Auditing an Oracle database for security issues is very important. provides all of the information and tools that you will need Click here for details of Limited's detailed Oracle database security audit service Click here for details of Limited's Oracle Security Training Courses
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Welcome, Guest. Please Login.
Jun 18th, 2019, 6:09am
News: If you would like to register contact the forum admin
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security
(Moderator: Pete Finnigan)
   listener security
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: listener security  (Read 2453 times)
Pete Finnigan Administrator

Oracle Security is easier if you design for it

View Profile | WWW | Email

Gender: male
Posts: 309
listener security
« on: Mar 18th, 2010, 5:03pm »
Quote | Modify

We have an Oracle installation (10204 under Linux) and the Oracle listener is running under another Linux user (not oracle). The oracle user can't issue lsnrctl commands: it gets a TNS-01190 error. In principle this is correct but because of some issues we want to allow oracle to issue lsnrctl commands.
What would be the best way to achieve this?
I was thinking about running the tnslnr process with setgid (set group id) set for the dba group. The user under which the listener runs is also member of the dba group.
Is this going to work?  
Another optio could be sudo.
Any other options?
IP Logged

Pete Finnigan (
Oracle Security Web site:
Oracle security blog:
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright 2000-2004 Yet another Bulletin Board