vpd2.sql
-- ----------------------------------------------------------------------------- -- File Name : vpd2.sql -- ----------------------------------------------------------------------------- -- Maintainer : Pete Finnigan (http://www.petefinnigan.com) -- Copyright : Copyright (C) 2009 PeteFinnigan.com Limited. All rights -- reserved. All registered trademarks are the property of their -- respective owners and are hereby acknowledged. -- ----------------------------------------------------------------------------- -- Usage : The script provided here is available free. You can do anything -- you want with it commercial or non commercial as long as the -- copyright and this notice are not removed or edited in any way. -- The scripts cannot be posted / published / hosted or whatever -- anywhere else except at www.petefinnigan.com/vpd2.sql -- ------------------------------------------------------------------------------ prompt [*] connect as SYS pause connect sys/oracle1 as sysdba prompt [*] Drop the test user drop user pxf cascade; prompt [*] Recreate the test user create user pxf identified by pxf default tablespace users temporary tablespace temp; grant create session to pxf; grant create any context to pxf; grant create table to pxf; grant unlimited tablespace to pxf; grant create procedure to pxf; grant execute on dbms_rls to pxf; grant execute on dbms_session to pxf; create table pxf.emp as select * from scott.emp; prompt [*] Now connect as PXF pause connect pxf/pxf prompt [*] Select from the sample table - should be 15 rows pause select * from emp; Prompt [*] Let everyone see the table and connect as SCOTT and select again prompt [*] should still be 15 rows grant select on pxf.emp to public; connect scott/tiger select * from pxf.emp; prompt [*] connect as PXF again and set up a simple VPD prompt [*] that restricts access to dept 10 pause connect pxf/pxf create or replace function predicate (pv_schema in varchar2, pv_object in varchar2) return varchar2 as begin return 'deptno != ''10'''; end; / begin dbms_rls.add_policy( object_schema => 'PXF', object_name => 'EMP', policy_name => 'PXFTEST', policy_function => 'PREDICATE'); end; / prompt [*] Finally connect as SCOTT and see if he is blocked from seeing the data prompt [*] should now be 12 rows! pause connect scott/tiger select * from pxf.emp; prompt [*] pause sho user prompt [*] set up trace and dump the predicate pause alter session set sql_trace=true; alter session set events '10730 trace name context forever'; prompt [*] Dump the data from the emp table select * from pxf.emp; prompt [*] Turn trace off alter session set events '10730 trace name context off'; alter session set sql_trace=false; prompt [*] Lets look at the trace file pause prompt [*] pause prompt [*] View the predicate pause select object_owner,object_name,policy_name, pf_owner,pf_owner,function from all_policies; set serveroutput on size 1000000 declare predic varchar2(1000); begin dbms_output.put_line('The predicate is :'||pxf.predicate('PXF','EMP')); end; / prompt [*] I have seen this type of design: prompt [*] where the predicate functions are executable by all pause connect pxf/pxf grant execute on predicate to public; connect scott/tiger set serveroutput on size 1000000 declare predic varchar2(1000); begin dbms_output.put_line('The predicate is :'||pxf.predicate('PXF','EMP')); end; / prompt [*] Access the data directly pause -- ------------------------------------------------------- -- change the file number and block number to suit your -- database not mine. -- ------------------------------------------------------- select distinct dbms_rowid.rowid_block_number(rowid) blk, dbms_rowid.rowid_relative_fno(rowid) fno from pxf.emp; select file_name from dba_data_files where file_id=4; alter system dump datafile 4 block 444; prompt [*] Lets try again as monitor pause connect monitor/monitor select distinct dbms_rowid.rowid_block_number(rowid) blk, dbms_rowid.rowid_relative_fno(rowid) fno from pxf.emp; select file_name from dba_data_files where file_id=4; alter system dump datafile 4 block 444;
-
PFCLScan
Simply connect PFCLScan to your Oracle database and it will automatically discover the security issues that could make your Oracle database vulnerable to attack and to the potential loss of your data.
-
PFCLObfuscate
PFCLObfuscate is the only tool available that can automatically add license controls to your PL/SQL code. PFCLObfuscate protects your Intellectual Property invested in your PL/SQL database code.
-
PFCLCode
PFCLCode is a tool to allow you to analyse your PL/SQL code for many different types of security issues. PFCLCode gives you a detailed review and reports and includes a powerful colour syntax highlighting code editor
-
PFCLForensics
PFCLForensics is the only tool available to allow you to do a detailed live response of a breached Oracle database and to then go on and do a detailed forensic analysis of the data gathered.
-
PFCLATK
PFCLATK is a toolkit that allows detailed pre-defined policy driven audit trails for your Oracle database. The toolkit also provides for a centralised audit trail and centralised activity reporting
-
PFCLCookie
PFCLCookie is a useful tool to use to audit your websites for tracking cookies. Scan websites in a natural way using powerful browser driven scanner
-
PFCLSEO
We offer a number of web based services such as cookie audits, improving website ranking in search engines, locating broken links and hosting email and websites
-
PFCLTraining
PFCLTraining is a set of expert training classes for you, aimed at teaching how to audit your own Oracle database, design audit trails, secure code in PL/SQL and secure and lock down your Oracle database.
-
PFCLServices
Choose PFCLServices to add PeteFinnigan.com Ltd to your team for your Oracle Security needs. We are experts in performing detailed security audits, data security design work and policy creation
-
PFCLConsulting
Choose PFCLConsulting to ask PeteFinnigan.com Limited to set up and use our products on your behalf
-
PFCLCustom
All of our software products can be customised at a number of levels. Choose this to see how our products can be part of your products and services
-
PFCLCloud
Private cloud, public cloud, hybrid cloud or no cloud. Learn how all of our services, trainings and products will work in the cloud
-
PFCLUserRights
PFCLUserRights allows you to create a very detailed view of database users rights. The focus of the reports is to allow you to decide what privileges and accounts to keep and which to remove.
-
PFCLSTK
PFCLSTK is a toolkit application that allows you to provide database security easily to an existing database. PFCLSTK is a policy driven toolkit of PL/SQL that creates your security
-
PFCLSFTK
PFCLSFTK is a toolkit that solves the problem of securing third party applications written in PL/SQL. It does this by creating a thin layer between the application and database and this traps SQL Injection attempts. This is a static firewall.
-
PFCLReselling
PeteFinnigan.com Limited has partnered with a small number of relevant companies to resell their products where they enhance or compliment what we do