Decrypting SSL and TLS traffic by using client key log files

If you have the key log files from a client’s browser, you can import them into IBM QRadar Incident Forensics to decrypt traffic from that client.

Key log files are generated by Google Chrome, Firefox, and Opera browsers that have the SSLKEYLOGFILE environment variable set. Only the RSA and DH key formats are supported for the SSLKEYLOGFILE session key.

Procedure

  1. Use SSH to log in to the QRadar Console, and then into the QRadar Incident Forensics host as the root user.
  2. Review the location of the key logs in the /opt/qradar/conf/forensics_config.xml file.
    <keybag 
    keydir="/opt/ibm/forensics/decapper/keys" 
    keylogs="/opt/ibm/forensics/decapper/keylogs"/>

    You will use the keylogs location in the next steps.

  3. Copy the key log files into the keylogs default directory.
    For example, /opt/ibm/forensics/decapper/keylogs/default.
  4. Restart the decapper service by typing the following command:
    systemctl restart decapper

Results

From this point on, all analysis of new recoveries or flows use the new keys to decrypt traffic.