REQUESTED, as is pretty common, otherwise the attacker can answerto the
connection attempt answering that no SSL cipher is supported atthe
server side (as the attacker's controlled box is for the clientthe
trusted database's server) and the client will reconnect withoutusing
SSL.
Here is more information aboutit…
http://seclists.org/fulldisclosure/2012/Apr/204
Then I did a easy way...
suneng23:/export/home/sfuser>lsnrctl LSNRCTL for Solaris: Version11.2.0.3.0 - Production on 28-FEB-2014 02:05:56 Copyright (c) 1991, 2011,Oracle. All rights reserved. Welcome to LSNRCTL, type"help" for information. LSNRCTL> setdynamic_registration off Connecting to(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521)) LISTENER parameter"dynamic_registration" set to OFF The command completedsuccessfully LSNRCTL> setsave_config_on_stop on Connecting to(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521)) LISTENER parameter"save_config_on_stop" set to ON The command completedsuccessfully LSNRCTL> exit