Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 

decrypted tcpdump capture without using an iRule using tshark

Hi Folks , 

I have used this Article : https://my.f5.com/manage/s/article/K31793632

Everything works well , and I could decrypt my captures but with using the manual way of collecting the Key log pms. 

but this way will take too much to export each key log for each stream so if I took two samples from Key log entries in two different ssl streams and create the pms file , I see that not whole capture be decrypted >>> that's expected , because I haven't exported all key log entries in F5 TLS. 

In this Article there is an automated way to export Key log entries with executing one command using tshark utility. 

Unfortunately this tool doesn't work with bigip bash to export Key Log , it needs others UNIX environments. 

Are there any direct method to export these Key log entries or using tshark utility but not with any Linux/UNIX environments. 

Thanks 

_______________________
Regards
Mohamed Kansoh
1 ACCEPTED SOLUTION
4 REPLIES 4

CA_Valli
MVP
MVP

If you need an on/off trigger for decrypted traffic, I still prefer using the iRule way instead of changing DB keys, so it just logs SSL info for the specific aplication traffic I'm troubleshooting and I can turn it off when I'm done. 

thanks @CA_Valli

yes I prefer Decryption irule too.
but I aimed to find a replacement and I found the DB method but it needs some facilities to obtain the PMS Key. 

_______________________
Regards
Mohamed Kansoh

Thanks alot @JRahm 

_______________________
Regards
Mohamed Kansoh