Ethical DDoS drone network
Patrick W. Gilmore
patrick at ianai.net
Mon Jan 5 00:08:24 CST 2009
On Jan 4, 2009, at 9:18 PM, deleskie at gmail.com wrote:
> Super risky. This would be a 99% legal worry plus. Unless all the
> end points and networks they cross sign off on it the risk is beyond
Since when do I need permission of "networks they cross" to send data
from a machine I (legitimately) own to another machine I own? If this
were an FTP or other data transfer, would I have any legal issues?
And if not, how is that different from load testing using a random
Before anyone jumps up & down, I know that all networks reserve the
right to filter, use TE, or otherwise alter traffic passing over their
infrastructure to avoid damage to the whole. But if I want to (for
instance) stream a few 100 Gbps and am paying transit for all bits
sent or received, since when do I have any legal worries?
You want to 'attack' yourself, I do not see any problems. And I see
lots of possible benefits. Hell, just figuring out which intermediate
networks cannot handle the added load is useful information.
> ------Original Message------
> From: Jeffrey Lyon
> To: nanog at merit.edu
> Subject: Ethical DDoS drone network
> Sent: Jan 4, 2009 10:06 PM
> Say for instance one wanted to create an "ethical botnet," how would
> this be done in a manner that is legal, non-abusive toward other
> networks, and unquestionably used for legitimate internal security
> purposes? How does your company approach this dilemma?
> Our company for instance has always relied on outside attacks to spot
> check our security and i'm beginning to think there may be a more user
> friendly alternative.
> Jeffrey Lyon, Leadership Team
> jeffrey.lyon at blacklotus.net | http://www.blacklotus.net
> Black Lotus Communications of The IRC Company, Inc.
> Look for us at HostingCon 2009 in Washington, DC on August 10th - 12th
> at Booth #401.
> Sent from my BlackBerry device on the Rogers Wireless Network
More information about the NANOG