Where to meet ISC in person
Here are some of the events ISC staff plan to participate in during the first half of 2025.
Read postFinancially and organizationally, ISC is in good health, with no major concerns. Revenues in 2024 were strong, nearly $7.7M, which was enough to cover development expenses for our BIND and Kea programs, as well as to fund our overhead, F-root operations and Stork development, which don’t generate any revenue.
ISC ended 2025 with 45 staff, over half of whom are software engineers. The BIND team consists of 16 engineers, with 6 of these focused on QA and release operations. The combined DHCP/KEA and Stork team has 10 software engineers, including 3 focused on QA and release operations. Three engineers manage the F-root operations, and some of our internal computing infrastructure. We have seven support engineers, who take turns providing on-call coverage nights and weekends. This leaves 5 people in sales and marketing and 4 in G&A.
ISC currently has only a single layer of management, which limits our ability to grow further, because we don’t want to add another layer. We are content with our current size, because we feel we have an effective and efficient structure and a pleasant work environment. Everyone at ISC works remotely, and we meet in person twice a year for dedicated working meetings, as well as occasionally, at technical conferences.
We hired three new BIND engineers, bringing the team to a total of 9 developers, 5 QA staff and two managers (Director of DNS Engineering and BIND 9 QA Manager).
We postponed the January 2024 BIND releases, skipped June and November and issued a total of 25 open source releases + 12 -S versions - plus packages for all of this.
We released BIND 9.20, a new stable version that completed the transition to new libuv-based event loops, begun with BIND 9.16 and continued in 9.18. We had received reports that some long-duration tasks, like updating statistics, handling transfers and similar system work, seemed to be blocking query resolution in very busy systems, so we added specialized thread pools to offload long-duration tasks. This was our first stable version with a new database infrastructure, qp-trie, replacing a red-black tree for functions requiring a database, including the zone database, server database and resolver cache. The transition to libuv and qp-trie were major refactoring projects, involving multiple developers for many months, and requiring extensive testing to discover any performance impacts. The result is a system that scales better on modern platforms.
The DNSSEC signing system has received a major update, and now uses the DNSSEC Key and Signing Policy (KASP) system for managing signed zones. The BIND team added more extended error codes and zone transfer statistics, updated our catalog zones implementation, and implemented the ProxyV2 protocol. ISC staff helped to incubate the Deleg proposal, which is now a new IETF working group, working on a standard for providing more information about the authoritative servers for a zone.
We evaluated, mitigated and published eleven BIND CVEs, several of which were dns-wide multi-vendor issues at the protocol level, requiring extensive coordination with other parties. These vulnerabilities take longer to fix and publish, because of the overhead of coordinating with other teams. Historically, most of our CVEs have been assertion failures, but lately there has been a lot of research into overloading different elements of the DNS, resulting in a number of CVEs that can exhaust resources. Some of the mitigations will necessarily require placing limits on the size or number of records BIND will process, which may end up requiring configuration changes for some users.
As an open source project, anyone open an issue in our repository, and many people do. The BIND team has a generous backlog of (as of this minute) 613 open issues. They typically close between 25 and 50 per monthly release, so there is plenty to choose from. Of the open issues, 96 are labelled as bugs, 132 are feature requests, 22 are labelled documentation issues and 70 are ToDo items related to tests.
Our bind-users mailing list has continued to be busy and provide helpful advice. We currently have 2408 subscribers to bind-users. We encourage all users to subscribe to the very low-traffic bind-announce mailing list, where we announce new releases and feature deprecation. Current subscribers to bind-announce: 3459.
We plan to post a separate blog going into more details on the many accomplishments in the Kea project in 2024, but here are a few highlights:
We released 12 Kea releases, including a new stable version, Kea 2.6. We created the Kea-migration page on the website, put up a live Kea migration utility on the web, and released a packaged version of the KeaMA utility.
We have seen Kea adoption and deployment expanding into a wider range of enterprise environments; our early adopters tended to be access providers (ISPs). Questions about ISC DHCP migration continue, and probably will continue for several more years.
The Kea project is very busy, and also has a healthy number of open issues, 690 at this writing. The monthly development releases typically resolve 20 - 35 issues. Of the open issues, 44 are labelled bugs and 137 are labelled enhancement or feature. The kea-users mailing list is growing, and has provided a lot of users with configuration help this past year. At this writing the list has 558 members.
Stork has come a long way in 2024, breaking out from a read-only monitoring system to provide comprehensive configuration control for Kea. We released 8 versions, including Stork 2.0, issued in November. With that release, we began offering professional support for Stork, and included it under our ISC Software Support and Security Vulnerability Disclosure policy documents.
We launched a live demo site for Stork (demo.stork.isc.org) to let prospective users try it out with minimal effort. Our marketing team is thrilled to finally have a product with interesting screen shots!
We have ramped up our efforts to track potential vulnerabilities in the Stork dependencies, because the web ecosystem tends to have relatively frequent issues, and we published our first Stork CVE:
[CVE-2024-28872: Incorrect TLS certificate validation can lead to escalated privileges](CVE-2024-28872: Incorrect TLS certificate validation can lead to escalated privileges)
ISC added new F-Root sites in Belgrade (Serbia), Pavlodar (Kazakhstan), Lviv (Ukraine), San Pedro Sula (Honduras) and replaced the equipment in Warsaw (Poland), with thanks to our site sponsors.
We have literally no idea how many users there are of our software, but we have frequent, excellent communications with our support customers. ISC’s technical support services fund all the rest of our operations, including the development and maintenance of our open source. 2024 was a good year for our technical support service.
We hired two new support engineers, which required interviewing dozens of candidates. These additions brought our support team up to a total of 7 engineers, including the Director of Support (who is also a capable support engineer, of course).
In the middle of the summer, we migrated all our support customers and their open tickets from a large commercial support system, back to our old open source ticketing system, Best Practical’s Request Tracker. It turned out that our support customers preferred the email and text interface of the older system to the vastly fancier, and more complicated, commercial system.
We implemented a new process for publishing Advance Security Notifications to our customers, using the ticketing system. We heard that some of our support customers don’t follow our announcement mailing lists, so we added announcement channels in our ticketing system.
2024 saw a significant increase in requests for assistance in migrating from ISC DHCP to Kea, both on the mailing lists, and among our support customers.
We have 187 total customers with Basic, Enterprise or OEM support agreements that extend into 2025. 88 of these customers have BIND support contracts, and 95 have Kea and/or DHCP contracts. 144 of our customers were returning from prior years, 43 were new to us. This is a net of 34 more support customers than we had at the start of 2024, so we more than replaced the few customers who did not renew.
We have a total of 211 on-going support contracts, because many customers have support from us for multiple products.
North America 101 Europe 57 APAC 19 South America 5 ROW 5 (includes Middle East, Africa and India) In addition, we entered 2025 with 43 subscribers for Kea Premium whose subscriptions extend beyond 2024. These customers are self-supporting, with the help of the public kea-users mailing list.
We published or updated 69 articles, including 12 new CVE advisories. New articles cover such topics as; a Stork Quickstart, Stork LDAP Authentication, Private networks and split DNS, RRset limits in zones, Redefining Standard Options, Exempting broken domains in recursion, Altering the Subnet Mask Option Based on giaddr, The Umbrella feature in detail, and A Brief Introduction to LDAP.
The top 10 most-read articles in 2024 were:
Several years ago we put the ISC DHCP man pages into documents in the KB and ever since, these have been astonishingly popular. There are fewer articles on Kea in our knowledgebase, and fewer views, in part because the Kea ARM is quite comprehensive, and provides more detailed configuration advice, than the BIND ARM. BIND is the most frequently read category with 167.67 views.
The top searches in the KB were for “windows”, “logging”, “cve-2023-50387”, “failover”, “ipv6”, “dnssec”, “rndc”, “next-server”, “ddns”, “CVE-2023-50868” and “Docker”. We ended support for BIND on Windows several years ago and people continue to discover this today and are disappointed.
ISC encourages staff to participate in the Internet infrastructure technical community. Several staff currently have specific roles outside of ISC.
TMarc Jones is a member of the NANOG Community Engagement Committee.
Obviously, staff are welcome to contribute to external projects. These are some of our code contributions.
Michał Kępień
Michal Nowak
Sławek Figiel
Tomek Mrugalski implemented DNR option sending in Wireshark. The wireshark patch was submitted upstream.
Ondřej Surý led the effort to update the PHP packages in next Debian stable (trixie) to PHP 8.4 and is running the highly successful https://deb.sury.org project that provides multiple PHP version packages for Debian and Ubuntu.
ISC sponsored work in the libuv project, to add the uv_udp_try_send2()
function.
ISC published 18 blogs in 2024. ISC staff delivered at least 8 presentations at community events. ISC abandoned X a long time ago: in 2024 we added a Bluesky account to our social media presence.
ISC did not give any webinars in 2024. Our usual presenter was unavailable, and the viewership for these events had declined over the years, giving us the impression that these were no longer worth the effort.
ISC sponsored an information table at all three 2024 NANOGs, sponsored a scholarship program for All Things Open for local user groups, and contributed to the 2024 BSDCan.
What's New from ISC