Skip to content

Commit ca9fed9

Browse files
committed
Move security-related information to SECURITY.md
To follow current best practices, create a short SECURITY.md file in the root of the repository that contains information about the project's security policy and guidelines for reporting potential security issues. Replace the relevant bits of text in other files with references to the new SECURITY.md file, so that the relevant information only needs to be maintained in one place. Replace all occurrences of the generic [email protected] email with a dedicated address for reporting BIND 9 security issues, [email protected].
1 parent 00a6268 commit ca9fed9

File tree

3 files changed

+39
-27
lines changed

3 files changed

+39
-27
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -102,22 +102,7 @@ Twitter, or Facebook.
102102

103103
### Reporting possible security issues
104104

105-
If you think you may be seeing a potential security vulnerability in BIND
106-
(for example, a crash with REQUIRE, INSIST, or ASSERT failure), please
107-
report it immediately by emailing to [email protected]. Plain-text
108-
e-mail is not a secure choice for communications concerning undisclosed
109-
security issues so please encrypt your communications to us if possible,
110-
using the [ISC Security Officer public key](https://www.isc.org/pgpkey/).
111-
112-
Do not discuss undisclosed security vulnerabilities on any public mailing list.
113-
ISC has a long history of handling reported vulnerabilities promptly and
114-
effectively and we respect and acknowledge responsible reporters.
115-
116-
ISC's Security Vulnerability Disclosure Policy is documented at
117-
[https://kb.isc.org/docs/aa-00861](https://kb.isc.org/docs/aa-00861).
118-
119-
If you have a crash, you may want to consult
120-
["What to do if your BIND or DHCP server has crashed."](https://kb.isc.org/docs/aa-00340)
105+
See `SECURITY.md`.
121106

122107
### <a name="contrib"></a>Contributing code
123108

README.md

Lines changed: 3 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -74,17 +74,9 @@ contents of your configuration file in a non-confidential issue, it is
7474
advisable to obscure key secrets; this can be done automatically by
7575
using `named-checkconf -px`.
7676

77-
If you are reporting a bug that is a potential security issue, such as an
78-
assertion failure or other crash in `named`, please do *NOT* use GitLab to
79-
report it. Instead, send mail to
80-
81-
OpenPGP key to secure your message. (Information about OpenPGP and links
82-
to our key can be found at
83-
[https://www.isc.org/pgpkey](https://www.isc.org/pgpkey).) Please do not
84-
discuss the bug on any public mailing list.
85-
86-
For a general overview of ISC security policies, read the Knowledgebase
87-
article at [https://kb.isc.org/docs/aa-00861](https://kb.isc.org/docs/aa-00861).
77+
For information about ISC's Security Vulnerability Disclosure Policy and
78+
information about reporting potential security issues, please see
79+
`SECURITY.md`.
8880

8981
Professional support and training for BIND are available from
9082
ISC. Contact us at [https://www.isc.org/contact](https://www.isc.org/contact)

SECURITY.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
<!--
2+
Copyright (C) Internet Systems Consortium, Inc. ("ISC")
3+
4+
SPDX-License-Identifier: MPL-2.0
5+
6+
This Source Code Form is subject to the terms of the Mozilla Public
7+
License, v. 2.0. If a copy of the MPL was not distributed with this
8+
file, you can obtain one at https://mozilla.org/MPL/2.0/.
9+
10+
See the COPYRIGHT file distributed with this work for additional
11+
information regarding copyright ownership.
12+
-->
13+
# Security Policy
14+
15+
ISC's Security Vulnerability Disclosure Policy is documented in the
16+
relevant [ISC Knowledgebase article][1].
17+
18+
## Reporting possible security issues
19+
20+
If you think you may be seeing a potential security vulnerability in
21+
BIND (for example, a crash with a REQUIRE, INSIST, or ASSERT failure),
22+
please report it immediately by [opening a confidential GitLab issue][2]
23+
(preferred) or emailing [email protected].
24+
25+
Please do not discuss undisclosed security vulnerabilities on any public
26+
mailing list. ISC has a long history of handling reported
27+
vulnerabilities promptly and effectively and we respect and acknowledge
28+
responsible reporters.
29+
30+
If you have a crash, you may want to consult the Knowledgebase article
31+
entitled ["What to do if your BIND or DHCP server has crashed"][3].
32+
33+
[1]: https://kb.isc.org/docs/aa-00861
34+
[2]: https://gitlab.isc.org/isc-projects/bind9/-/issues/new?issue[confidential]=true&issuable_template=Bug
35+
[3]: https://kb.isc.org/docs/aa-00340

0 commit comments

Comments
 (0)