https://docs.oracle.com/cd/B28359_01/server.111/b28320/initparams213.htm
SEC_PROTOCOL_ERROR_FURTHER_ACTION
specifies the further execution of a server process when receiving bad packets from a possibly malicious client.
如果受到可能的攻击请求的时候服务器进程采取的措施
Values:
-
CONTINUE
The server process continues execution. The database server may be subject to a Denial of Service (DoS) if bad packets continue to be sent by a malicious client.
-
(DELAY,integer)
The client experiences a delay of integer seconds before the server process accepts the next request from the same client connection. Malicious clients are prevented from excessive consumption of server resources while legitimate clients experience a degradation in performance but can continue to function.
-
(DROP,integer)
The server forcefully terminates the client connection after integer bad packets. The server protects itself at the expense of the client (for example, a client transaction may be lost). The client may reconnect and attempt the same operation.
SEC_MAX_FAILED_LOGIN_ATTEMPTS
specifies the number of authentication attempts that can be made by a client on a connection to the server process. After the specified number of failure attempts, the connection will be automatically dropped by the server process.
SEC_PROTOCOL_ERROR_TRACE_ACTION
specifies the action that the database should take when bad packets are received from a possibly malicious client.如果收到可能的攻击的时候数据库所采取的措施:
Values:
-
NONE
The database server ignores the bad packets and does not generate any trace files or log messages.
-
TRACE
A detailed trace file is generated when bad packets are received, which can be used to debug any problems in client/server communication.
-
LOG
A minimal log message is printed in the alert logfile and in the server trace file. A minimal amount of disk space is used.
-
ALERT
An alert message is sent to a DBA or monitoring console.
来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/8747612/viewspace-1974729/,如需转载,请注明出处,否则将追究法律责任。
转载于:http://blog.itpub.net/8747612/viewspace-1974729/