Re: FAILED_LOGIN _ATTEMPTS issue

From: Jared Still <jkstill_at_gmail.com>
Date: Thu, 11 Dec 2008 09:04:30 -0800
Message-ID: <bf46380812110904y6c8cb449k7f4984a73c5a369d@mail.gmail.com>


On Thu, Dec 11, 2008 at 5:55 AM, Remigiusz Sokolowski < remigiusz.sokolowski_at_nordea.com> wrote:

> hi,
>
> I wonder how do You deal with FAILED_LOGIN _ATTEMPTS issue in a day to
> day practice.
> This part of profile is thought of as a countermeasure against "brute
> force" attacks on password, however dark side of it is a blocking an
> account.
>

You can use a profile to limit the number of attempts that may be made against a single account.

http://download.oracle.com/docs/cd/B28359_01/server.111/b28286/statements_6010.htm#i2065930

The failed_login_attempts parameter can be used to lock the account after N consecutive failed login attempts.

The password_lock_time parameter can be used to lock the account for N days after the failed login attempts threshold is reached, where N can be a fraction of a day.

eg. a value of 0.0104 would lock the account for approximately 15 minutes.

>
> The "ideal" solution to this issue would be to allow a client identified
> by IP to connect with for example only its own account or few chosen
> accounts.
> Any thoughts?
>

If the connections are made through an application server, using tcp.validnode_checking
to specify which clients may connect may be feasible.

If there's a large number of clients that connect directly to the database, this
would probably be rather unwieldy.

There's probably other options available if you check into the Advanced Security Option. Personally, I have no experience with that.

Jared Still
Certifiable Oracle DBA and Part Time Perl Evangelist

--
http://www.freelists.org/webpage/oracle-l
Received on Thu Dec 11 2008 - 11:04:30 CST

Original text of this message