#8220;signed&#8221; zone.<\/p>\n<pre class=\"code-pre \"><code>\r\nnano \/etc\/bind\/named.conf.local\r\n<\/code><\/pre>\n<p>11. Now it is time to change the file option as part of the zone { }\u00a0 location.<\/p>\n<pre class=\"code-pre \"><code>\r\nzone \"example.com\" IN {\r\n    type master;\r\n    file \"example.com.zone.signed\";\r\n    allow-transfer { 2.2.2.2; };\r\n    allow-update { none; };\r\n};\r\n<\/code><\/pre>\n<p>12. It is apt to save the file now and reload the bind.<\/p>\n<pre class=\"code-pre \"><code>\r\nservice bind9 reload\r\n<\/code><\/pre>\n<p>13. It is necessary to check for the usage of DNSKEY records with the use of dig on a similar server.<\/p>\n<pre class=\"code-pre \"><code>\r\ndig DNSKEY example.com. @localhost +multiline\r\n<\/code><\/pre>\n<p><strong>Sample output:<\/strong><\/p>\n<pre class=\"code-pre \"><code>\r\nroot@master:\/var\/cache\/bind# dig DNSKEY example.com. @localhost +multiline\r\n;; Truncated, retrying in TCP mode.\r\n\r\n; &lt;&lt;&gt;&gt; DiG 9.8.4-rpz2+rl005.12-P1 &lt;&lt;&gt;&gt; DNSKEY example.com. @localhost +multiline\r\n;; global options: +cmd\r\n;; Got answer:\r\n;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 43986\r\n;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0\r\n;; WARNING: recursion requested but not available\r\n\r\n;; QUESTION SECTION:\r\n;example.com.       IN DNSKEY\r\n\r\n;; ANSWER SECTION:\r\nexample.com.        86400 IN DNSKEY   256 3 7 (\r\n                AwEAActPMYurNEyhUgHjPctbLCI1VuSj3xcjI8QFTpdM\r\n                8k3cYrfwB\/WlNKjnnjt98nPmHv6frnuvs2LKIvvGzz++\r\n                kVwVc8uMLVyLOxVeKhygDurFQpLNNdPumuc2MMRvV9me\r\n                fPrdKWtEEtOxq6Pce3DW2qRLjyE1n1oEq44gixn6hjgo\r\n                sG2FzV4fTQdxdYCzlYjsaZwy0Kww4HpIaozGNjoDQVI\/\r\n                f3JtLpE1MYEb9DiUVMjkwVR5yH2UhJwZH6VVvDOZg6u6\r\n                YPOSUDVvyofCGcICLqUOG+qITYVucyIWgZtHZUb49dpG\r\n                aJTAdVKlOTbYV9sbmHNuMuGt+1\/rc+StsjTPTHU=\r\n                ) ; key id = 40400\r\nexample.com.        86400 IN DNSKEY   257 3 7 (\r\n                AwEAAa2BE0dAvMs0pe2f+D6HaCyiFSHw47BA82YGs7Sj\r\n                qSqH3MprNra9\/4S0aV6SSqHM3iYZt5NRQNTNTRzkE18e\r\n                3j9AGV8JA+xbEow74n0eu33phoxq7rOpd\/N1GpCrxUsG\r\n                kK4PDkm+R0hhfufe1ZOSoiZUV7y8OVGFB+cmaVb7sYqB\r\n                RxeWPi1Z6Fj1\/5oKwB6Zqbs7s7pmxl\/GcjTvdQkMFtOQ\r\n                AFGqaaSxVrisjq7H3nUj4hJIJ+SStZ59qfW3rO7+Eqgo\r\n                1aDYaz+jFHZ+nTc\/os4Z51eMWsZPYRnPRJG2EjJmkBrJ\r\n                huZ9x0qnjEjUPAcUgMVqTo3hkRv0D24I10LAVQLETuw\/\r\n                QOuWMG1VjybzLbXi5YScwcBDAgtEpsQA9o7u6VC00DGh\r\n                +2+4RmgrQ7mQ5A9MwhglVPaNXKuI6sEGlWripgTwm425\r\n                JFv2tGHROS55Hxx06A416MtxBpSEaPMYUs6jSIyf9cjB\r\n                BMV24OjkCxdz29zi+OyUyHwirW51BFSaOQuzaRiOsovM\r\n                NSEgKWLwzwsQ5cVJBEMw89c2V0sHa4yuI5rr79msRgZT\r\n                KCD7wa1Hyp7s\/r+ylHhjpqrZwViOPU7tAGZ3IkkJ2SMI\r\n                e\/h+FGiwXXhr769EHbVE\/PqvdbpcsgsDqFu0K2oqY70u\r\n                SxnsLB8uVKYlzjG+UIoQzefBluQl\r\n                ) ; key id = 62910\r\n\r\n;; Query time: 0 msec\r\n;; SERVER: 127.0.0.1#53(127.0.0.1)\r\n;; WHEN: Wed Nov 27 18:18:30 2013\r\n;; MSG SIZE  rcvd: 839root@master:\/var\/cache\/bind# dig DNSKEY example.com. @localhost +multiline\r\n;; Truncated, retrying in TCP mode.\r\n\r\n; &lt;&lt;&gt;&gt; DiG 9.8.4-rpz2+rl005.12-P1 &lt;&lt;&gt;&gt; DNSKEY example.com. @localhost +multiline\r\n;; global options: +cmd\r\n;; Got answer:\r\n;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 43986\r\n;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0\r\n;; WARNING: recursion requested but not available\r\n\r\n;; QUESTION SECTION:\r\n;example.com.       IN DNSKEY\r\n\r\n;; ANSWER SECTION:\r\nexample.com.        86400 IN DNSKEY   256 3 7 (\r\n                AwEAActPMYurNEyhUgHjPctbLCI1VuSj3xcjI8QFTpdM\r\n                8k3cYrfwB\/WlNKjnnjt98nPmHv6frnuvs2LKIvvGzz++\r\n                kVwVc8uMLVyLOxVeKhygDurFQpLNNdPumuc2MMRvV9me\r\n                fPrdKWtEEtOxq6Pce3DW2qRLjyE1n1oEq44gixn6hjgo\r\n                sG2FzV4fTQdxdYCzlYjsaZwy0Kww4HpIaozGNjoDQVI\/\r\n                f3JtLpE1MYEb9DiUVMjkwVR5yH2UhJwZH6VVvDOZg6u6\r\n                YPOSUDVvyofCGcICLqUOG+qITYVucyIWgZtHZUb49dpG\r\n                aJTAdVKlOTbYV9sbmHNuMuGt+1\/rc+StsjTPTHU=\r\n                ) ; key id = 40400\r\nexample.com.        86400 IN DNSKEY   257 3 7 (\r\n                AwEAAa2BE0dAvMs0pe2f+D6HaCyiFSHw47BA82YGs7Sj\r\n                qSqH3MprNra9\/4S0aV6SSqHM3iYZt5NRQNTNTRzkE18e\r\n                3j9AGV8JA+xbEow74n0eu33phoxq7rOpd\/N1GpCrxUsG\r\n                kK4PDkm+R0hhfufe1ZOSoiZUV7y8OVGFB+cmaVb7sYqB\r\n                RxeWPi1Z6Fj1\/5oKwB6Zqbs7s7pmxl\/GcjTvdQkMFtOQ\r\n                AFGqaaSxVrisjq7H3nUj4hJIJ+SStZ59qfW3rO7+Eqgo\r\n                1aDYaz+jFHZ+nTc\/os4Z51eMWsZPYRnPRJG2EjJmkBrJ\r\n                huZ9x0qnjEjUPAcUgMVqTo3hkRv0D24I10LAVQLETuw\/\r\n                QOuWMG1VjybzLbXi5YScwcBDAgtEpsQA9o7u6VC00DGh\r\n                +2+4RmgrQ7mQ5A9MwhglVPaNXKuI6sEGlWripgTwm425\r\n                JFv2tGHROS55Hxx06A416MtxBpSEaPMYUs6jSIyf9cjB\r\n                BMV24OjkCxdz29zi+OyUyHwirW51BFSaOQuzaRiOsovM\r\n                NSEgKWLwzwsQ5cVJBEMw89c2V0sHa4yuI5rr79msRgZT\r\n                KCD7wa1Hyp7s\/r+ylHhjpqrZwViOPU7tAGZ3IkkJ2SMI\r\n                e\/h+FGiwXXhr769EHbVE\/PqvdbpcsgsDqFu0K2oqY70u\r\n                SxnsLB8uVKYlzjG+UIoQzefBluQl\r\n                ) ; key id = 62910\r\n\r\n;; Query time: 0 msec\r\n;; SERVER: 127.0.0.1#53(127.0.0.1)\r\n;; WHEN: Wed Nov 27 18:18:30 2013\r\n;; MSG SIZE  rcvd: 839\r\n<\/code><\/pre>\n<p>14. You must check whether the RRSIG records are there. With this, the configuration of DNSSEC is complete with the least hassle ever.<\/p>\n<pre class=\"code-pre \"><code>\r\ndig A example.com. @localhost +noadditional +dnssec +multiline\r\n; &lt;&lt;&gt;&gt; DiG 9.8.4-rpz2+rl005.12-P1 &lt;&lt;&gt;&gt; A example.com. @localhost +noadditional +dnssec +multiline\r\n;; global options: +cmd\r\n;; Got answer:\r\n;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 32902\r\n;; flags: qr aa rd; QUERY: 1, ANSWER: 2, AUTHORITY: 3, ADDITIONAL: 5\r\n;; WARNING: recursion requested but not available\r\n\r\n;; OPT PSEUDOSECTION:\r\n; EDNS: version: 0, flags: do; udp: 4096\r\n;; QUESTION SECTION:\r\n;example.com.         IN A\r\n\r\n;; ANSWER SECTION:\r\nexample.com.          86400 IN A 93.184.216.119\r\nexample.com.          86400 IN RRSIG A 7 2 86400 20131227171405 (\r\n                            20131127171405 40400 example.com.\r\n                            JCoL8L7As1a8CXnx1W62O94eQl6zvVQ3prtNK7BWIW9O\r\n                            lir\/4V+a6c+0tbt4z4lhgmb0sb+qdvqRnlI7CydaSZDb\r\n                            hlrJA93fHqFqNXw084YD1gWC+M8m3ewbobiZgBUh5W66\r\n                            1hsVjWZGvvQL+HmobuSvsF8WBMAFgJgYLg0YzBAvwHIk\r\n                            886be6vbNeAltvPl9I+tjllXkMK5dReMH40ulgKo+Cwb\r\n                            xNQ+RfHhCQIwKgyvL1JGuHB125rdEQEVnMy26bDcC9R+\r\n                            qJNYj751CEUZxEEGI9cZkD44oHwDvPgF16hpNZGUdo8P\r\n                            GtuH4JwP3hDIpNtGTsQrFWYWL5pUuuQRwA== )\r\n\r\n;; AUTHORITY SECTION:\r\nexample.com.          86400 IN NS master.example.com.\r\nexample.com.          86400 IN NS slave.example.com.\r\nexample.com.          86400 IN RRSIG NS 7 2 86400 20131227171405 (\r\n                            20131127171405 40400 example.com.\r\n                            hEGzNvKnc3sXkiQKo9\/+ylU5WSFWudbUc3PAZvFMjyRA\r\n                            j7dzcVwM5oArK5eXJ8\/77CxL3rfwGvi4LJzPQjw2xvDI\r\n                            oVKei2GJNYekU38XUwzSMrA9hnkremX\/KoT4Wd0K1NPy\r\n                            giaBgyyGR+PT3jIP95Ud6J0YS3+zg60Zmr9iQPBifH3p\r\n                            QrvvY3OjXWYL1FKBK9+rJcwzlsSslbmj8ndL1OBKPEX3\r\n                            psSwneMAE4PqSgbcWtGlzySdmJLKqbI1oB+d3I3bVWRJ\r\n                            4F6CpIRRCb53pqLvxWQw\/NXyVefNTX8CwOb\/uanCCMH8\r\n                            wTYkCS3APl\/hu20Y4R5f6xyt8JZx3zkZEQ== )\r\n\r\n;; Query time: 0 msec\r\n;; SERVER: 127.0.0.1#53(127.0.0.1)\r\n;; WHEN: Thu Nov 28 00:01:06 2013\r\n;; MSG SIZE  rcvd: 1335\r\n<\/code><\/pre>\n<p>Now the configuration of DNSSEC is completed!<\/p>\n<h2><\/h2>\n<h2 style=\"text-align: justify;\">Universal Benefits of DNSSEC Implementation<\/h2>\n<p><span data-preserver-spaces=\"true\">There are methods of\u00a0<\/span><strong><span data-preserver-spaces=\"true\">how to enable DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">. Following the same, it is easy to opt for several benefits in this case. DNS is highly effective with the universal implementation process. It is the platform to help you understand the methods of implementation and execution simultaneously.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Once it is sure\u00a0<\/span><strong><span data-preserver-spaces=\"true\">how to enable DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">, you can start with the same at all the root zones and even at the top-level domains. Then you can quickly move down to the individual domain identities of the registrars and the registries. The same is also applicable for most hosting companies and specifically for software developers. Once you tap on\u00a0<\/span><strong><span data-preserver-spaces=\"true\">configuring DNSSEC<\/span><\/strong><span data-preserver-spaces=\"true\">, you get to know the basics with the list of advantages. The same is also applicable in the operation of businesses and agencies with the best and most effective internet presence.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">You should know that it is the technology to help protect the brand of the registrants and the customers alike. At this juncture, you should know how to\u00a0<\/span><strong><span data-preserver-spaces=\"true\">enable DNSSEC windows server<\/span><\/strong><span data-preserver-spaces=\"true\">. This will help maintain the trust and the level of loyalty in the case of the registrants. It is the option to help attract and maintain the registrant&#8217;s security and the focused reputation. Now, it is time to create new service offerings like signing the zone for the registrants.<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-preserver-spaces=\"true\">There are steps to follow in matters of how to enable DNSSEC. Everything will lead to the open door of using DNS for the new form of secure data transactions like publishing the types of the public keys and the authentication of the email origin. If you are to enable the DNSSEC windows server, you can wait for the good things to happen systematically. It is something to help protect the core business functionality by enhancing trust in the case of internet users. It will also help in exerting leadership and can even influence the extent of shaping the future of DNSSEC. Now there is additional protection for the clients and users and even in the case of a specific brand. For more information, click\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.digitalocean.com\/community\/tutorials\/how-to-setup-dnssec-on-an-authoritative-bind-dns-server-2\" target=\"_blank\" rel=\"noopener\"><strong><span data-preserver-spaces=\"true\">here<\/span><\/strong><\/a><span data-preserver-spaces=\"true\">\u00a0.<\/span><\/p>\n<p><script type=\"application\/ld+json\">\n{\n\"@context\": \"http:\/\/schema.org\/\",\n\"@type\": \"CreativeWorkSeason\",\n\"name\": \"How To Enable DNSSEC on an Authoritative Bind DNS Server\",\n\"aggregateRating\": {\n\"@type\": \"AggregateRating\",\n\"ratingValue\": \"4.8\",\n\"reviewCount\": \"134\"\n}\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Indeed, DNS is the sort of protocol, and following the context, it is necessary to know\u00a0how to enable DNSSEC\u00a0for the perfect user convenience. It is the protocol to revolve around the main domain names concerning the IP addresses, and it is essential to know the procedure in detail. It is pretty easy for an attacker &#8230; <a title=\"How To Enable and Set Up DNSSEC on an Authoritative Bind DNS Server?\" class=\"read-more\" href=\"https:\/\/ideoname.com\/blog\/how-to-enable-dnssec\/\" aria-label=\"More on How To Enable and Set Up DNSSEC on an Authoritative Bind DNS Server?\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":3908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10,11],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/posts\/3675"}],"collection":[{"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/comments?post=3675"}],"version-history":[{"count":23,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/posts\/3675\/revisions"}],"predecessor-version":[{"id":5330,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/posts\/3675\/revisions\/5330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/media\/3908"}],"wp:attachment":[{"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/media?parent=3675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/categories?post=3675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ideoname.com\/blog\/wp-json\/wp\/v2\/tags?post=3675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}