Oracle Advanced Security Administrator's Guide
Release 8.1.7

Part Number A85430-01

Library

Product

Contents

Index

Go to previous page Go to next page

A
Data Encryption and Integrity Parameters

This appendix describes encryption and data integrity parameters supported by Oracle Advanced Security. It also includes an example of a sqlnet.ora file generated by performing the network configuration described in Chapter 2, Configuring Data Encryption and Integrity, and Chapter 9, Configuring Secure Socket Layer Authentication.

This appendix contains the following sections:

Sample sqlnet.ora File

This section contains a sample sqlnet.ora configuration file for a set of clients with similar characteristics and a set of servers with similar characteristics. The file includes examples of Oracle Advanced Security encryption and data integrity parameters.

Trace File Setup

#Trace file setup 
trace_level_server=16 
trace_level_client=16  
trace_directory_server=/orant/network/trace 
trace_directory_client=/orant/network/trace 
trace_file_client=cli  
trace_file_server=srv 
trace_unique_client=true 

Oracle Advanced Security Encryption

#ASO Encryption 
sqlnet.encryption_server=accepted 
sqlnet.encryption_client=requested 
sqlnet.encryption_types_server=(RC4_40) 
sqlnet.encryption_types_client=(RC4_40) 
sqlnet.crypto_seed = "-kdje83kkep39487dvmlqEPTbxxe70273" 

Oracle Advanced Security Integrity

#ASO Checksum 
sqlnet.crypto_checksum_server=requested 
sqlnet.crypto_checksum_client=requested  
sqlnet.crypto_checksum_types_server = (MD5) 
sqlnet.crypto_checksum_types_client = (MD5) 

SSL

#SSL 
oss.source.my_wallet = (SOURCE=
                          (METHOD = FILE) 
                          (METHOD_DATA = 
                           DIRECTORY=/wallet) 

SSL_CIPHER_SUITES=(SSL_DH_anon_WITH_RC4_128_MD5) 
SSL_VERSION= 3 
SSL_CLIENT_AUTHENTICATION=FALSE 

Common

#Common 
automatic_ipc = off  
sqlnet.authentication_services = (beq)  
names.directory_path = (TNSNAMES) 

Kerberos

#Kerberos 
sqlnet.authentication_services = (beq, kerberos5)  
sqlnet.authentication_kerberos5_service = oracle 
sqlnet.kerberos5_conf= /krb5/krb.conf 
sqlnet.kerberos5_keytab= /krb5/v5srvtab 
sqlnet.kerberos5_realms= /krb5/krb.realm 
sqlnet.kerberos5_cc_name = /krb5/krb5.cc 
sqlnet.kerberos5_clockskew=900 

CyberSafe

#CyberSafe 
sqlnet.authentication_services = (beq, cybersafe) 
sqlnet.authentication_gssapi_service = oracle/cybersaf.us.oracle.com  
sqlnet.authentication_kerberos5_service = oracle 
sqlnet.kerberos5_conf= /krb5/krb.conf 
sqlnet.kerberos5_keytab= /krb5/v5srvtab 
sqlnet.kerberos5_realms= /krb5/krb.realm 
sqlnet.kerberos5_cc_name = /krb5/krb5.cc 
sqlnet.kerberos5_clockskew=900 

Identix

#Identix 
sqlnet.authentication_services = (beq, identix) 
sqlnet.identix_fingerprint_database = identix_scanner 
sqlnet.identix_fingerprint_database_user = ofm_client 
sqlnet.identix_fingerprint_database_password = ofm_client 
sqlnet.identix_fingerprint_method = oracle  

RADIUS

#Radius 
sqlnet.authentication_services = (beq, RADIUS )  
sqlnet.radius_authentication_timeout = (10) 
sqlnet.radius_authentication_retries = (2) 
sqlnet.radius_authentication_port = (1645) 
sqlnet.radius_send_accounting = OFF 
sqlnet.radius_secret = /orant/network/admin/radius.key 
sqlnet.radius_authentication = radius.us.oracle.com 
sqlnet.radius_challenge_response = OFF 
sqlnet.radius_challenge_keyword = challenge 
sqlnet.radius_challenge_interface = 
oracle/net/radius/DefaultRadiusInterface 
sqlnet.radius_classpath = /jre1.1/ 

SecurID

#SecurID 
sqlnet.authentication_services = (beq, securid )



Data Encryption and Integrity Parameters

If you do not specify any values for Server Encryption, Client Encryption, Server Checksum, or Client Checksum, the corresponding configuration parameters do not appear in the sqlnet.ora file. However, Oracle Advanced Security defaults to ACCEPTED.

For both data encryption and integrity algorithms, the server selects the first algorithm listed in its sqlnet.ora file that matches an algorithm listed in the client sqlnet.ora file or in the client installed list. If there are no entries in the server sqlnet.ora file, the server sequentially searches its installed list, to match an item on the client side--either in the client sqlnet.ora file or in the client installed list. If no match can be made, the connection fails.

Data encryption and integrity algorithms are selected independently of each other; encryption can be activated without integrity, and integrity can be activated without encryption, as shown by Table A-1:

Table A-1 Algorithm Selection
Encryption Selected?  Integrity Selected? 

Yes 

No 

Yes 

Yes 

No 

Yes 

No 

No 

There are three classes of parameters required to enable data encryption and integrity:


Go to previous page Go to next page
Oracle
Copyright © 1996-2000, Oracle Corporation.

All Rights Reserved.

Library

Product

Contents

Index