Call: +44 (0)7759 277220 Call
Forum

Welcome, Guest. Please Login.
Nov 23rd, 2024, 1:52am
News: If you would like to register contact the forum admin
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security
(Moderator: Pete Finnigan)
   The owner of the listener process
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: The owner of the listener process  (Read 3440 times)
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
The owner of the listener process
« on: Jan 29th, 2008, 3:39pm »
Quote | Modify

A current security requirement in my organization is to have the listener owned by a different account than the instance.  Can someone support the reasoning of this requirement?
 
1.  Although giving it a different owner is easy enough, the listener owner account has to be in the dba group to access the data files correct?
 
2.  Split out or not, hacking the owner of the listener process still leads to a denial of service.  Once hacked, the group privilege could be used to cause other damage.  What have we gained by splitting this out?
 
3.  Is having the listener and instance owned by the same account but keeping the account locked not a secure approach?  We currently have to sudo to root then su to the owner account.  Is that not a safe approach?
 
Any feedback on this would be appreciated.
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: The owner of the listener process
« Reply #1 on: Jan 30th, 2008, 4:03pm »
Quote | Modify

Sorry Pete, I should have posted this to the Oracle Security section.
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: The owner of the listener process
« Reply #2 on: Jan 31st, 2008, 11:27am »
Quote | Modify

Hi Cody,
 
dont't worry its fine, i moved it to here. The reasoning for owning the listener by another user such as "nobody" is that if its hacked then the hacker is nobody not Oracle.  
 
I am unsure why you need to thave the listener process access datafiles? - you mean because the listener daemon spawns the shadow process? - the shadow process is the clients communication channel, it should not need access to datafiles?
 
Normally this sugestion is made for extproc and Oracle have documented how to do it on a number of occasions on older security alerts. I know of people who have moved apache to apache:apache - there is a paper on this out there but I cannot locate it quickly now. Also some people have the listener running as nobody - that is the daemon is still owned by oracle:dba (ok, i know these are bad name choices) and nobody simply starts the listener. I have seen an Oracle document describing this but again cannot find it this morning quickly. This subject was discussed here previously - http://www.petefinnigan.com/forum/yabb/YaBB.cgi?board=ora_sec;action=dis play;num=1150219028  
 
cheers
 
Pete
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: The owner of the listener process
« Reply #3 on: Feb 1st, 2008, 12:21am »
Quote | Modify

Some Oracle-specific security guidelines say to use different accounts for the database and Listener.  I  
too have been puzzled by that requirement.  In my company, one person  
maintains both the database and the Listener.  So if the intention is to  
protect from a blackhat admin, that person already has full control.  There  
is the special condition of extprocs: if extprocs are being used, then yes,  
absolutely, that extproc Listener should be owned by a non-privileged  
account.  The next question is the general case, the Listener handling  
normal traffic.  One attack vector would be Listener administration: if the  
Listener administration is not protected adequately then a blackhat could  
direct the log files to overwrite the data files and thus destroy  
availability until a restore can take place.  On the other hand, the 10G  
local authentication solves this issue.  The remaining vector would be some  
kind of spectacular buffer overflow attack and my gut feel is that, by now,  
with current software, those holes should have been closed.  My conclusion  
is that if (a) it is a 10G or higher database (b) administration of the  
Listener is only via local authentication (c) the Listener is not used for  
extprocs, then it should be safe to use the same account.  I don't know that you could convince whomever it is who mandates security controls, though.  
 
By the way, if the Listener is run by another userid, then that userid should not be in the OSDBA group.   You're protecting from somebody who can hack the Listener; if they can do that, they can figure out how to muck with the Listener to use SYSDBA privileges to come into the database.  (I wouldn't know how to do it but there seem to be people out there who can.)
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: The owner of the listener process
« Reply #4 on: Feb 6th, 2008, 10:11pm »
Quote | Modify

Sorry to reply so slowly.  Flu took me out for a bit.  This is definitely something our group of DBAs did not know.  Thanks for straightening us out.
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright © 2000-2004 Yet another Bulletin Board
  • PFCLScan PFCLScan

    Simply connect PFCLScan to your Oracle database and it will automatically discover the security issues that could make your Oracle database vulnerable to attack and to the potential loss of your data.

  • PFCL Obfuscate PFCLObfuscate

    PFCLObfuscate is the only tool available that can automatically add license controls to your PL/SQL code. PFCLObfuscate protects your Intellectual Property invested in your PL/SQL database code.

  • PFCLCode PFCLCode

    PFCLCode is a tool to allow you to analyse your PL/SQL code for many different types of security issues. PFCLCode gives you a detailed review and reports and includes a powerful colour syntax highlighting code editor

  • PFCLForensics PFCLForensics

    PFCLForensics is the only tool available to allow you to do a detailed live response of a breached Oracle database and to then go on and do a detailed forensic analysis of the data gathered.

  • Products We resell PFCLReselling

    PeteFinnigan.com Limited has partnered with a small number of relevant companies to resell their products where they enhance or compliment what we do

  • PFCLATK PFCLATK

    PFCLATK is a toolkit that allows detailed pre-defined policy driven audit trails for your Oracle database. The toolkit also provides for a centralised audit trail and centralised activity reporting

  • PFCLCookie PFCLCookie

    PFCLCookie is a useful tool to use to audit your websites for tracking cookies. Scan websites in a natural way using powerful browser driven scanner

  • PFCL Training PFCLTraining

    PFCLTraining is a set of expert training classes for you, aimed at teaching how to audit your own Oracle database, design audit trails, secure code in PL/SQL and secure and lock down your Oracle database.

  • PFCL Services PFCLServices

    Choose PFCLServices to add PeteFinnigan.com Ltd to your team for your Oracle Security needs. We are experts in performing detailed security audits, data security design work and policy creation

  • PFCLConsulting PFCLConsulting

    Choose PFCLConsulting to ask PeteFinnigan.com Limited to set up and use our products on your behalf

  • PFCLCustom PFCLCustom

    All of our software products can be customised at a number of levels. Choose this to see how our products can be part of your products and services

  • PFCLCloud PFCLCloud

    Private cloud, public cloud, hybrid cloud or no cloud. Learn how all of our services, trainings and products will work in the cloud

  • PFCLUserRights PFCLUserRights

    PFCLUserRights allows you to create a very detailed view of database users rights. The focus of the reports is to allow you to decide what privileges and accounts to keep and which to remove.

  • PFCLSTK PFCLSTK

    PFCLSTK is a toolkit application that allows you to provide database security easily to an existing database. PFCLSTK is a policy driven toolkit of PL/SQL that creates your security

  • PFCLSFTK PFCLSFTK

    PFCLSFTK is a toolkit that solves the problem of securing third party applications written in PL/SQL. It does this by creating a thin layer between the application and database and this traps SQL Injection attempts. This is a static firewall.

  • PFCLSEO PFCLSEO

    PFCLSEO is a web scanner based on the PFCLScan technology so that a user can easily scan a website for technical SEO issues