SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
♦Oracle 19c Network Security &
Sni
ffi
ng Test Scenario♦
Alireza Kamrani
07/26/2024
In this post I provided a sample to increase security network between Clients and Oracle Server
by setting on sqlnet.ora
fi
le to encrypt data transfer.
And
fi
nally I will use the Wireshark utility that listens to the network to see if the data is actually
encrypted.
I’m making the examples in the 19c database version on Oracle Virtual Box or Vmware
Workstation. The Virtual Box network setting works in the Host-only state.
Let’s start watching the network in Wireshark,
Connect to the database with SQL Developer and run a query,
SQL>select name from v$database;
Name
------
Testdb
Let’s come back to the Wireshark program and examine the results.
As you can see in the picture, the query we run has not made any encryption on the network. So
the query that we run clearly shows what it is.
This is not a safe situation at all.
Now let’s encrypt the tra
ffi
c between the client and the server by changing the “sqlnet.ora”
parameters on the client side.
The client side sqlnet.ora
fi
le should look like this,
The server-side
fi
le should look like this,
Let’s start monitoring the network with Wireshark and connect to SQL Developer and run a query,
select name from v$database;
As shown in the picture, the query appears encrypted after the query we run. When we look at
the tra
ffi
c in the Wireshark program as before, the query executed on the client side became
encrypted.
After you close the connection, let’s search all .trc
fi
les on the client. The trace
fi
le created at the
time of the connection will tell us whether the connection is encrypted.
Look for the word “encryption” in these
fi
le.
This result indicates that the data is encrypted over the network with the AES128 algorithm and
data integrity is ensured by the SHA1 algorithm.
Here I present some information about encryption settings:
Con
fi
guring for Network Encryption
The con
fi
guration for Network Encryption is de
fi
ned in the “sqlnet.ora”
fi
le on the client and server
side. Before con
fi
guring, Oracle Net installation must be done on both the server and client side.
Con
fi
guration can be done by replacing the
fi
le “sqlnet.ora” with the text editor or with the
netmgr program.
Two separate parameters are used on the server side.
SQLNET.ENCRYPTION_SERVER = [accepted | rejected | requested | required ]
SQLNET.ENCYRPTION_TYPES_SERVER = (algorithm name)
The parameters used by the client side,
SQLNET.ENCRYPTION_CLIENT = [ accepted | rejected | requested | required ]
SQLNET.ENCYRPTION_TYPES_CLIENT = ( algorithm name )
The SQLNET.ENCRYPTION_SERVER and SQLNET.ENCRYPTION_CLIENT parameters are
parameters that determine whether to encrypt the client and the server.
This parameter can take the following values,
• REJECTED
• ACCEPTED
• REQUESTED
• REQUIRED
The default value is ACCEPTED.
REJECRED : This means that the client and server will never establish an encrypted connection.
ACCEPTED : It means that the client and the server can establish an encrypted connection if
there is a request to establish an encrypted connection.
REQUESTED : It means that the client and the server want to establish an encrypted connection.
REQUIRED : It means that the client or server is necessarily trying to establish an encrypted
connection. The client and server cannot establish a connection when a connection is requested
withouth password.
📍 Can we use multiple security algorithms?
In any network connection, both the client and server can support multiple encryption algorithms
and integrity algorithms.
When a connection is made, the server selects which algorithm to use, if any, from those
algorithms speci
fi
ed in the sqlnet.ora
fi
les.The server searches for a match between the
algorithms available on both the client and the server, and picks the
fi
rst algorithm in its own list
that also appears in the client list. If one side of the connection does not specify an algorithm list,
all the algorithms installed on that side are acceptable.
The connection fails with error message ORA-12650 if either side speci
fi
es an algorithm that is not
installed.
Encryption and integrity parameters are de
fi
ned by modifying a sqlnet.ora
fi
le on the clients and
the servers on the network.
You can choose to con
fi
gure any or all of the available encryption algorithms, and either or both of
the available integrity algorithms.
Only one encryption algorithm and one integrity algorithm are used for each connect session.
Note:Oracle Database selects the
fi
rst encryption algorithm and the
fi
rst integrity algorithm
enabled on the client and the server. Oracle recommends that you select algorithms and key
lengths in the order in which you prefer negotiation, choosing the strongest key length
fi
rst.
📍 Are clients side con
fi
guration is mandatory?
Oracle Database servers and clients are set to ACCEPT encrypted connections out of the box.
This means that you can enable the desired encryption and integrity settings for a connection pair
by con
fi
guring just one side of the connection, server-side or client-side.
So, for example, if there are many Oracle clients connecting to an Oracle database, you can
con
fi
gure the required encryption and integrity settings for all these connections by making the
appropriate sqlnet.ora changes at the server end.
You do not need to implement con
fi
guration changes for each client separately.
More info:
https://docs.oracle.com/en/database/oracle/oracle-database/19/dbseg/con
fi
guring-network-
data-encryption-and-integrity.html
Best Regards,
Alireza Kamrani.

More Related Content

PPTX
Oracle Database 23c Security New Features.pptx
PDF
Mysql user-camp-march-11th-2016
PDF
Organizational compliance and security SQL 2012-2019 by George Walters
PPTX
Autonomous Database Security Features
PDF
Oracle Database Desupported Features on 23ai (Part B)
PDF
Presentation database security enhancements with oracle
PDF
SOUG Day Oracle 21c New Security Features
PDF
Demystifying the use of wallets and ssl with your database
Oracle Database 23c Security New Features.pptx
Mysql user-camp-march-11th-2016
Organizational compliance and security SQL 2012-2019 by George Walters
Autonomous Database Security Features
Oracle Database Desupported Features on 23ai (Part B)
Presentation database security enhancements with oracle
SOUG Day Oracle 21c New Security Features
Demystifying the use of wallets and ssl with your database

Similar to Oracle 19c Network Security & Sniffing Test Scenario (20)

PDF
Database security best_practices
PDF
Trivadis TechEvent 2017 Kerberos and Databases a Success by Stefan Oehrli
PPT
Formal Lecture.ppt
PPTX
Protecting Your Data with Encryption
PPTX
Always encrypted overview
PDF
SQL Server Column Based Encryption
PPTX
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
PDF
MySQL Day Paris 2016 - MySQL Enterprise Edition
PPTX
Enterprise-class security with PostgreSQL - 1
PPTX
Padding oracle [opkoko2011]
PDF
MySQL Security
PDF
Organizational compliance and security in Microsoft SQL 2012-2016
PPTX
Security Inside Out: Latest Innovations in Oracle Database 12c
PPTX
Understanding SQL Server 2016 Always Encrypted
PDF
MySQL 8.0 - Security Features
PPTX
Encryption oracle
PPTX
Security in Oracle Database
PDF
Oracle advance security transparent data encryption best practices
PDF
Oracle database 12c advanced security guide
PDF
Protecting MySQL Network traffic
Database security best_practices
Trivadis TechEvent 2017 Kerberos and Databases a Success by Stefan Oehrli
Formal Lecture.ppt
Protecting Your Data with Encryption
Always encrypted overview
SQL Server Column Based Encryption
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
MySQL Day Paris 2016 - MySQL Enterprise Edition
Enterprise-class security with PostgreSQL - 1
Padding oracle [opkoko2011]
MySQL Security
Organizational compliance and security in Microsoft SQL 2012-2016
Security Inside Out: Latest Innovations in Oracle Database 12c
Understanding SQL Server 2016 Always Encrypted
MySQL 8.0 - Security Features
Encryption oracle
Security in Oracle Database
Oracle advance security transparent data encryption best practices
Oracle database 12c advanced security guide
Protecting MySQL Network traffic
Ad

More from Alireza Kamrani (20)

PDF
How To Configure Client Failover For Data Guard Connections Using Database Se...
PDF
Tuning_anTroubleshooting_Synchronous_Redo_Transport Part1
PDF
Tuning and Troubleshooting Synchronous Redo Transport (Part 2)
PDF
Oracle Database Instance Tuning (Part 3)
PDF
Oracle Database Instance Tuning (Part 2)
PDF
Oracle Instance Tuning - (Database Box).pdf
PDF
Using ORM like Hibernate on Oracle Database , challenges and recommendations
PDF
Tuning write-heavy operations in Oracle Database, Part C
PDF
Oracle Datafile Recovery vs Block Media Recovery
PDF
CPU Wait Mean in Oracle AWR Report .....
PDF
Keep Sorted Rows / Blocks Oracle Table all versions
PDF
Oracle 19c Automatic Recovery Advisor (ADR)
PDF
Recover Corrupted Datafile Without RMAN Backup
PDF
What is the N+1 Query Problem and How to Solve It
PDF
How to Tuning Disk IO in Oracle DB (Part A)
PDF
Oracle_SGA_vs_PGA_Usage_and_Large_Table_Scans_1740680944.pdf
PDF
HANDLING SORT OPERATION IN Oracle SQL Overview
PDF
Apply_multiple_Oracle_patches_Simultaneously
PDF
Best Practices for Oracle RAC DB with large SGA size
PDF
Create Static Listener SI _ RAC Duplication.pdf
How To Configure Client Failover For Data Guard Connections Using Database Se...
Tuning_anTroubleshooting_Synchronous_Redo_Transport Part1
Tuning and Troubleshooting Synchronous Redo Transport (Part 2)
Oracle Database Instance Tuning (Part 3)
Oracle Database Instance Tuning (Part 2)
Oracle Instance Tuning - (Database Box).pdf
Using ORM like Hibernate on Oracle Database , challenges and recommendations
Tuning write-heavy operations in Oracle Database, Part C
Oracle Datafile Recovery vs Block Media Recovery
CPU Wait Mean in Oracle AWR Report .....
Keep Sorted Rows / Blocks Oracle Table all versions
Oracle 19c Automatic Recovery Advisor (ADR)
Recover Corrupted Datafile Without RMAN Backup
What is the N+1 Query Problem and How to Solve It
How to Tuning Disk IO in Oracle DB (Part A)
Oracle_SGA_vs_PGA_Usage_and_Large_Table_Scans_1740680944.pdf
HANDLING SORT OPERATION IN Oracle SQL Overview
Apply_multiple_Oracle_patches_Simultaneously
Best Practices for Oracle RAC DB with large SGA size
Create Static Listener SI _ RAC Duplication.pdf
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development

Oracle 19c Network Security & Sniffing Test Scenario

  • 1. ♦Oracle 19c Network Security & Sni ffi ng Test Scenario♦ Alireza Kamrani 07/26/2024 In this post I provided a sample to increase security network between Clients and Oracle Server by setting on sqlnet.ora fi le to encrypt data transfer. And fi nally I will use the Wireshark utility that listens to the network to see if the data is actually encrypted. I’m making the examples in the 19c database version on Oracle Virtual Box or Vmware Workstation. The Virtual Box network setting works in the Host-only state. Let’s start watching the network in Wireshark, Connect to the database with SQL Developer and run a query, SQL>select name from v$database; Name ------ Testdb Let’s come back to the Wireshark program and examine the results.
  • 2. As you can see in the picture, the query we run has not made any encryption on the network. So the query that we run clearly shows what it is. This is not a safe situation at all. Now let’s encrypt the tra ffi c between the client and the server by changing the “sqlnet.ora” parameters on the client side. The client side sqlnet.ora fi le should look like this, The server-side fi le should look like this, Let’s start monitoring the network with Wireshark and connect to SQL Developer and run a query, select name from v$database;
  • 3. As shown in the picture, the query appears encrypted after the query we run. When we look at the tra ffi c in the Wireshark program as before, the query executed on the client side became encrypted. After you close the connection, let’s search all .trc fi les on the client. The trace fi le created at the time of the connection will tell us whether the connection is encrypted. Look for the word “encryption” in these fi le. This result indicates that the data is encrypted over the network with the AES128 algorithm and data integrity is ensured by the SHA1 algorithm. Here I present some information about encryption settings: Con fi guring for Network Encryption The con fi guration for Network Encryption is de fi ned in the “sqlnet.ora” fi le on the client and server side. Before con fi guring, Oracle Net installation must be done on both the server and client side. Con fi guration can be done by replacing the fi le “sqlnet.ora” with the text editor or with the netmgr program. Two separate parameters are used on the server side. SQLNET.ENCRYPTION_SERVER = [accepted | rejected | requested | required ] SQLNET.ENCYRPTION_TYPES_SERVER = (algorithm name) The parameters used by the client side, SQLNET.ENCRYPTION_CLIENT = [ accepted | rejected | requested | required ] SQLNET.ENCYRPTION_TYPES_CLIENT = ( algorithm name ) The SQLNET.ENCRYPTION_SERVER and SQLNET.ENCRYPTION_CLIENT parameters are parameters that determine whether to encrypt the client and the server. This parameter can take the following values, • REJECTED • ACCEPTED • REQUESTED • REQUIRED The default value is ACCEPTED.
  • 4. REJECRED : This means that the client and server will never establish an encrypted connection. ACCEPTED : It means that the client and the server can establish an encrypted connection if there is a request to establish an encrypted connection. REQUESTED : It means that the client and the server want to establish an encrypted connection. REQUIRED : It means that the client or server is necessarily trying to establish an encrypted connection. The client and server cannot establish a connection when a connection is requested withouth password. 📍 Can we use multiple security algorithms? In any network connection, both the client and server can support multiple encryption algorithms and integrity algorithms. When a connection is made, the server selects which algorithm to use, if any, from those algorithms speci fi ed in the sqlnet.ora fi les.The server searches for a match between the algorithms available on both the client and the server, and picks the fi rst algorithm in its own list that also appears in the client list. If one side of the connection does not specify an algorithm list, all the algorithms installed on that side are acceptable. The connection fails with error message ORA-12650 if either side speci fi es an algorithm that is not installed. Encryption and integrity parameters are de fi ned by modifying a sqlnet.ora fi le on the clients and the servers on the network. You can choose to con fi gure any or all of the available encryption algorithms, and either or both of the available integrity algorithms. Only one encryption algorithm and one integrity algorithm are used for each connect session. Note:Oracle Database selects the fi rst encryption algorithm and the fi rst integrity algorithm enabled on the client and the server. Oracle recommends that you select algorithms and key lengths in the order in which you prefer negotiation, choosing the strongest key length fi rst. 📍 Are clients side con fi guration is mandatory? Oracle Database servers and clients are set to ACCEPT encrypted connections out of the box. This means that you can enable the desired encryption and integrity settings for a connection pair by con fi guring just one side of the connection, server-side or client-side. So, for example, if there are many Oracle clients connecting to an Oracle database, you can con fi gure the required encryption and integrity settings for all these connections by making the appropriate sqlnet.ora changes at the server end. You do not need to implement con fi guration changes for each client separately. More info: https://docs.oracle.com/en/database/oracle/oracle-database/19/dbseg/con fi guring-network- data-encryption-and-integrity.html Best Regards, Alireza Kamrani.