{"id":10467,"date":"2024-03-13T10:30:00","date_gmt":"2024-03-13T09:30:00","guid":{"rendered":"https:\/\/blog.capdata.fr\/?p=10467"},"modified":"2024-02-28T17:35:48","modified_gmt":"2024-02-28T16:35:48","slug":"le-chiffrement-oracle-native-network-encryption","status":"publish","type":"post","link":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/","title":{"rendered":"Le chiffrement Oracle : native network encryption"},"content":{"rendered":"<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467&#038;text=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467&#038;title=Le%20chiffrement%20Oracle%20%3A%20native%20network%20encryption\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Le%20chiffrement%20Oracle%20%3A%20native%20network%20encryption&#038;body=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20:%20https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10470 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/Capture-decran-2024-02-28-144722.png\" alt=\"\" width=\"545\" height=\"298\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/Capture-decran-2024-02-28-144722.png 545w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/Capture-decran-2024-02-28-144722-300x164.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Pour continuer dans la s\u00e9rie &#8220;chiffrement et bases de donn\u00e9es&#8221;, nous allons \u00e9voquer le sujet &#8220;native network encryption&#8221; et &#8220;data integrity&#8221; dans le cadre d&#8217;une connexion client \/serveur sur une base de donn\u00e9es Oracle 19c.<\/p>\n<p>&nbsp;<\/p>\n<h2>Pr\u00e9sentation<\/h2>\n<p>&nbsp;<\/p>\n<p>Le m\u00e9canisme consiste \u00e0 chiffrer le trafic r\u00e9seau entre un client Oracle et la base cible distante. Pour cela, nous allons tester, via des traces, ce que nous pouvons relever dans les informations SQLNet entre le client et le serveur de bases de donn\u00e9es.<\/p>\n<p>Attention, point important \u00e0 remonter, cette fonctionnalit\u00e9 est accessible pour <strong>toutes les \u00e9ditions Oracle<\/strong> et ce pour toutes versions. C&#8217;est plut\u00f4t une bonne nouvelle quand on conna\u00eet le co\u00fbt d&#8217;une licence Entreprise Edition avec &#8220;Advanced Security&#8221;.<\/p>\n<p>Consulter l&#8217;information sur <a href=\"https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/19\/dblic\/Licensing-Information.html#GUID-AB56CEE3-955E-4E56-8B44-6075E889C283\">ce lien<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10471 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/license_oracle.png\" alt=\"\" width=\"833\" height=\"357\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/license_oracle.png 833w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/license_oracle-300x129.png 300w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/license_oracle-768x329.png 768w\" sizes=\"auto, (max-width: 833px) 100vw, 833px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Les algorithmes de chiffrement<\/h3>\n<p>Pour proc\u00e9der au chiffrement client\/server, Oracle travaille sur une liste d&#8217;algorithmes que l&#8217;on peut utiliser.<\/p>\n<p>Voici une liste, extraite du site Oracle, pouvant \u00eatre prise en charge.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10472 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/algo.png\" alt=\"\" width=\"686\" height=\"164\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/algo.png 686w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/algo-300x72.png 300w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/p>\n<p>Depuis la version 19c, seuls les algorithmes AES (Advanced Encryption Standard) ont \u00e9t\u00e9 valid\u00e9s. On peut ajouter \u00e0 cette liste AES192.<\/p>\n<p>Pour utiliser les nouveaux algorithmes AES, Oracle recommande l&#8217;installation d&#8217;un patch de prise en charge \u00e0 prendre en compte dans la note <a href=\"https:\/\/support.oracle.com\/CSP\/main\/article?cmd=show&amp;amp;type=NOT&amp;amp;id=2118136.2\" target=\"_blank\" rel=\"noopener\">2118136.2<\/a>. Ceci pour les anciennes versions Oracle.<\/p>\n<p>L&#8217;algorithme 3DES peut \u00e9galement \u00eatre choisi, mais attention aux soucis de performances r\u00e9cemment relev\u00e9s par Oracle. A n&#8217;utiliser qu&#8217;avec des syst\u00e8mes tr\u00e8s performants en CPU.<\/p>\n<p>&nbsp;<\/p>\n<h3>Data Integrity<\/h3>\n<p>Il faudra penser \u00e0 conserver l\u2019int\u00e9grit\u00e9 des donn\u00e9es, en effectuant un \u00ab checksum \u00bb sur celles-ci.<br \/>\nOracle utilise pour cela les algorithmes SHA pour proc\u00e9der: SHA1, SHA256, SHA384, and SHA512.<\/p>\n<p>Attention, MD5 est encore compatible mais plus recommand\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<h3>Performances<\/h3>\n<p>Voici quelques tests de performances effectu\u00e9s permettant d\u2019avoir un retour sur les temps de r\u00e9ponses des<br \/>\nconnexions passant \u00e0 travers le chiffrement. Ces tests ont \u00e9t\u00e9 faits sur certains algorithmes qui sont d\u00e9pr\u00e9ci\u00e9s aujourd&#8217;hui.<\/p>\n<p>Un exemple, trouv\u00e9 sur le net, est le suivant :<\/p>\n<p>&#8220;on interroge 100 fois la table des objets d\u2019une base (dba_objects).<br \/>\nOn rel\u00e8vera les temps \u00e9coul\u00e9s pour chacune de ces op\u00e9rations.&#8221;<br \/>\nChacun des tests est ex\u00e9cut\u00e9 3 fois sur les diff\u00e9rents algorithmes utilis\u00e9s avec chacun des checksums.<br \/>\nCe qui donne le tableau suivant<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10473 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tableau_perf.png\" alt=\"\" width=\"426\" height=\"226\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tableau_perf.png 426w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tableau_perf-300x159.png 300w\" sizes=\"auto, (max-width: 426px) 100vw, 426px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>On consid\u00e8re une base 100% une connexion sans param\u00e8tres de chiffrement d\u00e9fini.<\/p>\n<p>&nbsp;<\/p>\n<h2>Configuration<\/h2>\n<p>&nbsp;<\/p>\n<p>Afin de mettre en \u0153uvre le chiffrement, nous devrons passer des param\u00e8tres dans le fichier &#8220;<span style=\"color: #993300;\">sqlnet.ora<\/span>&#8220;<br \/>\ncot\u00e9 client, et cot\u00e9 serveur.<\/p>\n<p>Les param\u00e8tres qui seront \u00e0 configurer cot\u00e9s client sont:<\/p>\n<p><strong><em>SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT<\/em><\/strong><br \/>\n<strong><em>SQLNET.CRYPTO_SEED<\/em><\/strong><br \/>\n<strong><em>SQLNET.ENCRYPTION_TYPES_CLIENT<\/em><\/strong><br \/>\n<strong><em>SQLNET.CRYPTO_CHECKSUM_CLIENT<\/em><\/strong><br \/>\n<strong><em>SQLNET.ENCRYPTION_CLIENT<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Au vu des r\u00e9sultats sur les performances et des recommandations Oracle, nous utiliserons, pour le test,<br \/>\nles algorithmes <strong>AES256<\/strong> pour le chiffrement et <strong>SHA384<\/strong> pour le checksum.<\/p>\n<p>A noter, que l&#8217;on pourra d\u00e9finir une cl\u00e9 &#8220;<strong><span style=\"color: #003366;\">crypto_seed<\/span><\/strong>&#8221; pour la connexion, en choisissant une valeur de<br \/>\n10 \u00e0 70 caract\u00e8res alphanum\u00e9riques.<br \/>\nPour la partie serveur, les param\u00e8tres \u00e0 d\u00e9finir sont les suivants :<\/p>\n<p><em><strong>SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER<\/strong><\/em><br \/>\n<em><strong>SQLNET.CRYPTO_SEED<\/strong><\/em><br \/>\n<em><strong>SQLNET.ENCRYPTION_TYPES_SERVER<\/strong><\/em><br \/>\n<em><strong>SQLNET.CRYPTO_CHECKSUM_SERVER<\/strong><\/em><br \/>\n<em><strong>SQLNET.ENCRYPTION_SERVER<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Les algorithmes devront \u00eatre <strong>identiques<\/strong> (<strong>encryption<\/strong> et <strong>crypto_checksum<\/strong>)<strong> entre le client et le serveur<\/strong><br \/>\npour que la communication se fasse.<\/p>\n<p>Les 4 valeurs que l&#8217;on peut choisir pour le param\u00e8tre SQLNET.ENCRYPTION cot\u00e9 client et serveur sont les suivantes :<\/p>\n<pre>REQUESTED : le chiffrement est demand\u00e9 mais si ce n'est pas possible, le flux client\/serveur se passera via trafic non chiffr\u00e9.\r\nREJECTED : Pas de chiffrement demand\u00e9.\r\nREQUIRED : seul le trafic avec chiffrement sera accept\u00e9.\r\nACCEPTED : le client ou le serveur accepte toute connexion chiffr\u00e9e ou non chiffr\u00e9e. Valeur par d\u00e9faut si \"native network encryption\" n'est pas activ\u00e9<\/pre>\n<p>&nbsp;<\/p>\n<p>Le tableau suivant donnera la matrice de compatibilit\u00e9 des diff\u00e9rents modes de n\u00e9gociations utilis\u00e9s<br \/>\npour une connexion.<\/p>\n<p>Il est possible, selon les param\u00e8tres <span style=\"color: #ff0000;\">SQLNET.ENCRYPTION<\/span> et <span style=\"color: #ff0000;\">SQLNET.CRYPTO_CHECKSUM <\/span>choisis d&#8217;activer ou non le chiffrement.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10475 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tab_integ.png\" alt=\"\" width=\"833\" height=\"683\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tab_integ.png 833w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tab_integ-300x246.png 300w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/tab_integ-768x630.png 768w\" sizes=\"auto, (max-width: 833px) 100vw, 833px\" \/><\/p>\n<p>Ce tableau est extrait du site Oracle sur <a href=\"https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/19\/dbseg\/configuring-network-data-encryption-and-integrity.html#GUID-02CA9997-996F-413E-B00D-55DB96675ACB\">ce lien<\/a><\/p>\n<p>Lorsque la connexion \u00e9choue, le client re\u00e7oit une erreur ORA-12650.<br \/>\nC&#8217;est le cas, si nous sommes en REJECTED cot\u00e9 client et REQUIRED cot\u00e9 serveur, par exemple.<\/p>\n<p>&nbsp;<\/p>\n<pre><code><\/code><\/pre>\n<h4><\/h4>\n<h4>Test avec chiffrement actif<\/h4>\n<p>&nbsp;<\/p>\n<p>Nous testons dans un premier temps une connexion avec chiffrement actif.<br \/>\nAussi, nous choisissons, cot\u00e9 serveur le mode ACCEPTED.<\/p>\n<p>Puis cot\u00e9 client REQUESTED, ceci pour<br \/>\nl&#8217;encryption et le checksum.<\/p>\n<p>En r\u00e9sum\u00e9, voici les param\u00e8tres que nous d\u00e9finirons dans le sqlnet.ora cot\u00e9 client :<\/p>\n<p><span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT= (SHA384)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_SEED = &#8216;&#8221;i5rrruweotcadsfdsafjkdsfqp5f201p45mxskdlfdasf&#8221;&#8216;<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_TYPES_CLIENT= (AES256)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_CLIENT = requested<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_CLIENT = requested<\/strong><\/span><\/p>\n<p>et le sqlnet.ora cot\u00e9 serveur :<\/p>\n<p><span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER= (SHA384)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_SEED = &#8216;&#8221;4fhfguweotcadsfdsafjkdsfqp5f201p45mxskdlfdasf&#8221;&#8216;<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_TYPES_SERVER= (AES256)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_SERVER = accepted<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_SERVER = accepted<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>Les op\u00e9rations se d\u00e9roulent avec les caract\u00e9ristiques suivantes<\/p>\n<ul>\n<li>Pour la partie client, une installation d&#8217;Oracle Client 12.2.<\/li>\n<li>Pour la\u00a0partie serveur, 1 base CAPDATADB version 19c avec le patchser 19.11 d&#8217;avril 2021<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<pre class=\"brush: sql; title: ; notranslate\" title=\"\">Connected to:\r\nOracle Database 19c Enterprise Edition Release 19.0.0.0.0 - Production\r\n\r\nSQL&gt; show user\r\nUSER is &quot;MANU&quot;<\/pre>\n<p>&nbsp;<\/p>\n<p>Voici le contexte de connexion cot\u00e9 base de donn\u00e9es. On s&#8217;assure ainsi que le chiffrement client\/serveur est bien actif<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: sql; title: ; notranslate\" title=\"\">SQL&gt; set pages 3000 linesize 190\r\nSQL&gt; select c.sid, c.serial#, c.network_service_banner,c.client_connection from v$session_connect_info c\r\n2* inner join v$session s on (s.sid=c.sid) and s.username ='MANU';\r\n\r\nSID        SERIAL#    NETWORK_SERVICE_BANNER                                                                          CLIENT_CONNEC\r\n---------- ---------- ----------------------------------------------------------------------------------------------- -------------\r\n32         1490       TCP\/IP NT Protocol Adapter for Linux: Version 19.0.0.0.0 - Production                           Homogeneous\r\n32         1490       Encryption service for Linux: Version 19.0.0.0.0 - Production                                   Homogeneous\r\n32         1490       AES256 Encryption service adapter for Linux: Version 19.0.0.0.0 - Production                    Homogeneous\r\n32         1490       Crypto-checksumming service for Linux: Version 19.0.0.0.0 - Production                          Homogeneous\r\n32         1490       SHA384 Crypto-checksumming service adapter for Linux: Version 19.0.0.0.0 - Production           Homogeneous<\/pre>\n<p>&nbsp;<\/p>\n<p>L&#8217;algorithme <strong>AES256<\/strong> et le checksum <strong>SHA384<\/strong> apparaissent dans les infos de connexions.<br \/>\nOn pourra aussi mettre en place une trace sqlnet afin de voir que les donn\u00e9es envoy\u00e9es via le r\u00e9seau sont bien chiffr\u00e9es durant cette connexion.<\/p>\n<p>Les param\u00e8tres \u00e0 mettre en place sur le &#8220;<strong>sqlnet.ora<\/strong>&#8221; du client sont les suivants :<\/p>\n<p><strong>TRACE_UNIQUE_CLIENT = on<\/strong><br \/>\n<strong>TRACE_DIRECTORY_CLIENT = \/opt\/oracle\/product\/12.2\/dbhome_1\/network\/trace<\/strong><br \/>\n<strong>TRACE_FILE_CLIENT = trace_client<\/strong><br \/>\n<strong>TRACE_LEVEL_CLIENT = 16<\/strong><br \/>\n<strong>DIAG_ADR_ENABLED = OFF<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Les traces sont donc g\u00e9n\u00e9r\u00e9es, cot\u00e9 client, dans le r\u00e9pertoire \u00ab \/<strong>opt\/oracle\/product\/12.2\/dbhome_1\/network\/trace<\/strong> \u00bb.<\/p>\n<p>Nous passons le param\u00e8tre <strong>TRACE_LEVEL_CLIENT<\/strong> \u00e0 16 ou niveau SUPPORT afin de r\u00e9cup\u00e9rer le maximum<br \/>\nd\u2019informations, y compris les trames envoy\u00e9es vers le serveur.<\/p>\n<p>On teste une connexion, avec une simple interrogation sur la vue d\u2019instance (<strong>v$instance<\/strong>).<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: sql; title: ; notranslate\" title=\"\">[oracle@ip-172-44-2-250 ]$ sqlplus manu@CAPDATADB\r\n\r\nSQL*Plus: Release 12.2.0.1.0 Production on Wed Feb 28 15:34:23 2024\r\n\r\nCopyright (c) 1982, 2016, Oracle. All rights reserved.\r\n\r\nEnter password:\r\nLast Successful login time: Wed Feb 28 2024 15:20:13 +00:00\r\n\r\nConnected to:\r\nOracle Database 19c Enterprise Edition Release 19.0.0.0.0 - Production\r\n\r\nSQL&gt; select INSTANCE_NAME,HOST_NAME,VERSION,STATUS,DATABASE_STATUS from v$instance;\r\n\r\nINSTANCE_NAME\r\n----------------\r\nHOST_NAME\r\n----------------------------------------------------------------\r\nVERSION           DATABASE_STATUS\r\n----------------- ------------ -----------------\r\nCAPDATADB\r\nip-172-44-2-141.capdata-aws.fr\r\n19.0.0.0.0        ACTIVE<\/pre>\n<p>&nbsp;<\/p>\n<p>Une trace est alors g\u00e9n\u00e9r\u00e9e dans le r\u00e9pertoire $ORACLE_HOME\/network\/trace. Le pid de notre connexion Oracle est le 5129.<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">[oracle@ip-172-44-2-250 trace]$ ls -rtl\r\ntotal 332\r\n-rw-rw----. 1 oracle oinstall 337246 Feb 28 15:36 trace_client_5129.trc<\/pre>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Si l\u2019on observer les packets envoy\u00e9s par le client, on voit que ceux-ci sont bien chifrr\u00e9s. La requ\u00eate<br \/>\nselect sur la vue v$instance n\u2019apparait pas en clair, les trames re\u00e7us par le serveur sont chiffr\u00e9s :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10482 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_chiffre.png\" alt=\"\" width=\"707\" height=\"436\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_chiffre.png 707w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_chiffre-300x185.png 300w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>On retrouve bien les informations d\u2019encryption dans les trames des packets.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10483 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_actif.png\" alt=\"\" width=\"892\" height=\"229\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_actif.png 892w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_actif-300x77.png 300w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_actif-768x197.png 768w\" sizes=\"auto, (max-width: 892px) 100vw, 892px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4>Test sans chiffrement actif<\/h4>\n<p>&nbsp;<\/p>\n<p>Nous effectuons le m\u00eame test avec une connexion sans chiffrage actif.<\/p>\n<p>S\u2019il l\u2019on se r\u00e9f\u00e8re au tableau de compatibilit\u00e9 client\/serveur sur les mode ENCRYPTION, en pla\u00e7ant les algorithmes d\u2019encryption sur REJECTED cot\u00e9<br \/>\nclient et ACCEPTED cot\u00e9 serveur, nous sommes dans un sc\u00e9nario ou le chiffrement est d\u00e9sactiv\u00e9.<\/p>\n<p>Les param\u00e8tres du sqlnet.ora sont les suivants cot\u00e9 client :<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT= (SHA384)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_SEED = &#8216;&#8221;i5rrruweotcadsfdsafjkdsfqp5f201p45mxskdlfdasf&#8221;&#8216;<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_TYPES_CLIENT= (AES256)<\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.CRYPTO_CHECKSUM_CLIENT = <span style=\"color: #800000;\">rejected<\/span><\/strong><\/span><br \/>\n<span style=\"color: #000080;\"><strong>SQLNET.ENCRYPTION_CLIENT = <span style=\"color: #800000;\">rejected<\/span><\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>Cot\u00e9 serveur, on ne modifie rien, on laisse \u00e0 ACCEPTED.<\/p>\n<p>Les op\u00e9rations se d\u00e9roulent \u00e0 l\u2019identique, avec les m\u00eames environnements que pr\u00e9c\u00e9demment.<\/p>\n<p>Si l&#8217;on interroge les contextes de connexion du user MANU sur la base<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: sql; title: ; notranslate\" title=\"\">SQL&gt; select c.sid, c.serial#, c.network_service_banner,c.client_connection from v$session_connect_info c\r\n2* inner join v$session s on (s.sid=c.sid) and s.username ='MANU'\r\n\r\n\r\n\r\nSID        SERIAL#     NETWORK_SERVICE_BANNER                                                                          CLIENT_CONNEC\r\n---------- -------     ----------------------------------------------------------------------------------------------- -------------\r\n32         24306       TCP\/IP NT Protocol Adapter for Linux: Version 19.0.0.0.0 - Production                           Homogeneous\r\n32         24306       Encryption service for Linux: Version 19.0.0.0.0 - Production                                   Homogeneous\r\n32         24306       Crypto-checksumming service for Linux: Version 19.0.0.0.0 - Production                          Homogeneous<\/pre>\n<p>&nbsp;<\/p>\n<p>On voit \u00e0 pr\u00e9sent que les algorithmes AES256 et SHA384 n\u2019apparaissaient pas dans les informations de<br \/>\nconnexion.<\/p>\n<p>S\u2019il l\u2019on se r\u00e9f\u00e8re \u00e0 nouveau au fichier trace, on cherche si les informations sont plus \u00ab parlantes \u00bb.<br \/>\nOn r\u00e9ex\u00e9cute un test de connexion, avec la m\u00eame requ\u00eate sur un simple select dans la vue v$instance .<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: sql; title: ; notranslate\" title=\"\">Connected to:\r\nOracle Database 19c Enterprise Edition Release 19.0.0.0.0 - Production\r\n\r\nSQL&gt; set pages 3000 linesize 200\r\nSQL&gt; select INSTANCE_NAME,HOST_NAME,VERSION,STATUS,DATABASE_STATUS from v$instance;\r\n\r\nINSTANCE_NAME     HOST_NAME                                                        VERSION           STATUS       DATABASE_STATUS\r\n----------------  ---------------------------------------------------------------- ----------------- ------------ -----------------\r\nCAPDATADB         ip-172-44-2-141.capdata-aws.fr                                   19.0.0.0.0        OPEN         ACTIVE<\/pre>\n<p>&nbsp;<\/p>\n<p>La trace g\u00e9n\u00e9r\u00e9e est la suivante , avec le pid 6116 cette fois ci.<\/p>\n<p>&nbsp;<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">[oracle@ip-172-44-2-250 trace]$ ls -lrt\r\ntotal 568\r\n-rw-rw----. 1 oracle oinstall 337246 Feb 28 15:36 trace_client_5129.trc\r\n-rw-rw----. 1 oracle oinstall 239231 Feb 28 15:58 trace_client_6116.trc<\/pre>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Nous voyons dans la trace que le chiffrement est bien inactif :<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10484 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_inactif.png\" alt=\"\" width=\"1097\" height=\"308\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_inactif.png 1097w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_inactif-300x84.png 300w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_inactif-1024x288.png 1024w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/encrypt_inactif-768x216.png 768w\" sizes=\"auto, (max-width: 1097px) 100vw, 1097px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Nous disposons m\u00eames des informations du user connect\u00e9, son nom, son programme, mais aussi, la<br \/>\nmachine depuis laquelle il est connect\u00e9, et le PID attach\u00e9e \u00e0 la session (ici 616 ce qui correspond au<br \/>\nnom de la trace g\u00e9n\u00e9r\u00e9).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10485 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_nonchiff.png\" alt=\"\" width=\"707\" height=\"550\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_nonchiff.png 707w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/packet_nonchiff-300x233.png 300w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Et surtout, nous retrouvons bien notre requ\u00eate\u00a0 select sur la vue from v$instance\u00a0 dans les packets envoy\u00e9s au<br \/>\nserveur :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10486 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/requete_claire.png\" alt=\"\" width=\"729\" height=\"484\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/requete_claire.png 729w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/requete_claire-300x199.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Avec, en clair, le r\u00e9sultat obtenu pour cette requ\u00eate :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10487 size-full\" src=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/donnees_claires.png\" alt=\"\" width=\"723\" height=\"475\" srcset=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/donnees_claires.png 723w, https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/donnees_claires-300x197.png 300w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Points d&#8217;attention<\/h3>\n<p>&nbsp;<\/p>\n<p>Selon les besoins en s\u00e9curit\u00e9, nous choisirons d\u2019activer, ou non, le chiffrement sur les connexions client\/serveur en fonction du degr\u00e9 de criticit\u00e9 du serveur et de son exposition au r\u00e9seau.<\/p>\n<p>Etant donn\u00e9 que l\u2019option se place sur le fichier sqlnet.ora, toutes les bases attach\u00e9s \u00e0 ce ORACLE_HOME prendront en compte le chiffrement.<\/p>\n<p>Attention \u00e9galement \u00e0 d\u00e9sactiver les traces cot\u00e9 client, une fois les divers tests termin\u00e9s.<\/p>\n<p>En effet, les r\u00e9pertoires \u2018trace\u2019 dans $ORACLE_HOME\/network\/trace peuvent vite \u00eatre satur\u00e9s.<\/p>\n<p>Dans le sqlnet.ora du client :<\/p>\n<p><strong>TRACE_LEVEL_CLIENT = OFF<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467&#038;text=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467&#038;title=Le%20chiffrement%20Oracle%20%3A%20native%20network%20encryption\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Le%20chiffrement%20Oracle%20%3A%20native%20network%20encryption&#038;body=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20:%20https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F10467\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Pour continuer dans la s\u00e9rie &#8220;chiffrement et bases de donn\u00e9es&#8221;, nous allons \u00e9voquer le sujet &#8220;native network encryption&#8221; et &#8220;data integrity&#8221; dans le cadre d&#8217;une connexion client \/serveur sur une base de donn\u00e9es Oracle 19c. &nbsp; Pr\u00e9sentation &nbsp; Le&hellip; <a href=\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\" class=\"more-link\">Continuer la lecture <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":10468,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[458,278],"class_list":["post-10467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-oracle","tag-chiffrement","tag-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le chiffrement Oracle : native network encryption - Capdata TECH BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le chiffrement Oracle : native network encryption - Capdata TECH BLOG\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Pour continuer dans la s\u00e9rie &#8220;chiffrement et bases de donn\u00e9es&#8221;, nous allons \u00e9voquer le sujet &#8220;native network encryption&#8221; et &#8220;data integrity&#8221; dans le cadre d&#8217;une connexion client \/serveur sur une base de donn\u00e9es Oracle 19c. &nbsp; Pr\u00e9sentation &nbsp; Le&hellip; Continuer la lecture &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Capdata TECH BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13T09:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-28T16:35:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/Capture-decran-2024-02-28-144148.png\" \/>\n\t<meta property=\"og:image:width\" content=\"316\" \/>\n\t<meta property=\"og:image:height\" content=\"179\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emmanuel RAMI\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emmanuel RAMI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\"},\"author\":{\"name\":\"Emmanuel RAMI\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/person\/797b9b6698fa35f7ce3e9a70a8b102ae\"},\"headline\":\"Le chiffrement Oracle : native network encryption\",\"datePublished\":\"2024-03-13T09:30:00+00:00\",\"dateModified\":\"2024-02-28T16:35:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\"},\"wordCount\":1861,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.capdata.fr\/#organization\"},\"keywords\":[\"chiffrement\",\"s\u00e9curit\u00e9\"],\"articleSection\":[\"Oracle\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\",\"url\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\",\"name\":\"Le chiffrement Oracle : native network encryption - Capdata TECH BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/blog.capdata.fr\/#website\"},\"datePublished\":\"2024-03-13T09:30:00+00:00\",\"dateModified\":\"2024-02-28T16:35:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/blog.capdata.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le chiffrement Oracle : native network encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.capdata.fr\/#website\",\"url\":\"https:\/\/blog.capdata.fr\/\",\"name\":\"Capdata TECH BLOG\",\"description\":\"Le blog technique sur les bases de donn\u00e9es de CAP DATA Consulting\",\"publisher\":{\"@id\":\"https:\/\/blog.capdata.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.capdata.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.capdata.fr\/#organization\",\"name\":\"Capdata TECH BLOG\",\"url\":\"https:\/\/blog.capdata.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp\",\"contentUrl\":\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp\",\"width\":800,\"height\":254,\"caption\":\"Capdata TECH BLOG\"},\"image\":{\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cap-data-consulting\/mycompany\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/person\/797b9b6698fa35f7ce3e9a70a8b102ae\",\"name\":\"Emmanuel RAMI\",\"sameAs\":[\"https:\/\/blog.capdata.fr\"],\"url\":\"https:\/\/blog.capdata.fr\/index.php\/author\/erami\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le chiffrement Oracle : native network encryption - Capdata TECH BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/","og_locale":"fr_FR","og_type":"article","og_title":"Le chiffrement Oracle : native network encryption - Capdata TECH BLOG","og_description":"&nbsp; Pour continuer dans la s\u00e9rie &#8220;chiffrement et bases de donn\u00e9es&#8221;, nous allons \u00e9voquer le sujet &#8220;native network encryption&#8221; et &#8220;data integrity&#8221; dans le cadre d&#8217;une connexion client \/serveur sur une base de donn\u00e9es Oracle 19c. &nbsp; Pr\u00e9sentation &nbsp; Le&hellip; Continuer la lecture &rarr;","og_url":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/","og_site_name":"Capdata TECH BLOG","article_published_time":"2024-03-13T09:30:00+00:00","article_modified_time":"2024-02-28T16:35:48+00:00","og_image":[{"width":316,"height":179,"url":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2024\/02\/Capture-decran-2024-02-28-144148.png","type":"image\/png"}],"author":"Emmanuel RAMI","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Emmanuel RAMI","Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#article","isPartOf":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/"},"author":{"name":"Emmanuel RAMI","@id":"https:\/\/blog.capdata.fr\/#\/schema\/person\/797b9b6698fa35f7ce3e9a70a8b102ae"},"headline":"Le chiffrement Oracle : native network encryption","datePublished":"2024-03-13T09:30:00+00:00","dateModified":"2024-02-28T16:35:48+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/"},"wordCount":1861,"commentCount":0,"publisher":{"@id":"https:\/\/blog.capdata.fr\/#organization"},"keywords":["chiffrement","s\u00e9curit\u00e9"],"articleSection":["Oracle"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/","url":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/","name":"Le chiffrement Oracle : native network encryption - Capdata TECH BLOG","isPartOf":{"@id":"https:\/\/blog.capdata.fr\/#website"},"datePublished":"2024-03-13T09:30:00+00:00","dateModified":"2024-02-28T16:35:48+00:00","breadcrumb":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.capdata.fr\/index.php\/le-chiffrement-oracle-native-network-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/blog.capdata.fr\/"},{"@type":"ListItem","position":2,"name":"Le chiffrement Oracle : native network encryption"}]},{"@type":"WebSite","@id":"https:\/\/blog.capdata.fr\/#website","url":"https:\/\/blog.capdata.fr\/","name":"Capdata TECH BLOG","description":"Le blog technique sur les bases de donn\u00e9es de CAP DATA Consulting","publisher":{"@id":"https:\/\/blog.capdata.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.capdata.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.capdata.fr\/#organization","name":"Capdata TECH BLOG","url":"https:\/\/blog.capdata.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp","contentUrl":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp","width":800,"height":254,"caption":"Capdata TECH BLOG"},"image":{"@id":"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cap-data-consulting\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/blog.capdata.fr\/#\/schema\/person\/797b9b6698fa35f7ce3e9a70a8b102ae","name":"Emmanuel RAMI","sameAs":["https:\/\/blog.capdata.fr"],"url":"https:\/\/blog.capdata.fr\/index.php\/author\/erami\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/10467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/comments?post=10467"}],"version-history":[{"count":13,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/10467\/revisions"}],"predecessor-version":[{"id":10492,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/10467\/revisions\/10492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/media\/10468"}],"wp:attachment":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/media?parent=10467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/categories?post=10467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/tags?post=10467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}