LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-09-2016, 05:36 AM   #1
ravindrah
LQ Newbie
 
Registered: Mar 2016
Posts: 1

Rep: Reputation: Disabled
Pros and Cons of programmatically modifying configuration file


Hi,

We are trying to integrate an opensource IPSec stack into our product. This IPSec stack would be configured through embedded web server. Internally we would be implementing a component which would convert user configuration into stack specific format programmatically.

As per our current investigation we understand there are two possible approaches to configure the IPSec stack -
1) Modifying IPSec stack configuration files.
2) Using a Plugin / API interface.

Before moving forward with actual implementation using one of the above approaches I wanted to get Linux expert opinion on -
1) What is the best / preferred approach in Linux world of the two listed above?
2) What are the pros and cons of each of the approaches?

Thanks,
-Ravi
 
Old 03-09-2016, 12:14 PM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Several thoughts ...

Look at shorewall, which is a good tool for automatically issuing IPsec commands. Maybe you update the Shorewall configuration file then restart that service.

There is an obvious risk of the user shutting himself out of his own system.

I have second thoughts about integrating this into your product, i.e. to be modified directly by the user.

I also am nervous about the possibility that a malicious intruder could tamper with it, perhaps undetected.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
ubuntu pros/cons mrmilne Ubuntu 4 11-02-2009 08:57 AM
Could somebody explain the pros and cons of some of the most used file systems? baldurpet Linux - General 20 12-11-2008 08:39 PM
What are the Pros versus Cons with File Integrity Detection Systems 2backitup Linux - Security 7 03-02-2006 06:47 PM
pros/cons of getting a G5 Tomasfuego Linux - Hardware 4 06-07-2005 04:53 AM
Pros and cons of upgrading to 2.6? Darklion Slackware 17 12-10-2004 02:35 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:04 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration