EducationSoftwareStrategy.com
StrategyCommunity

Knowledge Base

Product

Community

Knowledge Base

TopicsBrowse ArticlesDeveloper Zone

Product

Download SoftwareProduct DocumentationSecurity Hub

Education

Tutorial VideosSolution GalleryEducation courses

Community

GuidelinesGrandmastersEvents
x_social-icon_white.svglinkedin_social-icon_white.svg
Strategy logoCommunity

© Strategy Inc. All Rights Reserved.

LegalTerms of UsePrivacy Policy
  1. Home
  2. Topics

KB47153: How to obtain and unencrypt a TCP dump at the F5 load balancer level in MicroStrategy Cloud environments with the help of the Cloud Network Team?


Community Admin

• Strategy


In some cases it may be required to obtain a TCP dump of traffic flowing from a Strategy Cloud customer's Web browser through the Cloud F5 Load Balancer in order to troubleshoot specific issues.  A TCP dump can be analyzed in order to identify potential problems with the TCP packets being transferred when particular actions are performed by the end user.
 
This technical note applies to taking a TCP dump at the F5 Load Balancer level, which is a task handled by the Cloud Network Team.  This task should be do-able by Network Teams in all regions that have Cloud Network teams, including US, EMEA, and APAC.
 
Note:  TCP dumps can also be taken at the machine level instead of at the F5 load balancer level.  This task would be handled by the Cloud Operations Team instead of the network team, since the Operations Team administers machine level tasks.  In some cases it may be useful to get TCP dumps at both the F5 Load Balancer level and the machine level at the same time, in which case both Cloud Network and Operations teams would need to be involved.
 
The main point to consider when requesting a TCP dump is that all web traffic in Strategy Cloud environments is encrypted via SSL (HTTPS).  Therefore if this is not accounted for when obtaining the TCP dump, then the data in the TCP dump will remain encrypted and APS or Technology (or whoever is analyzing the TCP dump) will likely not be able to get much useful information out of it.  See the below extract from F5 Support which outlines the recommended process to generate a Pre-Master Secret (PMS) log file that can be used to unencrypt the TCP dump.  This part of the process should be handled by the Cloud Network Team.
 
The section below is an extract from F5 Support here:  http://support.f5.com/kb/en-us/solutions/public/10000/200/sol10209.html?sr=37336250
 
 
 
Examining the decrypted application data
 
When troubleshooting SSL issues, it may be necessary to examine the decrypted application data. To do this, thessldumputility must have access to either the (asymmetric) private key from the server you want to debug, or the (symmetric) pre-master secret keys. Using the pre-master secret keys allows you to examine the decrypted application data in Wireshark without having access to the (asymmetric) private key.
 
 
Warning: Decrypting the SSL application data may expose sensitive information such as credit card numbers and passwords.
 
Examining the decrypted application data using the (symmetric) pre-master secret keys
Beginning in BIG-IP 11.2.0, the ssldump -M option allows you to create a pre-master secret (PMS) key log file. You can load the PMS log file into Wireshark (1.6 and later) along with the capture file, and use it to decrypt the application data without having access to the server's private key. This option gives F5 Technical Support the ability to fully decrypt sessions in the targeted capture file without revealing sensitive information about the private key.
To run ssldump using the -M option to the create a pre-master secret key log file, perform the following procedure:

  1. Log in to the BIG-IP command line.
  2. Capture the packet trace containing the SSL traffic (see the Capturing the target traffic section).
  3. To create a pre-master secret key log file, use the followingssldump syntax:
    ssldump -r /path/to/capture_file -k /path/to/private_key -M /path/to/pre-master-key_log_file
    For example, the following ssldump command reads the www-ssl-client1.cap capture file using the test.org key file to decrypt the session, and creates the PMS log file called client1.pms:
    ssldump -r /var/tmp/www-ssl-client1.cap -k /config/filestore/files_d/Common_d/certificate_key_d/\:Common\:test.org.key_1 -M /var/tmp/client1.pms
    You can now load the capture file and the PMS log file into Wireshark (1.6 and later).

Note: For F5 Technical Support to examine the decrypted application data, you must submit the capture file and pre-master secret key log file.
 
 
 
 
Once the steps above are completed, the Network Team should provide Support with the packet capture file along with the .pms(Pre-Master Secret)log file.  Wireshark can be used to decrypt the packet capture by following the steps below:
 
1)  Open Wireshark and on the main screen select Open a previously capture file.  Browse to the capture file and open it.
 
2)  In the Edit menu select Preferences > Protocols > SSL and browse to select the Pre-Master Secretlog file as seen in the screenshot below:
 

ka04W000000OfhpQAC_0EM440000002Myj.png

 
3)  Click Apply / OK and then the data in the HTTPS packets should be readable.
 
Note that the information provided in this technical note is current as of the date of writing and is subject to change based on functionality of third-party applications including Wireshark and F5.


Comment

0 comments

Details

Knowledge Article

Published:

September 28, 2017

Last Updated:

September 28, 2017