SlideShare a Scribd company logo
1 of 24
Download to read offline
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Oracle Network Security
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Objectives
After completing this lesson, you should be able to do
the following:
• Describe the items on the client, listener, and
network security checklists
• Secure administration of the network
• Restrict access by IP address
• Administer the listener securely
• Analyze listener log files
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Client Checklist
• Internet access to secure data requires user
authentication, rather than client-computer
authentication.
• The options are:
– Bypass client-computer configuration and rely on
user authentication to a middle tier.
– Configure the client computer:
• Authentication
• Authorization
– Administer client certificates.
– Educate users.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Configuring the Browser
Browsers include the following security features:
• SSL encryption by using the HTTPS protocol
• Certificate authorization:
– Client
– Server
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Configuring the Client
Configure client computers to use Oracle Advanced
Security features with Oracle Net Services:
• Native encryption
• SSL authentication by using certificates
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Using Certificates
Considerations when using certificates for
authentication:
• Distinguished name and issuer uniquely identify
the user.
• Test for expiring certificates.
• Use certificate reissues to update certificate
information.
• Audit certificate revocations.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Network Security: Checklist
• Use a firewall.
• Restrict IP addresses.
• Encrypt network traffic.
• Prevent remote administration of Connection
Manager (CMAN).
• Use network log files to monitor connections.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Using a Firewall to Restrict
Network Access
Application
Web server
Database
server
Client
computers
Firewall Firewall
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Network IP Addresses:
Valid Node Checking
Set the following SQLNET.ORA parameters:
• Turn on the feature:
• Deny access from these nodes:
• Allow access from these nodes:
tcp.excluded_nodes = 192.168.10.102
tcp.invited_nodes =
(192.168.10.102, 192.168.10.112)
tcp.validnode_checking = YES
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Network IP Addresses:
Guidelines
Network IP restrictions can help secure access to your
server. Consider the following guidelines:
• Do not use IP restrictions as your only security. IP
addresses can be spoofed.
• Use Connection Manager to limit access by node.
• Limit access by protocol.
• Protect dispatcher ports. IP restrictions do not
prevent connections to the dispatcher.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Open Ports
• Limit open ports to needed applications:
– Open ports are network-attack opportunities.
– Know which ports are open on your computer.
• Find open ports:
– Oracle product installation ports in portlist.ini
– Listener ports in listener.ora
– Dispatcher ports by using lsnrctl services
– Other ports by using netstat
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Encrypting Network Traffic
• Guideline: Encrypt sensitive network traffic.
• Tasks:
– Use HTTPS when sending sensitive data between
the client computer and the server.
– Use SSL or native encryption to encrypt Oracle Net
Services traffic.
• Use the TCPS protocol for TCP/IP with SSL:
...
(ADDRESS=
(PROTOCOL=tcps)
...
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Oracle Net Services Log Files
Database
server
CMADMIN
process
CMGW
processsqlnet.log
listener.log
<name>_cmadm_pid.log
<name>_cmgw_pid.log
Listener
CMAN
listener
<name>_pid.log
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Listener Security: Checklist
• Restrict the privileges of the listener.
• Secure administration by:
– Protecting the listener with a password for remote
administration
– Using SSL when administering the listener
• Protect against denial-of-service attacks.
• Monitor listener activity.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting the Privileges of the Listener
• Restrict the privileges of a separate listener
process.
• A sample configuration is:
EXTPROC_LISTENER=
(DESCRIPTION=
(ADDRESS=(PROTOCOL=ipc)(KEY=extproc)))
SID_LIST_EXTPROC_LISTENER=
(SID_LIST=
(SID_DESC=
(SID_NAME=plsextproc)
(ORACLE_HOME=
/u01/app/oracle/product/11.2.0/db_1)
(PROGRAM=extproc)))
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Use the CREATE LIBRARY
Privilege Sparingly
• External procedures:
– Are executed from a library
– Run with the privileges of the listener
• By default, the listener has the write privilege to:
– Database files
– The memory space of the instance
• To avoid misuse of this privilege:
– Use it only when needed
– Limit the privileges of the listener
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Password Protect the Listener
• Establish a password for the Oracle listener to
prevent unauthorized listener administration.
• From the Listener Control utility, issue the
following command:
LSNRCTL> CHANGE_PASSWORD
Old password: lsnrc80
New password: lsnrc90
Reenter new password: lsnrc90
LSNRCTL> SET PASSWORD
Password:
The command completed successfully
LSNRCTL> SAVE_CONFIG
The command completed successfully
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Preventing Online Administration
of the Listener
• Listener configuration cannot be changed online.
• To change the configuration, you must:
– Make the changes in the LISTENER.ORA file
– Reload the configuration
• In the LISTENER.ORA file, enter the following:
• This configuration requires the administrator to
have:
– Write privileges on the LISTENER.ORA file
ADMIN_RESTRICTIONS_LISTENER=ON
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Administering the Listener Using
TCP/IP with SSL
• Use TCP/IP with SSL when administering over an
insecure network.
• Make the TCPS protocol the first entry in the
address list.
• Example (LISTENER.ORA file configured for SSL):
LISTENER=
(DESCRIPTION=
(ADDRESS_LIST=
(ADDRESS=
(PROTOCOL=tcps)
(HOST = singleton11g.snda.com)
(PORT = 1521)))
...
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
INBOUND_CONNECT_TIMEOUT
Protect the listener from denial-of-service attacks with
the following network parameters:
• SQLNET.INBOUND_CONNECT_TIMEOUT
• INBOUND_CONNECT_TIMEOUT_listener_name
These parameters:
• Set the time allowed for a connection to complete
authentication
• Log failures with source IP addresses
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Setting Listener Logging Parameters
• In the LISTENER.ORA file:
– LOG_DIRECTORY_listener_name
– LOG_FILE_listener_name
• With Oracle Net Manager:
• With the SET command in the Listener Control
utility:
– LOG_DIRECTORY
– LOG_FILE
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Analyzing Listener Log Files
The listener log contains the following information:
• Listener log audits:
– Client connection request
– Listener Control utility commands
• Listener service registration events:
– service_register
– service_update
– service_died
• Listener direct hand-off information
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Summary
In this lesson, you should have learned how to:
• Describe the items on the client, listener, and
network security checklists
• Secure administration of the network
• Restrict access by IP address
• Administer the listener securely
• Analyze listener log files
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Q&A

More Related Content

What's hot

Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 

What's hot (20)

10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 201510 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
 
SqlSa94
SqlSa94SqlSa94
SqlSa94
 
Securing Hadoop with OSSEC
Securing Hadoop with OSSECSecuring Hadoop with OSSEC
Securing Hadoop with OSSEC
 
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle TrainingsOracle Audit Vault Training | Audit Vault - Oracle Trainings
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
 
Web Server Hardening
Web Server HardeningWeb Server Hardening
Web Server Hardening
 
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
2017 Secure360 - Hacking SQL Server on Scale with PowerShell2017 Secure360 - Hacking SQL Server on Scale with PowerShell
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
 
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
PowerUpSQL - 2018 Blackhat USA Arsenal PresentationPowerUpSQL - 2018 Blackhat USA Arsenal Presentation
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
 
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL ServerSecure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
 
What's New in AlienVault v3.0?
What's New in AlienVault v3.0?What's New in AlienVault v3.0?
What's New in AlienVault v3.0?
 
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsTROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
 
2019 Blackhat Booth Presentation - PowerUpSQL
2019 Blackhat Booth Presentation - PowerUpSQL2019 Blackhat Booth Presentation - PowerUpSQL
2019 Blackhat Booth Presentation - PowerUpSQL
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellDerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
 
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
Security Issues in OpenStack
Security Issues in OpenStackSecurity Issues in OpenStack
Security Issues in OpenStack
 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheet
 

Viewers also liked (7)

Osobní bezpečnost na internetu
Osobní bezpečnost na internetuOsobní bezpečnost na internetu
Osobní bezpečnost na internetu
 
Auditing security of Oracle DB (Karel Miko)
Auditing security of Oracle DB (Karel Miko)Auditing security of Oracle DB (Karel Miko)
Auditing security of Oracle DB (Karel Miko)
 
Oracle db subprograms
Oracle db subprogramsOracle db subprograms
Oracle db subprograms
 
Secure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin ObstSecure Technical Implementation Guide for databases by Martin Obst
Secure Technical Implementation Guide for databases by Martin Obst
 
Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2Oracle Berkeley Db 11g R2
Oracle Berkeley Db 11g R2
 
1 z0 052
1 z0 0521 z0 052
1 z0 052
 
Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践Oracle Compute Cloud Service快速实践
Oracle Compute Cloud Service快速实践
 

Similar to Oracle security 08-oracle network security

Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
ali raza
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
ali raza
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
ali raza
 

Similar to Oracle security 08-oracle network security (20)

CCNA_Security_02.ppt
CCNA_Security_02.pptCCNA_Security_02.ppt
CCNA_Security_02.ppt
 
MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the Cloud
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud Security
 
Chapter 2 overview
Chapter 2 overviewChapter 2 overview
Chapter 2 overview
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
CCNA_Security_03.ppt
CCNA_Security_03.pptCCNA_Security_03.ppt
CCNA_Security_03.ppt
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
Chapter 3 overview
Chapter 3 overviewChapter 3 overview
Chapter 3 overview
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
network security
network securitynetwork security
network security
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Building a secure BFF at Postman
Building a secure BFF at PostmanBuilding a secure BFF at Postman
Building a secure BFF at Postman
 
Webinar: Securing your data - Mitigating the risks with MongoDB
Webinar: Securing your data - Mitigating the risks with MongoDBWebinar: Securing your data - Mitigating the risks with MongoDB
Webinar: Securing your data - Mitigating the risks with MongoDB
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Application and Server Security
Application and Server SecurityApplication and Server Security
Application and Server Security
 

More from Zhaoyang Wang

More from Zhaoyang Wang (20)

海通证券金融云思考与实践(数据技术嘉年华2017)
海通证券金融云思考与实践(数据技术嘉年华2017)海通证券金融云思考与实践(数据技术嘉年华2017)
海通证券金融云思考与实践(数据技术嘉年华2017)
 
云管理平台助力海通金融云建设
云管理平台助力海通金融云建设云管理平台助力海通金融云建设
云管理平台助力海通金融云建设
 
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
 
Oracle Compute Cloud Service介绍
Oracle Compute Cloud Service介绍Oracle Compute Cloud Service介绍
Oracle Compute Cloud Service介绍
 
Oracle cloud 使用云市场快速搭建小型电商网站
Oracle cloud 使用云市场快速搭建小型电商网站Oracle cloud 使用云市场快速搭建小型电商网站
Oracle cloud 使用云市场快速搭建小型电商网站
 
Oracle cloud ravello介绍及测试账户申请
Oracle cloud ravello介绍及测试账户申请Oracle cloud ravello介绍及测试账户申请
Oracle cloud ravello介绍及测试账户申请
 
Oracle cloud 云介绍及测试账户申请
Oracle cloud 云介绍及测试账户申请Oracle cloud 云介绍及测试账户申请
Oracle cloud 云介绍及测试账户申请
 
New awesome features in MySQL 5.7
New awesome features in MySQL 5.7New awesome features in MySQL 5.7
New awesome features in MySQL 5.7
 
Performance Tuning Tool01-Statspack
Performance Tuning Tool01-StatspackPerformance Tuning Tool01-Statspack
Performance Tuning Tool01-Statspack
 
SQL Tuning02-Intorduction to the CBO Optimizer
SQL Tuning02-Intorduction to the CBO OptimizerSQL Tuning02-Intorduction to the CBO Optimizer
SQL Tuning02-Intorduction to the CBO Optimizer
 
SQL Tuning04-Interpreting Execution Plans
SQL Tuning04-Interpreting Execution PlansSQL Tuning04-Interpreting Execution Plans
SQL Tuning04-Interpreting Execution Plans
 
SQL Tuning01-Introduction to SQL Tuning
SQL Tuning01-Introduction to SQL TuningSQL Tuning01-Introduction to SQL Tuning
SQL Tuning01-Introduction to SQL Tuning
 
MySQL Fulltext Search Tutorial
MySQL Fulltext Search TutorialMySQL Fulltext Search Tutorial
MySQL Fulltext Search Tutorial
 
Data Organization in InnoDB
Data Organization in InnoDBData Organization in InnoDB
Data Organization in InnoDB
 
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
 
Oracle enterprise manager cloud control 12c r5 agent installation
Oracle enterprise manager cloud control 12c r5 agent installationOracle enterprise manager cloud control 12c r5 agent installation
Oracle enterprise manager cloud control 12c r5 agent installation
 
Why use MySQL
Why use MySQLWhy use MySQL
Why use MySQL
 
MYSQLCLONE Introduction
MYSQLCLONE IntroductionMYSQLCLONE Introduction
MYSQLCLONE Introduction
 
Interpreting execution plans
Interpreting execution plansInterpreting execution plans
Interpreting execution plans
 
Intorduction to the cbo optimizer
Intorduction to the cbo optimizerIntorduction to the cbo optimizer
Intorduction to the cbo optimizer
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Oracle security 08-oracle network security

  • 1. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Oracle Network Security
  • 2. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Objectives After completing this lesson, you should be able to do the following: • Describe the items on the client, listener, and network security checklists • Secure administration of the network • Restrict access by IP address • Administer the listener securely • Analyze listener log files
  • 3. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Client Checklist • Internet access to secure data requires user authentication, rather than client-computer authentication. • The options are: – Bypass client-computer configuration and rely on user authentication to a middle tier. – Configure the client computer: • Authentication • Authorization – Administer client certificates. – Educate users.
  • 4. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Configuring the Browser Browsers include the following security features: • SSL encryption by using the HTTPS protocol • Certificate authorization: – Client – Server
  • 5. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Configuring the Client Configure client computers to use Oracle Advanced Security features with Oracle Net Services: • Native encryption • SSL authentication by using certificates
  • 6. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Using Certificates Considerations when using certificates for authentication: • Distinguished name and issuer uniquely identify the user. • Test for expiring certificates. • Use certificate reissues to update certificate information. • Audit certificate revocations.
  • 7. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Network Security: Checklist • Use a firewall. • Restrict IP addresses. • Encrypt network traffic. • Prevent remote administration of Connection Manager (CMAN). • Use network log files to monitor connections.
  • 8. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Using a Firewall to Restrict Network Access Application Web server Database server Client computers Firewall Firewall
  • 9. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Restricting Network IP Addresses: Valid Node Checking Set the following SQLNET.ORA parameters: • Turn on the feature: • Deny access from these nodes: • Allow access from these nodes: tcp.excluded_nodes = 192.168.10.102 tcp.invited_nodes = (192.168.10.102, 192.168.10.112) tcp.validnode_checking = YES
  • 10. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Restricting Network IP Addresses: Guidelines Network IP restrictions can help secure access to your server. Consider the following guidelines: • Do not use IP restrictions as your only security. IP addresses can be spoofed. • Use Connection Manager to limit access by node. • Limit access by protocol. • Protect dispatcher ports. IP restrictions do not prevent connections to the dispatcher.
  • 11. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Restricting Open Ports • Limit open ports to needed applications: – Open ports are network-attack opportunities. – Know which ports are open on your computer. • Find open ports: – Oracle product installation ports in portlist.ini – Listener ports in listener.ora – Dispatcher ports by using lsnrctl services – Other ports by using netstat
  • 12. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Encrypting Network Traffic • Guideline: Encrypt sensitive network traffic. • Tasks: – Use HTTPS when sending sensitive data between the client computer and the server. – Use SSL or native encryption to encrypt Oracle Net Services traffic. • Use the TCPS protocol for TCP/IP with SSL: ... (ADDRESS= (PROTOCOL=tcps) ...
  • 13. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Oracle Net Services Log Files Database server CMADMIN process CMGW processsqlnet.log listener.log <name>_cmadm_pid.log <name>_cmgw_pid.log Listener CMAN listener <name>_pid.log
  • 14. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Listener Security: Checklist • Restrict the privileges of the listener. • Secure administration by: – Protecting the listener with a password for remote administration – Using SSL when administering the listener • Protect against denial-of-service attacks. • Monitor listener activity.
  • 15. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Restricting the Privileges of the Listener • Restrict the privileges of a separate listener process. • A sample configuration is: EXTPROC_LISTENER= (DESCRIPTION= (ADDRESS=(PROTOCOL=ipc)(KEY=extproc))) SID_LIST_EXTPROC_LISTENER= (SID_LIST= (SID_DESC= (SID_NAME=plsextproc) (ORACLE_HOME= /u01/app/oracle/product/11.2.0/db_1) (PROGRAM=extproc)))
  • 16. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Use the CREATE LIBRARY Privilege Sparingly • External procedures: – Are executed from a library – Run with the privileges of the listener • By default, the listener has the write privilege to: – Database files – The memory space of the instance • To avoid misuse of this privilege: – Use it only when needed – Limit the privileges of the listener
  • 17. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Password Protect the Listener • Establish a password for the Oracle listener to prevent unauthorized listener administration. • From the Listener Control utility, issue the following command: LSNRCTL> CHANGE_PASSWORD Old password: lsnrc80 New password: lsnrc90 Reenter new password: lsnrc90 LSNRCTL> SET PASSWORD Password: The command completed successfully LSNRCTL> SAVE_CONFIG The command completed successfully
  • 18. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Preventing Online Administration of the Listener • Listener configuration cannot be changed online. • To change the configuration, you must: – Make the changes in the LISTENER.ORA file – Reload the configuration • In the LISTENER.ORA file, enter the following: • This configuration requires the administrator to have: – Write privileges on the LISTENER.ORA file ADMIN_RESTRICTIONS_LISTENER=ON
  • 19. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Administering the Listener Using TCP/IP with SSL • Use TCP/IP with SSL when administering over an insecure network. • Make the TCPS protocol the first entry in the address list. • Example (LISTENER.ORA file configured for SSL): LISTENER= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS= (PROTOCOL=tcps) (HOST = singleton11g.snda.com) (PORT = 1521))) ...
  • 20. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com INBOUND_CONNECT_TIMEOUT Protect the listener from denial-of-service attacks with the following network parameters: • SQLNET.INBOUND_CONNECT_TIMEOUT • INBOUND_CONNECT_TIMEOUT_listener_name These parameters: • Set the time allowed for a connection to complete authentication • Log failures with source IP addresses
  • 21. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Setting Listener Logging Parameters • In the LISTENER.ORA file: – LOG_DIRECTORY_listener_name – LOG_FILE_listener_name • With Oracle Net Manager: • With the SET command in the Listener Control utility: – LOG_DIRECTORY – LOG_FILE
  • 22. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Analyzing Listener Log Files The listener log contains the following information: • Listener log audits: – Client connection request – Listener Control utility commands • Listener service registration events: – service_register – service_update – service_died • Listener direct hand-off information
  • 23. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Summary In this lesson, you should have learned how to: • Describe the items on the client, listener, and network security checklists • Secure administration of the network • Restrict access by IP address • Administer the listener securely • Analyze listener log files
  • 24. 云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com Q&A