Nice article. The first link (“I rewrote BIND’s DNS name compression algorithm”) does not work for me. It goes to https://dotat.at/@/2022-07-01-dns-compress.md
oops! now fixed, thanks for spotting the mistake
I appreciate the addition of a fuzz test! Before the last OpenSSL vuln, I had naively assumed every “C function in a high profile codebase that accepts an untrusted string from the network” had fuzz tests by now.