Mcaster1 Broadcasting Tools
  • Home
  • About
  • Products
    Mcaster1DNAS Mcaster1Encoder Mcaster1 TagStack Mcaster1CastIt Mcaster1AMP Mcaster1AudioPipe Mcaster1Studio Install Studio
  • Downloads
  • Community
  • Contact

Security Policy

Our commitment to security, responsible disclosure guidelines, and security best practices for Mcaster1DNAS.

Last Updated: February 15, 2026

Quick Navigation

  • Security Overview
  • Report Vulnerability
  • Responsible Disclosure
  • Our Response Process
  • Security Practices
  • Updates & Patches
  • Server Hardening
  • Hall of Fame

Security Commitment

Security is a top priority for Mcaster1DNAS. We are committed to promptly addressing security vulnerabilities, maintaining transparent communication, and following industry best practices to protect users.

1. Security Overview

Mcaster1DNAS is open-source streaming server software that handles sensitive operations including authentication, data streaming, and network communications. Security is fundamental to our design and development process.

Our Security Principles

  • Security by Design: Security considerations from the initial architecture
  • Defense in Depth: Multiple layers of security controls
  • Least Privilege: Minimal permissions and access by default
  • Open Source Transparency: Public code review and community auditing
  • Rapid Response: Quick patches for identified vulnerabilities
  • Privacy First: No telemetry or data collection by default

Security Features

  • TLS/SSL encryption for streams and admin interfaces
  • Strong password hashing (bcrypt/scrypt)
  • Role-based access controls
  • Input validation and sanitization
  • Protection against common web vulnerabilities (XSS, CSRF, injection)
  • Secure default configurations
  • Regular dependency updates

2. Reporting Security Vulnerabilities

Do NOT Create Public Issues

To protect users, please DO NOT report security vulnerabilities through public GitHub issues. Use the confidential reporting methods below.

Reporting Methods

Method 1: Private Email (Preferred for Critical Issues)

  • Email: davestj@gmail.com
  • Subject Line: "SECURITY - Mcaster1DNAS Vulnerability Report"
  • Encryption: PGP encryption welcome (key available on request)
  • Response Time: Within 48 hours for initial acknowledgment

Method 2: GitHub Security Advisories

  • URL: Create Private Security Advisory
  • Visibility: Only visible to repository maintainers
  • Collaboration: Allows private discussion and patch development

What to Include in Your Report

A good vulnerability report includes:

  1. Description: Clear summary of the vulnerability
  2. Impact: What can an attacker do? Who is affected?
  3. Steps to Reproduce: Detailed instructions to verify the issue
  4. Proof of Concept: Code, scripts, or screenshots demonstrating the vulnerability
  5. Affected Versions: Which versions of Mcaster1DNAS are vulnerable
  6. Suggested Fix: If you have remediation suggestions (optional)
  7. Your Contact Info: For follow-up questions and credit
Example Report Template: Subject: SECURITY - Buffer Overflow in HTTP Parser Vulnerability Type: Buffer Overflow Severity: High Affected Versions: v1.0.0 - v1.1.1 Impact: Remote code execution Description: A buffer overflow exists in the HTTP header parser when processing excessively long User-Agent strings... Steps to Reproduce: 1. Start Mcaster1DNAS server 2. Send crafted HTTP request with 10KB User-Agent header 3. Server crashes with segmentation fault Proof of Concept: [Code or curl command here] Suggested Fix: Implement input length validation before strcpy()... Contact: researcher@example.com

3. Responsible Disclosure Policy

We follow responsible disclosure principles to protect users while allowing researchers to receive credit for their findings.

Our Commitments to Researchers

  • Acknowledge receipt within 48 hours
  • Provide regular updates on remediation progress
  • Work with you to understand and validate the vulnerability
  • Give appropriate credit in security advisories (if desired)
  • Not pursue legal action against good-faith security researchers
  • Coordinate public disclosure timing

Disclosure Timeline

Our standard disclosure timeline:

  1. Day 0: Vulnerability reported
  2. Day 1-2: Initial acknowledgment sent
  3. Day 3-7: Validation and impact assessment
  4. Day 8-30: Patch development and testing
  5. Day 30-45: Patch release and security advisory
  6. Day 45-90: Public disclosure (coordinated with researcher)

Critical Vulnerabilities

For critical vulnerabilities (RCE, authentication bypass, etc.), we aim for faster patch development and may release emergency updates within 7-14 days.

What We Ask of Researchers

  • Give us reasonable time to fix vulnerabilities before public disclosure
  • Do not exploit vulnerabilities beyond proof-of-concept testing
  • Do not access, modify, or delete user data
  • Do not perform testing on production systems you don't own
  • Do not use vulnerabilities for personal gain
  • Coordinate disclosure timing with us

4. Our Security Response Process

Vulnerability Handling Workflow

  1. Triage:
    • Acknowledge report within 48 hours
    • Assign severity level (Critical, High, Medium, Low)
    • Determine affected versions and components
  2. Investigation:
    • Reproduce the vulnerability in test environment
    • Assess impact and exploitability
    • Identify root cause
  3. Development:
    • Design and implement fix
    • Create unit and integration tests
    • Review code changes
  4. Testing:
    • Verify fix resolves vulnerability
    • Ensure no regressions
    • Performance impact testing
  5. Release:
    • Prepare security advisory
    • Release patched version
    • Notify users of security update
  6. Disclosure:
    • Publish security advisory (CVE if applicable)
    • Credit researcher (if desired)
    • Update security documentation

Severity Levels

We categorize vulnerabilities using these severity levels:

CRITICAL Critical: Remote code execution, authentication bypass, complete system compromise

HIGH High: Privilege escalation, sensitive data exposure, DoS of critical services

MEDIUM Medium: Information disclosure, partial DoS, authentication weaknesses

LOW Low: Minor information leaks, configuration issues, minimal impact

5. Our Security Development Practices

Secure Development Lifecycle

  • Code Review: All changes reviewed by multiple developers
  • Static Analysis: Automated scanning for common vulnerabilities
  • Dependency Scanning: Regular checks for vulnerable dependencies
  • Fuzzing: Automated input fuzzing for parser robustness
  • Penetration Testing: Periodic security assessments
  • Secure Defaults: Security-first default configurations

Security Resources

  • OWASP Guidelines: Following OWASP Top 10 and secure coding practices
  • CWE Mitigation: Addressing Common Weakness Enumeration issues
  • NIST Standards: Aligning with NIST security frameworks
  • Industry Best Practices: Following streaming media security standards

Vulnerability Prevention

We actively prevent common vulnerability classes:

  • Injection Attacks: Parameterized queries, input validation
  • Buffer Overflows: Bounds checking, safe string operations
  • XSS: Output encoding, Content Security Policy
  • CSRF: Token validation, SameSite cookies
  • Path Traversal: Path canonicalization, access controls
  • Cryptographic Failures: Modern algorithms, proper key management

6. Security Updates & Patch Management

Update Notifications

Stay informed about security updates:

  • GitHub Releases: Release notifications
  • Security Advisories: GitHub Security tab
  • GitHub Watch: Enable "Releases only" or "All activity" notifications
  • RSS Feed: Subscribe to release RSS feed

Applying Security Updates

# Check current version ./mcaster1 --version # Pull latest updates from GitHub cd /path/to/mcaster1dnas git fetch --tags git checkout tags/v1.x.x # Replace with latest version # Rebuild and reinstall ./configure --with-yaml --with-openssl make clean make -j$(nproc) sudo make install # Restart server sudo systemctl restart mcaster1dnas

Supported Versions

We provide security updates for:

  • Latest Release: Full support with active development
  • Previous Major Version: Critical security patches for 6 months
  • Older Versions: No security patches; please upgrade

End-of-Life Versions

Using outdated versions exposes you to known vulnerabilities. Always run the latest stable release for optimal security.

7. Security Best Practices for Server Operators

Authentication & Access Control

  • Use strong, unique passwords (20+ characters, random)
  • Change default admin credentials immediately
  • Implement IP whitelisting for admin access
  • Use SSH key authentication (disable password auth)
  • Enable two-factor authentication where possible
  • Regularly rotate credentials

Network Security

  • Enable TLS/SSL for all connections (streams, admin, API)
  • Use strong cipher suites (TLS 1.2+, AES-256)
  • Configure firewall rules (allow only necessary ports)
  • Implement rate limiting to prevent abuse
  • Use fail2ban or similar for brute force protection
  • Consider VPN or private networks for admin access

Configuration Hardening

  • Run Mcaster1DNAS as a non-root user
  • Set appropriate file permissions (configs 600, binaries 755)
  • Disable unnecessary features and modules
  • Configure resource limits (connections, bandwidth)
  • Enable security headers (HSTS, X-Frame-Options, CSP)
  • Use secure random number generation

Monitoring & Logging

  • Enable comprehensive logging (access, errors, security events)
  • Monitor logs for suspicious activity
  • Set up alerts for failed login attempts, errors
  • Use log rotation to manage disk space
  • Consider centralized logging (syslog, ELK stack)
  • Regularly review logs for anomalies

Data Protection

  • Encrypt sensitive data at rest and in transit
  • Regular backups with encryption
  • Secure backup storage (offsite, encrypted)
  • Test disaster recovery procedures
  • Implement data retention policies
  • Securely delete sensitive data when no longer needed

System Security

  • Keep operating system updated
  • Update dependencies regularly (libxml2, OpenSSL, etc.)
  • Install security patches promptly
  • Run antivirus/antimalware scans
  • Enable SELinux or AppArmor for mandatory access control
  • Use intrusion detection systems (IDS/IPS)

8. Security Deployment Checklist

Before deploying Mcaster1DNAS to production:

Pre-Deployment Security Checklist

  • ✓ Change all default passwords and credentials
  • ✓ Enable TLS/SSL with valid certificates
  • ✓ Configure firewall rules (allow only necessary ports)
  • ✓ Run server as non-root user
  • ✓ Set proper file permissions (configs, logs, binaries)
  • ✓ Enable comprehensive logging
  • ✓ Configure backup procedures
  • ✓ Test authentication and access controls
  • ✓ Review configuration for security best practices
  • ✓ Update all dependencies to latest versions
  • ✓ Subscribe to security notifications
  • ✓ Document emergency response procedures

9. Security Researcher Hall of Fame

We recognize and thank security researchers who have responsibly disclosed vulnerabilities:

Thank You to Our Security Contributors

This section will be updated as researchers contribute to Mcaster1DNAS security. Your responsible disclosures help protect the entire community.

If you've reported a vulnerability and would like to be listed here, please let us know your preferred attribution.

10. Security Contact Information

For security-related inquiries, vulnerability reports, or urgent security matters:

  • Email: davestj@gmail.com
  • Subject: "SECURITY - [Brief Description]"
  • GitHub Security: Security Advisories
  • Response Time: 48 hours for initial acknowledgment

Emergency Contact

For critical vulnerabilities being actively exploited, please email immediately with "URGENT SECURITY" in the subject line. We will prioritize these reports for immediate response.

Security Policy Summary

  • Report Privately: Email davestj@gmail.com or use GitHub Security Advisories
  • Responsible Disclosure: 48-hour acknowledgment, coordinated disclosure
  • Rapid Response: Critical patches within 7-14 days
  • Open Source: Transparent code for community security review
  • Best Practices: Follow server hardening guidelines
  • Stay Updated: Monitor releases and apply security patches promptly
Mcaster1 Broadcasting Tools

Professional AI-based Digital Network Audio Server platform delivering next-generation streaming technology with ICY 2.0+ protocol support for broadcasting excellence.

Products & Services

  • Mcaster1DNAS
  • Mcaster1Encoder
  • Mcaster1 TagStack
  • Mcaster1CastIt
  • Mcaster1AMP
  • Mcaster1AudioPipe
  • Mcaster1Studio MC1 Studio
  • Install Studio
  • Downloads

Resources

  • Technical Documentation
  • API Reference
  • Getting Started Guide
  • Release Notes
  • Community

Contact & Support

General Inquiries info@mcaster1.com
Technical Support support@mcaster1.com
Lead Developer davestj@gmail.com

Stay Updated

Get the latest updates on new features and releases

© 2026 Mcaster1. All rights reserved.

Privacy Policy Terms of Service Security Compliance
Mcaster1 v2.5.1-rc1 Built with Professional Excellence