Solved

oracle listener security best practice

Posted on 2014-02-14
5
412 Views
Last Modified: 2014-02-20
are there any specific best practice recommendations for securing the oracle listener (for 10g and 11i), including how to check whether you are currently following the best practices or if there is work to do?
0
Comment
Question by:pma111
  • 2
  • 2
5 Comments
 
LVL 76

Accepted Solution

by:
slightwv (䄆 Netminder) earned 250 total points
ID: 39858830
You can password protect it:
http://docs.oracle.com/cd/E11882_01/network.112/e41945/listenercfg.htm#NETAG459

About the only other thing I can think of as far as security that involves the listener really isn't about the listener itself as much as protecting the database.  You can restrict what machines can connect to the database by ip address.
0
 
LVL 37

Assisted Solution

by:Geert Gruwez
Geert Gruwez earned 250 total points
ID: 39858892
protection ... or the holes in it come mostly with using the defaults

i'll always remember a part of a film with navy seals having to go into a building
the door is locked with a very sophisticated lock
the navy seal enters the factory default password for that type of lock  ...
and guess what ...
the door opens !!!

try and use a different port than the standard 1521 port for the listener
0
 
LVL 3

Author Comment

by:pma111
ID: 39858954
so thats all there is to it, use a non default port and add a password?
0
 
LVL 37

Expert Comment

by:Geert Gruwez
ID: 39858979
why make it difficult ?
you still need to be able to get in
or the one coming after you
0
 
LVL 76

Expert Comment

by:slightwv (䄆 Netminder)
ID: 39859057
Just thought of another one.

There was a pretty obscure vulnerability a while back.  There is a new parameter:
ADMIN_RESTRICTIONS_listener_name

http://www.oracle.com/technetwork/topics/security/listener-alert-132737.pdf
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article started out as an Experts-Exchange question, which then grew into a quick tip to go along with an IOUG presentation for the Collaborate confernce and then later grew again into a full blown article with expanded functionality and legacy…
Note: this article covers simple compression. Oracle introduced in version 11g release 2 a new feature called Advanced Compression which is not covered here. General principle of Oracle compression Oracle compression is a way of reducing the d…
Via a live example show how to connect to RMAN, make basic configuration settings changes and then take a backup of a demo database
This video shows setup options and the basic steps and syntax for duplicating (cloning) a database from one instance to another. Examples are given for duplicating to the same machine and to different machines

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now