Ethical DDoS drone network

Patrick W. Gilmore patrick at
Mon Jan 5 06:08:24 UTC 2009

On Jan 4, 2009, at 9:18 PM, deleskie at wrote:

> Super risky.  This would be a 99% legal worry plus.  Unless all the  
> end points and networks they cross sign off on it the risk is beyond  
> huge.

Since when do I need permission of "networks they cross" to send data  
from a machine I (legitimately) own to another machine I own?  If this  
were an FTP or other data transfer, would I have any legal issues?   
And if not, how is that different from load testing using a random  

Before anyone jumps up & down, I know that all networks reserve the  
right to filter, use TE, or otherwise alter traffic passing over their  
infrastructure to avoid damage to the whole.  But if I want to (for  
instance) stream a few 100 Gbps and am paying transit for all bits  
sent or received, since when do I have any legal worries?

You want to 'attack' yourself, I do not see any problems.  And I see  
lots of possible benefits.  Hell, just figuring out which intermediate  
networks cannot handle the added load is useful information.


> ------Original Message------
> From: Jeffrey Lyon
> Sender:
> To: nanog at
> Subject: Ethical DDoS drone network
> Sent: Jan 4, 2009 10:06 PM
> Say for instance one wanted to create an "ethical botnet," how would
> this be done in a manner that is legal, non-abusive toward other
> networks, and unquestionably used for legitimate internal security
> purposes? How does your company approach this dilemma?
> Our company for instance has always relied on outside attacks to spot
> check our security and i'm beginning to think there may be a more user
> friendly alternative.
> Thoughts?
> -- 
> Jeffrey Lyon, Leadership Team
> jeffrey.lyon at |
> Black Lotus Communications of The IRC Company, Inc.
> Look for us at HostingCon 2009 in Washington, DC on August 10th - 12th
> at Booth #401.
> Sent from my BlackBerry device on the Rogers Wireless Network

More information about the NANOG mailing list