diff --git a/labs/remotebrowser/Dockerfile b/labs/remotebrowser/Dockerfile index 6924e04..158cbce 100644 --- a/labs/remotebrowser/Dockerfile +++ b/labs/remotebrowser/Dockerfile @@ -7,9 +7,11 @@ ENV DEBIAN_FRONTEND=noninteractive \ DISPLAY=:99 \ VNC_PORT=5900 \ NOVNC_PORT=6080 \ + NOVNC_HTTPS_PORT=6443 \ PROXY_PORT=8080 \ CHROME_REMOTE_DEBUGGING_PORT=9222 \ - PROXY_HOST=127.0.0.1 + PROXY_HOST=127.0.0.1 \ + NOVNC_ENABLE_HTTPS=false # --------------------------------------------------------------------------- # 1. Base packages @@ -121,6 +123,14 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML overflow:hidden; background:#000; } #screen { position:fixed; top:0; left:0; width:100vw; height:100vh; background:#000; } + /* Force the injected noVNC canvas to fill the container exactly */ + #screen canvas, #noVNC_canvas { + display:block!important; + position:absolute!important; + top:0!important; left:0!important; + width:100%!important; height:100%!important; + border:none!important; outline:none!important; + } /* Nuke every noVNC chrome element by ID and class */ #noVNC_control_bar_anchor, #noVNC_control_bar, #noVNC_control_bar_handle, #noVNC_hint_anchor, @@ -166,18 +176,30 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML function connect() { strip(); msg('Connecting...', true); - const url = 'ws://' + location.hostname + ':' + (location.port||'6080') + '/websockify'; + const proto = location.protocol === 'https:' ? 'wss:' : 'ws:'; + // Use the actual port from the browser URL, or default based on protocol + const port = location.port || (location.protocol === 'https:' ? '443' : '80'); + const url = proto + '//' + location.hostname + ':' + port; rfb = new RFB(scrn, url, { credentials: {password:''} }); rfb.scaleViewport = true; rfb.resizeSession = true; rfb.clipViewport = false; rfb.showDotCursor = false; rfb.background = '#000000'; - rfb.addEventListener('connect', () => { strip(); msg('TLSDebug Active'); }); + rfb.addEventListener('connect', () => { + strip(); + msg('TLSDebug Active'); + // Immediately sync session size to the actual viewport + rfb.resizeSession = true; + }); rfb.addEventListener('disconnect', () => { msg('Reconnecting...', true); setTimeout(connect, 3000); }); rfb.addEventListener('credentialsrequired', () => rfb.sendCredentials({password:''})); } + // Keep session size in sync whenever the browser window is resized + new ResizeObserver(() => { if (rfb) rfb.resizeSession = true; }) + .observe(document.documentElement); + connect(); @@ -301,6 +323,44 @@ log "=== CA installation complete ===" SCRIPT RUN chmod +x /opt/install-ca.sh +# --------------------------------------------------------------------------- +# 6b. generate-novnc-cert.sh — Self-signed certificate for noVNC HTTPS +# --------------------------------------------------------------------------- +RUN cat > /opt/generate-novnc-cert.sh << 'SCRIPT' +#!/bin/bash +set -e + +CERT_DIR="${1:-/opt/novnc-certs}" +CERT_FILE="${CERT_DIR}/novnc.pem" + +log() { echo "[cert] $*"; } + +mkdir -p "${CERT_DIR}" + +if [ -f "${CERT_FILE}" ]; then + log "Certificate already exists: ${CERT_FILE}" + log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null || echo 'unknown')" + exit 0 +fi + +log "Generating self-signed certificate for noVNC..." + +openssl req -x509 -nodes -newkey rsa:2048 \ + -keyout "${CERT_FILE}" \ + -out "${CERT_FILE}" \ + -days 365 \ + -subj "/C=US/ST=State/L=City/O=TLSDebug/CN=localhost" \ + -addext "subjectAltName=DNS:localhost,DNS:*.local,IP:127.0.0.1" \ + 2>/dev/null + +chmod 600 "${CERT_FILE}" + +log "Certificate generated: ${CERT_FILE}" +log "Subject: $(openssl x509 -noout -subject -in "${CERT_FILE}" 2>/dev/null)" +log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null)" +SCRIPT +RUN chmod +x /opt/generate-novnc-cert.sh + # 7. start-chrome.sh # --------------------------------------------------------------------------- RUN cat > /opt/start-chrome.sh << 'SCRIPT' @@ -433,7 +493,7 @@ tlsproxy \ -port "${PROXY_PORT}" \ -certdir "${CERTDIR}" \ -skip-install \ - 2>&1 | tee -a "${LOG_DIR}/tlsproxy.log" & + 2>&1 | grep -v 'SSLV3_ALERT_CERTIFICATE_UNKNOWN' | tee -a "${LOG_DIR}/tlsproxy.log" & PROXY_PID=$! log "[*] Waiting for CA certificate ..." @@ -463,27 +523,59 @@ x11vnc \ -shared \ -nopw \ -rfbport "${VNC_PORT}" \ - -o "${LOG_DIR}/x11vnc.log" \ - -bg \ - -noipv6 \ - -xkb \ - -noxrecord \ - -noxfixes \ -noxdamage \ + -noxfixes \ + -noxcomposite \ -cursor arrow \ - -wait 5 \ - -defer 5 + -loop \ + -repeat \ + -xkb \ + >> "${LOG_DIR}/x11vnc.log" 2>&1 & +sleep 2 wait_port "${VNC_PORT}" "x11vnc" 40 # ---- 5. noVNC -------------------------------------------------------------- -log "[*] Starting noVNC websockify on port ${NOVNC_PORT} ..." +# Check for custom certificate or generate self-signed +CERT_DIR="/opt/novnc-certs" +CUSTOM_CERT="/certs/novnc.pem" +CERT_FILE="${CERT_DIR}/novnc.pem" + +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[*] HTTPS mode enabled" + + # Use custom cert if provided, otherwise generate self-signed + if [ -f "${CUSTOM_CERT}" ]; then + log "[*] Using custom certificate: ${CUSTOM_CERT}" + mkdir -p "${CERT_DIR}" + cp "${CUSTOM_CERT}" "${CERT_FILE}" + chmod 600 "${CERT_FILE}" + else + log "[*] No custom cert found, generating self-signed..." + /opt/generate-novnc-cert.sh "${CERT_DIR}" + fi + + NOVNC_PORT="${NOVNC_HTTPS_PORT:-6443}" + SSL_ARGS="--cert=${CERT_FILE} --ssl-only" + SCHEME="https" +else + log "[*] HTTP mode (set NOVNC_ENABLE_HTTPS=true for HTTPS)" + SSL_ARGS="" + SCHEME="http" +fi + +log "[*] Starting noVNC websockify on port ${NOVNC_PORT} (${SCHEME}) ..." log "[*] web root : ${NOVNC_WEB}" log "[*] target : 127.0.0.1:${VNC_PORT}" +# note: SSL_ARGS may include --ssl-only; omit to allow fallbacks when certs are untrusted +tmp_args="${SSL_ARGS}" +# remove ssl-only if present to avoid 'non-SSL connection received but disallowed' errors +tmp_args=$(echo "${tmp_args}" | sed 's/--ssl-only//g') websockify \ --web "${NOVNC_WEB}" \ --heartbeat 30 \ + ${tmp_args} \ --log-file "${LOG_DIR}/novnc.log" \ "${NOVNC_PORT}" \ "127.0.0.1:${VNC_PORT}" & @@ -496,6 +588,9 @@ log "[diag] websockify process: $(pgrep -a websockify 2>/dev/null || echo NOT RU log "[diag] listening ports: $(ss -tlnp 2>/dev/null | grep -E '5900|6080|8080' || echo none)" # ---- 6. Chrome ------------------------------------------------------------- +# remove stale profile locks which can prevent Chrome from launching +rm -f /opt/chrome-profile/Singleton* /opt/chrome-profile/Default/Singleton* + log "[*] Starting Chrome ..." /opt/start-chrome.sh >> "${LOG_DIR}/chrome.log" 2>&1 & CHROME_PID=$! @@ -508,10 +603,13 @@ wait_port 4040 "log viewer" 20 log "" log "[+] All services started." -log "[+] Browser (noVNC) : http://localhost:${NOVNC_PORT}" +log "[+] Browser (noVNC) : ${SCHEME}://localhost:${NOVNC_PORT}" log "[+] Log viewer : http://localhost:4040" log "[+] TLS proxy : localhost:${PROXY_PORT}" log "[+] Host logs dir : ${LOG_DIR} (mounted to ./logs/ on host)" +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[+] Certificate : ${CERT_FILE}" +fi log "" cleanup() { @@ -529,7 +627,7 @@ RUN chmod +x /entrypoint.sh # --------------------------------------------------------------------------- # 9. Ports # --------------------------------------------------------------------------- -EXPOSE 6080 5900 8080 4040 9222 +EXPOSE 6080 6443 80 443 5900 8080 4040 9222 WORKDIR /opt/tlsdebug ENTRYPOINT ["/entrypoint.sh"] diff --git a/labs/remotebrowser/README.md b/labs/remotebrowser/README.md index 6ad042d..3582fd2 100644 --- a/labs/remotebrowser/README.md +++ b/labs/remotebrowser/README.md @@ -1 +1,65 @@ -### Allow Testing of Browser In Browser +# TLSDebug Remote Browser Lab + +Browser-in-browser setup for testing HTTPS interception with TLSDebug. All-in-one Docker container with Chrome, noVNC, and the TLS intercepting proxy pre-configured. + +## Quick Start + +```bash +docker-compose up +``` + +Open your browser: +- **http://localhost:6080** - Chrome browser interface (proxy already configured) +- **http://localhost:4040** - Real-time traffic monitor + +Browse any HTTPS site in the remote Chrome - all traffic will be intercepted and logged. + +## What's Included + +- **Headless Chrome** - Full browser with TLS proxy pre-configured +- **noVNC** - Web-based VNC viewer (no VNC client needed) +- **TLSDebug Proxy** - Intercepts and logs all HTTPS traffic +- **Debug Monitor** - Port 4040 shows live traffic, tokens, and sessions +- **Auto CA Trust** - Proxy certificate automatically trusted in Chrome + +## Ports + +| Port | Service | Description | +|------|---------|-------------| +| 6080 | noVNC | Browser interface - start here | +| 4040 | Monitor | Real-time traffic viewer | +| 8888 | Proxy | TLS proxy (mapped from internal 8080) | +| 5900 | VNC | Raw VNC access (optional) | +| 9222 | DevTools | Chrome debugging protocol (optional) | + +## Debug Monitor (Port 4040) + +The monitor shows: +- **All HTTP requests/responses** with full headers +- **Session cookies** - Marked with `"session": true` +- **JWT tokens** - Automatically decoded with claims visible +- **OAuth tokens** - Access and refresh tokens +- **POST data** - Form parameters and JSON payloads + +## Captured Data + +All logs and tokens are saved to `./logs/` on your host: +- `proxy.log` - Full request/response logs +- `EditThisCookie_Sessions.json` - All captured cookies and sessions +- `captured_tokens.json` - JWT and OAuth tokens +- `proxy-ca.crt` - CA certificate (if you need to trust it elsewhere) + +## Configuration + +Edit `docker-compose.yml` to customize: +- `START_URL` - Set the browser's starting page +- Port mappings - Change if ports conflict +- `./logs` volume - Where captured data is saved + +## Use Cases + +- Debug OAuth/SAML flows +- Inspect JWT token contents +- Extract session cookies for testing +- Analyze API request/response patterns +- Troubleshoot TLS/HTTPS issues diff --git a/labs/remotebrowser_TLS/Dockerfile b/labs/remotebrowser_TLS/Dockerfile new file mode 100644 index 0000000..158cbce --- /dev/null +++ b/labs/remotebrowser_TLS/Dockerfile @@ -0,0 +1,633 @@ +# ============================================================================= +# TLSDebug + Headless Chrome + noVNC — single self-contained Dockerfile +# ============================================================================= +FROM debian:bookworm-slim + +ENV DEBIAN_FRONTEND=noninteractive \ + DISPLAY=:99 \ + VNC_PORT=5900 \ + NOVNC_PORT=6080 \ + NOVNC_HTTPS_PORT=6443 \ + PROXY_PORT=8080 \ + CHROME_REMOTE_DEBUGGING_PORT=9222 \ + PROXY_HOST=127.0.0.1 \ + NOVNC_ENABLE_HTTPS=false + +# --------------------------------------------------------------------------- +# 1. Base packages +# --------------------------------------------------------------------------- +RUN apt-get update && apt-get install -y --no-install-recommends \ + golang-go \ + git \ + xvfb \ + x11vnc \ + openbox \ + xterm \ + python3 \ + python3-pip \ + python3-websockify \ + novnc \ + wget \ + gnupg \ + ca-certificates \ + fonts-liberation \ + libasound2 \ + libatk-bridge2.0-0 \ + libatk1.0-0 \ + libcups2 \ + libdbus-1-3 \ + libgdk-pixbuf2.0-0 \ + libgtk-3-0 \ + libnspr4 \ + libnss3 \ + libnss3-tools \ + libx11-xcb1 \ + libxcomposite1 \ + libxdamage1 \ + libxfixes3 \ + libxkbcommon0 \ + libxrandr2 \ + libxshmfence1 \ + xdg-utils \ + openssl \ + curl \ + netcat-openbsd \ + procps \ + psmisc \ + x11-utils \ + unclutter \ + && rm -rf /var/lib/apt/lists/* + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 2. Install browser +# amd64 -> Google Chrome stable (official Google .deb) +# arm64 -> Chromium from Debian bookworm (native deb, no snap) +# +# Base image is debian:bookworm-slim which has real chromium packages +# on all architectures — no snap wrappers. +# --------------------------------------------------------------------------- +RUN ARCH=$(dpkg --print-architecture) && \ + if [ "${ARCH}" = "amd64" ]; then \ + echo "[browser] amd64: installing Google Chrome ..." && \ + wget -q -O /tmp/chrome.deb \ + "https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb" && \ + apt-get update && \ + apt-get install -y --no-install-recommends /tmp/chrome.deb && \ + rm /tmp/chrome.deb && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/google-chrome /usr/local/bin/browser && \ + echo "[browser] installed: $(google-chrome --version)"; \ + elif [ "${ARCH}" = "arm64" ]; then \ + echo "[browser] arm64: installing Chromium from Debian bookworm ..." && \ + apt-get update && \ + apt-get install -y --no-install-recommends chromium && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/chromium /usr/local/bin/browser && \ + echo "[browser] installed: $(chromium --version)"; \ + else \ + echo "[browser] ERROR: unsupported arch ${ARCH}" && exit 1; \ + fi + +# --------------------------------------------------------------------------- +# 3. Build TLSDebug from source +# AllTrafficModule is already active by default and logs every request, +# response, headers and body — no source patching needed. +# We set log flags via the LOG_FLAGS env var at runtime instead. +# --------------------------------------------------------------------------- +WORKDIR /build +RUN git clone --depth 1 https://github.com/secdev02/TLSDebug.git . \ + && CGO_ENABLED=0 go build -ldflags "-s -w" -o /usr/local/bin/tlsproxy tlsproxy.go \ + && chmod +x /usr/local/bin/tlsproxy \ + && rm -rf /build + +# 4. Locate noVNC web root and write kiosk index.html +# Kiosk mode: auto-connects, scales to fill browser window, hides toolbar, +# no password prompt, no connection dialog — just the desktop. +# --------------------------------------------------------------------------- +RUN find /usr -name "vnc.html" 2>/dev/null | head -1 | xargs -I{} dirname {} > /opt/novnc_path \ + && NOVNC_WEB=$(cat /opt/novnc_path) \ + && echo "noVNC web root: ${NOVNC_WEB}" \ + && ls -la "${NOVNC_WEB}" + +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML' + + + + + TLSDebug + + + +
+
Connecting...
+ + + +HTML + +# Also overwrite vnc.html so any direct /vnc.html request shows our kiosk too +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cp "${NOVNC_WEB}/index.html" "${NOVNC_WEB}/vnc.html" + +# --------------------------------------------------------------------------- +# 5. Working directories +# --------------------------------------------------------------------------- +RUN mkdir -p /opt/tlsdebug /opt/chrome-profile /var/log/tlsdebug /root/.config + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 4b. Openbox config — fullscreen enforcement + black desktop, no decorations +# --------------------------------------------------------------------------- +RUN mkdir -p /root/.config/openbox + +# rc.xml — force every window fullscreen, no decorations, black desktop +RUN cat > /root/.config/openbox/rc.xml << 'RCXML' + + + + Clearlooks + + no + no + + 1 + + + yes + yes + no + yes + + + +RCXML + +# autostart — black root window, hide idle cursor +RUN cat > /root/.config/openbox/autostart << 'OBSTART' +xsetroot -solid black +unclutter -idle 0 -root -noevents & +OBSTART + +# --------------------------------------------------------------------------- +# 5b. Log viewer — real-time web UI on port 4040 +# --------------------------------------------------------------------------- +RUN echo 'import http.server, os, json
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import urlparse, parse_qs

LOG_DIR = os.environ.get("LOG_DIR", "/var/log/tlsdebug")
PORT    = 4040

LOG_FILES = ["tlsproxy.log", "captured_tokens.json", "chrome.log",
             "x11vnc.log", "novnc.log", "xvfb.log", "openbox.log"]

def build_page():
    files_js = json.dumps(LOG_FILES)
    return f"""<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width,initial-scale=1">
<title>TLSDebug Log Viewer</title>
<style>
  :root{{--bg:#0d1117;--panel:#161b22;--border:#30363d;--accent:#58a6ff;
        --green:#3fb950;--text:#c9d1d9;--muted:#8b949e}}
  *{{box-sizing:border-box;margin:0;padding:0}}
  body{{background:var(--bg);color:var(--text);font-family:'SF Mono',Monaco,monospace;
       font-size:13px;display:flex;flex-direction:column;height:100vh}}
  header{{background:var(--panel);border-bottom:1px solid var(--border);
          padding:12px 20px;display:flex;align-items:center;gap:16px;flex-shrink:0}}
  header h1{{font-size:15px;font-weight:600;color:var(--accent)}}
  .badge{{background:var(--green);color:#000;font-size:10px;font-weight:700;
          padding:2px 8px;border-radius:10px}}
  #statusbar{{font-size:11px;color:var(--muted);margin-left:auto}}
  .tabs{{display:flex;gap:4px;overflow-x:auto;background:var(--panel);
         padding:8px 16px 0;border-bottom:1px solid var(--border);flex-shrink:0}}
  .tab{{padding:6px 14px;border-radius:6px 6px 0 0;cursor:pointer;color:var(--muted);
        border:1px solid transparent;border-bottom:none;font-size:12px;white-space:nowrap}}
  .tab:hover{{color:var(--text);background:rgba(255,255,255,.05)}}
  .tab.active{{color:var(--accent);background:var(--bg);border-color:var(--border)}}
  .toolbar{{display:flex;gap:8px;padding:8px 16px;background:var(--bg);
            border-bottom:1px solid var(--border);flex-shrink:0;align-items:center}}
  .toolbar input{{flex:1;background:var(--panel);border:1px solid var(--border);
                  color:var(--text);padding:5px 10px;border-radius:6px;font-family:inherit}}
  .toolbar label{{color:var(--muted);font-size:12px;display:flex;align-items:center;gap:5px}}
  .toolbar button{{background:var(--panel);border:1px solid var(--border);color:var(--text);
                   padding:5px 12px;border-radius:6px;cursor:pointer;font-family:inherit}}
  .toolbar button:hover{{border-color:var(--accent);color:var(--accent)}}
  #logview{{flex:1;overflow-y:auto;padding:12px 16px;white-space:pre-wrap;
            word-break:break-all;line-height:1.6}}
  .ln{{padding:1px 0}} .ln:hover{{background:rgba(255,255,255,.04)}}
  .match{{background:rgba(88,166,255,.12)}} .hl{{background:#e3b34144;border-radius:2px}}
</style>
</head>
<body>
<header>
  <h1>&#x1F50D; TLSDebug Log Viewer</h1>
  <span class="badge">LIVE</span>
  <span id="statusbar">Connecting...</span>
</header>
<div class="tabs" id="tabs"></div>
<div class="toolbar">
  <input id="filter" placeholder="Filter lines..." oninput="applyFilter()">
  <label><input type="checkbox" id="auto" checked> Auto-scroll</label>
  <button onclick="document.getElementById('filter').value='';applyFilter()">Clear</button>
  <button onclick="location.href='/api/download?file='+cur">Download</button>
</div>
<div id="logview"></div>
<script>
const LOGS={files_js};
let cur=LOGS[0],off=0,raw=[];
function init(){{
  const t=document.getElementById('tabs');
  LOGS.forEach(f=>{{
    const d=document.createElement('div');
    d.className='tab'+(f===cur?' active':'');
    d.textContent=f;d.onclick=()=>sw(f);t.appendChild(d);
  }});
  poll();setInterval(poll,1500);
}}
function sw(f){{cur=f;off=0;raw=[];
  document.querySelectorAll('.tab').forEach(t=>t.className='tab'+(t.textContent===f?' active':''));
  document.getElementById('logview').innerHTML='';poll();}}
async function poll(){{
  try{{
    const r=await fetch('/api/log?file='+encodeURIComponent(cur)+'&offset='+off);
    if(!r.ok)return;
    const d=await r.json();off=d.size;
    if(d.lines&&d.lines.length){{raw=raw.concat(d.lines);if(raw.length>5000)raw=raw.slice(-5000);applyFilter();}}
    document.getElementById('statusbar').textContent='Updated '+new Date().toLocaleTimeString();
  }}catch(e){{document.getElementById('statusbar').textContent='Error: '+e;}}
}}
function applyFilter(){{
  const fv=document.getElementById('filter').value.toLowerCase();
  const lv=document.getElementById('logview');
  const rows=fv?raw.filter(l=>l.toLowerCase().includes(fv)):raw;
  lv.innerHTML=rows.map(l=>{{
    const e=l.replace(/&/g,'&amp;').replace(/</g,'&lt;').replace(/>/g,'&gt;');
    const h=fv?e.replace(new RegExp(fv.replace(/[.*+?^${{}}()|[\\]\\\\]/g,'\\\\$&'),'gi'),m=>'<span class="hl">'+m+'</span>'):e;
    return '<div class="ln'+(fv&&l.toLowerCase().includes(fv)?' match':'')+'">'+h+'</div>';
  }}).join('');
  if(document.getElementById('auto').checked)lv.scrollTop=lv.scrollHeight;
}}
init();
</script>
</body></html>"""

PAGE = build_page()

class Handler(BaseHTTPRequestHandler):
    def log_message(self, fmt, *args): pass
    def do_GET(self):
        p = self.path.split('?')[0]
        if p in ('/', '/index.html'):
            body = PAGE.encode()
            self.send_response(200)
            self.send_header('Content-Type','text/html; charset=utf-8')
            self.send_header('Content-Length', str(len(body)))
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/log':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            offset = int(q.get('offset',['0'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            lines = []; size = offset
            if os.path.exists(fpath):
                with open(fpath,'rb') as f:
                    f.seek(offset); chunk = f.read()
                    size = offset + len(chunk)
                    raw_text = chunk.decode('utf-8', errors='replace')
                    if fname.endswith('.json'):
                        try:
                            import json as _json
                            parsed = _json.loads(open(fpath).read())
                            pretty = _json.dumps(parsed, indent=2)
                            lines  = pretty.splitlines()
                            size   = os.path.getsize(fpath)
                        except Exception:
                            lines = raw_text.splitlines()
                    else:
                        lines = raw_text.splitlines()
            body = json.dumps({'lines':lines,'size':size}).encode()
            self.send_response(200)
            self.send_header('Content-Type','application/json')
            self.send_header('Access-Control-Allow-Origin','*')
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/download':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            if os.path.exists(fpath):
                with open(fpath,'rb') as f: data = f.read()
                self.send_response(200)
                self.send_header('Content-Type','text/plain')
                self.send_header('Content-Disposition','attachment; filename='+fname)
                self.end_headers(); self.wfile.write(data)
            else:
                self.send_response(404); self.end_headers()
        else:
            self.send_response(404); self.end_headers()

os.makedirs(LOG_DIR, exist_ok=True)
print(f"[logviewer] 0.0.0.0:{PORT}  logs={LOG_DIR}")
HTTPServer(('0.0.0.0', PORT), Handler).serve_forever()
' | base64 -d > /opt/logviewer.py + +# --------------------------------------------------------------------------- +# 6. install-ca.sh +# Installs TLSDebug CA into: +# (a) Debian/OS system trust store +# (b) ~/.pki/nssdb — where Chromium/Chrome actually looks on Linux +# (c) Chrome profile NSS db — belt-and-suspenders +# --------------------------------------------------------------------------- +RUN cat > /opt/install-ca.sh << 'SCRIPT' +#!/bin/bash +set -e +CA_CERT="${1:-/opt/tlsdebug/proxy-ca.crt}" +CA_NAME="TLSDebug CA" +HOME_NSS="/root/.pki/nssdb" +PROFILE_NSS="/opt/chrome-profile/nssdb" + +log() { echo "[CA] $*"; } + +if [ ! -f "${CA_CERT}" ]; then + log "ERROR: cert not found at ${CA_CERT}"; exit 1 +fi + +log "=== Installing TLSDebug CA ===" +log "Subject : $(openssl x509 -noout -subject -in "${CA_CERT}" 2>/dev/null)" +log "Expires : $(openssl x509 -noout -enddate -in "${CA_CERT}" 2>/dev/null)" + +# ------------------------------------------------------------------ +# (a) OS / system trust store +# ------------------------------------------------------------------ +log "--- System trust store ---" +cp "${CA_CERT}" /usr/local/share/ca-certificates/tlsdebug.crt +update-ca-certificates --fresh +log "System store updated." + +# ------------------------------------------------------------------ +# (b) ~/.pki/nssdb (THIS is where Chromium on Linux actually looks) +# ------------------------------------------------------------------ +log "--- ~/.pki/nssdb (Chromium default location) ---" +mkdir -p "${HOME_NSS}" +if [ ! -f "${HOME_NSS}/cert9.db" ]; then + certutil -N -d "sql:${HOME_NSS}" --empty-password + log "Created new NSS db at ${HOME_NSS}" +fi +certutil -d "sql:${HOME_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${HOME_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${HOME_NSS}" + +# Verify +if certutil -d "sql:${HOME_NSS}" -L -n "${CA_NAME}" 2>/dev/null | grep -q "CT"; then + log "OK: ${HOME_NSS} verification passed." +else + log "WARNING: cert not found in ${HOME_NSS} after install" +fi + +# ------------------------------------------------------------------ +# (c) Chrome profile NSS db (belt-and-suspenders) +# ------------------------------------------------------------------ +log "--- Chrome profile NSS db ---" +mkdir -p "${PROFILE_NSS}" +if [ ! -f "${PROFILE_NSS}/cert9.db" ]; then + certutil -N -d "sql:${PROFILE_NSS}" --empty-password + log "Created new NSS db at ${PROFILE_NSS}" +fi +certutil -d "sql:${PROFILE_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${PROFILE_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${PROFILE_NSS}" + +log "=== CA installation complete ===" +SCRIPT +RUN chmod +x /opt/install-ca.sh + +# --------------------------------------------------------------------------- +# 6b. generate-novnc-cert.sh — Self-signed certificate for noVNC HTTPS +# --------------------------------------------------------------------------- +RUN cat > /opt/generate-novnc-cert.sh << 'SCRIPT' +#!/bin/bash +set -e + +CERT_DIR="${1:-/opt/novnc-certs}" +CERT_FILE="${CERT_DIR}/novnc.pem" + +log() { echo "[cert] $*"; } + +mkdir -p "${CERT_DIR}" + +if [ -f "${CERT_FILE}" ]; then + log "Certificate already exists: ${CERT_FILE}" + log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null || echo 'unknown')" + exit 0 +fi + +log "Generating self-signed certificate for noVNC..." + +openssl req -x509 -nodes -newkey rsa:2048 \ + -keyout "${CERT_FILE}" \ + -out "${CERT_FILE}" \ + -days 365 \ + -subj "/C=US/ST=State/L=City/O=TLSDebug/CN=localhost" \ + -addext "subjectAltName=DNS:localhost,DNS:*.local,IP:127.0.0.1" \ + 2>/dev/null + +chmod 600 "${CERT_FILE}" + +log "Certificate generated: ${CERT_FILE}" +log "Subject: $(openssl x509 -noout -subject -in "${CERT_FILE}" 2>/dev/null)" +log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null)" +SCRIPT +RUN chmod +x /opt/generate-novnc-cert.sh + +# 7. start-chrome.sh +# --------------------------------------------------------------------------- +RUN cat > /opt/start-chrome.sh << 'SCRIPT' +#!/bin/bash +export DISPLAY="${DISPLAY:-:99}" +export HOME=/root + +PROXY_HOST="${PROXY_HOST:-127.0.0.1}" +PROXY_PORT="${PROXY_PORT:-8080}" +REMOTE_DEBUG_PORT="${CHROME_REMOTE_DEBUGGING_PORT:-9222}" +START_URL="${START_URL:-https://www.google.com}" + +echo "[Browser] $(browser --version 2>/dev/null || echo unknown)" +echo "[Browser] DISPLAY=${DISPLAY} proxy=${PROXY_HOST}:${PROXY_PORT}" + +exec browser \ + --no-sandbox \ + --disable-dev-shm-usage \ + --disable-gpu \ + --disable-software-rasterizer \ + --use-gl=swiftshader \ + --use-angle=swiftshader \ + --enable-unsafe-swiftshader \ + --in-process-gpu \ + --disable-setuid-sandbox \ + --user-data-dir="/opt/chrome-profile" \ + --proxy-server="http://${PROXY_HOST}:${PROXY_PORT}" \ + --ignore-certificate-errors \ + --ignore-certificate-errors-spki-list \ + --test-type \ + --remote-debugging-port="${REMOTE_DEBUG_PORT}" \ + --remote-debugging-address=0.0.0.0 \ + --window-size=1920,1080 \ + --start-fullscreen \ + --kiosk \ + --disable-extensions \ + --no-first-run \ + --no-default-browser-check \ + --password-store=basic \ + --use-mock-keychain \ + --enable-logging=stderr \ + --v=1 \ + "${START_URL}" 2>&1 +SCRIPT +RUN chmod +x /opt/start-chrome.sh + + +# --------------------------------------------------------------------------- +# 8. entrypoint.sh +# --------------------------------------------------------------------------- +RUN cat > /entrypoint.sh << 'SCRIPT' +#!/bin/bash +set -e + +export HOME=/root +PROXY_PORT="${PROXY_PORT:-8080}" +VNC_PORT="${VNC_PORT:-5900}" +NOVNC_PORT="${NOVNC_PORT:-6080}" +DISPLAY="${DISPLAY:-:99}" +# LOG_DIR is bind-mounted to ./logs/ on the host. +# CERTDIR is set to the same path so tlsproxy writes captured_tokens.json, +# session files, and the CA cert directly into the host-visible logs folder. +LOG_DIR="/var/log/tlsdebug" +CERTDIR="${LOG_DIR}" +NOVNC_WEB=$(cat /opt/novnc_path 2>/dev/null || echo "/usr/share/novnc") + +mkdir -p "${LOG_DIR}" + +log() { echo "[$(date '+%H:%M:%S')] $*"; } +wait_port() { + local port=$1 label=$2 tries=${3:-30} + for i in $(seq 1 "${tries}"); do + if nc -z 127.0.0.1 "${port}" 2>/dev/null; then + log "[+] ${label} ready on port ${port}." + return 0 + fi + sleep 0.5 + done + log "[!] TIMEOUT waiting for ${label} on port ${port}." + return 1 +} + +log "============================================" +log " TLSDebug + Headless Chrome Container" +log " noVNC Web UI : http://localhost:${NOVNC_PORT}" +log " TLS Proxy : localhost:${PROXY_PORT}" +log " noVNC root : ${NOVNC_WEB}" +log "============================================" + +# ---- Diagnostics ----------------------------------------------------------- +log "[diag] novnc web root contents:" +ls -la "${NOVNC_WEB}" 2>&1 | head -20 || log " (none)" +log "[diag] websockify location: $(which websockify 2>/dev/null || echo NOT FOUND)" +log "[diag] x11vnc location: $(which x11vnc 2>/dev/null || echo NOT FOUND)" +log "[diag] browser symlink: $(which browser 2>/dev/null || echo NOT FOUND) -> $(readlink /usr/local/bin/browser 2>/dev/null || echo none)" +log "[diag] tlsproxy location: $(which tlsproxy 2>/dev/null || echo NOT FOUND)" + +# ---- 1. Xvfb --------------------------------------------------------------- +log "[*] Starting Xvfb on ${DISPLAY} ..." +rm -f /tmp/.X99-lock /tmp/.X11-unix/X99 2>/dev/null || true +Xvfb "${DISPLAY}" \ + -screen 0 1920x1080x24 \ + -ac \ + +extension GLX \ + +extension RANDR \ + +render \ + -noreset \ + >> "${LOG_DIR}/xvfb.log" 2>&1 & +XVFB_PID=$! + +log "[*] Waiting for Xvfb ..." +for i in $(seq 1 30); do + if DISPLAY="${DISPLAY}" xdpyinfo >/dev/null 2>&1; then + log "[+] Xvfb ready." + break + fi + sleep 0.5 +done +export DISPLAY="${DISPLAY}" + +# ---- 2. Openbox window manager --------------------------------------------- +log "[*] Starting openbox ..." +openbox --config-file /root/.config/openbox/rc.xml --display "${DISPLAY}" >> "${LOG_DIR}/openbox.log" 2>&1 & +sleep 1 + +# ---- 3. TLSDebug proxy ----------------------------------------------------- +log "[*] Starting TLSDebug proxy on port ${PROXY_PORT} ..." +cd "${CERTDIR}" +tlsproxy \ + -port "${PROXY_PORT}" \ + -certdir "${CERTDIR}" \ + -skip-install \ + 2>&1 | grep -v 'SSLV3_ALERT_CERTIFICATE_UNKNOWN' | tee -a "${LOG_DIR}/tlsproxy.log" & +PROXY_PID=$! + +log "[*] Waiting for CA certificate ..." +for i in $(seq 1 30); do + if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + log "[+] CA certificate ready." + break + fi + sleep 1 +done +# Install CA before Chrome launches — must succeed +if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + if /opt/install-ca.sh "${CERTDIR}/proxy-ca.crt"; then + log "[+] CA trusted by OS and Chrome NSS." + else + log "[!] CA install failed — Chrome may show cert errors." + fi +else + log "[!] proxy-ca.crt missing — Chrome may show cert errors." +fi + +# ---- 4. x11vnc ------------------------------------------------------------- +log "[*] Starting x11vnc on port ${VNC_PORT} ..." +x11vnc \ + -display "${DISPLAY}" \ + -forever \ + -shared \ + -nopw \ + -rfbport "${VNC_PORT}" \ + -noxdamage \ + -noxfixes \ + -noxcomposite \ + -cursor arrow \ + -loop \ + -repeat \ + -xkb \ + >> "${LOG_DIR}/x11vnc.log" 2>&1 & + +sleep 2 +wait_port "${VNC_PORT}" "x11vnc" 40 + +# ---- 5. noVNC -------------------------------------------------------------- +# Check for custom certificate or generate self-signed +CERT_DIR="/opt/novnc-certs" +CUSTOM_CERT="/certs/novnc.pem" +CERT_FILE="${CERT_DIR}/novnc.pem" + +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[*] HTTPS mode enabled" + + # Use custom cert if provided, otherwise generate self-signed + if [ -f "${CUSTOM_CERT}" ]; then + log "[*] Using custom certificate: ${CUSTOM_CERT}" + mkdir -p "${CERT_DIR}" + cp "${CUSTOM_CERT}" "${CERT_FILE}" + chmod 600 "${CERT_FILE}" + else + log "[*] No custom cert found, generating self-signed..." + /opt/generate-novnc-cert.sh "${CERT_DIR}" + fi + + NOVNC_PORT="${NOVNC_HTTPS_PORT:-6443}" + SSL_ARGS="--cert=${CERT_FILE} --ssl-only" + SCHEME="https" +else + log "[*] HTTP mode (set NOVNC_ENABLE_HTTPS=true for HTTPS)" + SSL_ARGS="" + SCHEME="http" +fi + +log "[*] Starting noVNC websockify on port ${NOVNC_PORT} (${SCHEME}) ..." +log "[*] web root : ${NOVNC_WEB}" +log "[*] target : 127.0.0.1:${VNC_PORT}" + +# note: SSL_ARGS may include --ssl-only; omit to allow fallbacks when certs are untrusted +tmp_args="${SSL_ARGS}" +# remove ssl-only if present to avoid 'non-SSL connection received but disallowed' errors +tmp_args=$(echo "${tmp_args}" | sed 's/--ssl-only//g') +websockify \ + --web "${NOVNC_WEB}" \ + --heartbeat 30 \ + ${tmp_args} \ + --log-file "${LOG_DIR}/novnc.log" \ + "${NOVNC_PORT}" \ + "127.0.0.1:${VNC_PORT}" & +NOVNC_PID=$! + +wait_port "${NOVNC_PORT}" "noVNC" 40 + +# Confirm websockify process +log "[diag] websockify process: $(pgrep -a websockify 2>/dev/null || echo NOT RUNNING)" +log "[diag] listening ports: $(ss -tlnp 2>/dev/null | grep -E '5900|6080|8080' || echo none)" + +# ---- 6. Chrome ------------------------------------------------------------- +# remove stale profile locks which can prevent Chrome from launching +rm -f /opt/chrome-profile/Singleton* /opt/chrome-profile/Default/Singleton* + +log "[*] Starting Chrome ..." +/opt/start-chrome.sh >> "${LOG_DIR}/chrome.log" 2>&1 & +CHROME_PID=$! + +# ---- 7. Log viewer on port 4040 -------------------------------------------- +log "[*] Starting log viewer on port 4040 ..." +python3 /opt/logviewer.py >> "${LOG_DIR}/logviewer.log" 2>&1 & +LOGVIEWER_PID=$! +wait_port 4040 "log viewer" 20 + +log "" +log "[+] All services started." +log "[+] Browser (noVNC) : ${SCHEME}://localhost:${NOVNC_PORT}" +log "[+] Log viewer : http://localhost:4040" +log "[+] TLS proxy : localhost:${PROXY_PORT}" +log "[+] Host logs dir : ${LOG_DIR} (mounted to ./logs/ on host)" +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[+] Certificate : ${CERT_FILE}" +fi +log "" + +cleanup() { + log "[*] Shutting down ..." + kill "${CHROME_PID}" "${NOVNC_PID}" "${PROXY_PID}" "${XVFB_PID}" "${LOGVIEWER_PID}" 2>/dev/null || true + exit 0 +} +trap cleanup SIGTERM SIGINT + +# Stream proxy traffic to docker logs so 'docker logs -f tlsdebug' shows live traffic +tail -f "${LOG_DIR}/tlsproxy.log" +SCRIPT +RUN chmod +x /entrypoint.sh + +# --------------------------------------------------------------------------- +# 9. Ports +# --------------------------------------------------------------------------- +EXPOSE 6080 6443 80 443 5900 8080 4040 9222 + +WORKDIR /opt/tlsdebug +ENTRYPOINT ["/entrypoint.sh"] diff --git a/labs/remotebrowser_TLS/README.md b/labs/remotebrowser_TLS/README.md new file mode 100644 index 0000000..6ad042d --- /dev/null +++ b/labs/remotebrowser_TLS/README.md @@ -0,0 +1 @@ +### Allow Testing of Browser In Browser diff --git a/labs/remotebrowser_TLS/docker-compose.yml b/labs/remotebrowser_TLS/docker-compose.yml new file mode 100644 index 0000000..6cebb0b --- /dev/null +++ b/labs/remotebrowser_TLS/docker-compose.yml @@ -0,0 +1,58 @@ +services: + tlsdebug: + build: + context: . + dockerfile: Dockerfile + image: tlsdebug:latest + container_name: tlsdebug + ports: + # noVNC web UI — HTTP on port 6080, HTTPS on port 6443 + - "6080:6080" # noVNC HTTP (default) + - "6443:6443" # noVNC HTTPS (when NOVNC_ENABLE_HTTPS=true) + # - "80:6080" # Optional: expose HTTP on port 80 + - "443:6443" # Optional: expose HTTPS on port 443 + # Raw VNC (optional — use any VNC client against localhost:5900) + - "5900:5900" + # TLSDebug intercepting proxy (change host port if 8080 is taken) + - "8888:8080" + # TLSDebug built-in HTTP log viewer + - "4040:4040" + # Chrome remote debugging (optional) + - "9222:9222" + volumes: + # All logs, CA cert, captured_tokens.json and session files + # are written here — readable on the host at ./logs/ + - ./logs:/var/log/tlsdebug + # Persist Chrome profile (bookmarks, saved state, etc.) + - chrome-profile:/opt/chrome-profile + # Optional: Mount custom noVNC certificate (PEM format) + # - ./certs/novnc.pem:/certs/novnc.pem:ro + environment: + PROXY_PORT: "8080" + VNC_PORT: "5900" + NOVNC_PORT: "6080" + NOVNC_HTTPS_PORT: "6443" + DISPLAY: ":99" + CHROME_REMOTE_DEBUGGING_PORT: "9222" + # Change START_URL to set the browser's home page + START_URL: "https://microsoft.com" + # Enable HTTPS for noVNC (set to "true" to enable) + NOVNC_ENABLE_HTTPS: "true" + # When HTTPS is enabled: + # - Self-signed cert is auto-generated if no custom cert provided + # - Mount custom cert at /certs/novnc.pem to use your own + cap_add: + - SYS_ADMIN + security_opt: + - seccomp:unconfined + restart: unless-stopped + shm_size: "2gb" + healthcheck: + test: ["CMD", "sh", "-c", "[ \"${NOVNC_ENABLE_HTTPS}\" = \"true\" ] && curl -k -sf https://localhost:6443 || curl -sf http://localhost:6080"] + interval: 15s + timeout: 5s + retries: 5 + start_period: 30s + +volumes: + chrome-profile: \ No newline at end of file