{"id":35,"date":"2020-09-26T15:38:19","date_gmt":"2020-09-26T15:38:19","guid":{"rendered":"https:\/\/mikestechtips.com\/?p=35"},"modified":"2024-05-05T16:11:00","modified_gmt":"2024-05-05T16:11:00","slug":"dns-encrypting-virtual-environments","status":"publish","type":"post","link":"https:\/\/mikestechtips.com\/?p=35","title":{"rendered":"DNS Encrypting &#038; Virtual Environments"},"content":{"rendered":"\n<p>As someone who is perpetually concerned about a lack of security while surfing the web, I try my best to keep up on the latest zero-days, scams, spoofs and vulnerabilities that I may be susceptible to.&nbsp; I began to read about DNS spoofing and cache poisoning; <a href=\"https:\/\/www.cloudflare.com\/learning\/dns\/dns-cache-poisoning\/\" target=\"_blank\" rel=\"noreferrer noopener\">an article from CloudFlare<\/a> comes to mind.&nbsp; &nbsp;CloudFlare is one of the leading providers of website protection services for many of the web\u2019s most well-known websites.&nbsp; They also have powerful services that help deflect <a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noreferrer noopener\">DDOS<\/a> attacks that can bring down web servers by overloading them with fake traffic pings, which lead to the downfall of those web services or servers.&nbsp;<\/p>\n\n\n\n<p>Back to the topic at hand though, what is DNS?&nbsp;<\/p>\n\n\n\n<p>DNS stands for Domain Name Service and is critical to the overall functionality of the Internet.&nbsp;<\/p>\n\n\n\n<p>Every website on the internet is represented by a series of numbers called an IP Address.&nbsp; For example, Google.com\u2019s IP Address is 172.217.14.228; however, trying to remember Google\u2019s IP address (or any other site\u2019s for that matter) when you want to visit their site would be very cumbersome.&nbsp;<\/p>\n\n\n\n<p>Enter DNS:&nbsp; Which translates an easily memberable URL into an IP address (i.e. User types: &#8220;Google.com&#8221; into their browser and DNS knows that this should point the use to 172.217.14.228).<\/p>\n\n\n\n<p>Thinking about how DNS works a little more, one may think, what happens if the DNS server that translates these requests gets compromised?&nbsp; Or, queries from my browser are being sent to my ISP&#8217;s DNS servers in plain text, creating a privacy issue for me as I browse the internet. &nbsp;<\/p>\n\n\n\n<p>At this point, readers are probably thinking \u2013 \u201cWho cares? If you\u2019re not doing anything wrong, you have nothing to worry about.\u201d&nbsp; This is a great point; however in my opinion, my ISP does not need to know that I went to YouTube.com 7 times yesterday afternoon.&nbsp;<\/p>\n\n\n\n<p>Back to CloudFlare.&nbsp;<\/p>\n\n\n\n<p>Among the list of services outlined above, CloudFlare also provides secured and encrypted DNS services.&nbsp; But how does one go about accessing those services in lieu of falling back to the unsecured default DNS servers from one\u2019s ISP?&nbsp; <\/p>\n\n\n\n<p>We will outline two methods.&nbsp; &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Method 1 &#8211; Firefox Browser:<\/span><\/strong><\/p>\n\n\n\n<p>The first is the easiest method.&nbsp; Download Mozilla\u2019s Firefox browser <a rel=\"noreferrer noopener\" href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/\" target=\"_blank\">here<\/a>.&nbsp; Within Firefox, there is a setting to enable <a href=\"https:\/\/en.wikipedia.org\/wiki\/DNS_over_HTTPS\" target=\"_blank\" rel=\"noreferrer noopener\">DNS over HTTPS<\/a>, which will encrypt your DNS queries via CloudFlare over HTTPS.&nbsp; Thus, all of your DNS queries in Firefox (i.e. Translating from Google.com to 172.217.14.228) will always be routed through CloudFlare\u2019s DNS Resolver Services and encrypted while referring you to your destination.&nbsp; &nbsp;To enable this setting, click the &#8220;hamburger&#8221; menu (three lines stacked on top one another) at the top right of the window and select &#8220;Options.&#8221;&nbsp; With \u201cGeneral\u201d selected, scroll to the bottom until you see \u201cNetwork Settings.\u201d&nbsp; Then, check \u201cEnable DNS-over-HTTPS\u201d and ensure Cloudflare (Default) is selected.&nbsp; In most recent versions of Google&#8217;s Chrome browser, DNS over HTTPS is an option available to users as well&#8230;  <\/p>\n\n\n\n<p>&#8230;But what if you want this level of encryption across your entire home network.  That is where Method 2 comes in&#8230; <\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Method 2 &#8211; Virtual Server Environment:<\/span><\/strong><\/p>\n\n\n\n<p>Method 2; however, (though more challenging) is a lot more fun as it involves building your own virtualization server (a\/k\/a <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hypervisor\" target=\"_blank\">Hypervisor<\/a>) using Proxmox, a free and open-source virtualization software platform.&nbsp; Please note that you can also just install an instance of Ubuntu Server (Linux) directly to \u201cbare-metal\u201d (i.e. to your hard\/solid state drive) in lieu of using a Hypervisor (<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hypervisor\" target=\"_blank\">virtual environment operating system<\/a>) to host each instance of Ubuntu Server.&nbsp; However, using Proxmox will allow for more flexibility should you choose to add more virtual environments to host more resources on your network.<\/p>\n\n\n\n<p>After Proxmox, we will then install a virtual instance of Ubuntu Linux (also free and open-source).&nbsp; As a cheaper alternative, nearly the same steps can be taken on a <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Raspberry_Pi\" target=\"_blank\">Raspberry Pi<\/a> using Raspbian Linux. &nbsp;&nbsp;<\/p>\n\n\n\n<p>Regardless of what hardware you choose, the end-goal is your own fully operational private DNS forwarding server utilizing CloudFlare\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/DNS_over_TLS\" target=\"_blank\">DNS-over-TLS<\/a> encryption to ensure requests are not sent over the internet in plain-text.&nbsp;<\/p>\n\n\n\n<p>On May 2<sup>nd<\/sup>, 2020, I jumped on NewEgg to start this project and ordered the following parts:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"765\" src=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-1024x765.jpg\" alt=\"\" class=\"wp-image-44\" srcset=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-1024x765.jpg 1024w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-300x224.jpg 300w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-768x574.jpg 768w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-1536x1147.jpg 1536w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-2048x1530.jpg 2048w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-1200x896.jpg 1200w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/IMG_0365-FULL-1980x1479.jpg 1980w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Case: Fractal Design Node 202 (Slim Case for discrete placement.\u00a0 Includes 450W power supply.)<\/li>\n\n\n\n<li>Motherboard: Gigabyte B450 I Aorus Pro (Mini-ITX form factor)<\/li>\n\n\n\n<li>CPU: AMD Ryzen 3 3200 G Processor 3.6 GHz (Turbo Boost to 4.0 GHz and on-chip graphics)<\/li>\n\n\n\n<li>Memory: 32 GB Corsair Vengeance LPX 2&#215;16 GB DDR4 3200 SDRAM<\/li>\n\n\n\n<li>Storage: 250 GB Samsung 860 EVO SSD (For Operating System)<\/li>\n\n\n\n<li>Storage: Crucial MX500 1TB SSD (For Virtual Machine Storage)<\/li>\n\n\n\n<li>Operating System: Proxmox 6.1<\/li>\n\n\n\n<li>Virtual Machine Image Used: Ubuntu 20.04 LTS<\/li>\n<\/ul>\n\n\n\n<p>This is just a sample build that I used and has been working well.&nbsp; However, lots of memory is critical for this project.&nbsp;&nbsp; I have 4 different Ubuntu Virtual Machines (VMs) running and often, that requires nearly 70% of 32 GBs to be utilized.&nbsp; &nbsp;Also, for some motherboards, it is necessary that virtualization is manually enabled (commonly referred to a Intel VT or AMD-V\/SVM Mode in your BIOS settings).&nbsp; On some systems it is disbled by default and this will cause errors when launching a VM .&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Once your new system built and powered on, go to your existing Mac, Linux or Windows system.\u00a0 You will need to download balenaEtcher, which is a tool that makes a USB flash-drive bootable.\u00a0 A copy of this tool can be downloaded at: \u00a0<a href=\"https:\/\/www.balena.io\/etcher\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.balena.io\/etcher\/<\/a><\/li>\n\n\n\n<li>After you have downloaded balenaEtcher, you will need to obtain an ISO image of Proxmox.\u00a0 At the time of writing this, version 6.2 of Proxmox is available in ISO format.\u00a0\u00a0 Again, this is free and be obtained from <a href=\"https:\/\/www.proxmox.com\/en\/downloads\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.proxmox.com\/en\/downloads<\/a>.<\/li>\n\n\n\n<li>Once balenaEtcher finishes writing to the USB flash-drive, plug it into your new system.\u00a0 It will need to be hooked up to a monitor, keyboard and mouse for the initial setup, but can be run \u201cheadless\u201d after this.\u00a0<\/li>\n<\/ol>\n\n\n\n<p>One of the best tutorials providing the greatest amount of detail was created by the \u201cCraft Computing\u201d channel on YouTube.&nbsp; Use the following link for an installation and configuration tutorial of Proxmox:&nbsp; <a href=\"https:\/\/youtu.be\/azORbxrItOo\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/youtu.be\/azORbxrItOo<\/a><\/p>\n\n\n\n<p>It should also be mentioned that &#8220;Techno Tim&#8221; has a great Proxmox install video too:&nbsp; <a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/7OVaWaqO2aU\" target=\"_blank\">https:\/\/youtu.be\/7OVaWaqO2aU<\/a><\/p>\n\n\n\n<p>After you view this tutorial, proceed to <a href=\"https:\/\/ubuntu.com\/download\/server\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ubuntu.com\/download\/server<\/a> to download Ubuntu server.&nbsp;<\/p>\n\n\n\n<p>A great tutorial that outlines setting up an Ubuntu Server VM on Proxmox was made by the \u201cTechno Tim\u201d Youtube channel.&nbsp; I recommend using the following link for an installation and configuration guided tutorial:&nbsp; <a rel=\"noreferrer noopener\" href=\"https:\/\/youtu.be\/YR9SNDD8WB4\" target=\"_blank\">https:\/\/youtu.be\/YR9SNDD8WB4<\/a><\/p>\n\n\n\n<p>A few things to note when viewing this tutorial and then setting up your VMs with Ubuntu Server 20.04 LTS:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Upon accessing the \u201cCreate: Virtual Machine\u201d setup wizard, under \u201cGeneral\u201d be sure to check \u201cAdvanced\u201d at the bottom right and then select \u201cStart at boot.\u201d\u00a0 This way, your server will always automatically load if Proxmox is ever rebooted.\u00a0<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"754\" src=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/NewVM-1-1024x754.png\" alt=\"\" class=\"wp-image-43\" srcset=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/NewVM-1-1024x754.png 1024w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/NewVM-1-300x221.png 300w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/NewVM-1-768x566.png 768w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/NewVM-1.png 1040w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Depending upon the storage available in your system, it is recommended to select at least 32GB.<\/li>\n\n\n\n<li>Depending upon the processor you selected for your build, I would recommend a 1 socket, 2 core setup.\u00a0<\/li>\n\n\n\n<li>For memory I would also recommended selecting a minimum of 1024 MiB and a max of 4096 MiB.\u00a0 \u00a0<\/li>\n\n\n\n<li>For the Ubuntu setup, you can follow the recommended YouTube tutorials verbatim, however, it is highly recommended that the Open SSH Server function is installed in order to enable access to the server from any Command Line Interface (CLI).\u00a0 \u00a0If you use Windows, PuTTY can be downloaded for free so that you can SSH into your new server VM.\u00a0\u00a0 PuTTY can be downloaded <a href=\"https:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/latest.html\">here<\/a>.<\/li>\n\n\n\n<li>It is also critical that you set a Static IP address for your Ubuntu VM install.\u00a0 This is a prompt in the setup that can be selected.\u00a0 It is more than likely that your home network is on a \/24 subnet.  So, if your PCs internal IP address is 192.168.1.15 for example, then you would enter a subnet of 192.168.1.0\/24.<\/li>\n<\/ul>\n\n\n\n<p>Using your SSH client (PuTTY), type the IP address you assigned to your Ubuntu VM.&nbsp; You can leave the port set to 22 and then click open.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"676\" src=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/Putty.png\" alt=\"\" class=\"wp-image-40\" srcset=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/Putty.png 673w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/Putty-300x300.png 300w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/Putty-150x150.png 150w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Once connected, you will be presented with a \u201clogin as:\u201d prompt.\u00a0 Here you will want to type in the username you assigned to the Ubuntu Server at setup followed by [Enter].\u00a0 Then, do the same for the user account\u2019s password (no \u201c*\u201d will be shown in the CLI when entering your password), followed by [ENTER].\u00a0 <\/li>\n\n\n\n<li>When you enter your server&#8217;s login credentials, click \u201cYes\u201d when prompted about the server host key not being cached in the registry. This is fine as we know we are connecting to a known server (the one we setup).<\/li>\n\n\n\n<li>After a successful login in, we will want to ensure we have the latest updates to our server.\u00a0 To obtain these, you will need to enter the following command and then [ENTER] :\n<ol class=\"wp-block-list\">\n<li>sudo apt update &amp;&amp; sudo apt upgrade -y<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You will then be prompted to enter your password once again followed by [ENTER].<\/li>\n\n\n\n<li>Once the progress bar reaches 100% and you are left back at the prompt with a blinking cursor, it will be a good idea to reboot.\u00a0 To do this, type: sudo reboot (followed by your password and then [ENTER].<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>After about a minute or so, log back in utilizing the instructions outlined in step one above.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Now that you are logged back in, we will need to re-configure Ubuntu Server\u2019s default DNS settings.&nbsp; To do this, run the following commands (press [ENTER] after each step):<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>sudo systemctl stop systemd-resolved.service<\/li>\n\n\n\n<li>sudo systemctl disable systemd-resolved.service<\/li>\n\n\n\n<li>Then, we will need to change the configuration file for the DNS Resolver.\u00a0 To do this, type sudo nano \/etc\/resolv.conf\n<ol class=\"wp-block-list\">\n<li>This will bring you into the NANO text editor.\u00a0<\/li>\n\n\n\n<li>Move your cursor down to the line that says \u201cnameserver\u201d and change this to show 1.1.1.1<\/li>\n\n\n\n<li>Press Ctrl+x on the keyboard<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<p>Enter Unbound. <\/p>\n\n\n\n<p>Unbound is another free utility that will enable us to forward DNS queries to CloudFlare.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>To install, type the following command:\u00a0 sudo apt install unbound dnsutils<\/li>\n\n\n\n<li>Next we will need to edit the configuration file and input all settings.\u00a0 To edit the configuration file, we will need to access the NANO text editor once more as follows:\n<ol class=\"wp-block-list\">\n<li>Sudo nano \/etc\/unbound\/unbound.conf<\/li>\n\n\n\n<li>Look for the line that shows:\u00a0 include: &#8220;\/etc\/unbound\/unbound.conf.d\/*.conf&#8221; and place a # symbol before the word \u201cinclude:.\u201d\u00a0 This will comment this particular line out.\u00a0<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<p>Now we will input the following settings into this file (Comments column below is for reference purposes only):<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Configuration<\/th><th>Comments<\/th><\/tr><\/thead><tbody><tr><td>server:<br>interface: 0.0.0.0 <br>do-tcp: yes <br>do-udp: yes<br>access-control: 0.0.0.0\/0 allow<br>harden-dnssec-stripped: yes<br>harden-glue: yes <br>private-address: 192.168.1.0\/24 private-address: 127.0.0.0\/8<br>prefetch: yes<br>rrset-roundrobin: yes <br>qname-minimisation: yes <br>tls-cert-bundle: \/etc\/ssl\/certs\/ca-certificates.crt <br><br>forward-zone: <br>name: &#8220;.&#8221; <br>forward-tls-upstream: yes forward-addr: 1.1.1.1@853#cloudflare-dns.com forward-addr: 1.0.0.1@853#cloudflare-dns.com<br><\/td><td><strong>Interface:<\/strong> Should point to the server itself (127.0.0.1 or 0.0.0.0 is the IP that points back to the server).&nbsp; <br><strong>do-tcp:<\/strong> Set to \u2018yes\u2019 so that the server will handle DNS forwarding over TCP protocol.&nbsp; <br><strong>do-udp:<\/strong> Set to \u2018yes\u2019 so that the server will handle DNS forwarding over UDP protocol.&nbsp; <br><strong>access-control:<\/strong> 0.0.0.0\/0 allow will point to all networks.&nbsp; <br><strong>harden-dnssec-stripped<\/strong> &amp; <strong>harden-glue<\/strong>: Set to \u2018yes\u2019 to limit DNS query fraud\/redirection. <strong>private-address:<\/strong> As was the case in \u201caccess-control\u201d list internal IP ranges and subnets only so the server can delineate.&nbsp; <br><strong>prefetch:<\/strong> Allows for DNS caching of frequently visited DNS queries (i.e. google.com) <br><strong>rrset-roundrobin:<\/strong> Inventories\/indexes DNS queries for faster retrieval in the future. <strong>qname-minimisation:<\/strong> Helps server to run as efficiently as possible by reducing data required to query.&nbsp; <br><strong>tls-cert-bundle:<\/strong> Used for encryption purposes.&nbsp; <br><strong>forward-zone:<\/strong> Copy verbatim to ensure encryption via CloudFlare works properly.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\u00a0Once configuration entries are entered into unbound.conf, press Ctrl + x on the keyboard followed Y.<\/li>\n\n\n\n<li>Then, press [ENTER] on the keyboard to confirm the changes.<\/li>\n\n\n\n<li>Reboot the server using sudo reboot followed by [ENTER].<\/li>\n<\/ol>\n\n\n\n<p>Now that your server is up and running, it is important to keep it updated by running the following commands as frequently as possible (recommend at least weekly):&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>sudo apt update &amp;&amp; sudo apt upgrade -y<\/li>\n\n\n\n<li>Followed by sudo reboot<\/li>\n<\/ul>\n\n\n\n<p>You can now start pointing each of your individual computers to the IP address of your new DNS server.&nbsp; However, you can use your router to automatically always point all devices to your internal DNS server, which is the recommended approach.&nbsp;<\/p>\n\n\n\n<p>As each router is a little different, you should consult your router\u2019s manual for more information on pointing it to the specific IP address for your DNS server.<\/p>\n\n\n\n<p>Finally, to test that your encryption is working, head to <a href=\"https:\/\/1.1.1.1\/help\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/1.1.1.1\/help<\/a>. You should see the following, which will confirm you are using CloudFlare and using DNS over TLS (DoT).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"838\" height=\"259\" src=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/CloudFlare.png\" alt=\"\" class=\"wp-image-41\" srcset=\"https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/CloudFlare.png 838w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/CloudFlare-300x93.png 300w, https:\/\/mikestechtips.com\/wp-content\/uploads\/2024\/05\/CloudFlare-768x237.png 768w\" sizes=\"auto, (max-width: 838px) 100vw, 838px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As someone who is perpetually concerned about a lack of security while surfing the web, I try my best to keep up on the latest zero-days, scams, spoofs and vulnerabilities that I may be susceptible to.&nbsp; I began to read about DNS spoofing and cache poisoning; an article from CloudFlare comes to mind.&nbsp; &nbsp;CloudFlare is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"templates\/template-full-width.php","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-35","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/posts\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35"}],"version-history":[{"count":1,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":46,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=\/wp\/v2\/posts\/35\/revisions\/46"}],"wp:attachment":[{"href":"https:\/\/mikestechtips.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikestechtips.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}