Professional Support for Open Source
Dedicated support engineers, backed by the development team
7 x 24 availability for critical problems
Priority bug fixing
Early notification of security vulnerabilities
Access to subscriber-only BIND edition and subscriber-only Kea hooks applications
Some of our satisfied support customers
- Provisioning Performance of Name Server Software. Through their support relationship with ISC, CIRA is helping to underwrite the maintenance of ISC's open source for everyone.
- Advance Security Notification service, so they can receive BIND patches for critical security issues a few days before they are announced. Switch use BIND resolvers and dnsdist to provide recursive DNS services to users of the Swiss higher education and research network NREN. Switch also offer a DNS Firewall service which supports BIND with RPZ. Oli Schacher of Switch discovered and reported a serious bug in RPZ, which ISC fixed in CVE 2017-3140. Switch not only supports ISC with a regular ASN contract, they also made an unrestricted donation of CHF 10,000 to ISC in 2017.
- the first active country top-level-domain in the DNS, outside of the US. SIDN Labs authors tools and conducts research projects to help support the Internet and DNS in particular. As an ISC support customer, SIDN is also helping to support the open source you use!https://www.sidn.nl/a/about-sidn/our-milestones
- NZRS operates the registry for .nz. They offer internationalized domain names in the Māori language, both under a separate third-level domain and in .nz. NZRS engineers are frequent participants in DNS-OARC conferences. Sebastian Castro of NZRS personally contributed to the development of BIND's dnssec key-manager utility. NZRS subscribes to ISC's Advance Security Notifications for BIND.
Selecting a SW Version
The planned EOL date for every release is noted on the page where you download the software, and our software support policy is documented here. If you have just taken over an existing BIND or DHCP installation, you might want to check our list of published security vulnerabilities to ensure your implementation is not vulnerable.
BIND Documentation consists of the Administrators Reference Manual (ARM), and a Doxygen doc included in the source code.
BIND, Kea and ISC DHCP are open source software. Community support is available on our public mailing lists: bind-users, dhcp-users and Kea-users. Mail-archive.com, which is not affiliated with ISC, hosts searchable archives of bind-users and dhcp-users if you want to look and see if your question has already been asked and answered on the list. We recommend that all BIND users subscribe to the bind-announce mailing list, to receive notices of any security vulnerabilities, as well as notices of new versions available. For DHCP users the equivalent list is dhcp-announce and for Kea it is Kea-announce.
Reporting Bugs, Requesting Features
Everyone can help contribute to open source quality by submitting complete and accurate bug reports. To report a bug, please check which product you are using as BIND, ISC DHCP and Kea each use a different issue tracking system.
BIND issues or feature requests, open an issue at gitlab.isc.org.
BIND security is critical to the Internet Infrastructure. If you think you may be seeing a potential security vulnerability in BIND (for example, a crash with REQUIRE, INSIST, or ASSERT failure), please report it immediately to email@example.com and do not post it on the public mailing list.
DHCP issues, mail to: firstname.lastname@example.org, mail feature requests to email@example.com
Kea issues, please open an issue on the kea.isc.org trac site or raise the question on firstname.lastname@example.org