- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: ps permissions
Categories
Company
Local Language
Forums
Discussions
Knowledge Base
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Knowledge Base
Forums
Discussions
- Cloud Mentoring and Education
- Software - General
- HPE OneView
- HPE Ezmeral Software platform
- HPE OpsRamp
Knowledge Base
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-05-2004 10:05 AM
01-05-2004 10:05 AM
When we run database imports, the developers can use ps to see the userid/password on the imp command and I'm trying to prevent this.
Is there any risk in doing this?
Thanks,
Tim
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-05-2004 10:13 AM
01-05-2004 10:13 AM
SolutionHere's a risk:
There could be 10,000 scripts running out there with "ps -ef | grep "STRING" " statements in them and they will all abort, and it will be your fault.
If Oracle doesn't know enough to hide their stupid ID/passwords, then it's not your responsibility to cover it up. We have the same problem with Oracle Applications, and it's just the way it is.
BTW, nobody ever figured out the Oracle Apps passwords.... Users just don't think of it.
(You can't take that to the bank, of course...)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-05-2004 10:17 AM
01-05-2004 10:17 AM
Re: ps permissions
The real problem is not ps but rather the practice of sending plaintext in the command line. I would put the username/password in the exp parameter file and make the permissions of the paramter file restrictive.
Plan B. Let the user be authenicsted by the OS just as you would for SQLPlus. I think external authenication works for export but I can't remember trying it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-05-2004 10:24 AM
01-05-2004 10:24 AM
Re: ps permissions
Still, I have to voice the opinion:
This is the tail wagging the dog, if I ever saw it.
I'd say the import method needs changing... not the "ps" command.
There are a few ways around this, including the "hide"
command that you can get and compile... another is by
piping the password to the import command, instead of including it.
Shame on Oracle, for not making this an easier task.
If you still wanted to cripple users' ability to use "ps",
I suppose you could do that. I can't think of anything
right off that would break, unless they've got scripts
that require a functional "ps" command to work correctly.
I suppose you could also wrapper ps in such a way
that it checked uid, and ignored sql, import, and other
oracle commands for users not in a specific group, if you wanted.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-06-2004 12:34 AM
01-06-2004 12:34 AM