Sinkhole Architecture
Howard C. Berkowitz
hcb at gettcomm.com
Fri Apr 29 15:24:21 UTC 2005
At 1:34 PM +0000 4/29/05, Christopher L. Morrow wrote:
>On Fri, 29 Apr 2005, Howard C. Berkowitz wrote:
>
>>
>> I've seen some Cisco security presentations that include sinkholes
>> composed of an ingress and egress router, interconnected with a
>> switch. The switch provides access for tools such as packet
>> analyzers, IDS, routing analyzers, etc. The multiple routers also
>> provide more horsepower for inspection, filtering, and
>> overhead-imposing measurements such as NetFlow.
>
>the multiple routers could just be a way to get a MAC to the ingress
>router for delivery over the ethernet... a sun/linux/bsd/*unix box might
>provide the same function. (please logging, analysis, ids, flow
>collection)
The architecture described doesn't have the two routers treating the
Ethernet as a destination:
SinkholeIn--->Switch------>SinkholeOut
|
|
analyzers
>
>>
>> I am unclear about the BGP relationship between the two routers,
>> which are meant to be treated as one subsystem. The ingress router
>> (with respect to the outside) clearly has to have its BGP isolated
>> from the rest of the AS, so it can't be part of the iBGP mesh.
>>
>
>why can't it be part of the ibgp mesh? I'm not sure I see why that would
>be BAD, aside from it bouncing under load and affecting all ibgp
>neighbors... so, aside from route-churn and neighbor setup/teardown churn
>what other reasons?
The most basic is whether I am diverting a maliciously inserted route
to it from the edge router.
More information about the NANOG
mailing list