Oracle FAQ | Your Portal to the Oracle Knowledge Grid |
Home -> Community -> Usenet -> c.d.o.misc -> Re: Oracle network authentication encryption?
Maxim Demenko wrote:
> Mark D Powell schrieb:
>
>> Jeroen, it isn't the logon encryption that has been questioned recently >> so much as the password hash that Oracle generates and stores in the >> DB. It does not do you a lot of good to encrypt the logon id and >> password passed over the network if the password hash stored in the >> database can be easily broken. >> >> There was an article published that criticized the password hash used >> by Oracle as being week and demostrating how easy it is to generate a >> list of all possible passwords for a set size password. Because Oracle >> converts lower case to upper Oracle loses about half of the available >> hash values. The average was around 20 days to crach a password. >> Requiring all passwords to be long greatly increases this average time >> necessary to break the hash. Requiring all passwords to be changed in >> less than the average time to crack would also be wise. Use of single >> sign-on or LDAP based sign-on security would completely bypass this >> issue. >> >> You can probably find a link or two to the issue on Pete Finnigan's >> site >> http://www.petefinnigan.com >> Pete sort of specializes in security related issues >> >> HTH -- Mark D Powell -- >>
I agree. How is any more Oracle's fault that people don't implement the security resources provided than it is Ford's fault that people don't buckle their seatbelts?
How many databases do you know that have RESOURCE_LIMIT = TRUE and PROFILES implemented? How many have implemented TCP.VALIDNODE_CHECKING? Neither of these take more than five minutes to implement. And yet I can think of only a handful of DBAs that do so routinely.
-- Daniel A. Morgan http://www.psoug.org damorgan_at_x.washington.edu (replace x with u to respond)Received on Mon Nov 14 2005 - 13:33:26 CST