OracleTNSPoisonVulnerability(二)

2014-11-24 16:18:24 · 作者: · 浏览: 4
ctives must be REQUIRED andnot
REQUESTED, as is pretty common, otherwise the attacker can answerto the
connection attempt answering that no SSL cipher is supported atthe
server side (as the attacker's controlled box is for the clientthe
trusted database's server) and the client will reconnect withoutusing
SSL.

Here is more information aboutit…

http://seclists.org/fulldisclosure/2012/Apr/204

Then I did a easy way...

suneng23:/export/home/sfuser>lsnrctl
 
LSNRCTL for Solaris: Version11.2.0.3.0 - Production on 28-FEB-2014 02:05:56
 
Copyright (c) 1991, 2011,Oracle.  All rights reserved.
 
Welcome to LSNRCTL, type"help" for information.
 
LSNRCTL> setdynamic_registration off
Connecting to(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521))
LISTENER parameter"dynamic_registration" set to OFF
The command completedsuccessfully
LSNRCTL>  setsave_config_on_stop on
Connecting to(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521))
LISTENER parameter"save_config_on_stop" set to ON
The command completedsuccessfully
LSNRCTL> exit