Skip to content

Security: isc-projects/stork

SECURITY.md

Security Policy

ISC treats the security of its software products very seriously. ISC's Security Vulnerability Disclosure Policy is documented in the relevant ISC KnowledgeBase article.

Reporting Possible Software Vulnerabilities

To report a possible software vulnerability, please follow the instructions on this page.

We prefer that you open a confidential issue in ISC's GitLab instance (not GitHub). The GitLab issue creates a record, is visible to all ISC engineers, and provides a shared communication channel with the reporter.

If it is not possible to create a GitLab issue, then send e-mail (encrypted if possible) to stork-security@isc.org. Do not report any serious issues on the Stork project on GitHub, that is a mirror site and is not regularly monitored.

Please do not discuss undisclosed security vulnerabilities on any public mailing list. ISC has a long history of handling reported vulnerabilities promptly and effectively and we respect and acknowledge responsible reporters.

If you have a crash, you may want to consult the KnowledgeBase article entitled "What to do if your BIND, Kea DHCP, Stork, or ISC DHCP server has crashed".

Reporting Bugs and Lodging Feature Requests

Users are invited to visit our Stork issues list in GitLab. Before opening a new issue, please look and see if someone has already logged the bug you wish to report. You may be able to add information to an existing report, or to find a workaround or updated status on the issue that impacts you. We also track feature requests in the issue tracker, so please submit feature requests there as well. Often it is helpful to first post these requirements on the stork-users mailing list to clarify whether there is already a way to accomplish what you need.

Due to a large ticket backlog and an even larger quantity of incoming spam, we may sometimes be slow to respond, especially if a bug is cosmetic or if a feature request is vague or low-priority. However, we truly appreciate and depend on community-submitted bug reports and will address all reports of serious defects.

No Bug Bounties

We are working with the interests of the greater Internet at heart, and we hope you are too. ISC does not offer bug bounties. If you think you have found a bug in Stork, we encourage you to report it responsibly via a confidential GitLab issue as described above; if verified, we will be happy to credit you in our Release Notes.

Supported Versions

ISC's Software Support Policy and Version Numbering is explained in a KnowledgeBase article. Limited past EOL support may be available to higher-tier customers. For more information, please contact ISC sales at info@isc.org.

Stork Security Advisories

Past advisories for Stork can be found in our KnowledgeBase. On the left-hand panel, navigate to the Stork section and look for the Security Advisories folder.

There aren’t any published security advisories