11.07.2015 Views

Oracle Database 11 g - Online Public Access Catalog

Oracle Database 11 g - Online Public Access Catalog

Oracle Database 11 g - Online Public Access Catalog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

234 CHAPTER 5 ■ DATABASE SECURITYBecause database link passwords are stored in uppercase, the password in <strong>Oracle</strong> <strong>Database</strong> <strong>11</strong>gshould be set with uppercase.Now let’s see what kind of implications there are to initiate the database link from <strong>Oracle</strong><strong>Database</strong> <strong>11</strong>g to an older version of <strong>Oracle</strong>. Since <strong>Oracle</strong> <strong>Database</strong> <strong>11</strong>g Release 1 is the firstrelease to use password sensitivity, you do not have to worry about case sensitivity whencreating database links to a prior release of <strong>Oracle</strong>.Password ManagementIn previous releases, if a hacker has select access to the DBA_USERS view, the hacker can easilycrack another user’s password if the passwords are weak. Hackers can create a copy of theDBA_USERS view to a local database and perform an offline attack. Hackers can create a databaseaccount for username entries in the DBA_USERS view and can compare the hash value ofthe password column in the local DBA_USERS view with the production copy of the DBA_USERSview. There are various ways to determine passwords. One common practice is to comparepasswords with millions of words in the dictionary to exploit weak passwords. Another commonpractice is to generate random alphanumeric passwords such as <strong>Oracle</strong>’s RANDOM function andcompare hash values.Luckily, <strong>Oracle</strong> provides another level of security to the underlying data dictionary. TheDBA_USERS view in <strong>Oracle</strong> <strong>Database</strong> <strong>11</strong>g has the password column blanked out. The followingquery confirms that the password column no longer provides the hashed value of the password:SQL> select username, password from dba_users order by username;USERNAMEPASSWORD----------------------- ------------------------------ANONYMOUSAPEX_PUBLIC_USERBICKIMCTXSYSDBSNMPDIPDSONGDSWEET......To obtain the hashed value of the encrypted password, you will need to have the selectprivilege on the USER$ table instead. <strong>Database</strong> users do not receive select privileges against theUSER$ table via the SELECT_CATALOG_ROLE role. One of the ways to grant access to the USER$ tableis by granting the SELECT ANY DICTIONARY role to the database account.Here is the simple query of the USER$ table to view the hashed password values:SQL> select name, password from user$;

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!