* * * * *
It's always nice when my code doesn't crash
I was reading this article (How I nearly almost saved the Internet, starring
afl-fuzz and dnsmasq » SkullSecurity) [1] (link via Hacker News [2]) about
fuzz testing [3] a DNS (Domain Name Service) server and when I saw that the
problematic packets that caused the program to crash could be downloaded [4],
I figured I would give them a try against my own DNS parsing code [5].
My code did not crash, which is what I expected given that some of the tests
I did included throwing random data. But I might have to install afl-fuzz
(American fuzzy lop) [6] and play around with it. I'd really love to throw
afl-fuzz at the Protocol Stack From Hell™ [7], and while it would be
cathartic, in a way, that's like shooting already dead fish in a wine barrel
with a double barrel shot-gun at point-blank range.
[1]
https://blog.skullsecurity.org/2015/how-i-nearly-almost-saved-the-internet-starring-afl-fuzz-and-dnsmasq
[2]
https://news.ycombinator.com/item?id=9897159
[3]
https://en.wikipedia.org/wiki/Fuzz_testing
[4]
https://blogdata.skullsecurity.org/fuzz_dnsmasq.tar.bz2
[5]
https://github.com/spc476/SPCDNS
[6]
http://lcamtuf.coredump.cx/afl/
[7]
gopher://gopher.conman.org/0Phlog:2012/01/30.2
Email author at
[email protected]