From 389d318e417cb494df1493ed5b65b671405cbde1 Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Fri, 6 Mar 2026 13:45:32 -0700 Subject: [PATCH 1/9] Update WebSocket URL construction in Dockerfile Mixed Content Fix --- labs/remotebrowser/Dockerfile | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/labs/remotebrowser/Dockerfile b/labs/remotebrowser/Dockerfile index 6924e04..7f3fd26 100644 --- a/labs/remotebrowser/Dockerfile +++ b/labs/remotebrowser/Dockerfile @@ -166,7 +166,8 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML function connect() { strip(); msg('Connecting...', true); - const url = 'ws://' + location.hostname + ':' + (location.port||'6080') + '/websockify'; + const proto = location.protocol === 'https:' ? 'wss:' : 'ws:'; + const url = proto + '//' + location.hostname + ':' + (location.port||'6080') + '/websockify'; rfb = new RFB(scrn, url, { credentials: {password:''} }); rfb.scaleViewport = true; rfb.resizeSession = true; From fd7f3209ce8db1c98f9b5d29fe1994b9f32bbef0 Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Fri, 6 Mar 2026 13:56:59 -0700 Subject: [PATCH 2/9] Fix URL construction for WebSocket connection --- labs/remotebrowser/Dockerfile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/labs/remotebrowser/Dockerfile b/labs/remotebrowser/Dockerfile index 7f3fd26..667255a 100644 --- a/labs/remotebrowser/Dockerfile +++ b/labs/remotebrowser/Dockerfile @@ -167,7 +167,7 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML strip(); msg('Connecting...', true); const proto = location.protocol === 'https:' ? 'wss:' : 'ws:'; - const url = proto + '//' + location.hostname + ':' + (location.port||'6080') + '/websockify'; + const url = proto + '//' + location.hostname + ':' + (location.port||'6080'); rfb = new RFB(scrn, url, { credentials: {password:''} }); rfb.scaleViewport = true; rfb.resizeSession = true; From 3716ed30ff3d0d4bdaa1aba9076bf2fdc2c97672 Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Sat, 7 Mar 2026 12:18:51 -0700 Subject: [PATCH 3/9] Create README.md --- labs/remotebrowser_TLS/README.md | 1 + 1 file changed, 1 insertion(+) create mode 100644 labs/remotebrowser_TLS/README.md diff --git a/labs/remotebrowser_TLS/README.md b/labs/remotebrowser_TLS/README.md new file mode 100644 index 0000000..8b13789 --- /dev/null +++ b/labs/remotebrowser_TLS/README.md @@ -0,0 +1 @@ + From d20d1e414c263ea089b13816739b90285160a88c Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Sat, 7 Mar 2026 12:19:56 -0700 Subject: [PATCH 4/9] Add files via upload --- labs/remotebrowser_TLS/Dockerfile | 616 ++++++++++++++++++++++ labs/remotebrowser_TLS/README.md | 2 +- labs/remotebrowser_TLS/docker-compose.yml | 58 ++ 3 files changed, 675 insertions(+), 1 deletion(-) create mode 100644 labs/remotebrowser_TLS/Dockerfile create mode 100644 labs/remotebrowser_TLS/docker-compose.yml diff --git a/labs/remotebrowser_TLS/Dockerfile b/labs/remotebrowser_TLS/Dockerfile new file mode 100644 index 0000000..ee8c77a --- /dev/null +++ b/labs/remotebrowser_TLS/Dockerfile @@ -0,0 +1,616 @@ +# ============================================================================= +# TLSDebug + Headless Chrome + noVNC — single self-contained Dockerfile +# ============================================================================= +FROM debian:bookworm-slim + +ENV DEBIAN_FRONTEND=noninteractive \ + DISPLAY=:99 \ + VNC_PORT=5900 \ + NOVNC_PORT=6080 \ + NOVNC_HTTPS_PORT=6443 \ + PROXY_PORT=8080 \ + CHROME_REMOTE_DEBUGGING_PORT=9222 \ + PROXY_HOST=127.0.0.1 \ + NOVNC_ENABLE_HTTPS=false + +# --------------------------------------------------------------------------- +# 1. Base packages +# --------------------------------------------------------------------------- +RUN apt-get update && apt-get install -y --no-install-recommends \ + golang-go \ + git \ + xvfb \ + x11vnc \ + openbox \ + xterm \ + python3 \ + python3-pip \ + python3-websockify \ + novnc \ + wget \ + gnupg \ + ca-certificates \ + fonts-liberation \ + libasound2 \ + libatk-bridge2.0-0 \ + libatk1.0-0 \ + libcups2 \ + libdbus-1-3 \ + libgdk-pixbuf2.0-0 \ + libgtk-3-0 \ + libnspr4 \ + libnss3 \ + libnss3-tools \ + libx11-xcb1 \ + libxcomposite1 \ + libxdamage1 \ + libxfixes3 \ + libxkbcommon0 \ + libxrandr2 \ + libxshmfence1 \ + xdg-utils \ + openssl \ + curl \ + netcat-openbsd \ + procps \ + psmisc \ + x11-utils \ + unclutter \ + && rm -rf /var/lib/apt/lists/* + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 2. Install browser +# amd64 -> Google Chrome stable (official Google .deb) +# arm64 -> Chromium from Debian bookworm (native deb, no snap) +# +# Base image is debian:bookworm-slim which has real chromium packages +# on all architectures — no snap wrappers. +# --------------------------------------------------------------------------- +RUN ARCH=$(dpkg --print-architecture) && \ + if [ "${ARCH}" = "amd64" ]; then \ + echo "[browser] amd64: installing Google Chrome ..." && \ + wget -q -O /tmp/chrome.deb \ + "https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb" && \ + apt-get update && \ + apt-get install -y --no-install-recommends /tmp/chrome.deb && \ + rm /tmp/chrome.deb && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/google-chrome /usr/local/bin/browser && \ + echo "[browser] installed: $(google-chrome --version)"; \ + elif [ "${ARCH}" = "arm64" ]; then \ + echo "[browser] arm64: installing Chromium from Debian bookworm ..." && \ + apt-get update && \ + apt-get install -y --no-install-recommends chromium && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/chromium /usr/local/bin/browser && \ + echo "[browser] installed: $(chromium --version)"; \ + else \ + echo "[browser] ERROR: unsupported arch ${ARCH}" && exit 1; \ + fi + +# --------------------------------------------------------------------------- +# 3. Build TLSDebug from source +# AllTrafficModule is already active by default and logs every request, +# response, headers and body — no source patching needed. +# We set log flags via the LOG_FLAGS env var at runtime instead. +# --------------------------------------------------------------------------- +WORKDIR /build +RUN git clone --depth 1 https://github.com/secdev02/TLSDebug.git . \ + && CGO_ENABLED=0 go build -ldflags "-s -w" -o /usr/local/bin/tlsproxy tlsproxy.go \ + && chmod +x /usr/local/bin/tlsproxy \ + && rm -rf /build + +# 4. Locate noVNC web root and write kiosk index.html +# Kiosk mode: auto-connects, scales to fill browser window, hides toolbar, +# no password prompt, no connection dialog — just the desktop. +# --------------------------------------------------------------------------- +RUN find /usr -name "vnc.html" 2>/dev/null | head -1 | xargs -I{} dirname {} > /opt/novnc_path \ + && NOVNC_WEB=$(cat /opt/novnc_path) \ + && echo "noVNC web root: ${NOVNC_WEB}" \ + && ls -la "${NOVNC_WEB}" + +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML' + + + + + TLSDebug + + + +
+
Connecting...
+ + + +HTML + +# Also overwrite vnc.html so any direct /vnc.html request shows our kiosk too +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cp "${NOVNC_WEB}/index.html" "${NOVNC_WEB}/vnc.html" + +# --------------------------------------------------------------------------- +# 5. Working directories +# --------------------------------------------------------------------------- +RUN mkdir -p /opt/tlsdebug /opt/chrome-profile /var/log/tlsdebug /root/.config + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 4b. Openbox config — fullscreen enforcement + black desktop, no decorations +# --------------------------------------------------------------------------- +RUN mkdir -p /root/.config/openbox + +# rc.xml — force every window fullscreen, no decorations, black desktop +RUN cat > /root/.config/openbox/rc.xml << 'RCXML' + + + + Clearlooks + + no + no + + 1 + + + yes + yes + no + yes + + + +RCXML + +# autostart — black root window, hide idle cursor +RUN cat > /root/.config/openbox/autostart << 'OBSTART' +xsetroot -solid black +unclutter -idle 0 -root -noevents & +OBSTART + +# --------------------------------------------------------------------------- +# 5b. Log viewer — real-time web UI on port 4040 +# --------------------------------------------------------------------------- +RUN echo 'import http.server, os, json
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import urlparse, parse_qs

LOG_DIR = os.environ.get("LOG_DIR", "/var/log/tlsdebug")
PORT    = 4040

LOG_FILES = ["tlsproxy.log", "captured_tokens.json", "chrome.log",
             "x11vnc.log", "novnc.log", "xvfb.log", "openbox.log"]

def build_page():
    files_js = json.dumps(LOG_FILES)
    return f"""<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width,initial-scale=1">
<title>TLSDebug Log Viewer</title>
<style>
  :root{{--bg:#0d1117;--panel:#161b22;--border:#30363d;--accent:#58a6ff;
        --green:#3fb950;--text:#c9d1d9;--muted:#8b949e}}
  *{{box-sizing:border-box;margin:0;padding:0}}
  body{{background:var(--bg);color:var(--text);font-family:'SF Mono',Monaco,monospace;
       font-size:13px;display:flex;flex-direction:column;height:100vh}}
  header{{background:var(--panel);border-bottom:1px solid var(--border);
          padding:12px 20px;display:flex;align-items:center;gap:16px;flex-shrink:0}}
  header h1{{font-size:15px;font-weight:600;color:var(--accent)}}
  .badge{{background:var(--green);color:#000;font-size:10px;font-weight:700;
          padding:2px 8px;border-radius:10px}}
  #statusbar{{font-size:11px;color:var(--muted);margin-left:auto}}
  .tabs{{display:flex;gap:4px;overflow-x:auto;background:var(--panel);
         padding:8px 16px 0;border-bottom:1px solid var(--border);flex-shrink:0}}
  .tab{{padding:6px 14px;border-radius:6px 6px 0 0;cursor:pointer;color:var(--muted);
        border:1px solid transparent;border-bottom:none;font-size:12px;white-space:nowrap}}
  .tab:hover{{color:var(--text);background:rgba(255,255,255,.05)}}
  .tab.active{{color:var(--accent);background:var(--bg);border-color:var(--border)}}
  .toolbar{{display:flex;gap:8px;padding:8px 16px;background:var(--bg);
            border-bottom:1px solid var(--border);flex-shrink:0;align-items:center}}
  .toolbar input{{flex:1;background:var(--panel);border:1px solid var(--border);
                  color:var(--text);padding:5px 10px;border-radius:6px;font-family:inherit}}
  .toolbar label{{color:var(--muted);font-size:12px;display:flex;align-items:center;gap:5px}}
  .toolbar button{{background:var(--panel);border:1px solid var(--border);color:var(--text);
                   padding:5px 12px;border-radius:6px;cursor:pointer;font-family:inherit}}
  .toolbar button:hover{{border-color:var(--accent);color:var(--accent)}}
  #logview{{flex:1;overflow-y:auto;padding:12px 16px;white-space:pre-wrap;
            word-break:break-all;line-height:1.6}}
  .ln{{padding:1px 0}} .ln:hover{{background:rgba(255,255,255,.04)}}
  .match{{background:rgba(88,166,255,.12)}} .hl{{background:#e3b34144;border-radius:2px}}
</style>
</head>
<body>
<header>
  <h1>&#x1F50D; TLSDebug Log Viewer</h1>
  <span class="badge">LIVE</span>
  <span id="statusbar">Connecting...</span>
</header>
<div class="tabs" id="tabs"></div>
<div class="toolbar">
  <input id="filter" placeholder="Filter lines..." oninput="applyFilter()">
  <label><input type="checkbox" id="auto" checked> Auto-scroll</label>
  <button onclick="document.getElementById('filter').value='';applyFilter()">Clear</button>
  <button onclick="location.href='/api/download?file='+cur">Download</button>
</div>
<div id="logview"></div>
<script>
const LOGS={files_js};
let cur=LOGS[0],off=0,raw=[];
function init(){{
  const t=document.getElementById('tabs');
  LOGS.forEach(f=>{{
    const d=document.createElement('div');
    d.className='tab'+(f===cur?' active':'');
    d.textContent=f;d.onclick=()=>sw(f);t.appendChild(d);
  }});
  poll();setInterval(poll,1500);
}}
function sw(f){{cur=f;off=0;raw=[];
  document.querySelectorAll('.tab').forEach(t=>t.className='tab'+(t.textContent===f?' active':''));
  document.getElementById('logview').innerHTML='';poll();}}
async function poll(){{
  try{{
    const r=await fetch('/api/log?file='+encodeURIComponent(cur)+'&offset='+off);
    if(!r.ok)return;
    const d=await r.json();off=d.size;
    if(d.lines&&d.lines.length){{raw=raw.concat(d.lines);if(raw.length>5000)raw=raw.slice(-5000);applyFilter();}}
    document.getElementById('statusbar').textContent='Updated '+new Date().toLocaleTimeString();
  }}catch(e){{document.getElementById('statusbar').textContent='Error: '+e;}}
}}
function applyFilter(){{
  const fv=document.getElementById('filter').value.toLowerCase();
  const lv=document.getElementById('logview');
  const rows=fv?raw.filter(l=>l.toLowerCase().includes(fv)):raw;
  lv.innerHTML=rows.map(l=>{{
    const e=l.replace(/&/g,'&amp;').replace(/</g,'&lt;').replace(/>/g,'&gt;');
    const h=fv?e.replace(new RegExp(fv.replace(/[.*+?^${{}}()|[\\]\\\\]/g,'\\\\$&'),'gi'),m=>'<span class="hl">'+m+'</span>'):e;
    return '<div class="ln'+(fv&&l.toLowerCase().includes(fv)?' match':'')+'">'+h+'</div>';
  }}).join('');
  if(document.getElementById('auto').checked)lv.scrollTop=lv.scrollHeight;
}}
init();
</script>
</body></html>"""

PAGE = build_page()

class Handler(BaseHTTPRequestHandler):
    def log_message(self, fmt, *args): pass
    def do_GET(self):
        p = self.path.split('?')[0]
        if p in ('/', '/index.html'):
            body = PAGE.encode()
            self.send_response(200)
            self.send_header('Content-Type','text/html; charset=utf-8')
            self.send_header('Content-Length', str(len(body)))
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/log':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            offset = int(q.get('offset',['0'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            lines = []; size = offset
            if os.path.exists(fpath):
                with open(fpath,'rb') as f:
                    f.seek(offset); chunk = f.read()
                    size = offset + len(chunk)
                    raw_text = chunk.decode('utf-8', errors='replace')
                    if fname.endswith('.json'):
                        try:
                            import json as _json
                            parsed = _json.loads(open(fpath).read())
                            pretty = _json.dumps(parsed, indent=2)
                            lines  = pretty.splitlines()
                            size   = os.path.getsize(fpath)
                        except Exception:
                            lines = raw_text.splitlines()
                    else:
                        lines = raw_text.splitlines()
            body = json.dumps({'lines':lines,'size':size}).encode()
            self.send_response(200)
            self.send_header('Content-Type','application/json')
            self.send_header('Access-Control-Allow-Origin','*')
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/download':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            if os.path.exists(fpath):
                with open(fpath,'rb') as f: data = f.read()
                self.send_response(200)
                self.send_header('Content-Type','text/plain')
                self.send_header('Content-Disposition','attachment; filename='+fname)
                self.end_headers(); self.wfile.write(data)
            else:
                self.send_response(404); self.end_headers()
        else:
            self.send_response(404); self.end_headers()

os.makedirs(LOG_DIR, exist_ok=True)
print(f"[logviewer] 0.0.0.0:{PORT}  logs={LOG_DIR}")
HTTPServer(('0.0.0.0', PORT), Handler).serve_forever()
' | base64 -d > /opt/logviewer.py + +# --------------------------------------------------------------------------- +# 6. install-ca.sh +# Installs TLSDebug CA into: +# (a) Debian/OS system trust store +# (b) ~/.pki/nssdb — where Chromium/Chrome actually looks on Linux +# (c) Chrome profile NSS db — belt-and-suspenders +# --------------------------------------------------------------------------- +RUN cat > /opt/install-ca.sh << 'SCRIPT' +#!/bin/bash +set -e +CA_CERT="${1:-/opt/tlsdebug/proxy-ca.crt}" +CA_NAME="TLSDebug CA" +HOME_NSS="/root/.pki/nssdb" +PROFILE_NSS="/opt/chrome-profile/nssdb" + +log() { echo "[CA] $*"; } + +if [ ! -f "${CA_CERT}" ]; then + log "ERROR: cert not found at ${CA_CERT}"; exit 1 +fi + +log "=== Installing TLSDebug CA ===" +log "Subject : $(openssl x509 -noout -subject -in "${CA_CERT}" 2>/dev/null)" +log "Expires : $(openssl x509 -noout -enddate -in "${CA_CERT}" 2>/dev/null)" + +# ------------------------------------------------------------------ +# (a) OS / system trust store +# ------------------------------------------------------------------ +log "--- System trust store ---" +cp "${CA_CERT}" /usr/local/share/ca-certificates/tlsdebug.crt +update-ca-certificates --fresh +log "System store updated." + +# ------------------------------------------------------------------ +# (b) ~/.pki/nssdb (THIS is where Chromium on Linux actually looks) +# ------------------------------------------------------------------ +log "--- ~/.pki/nssdb (Chromium default location) ---" +mkdir -p "${HOME_NSS}" +if [ ! -f "${HOME_NSS}/cert9.db" ]; then + certutil -N -d "sql:${HOME_NSS}" --empty-password + log "Created new NSS db at ${HOME_NSS}" +fi +certutil -d "sql:${HOME_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${HOME_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${HOME_NSS}" + +# Verify +if certutil -d "sql:${HOME_NSS}" -L -n "${CA_NAME}" 2>/dev/null | grep -q "CT"; then + log "OK: ${HOME_NSS} verification passed." +else + log "WARNING: cert not found in ${HOME_NSS} after install" +fi + +# ------------------------------------------------------------------ +# (c) Chrome profile NSS db (belt-and-suspenders) +# ------------------------------------------------------------------ +log "--- Chrome profile NSS db ---" +mkdir -p "${PROFILE_NSS}" +if [ ! -f "${PROFILE_NSS}/cert9.db" ]; then + certutil -N -d "sql:${PROFILE_NSS}" --empty-password + log "Created new NSS db at ${PROFILE_NSS}" +fi +certutil -d "sql:${PROFILE_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${PROFILE_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${PROFILE_NSS}" + +log "=== CA installation complete ===" +SCRIPT +RUN chmod +x /opt/install-ca.sh + +# --------------------------------------------------------------------------- +# 6b. generate-novnc-cert.sh — Self-signed certificate for noVNC HTTPS +# --------------------------------------------------------------------------- +RUN cat > /opt/generate-novnc-cert.sh << 'SCRIPT' +#!/bin/bash +set -e + +CERT_DIR="${1:-/opt/novnc-certs}" +CERT_FILE="${CERT_DIR}/novnc.pem" + +log() { echo "[cert] $*"; } + +mkdir -p "${CERT_DIR}" + +if [ -f "${CERT_FILE}" ]; then + log "Certificate already exists: ${CERT_FILE}" + log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null || echo 'unknown')" + exit 0 +fi + +log "Generating self-signed certificate for noVNC..." + +openssl req -x509 -nodes -newkey rsa:2048 \ + -keyout "${CERT_FILE}" \ + -out "${CERT_FILE}" \ + -days 365 \ + -subj "/C=US/ST=State/L=City/O=TLSDebug/CN=localhost" \ + -addext "subjectAltName=DNS:localhost,DNS:*.local,IP:127.0.0.1" \ + 2>/dev/null + +chmod 600 "${CERT_FILE}" + +log "Certificate generated: ${CERT_FILE}" +log "Subject: $(openssl x509 -noout -subject -in "${CERT_FILE}" 2>/dev/null)" +log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null)" +SCRIPT +RUN chmod +x /opt/generate-novnc-cert.sh + +# 7. start-chrome.sh +# --------------------------------------------------------------------------- +RUN cat > /opt/start-chrome.sh << 'SCRIPT' +#!/bin/bash +export DISPLAY="${DISPLAY:-:99}" +export HOME=/root + +PROXY_HOST="${PROXY_HOST:-127.0.0.1}" +PROXY_PORT="${PROXY_PORT:-8080}" +REMOTE_DEBUG_PORT="${CHROME_REMOTE_DEBUGGING_PORT:-9222}" +START_URL="${START_URL:-https://www.google.com}" + +echo "[Browser] $(browser --version 2>/dev/null || echo unknown)" +echo "[Browser] DISPLAY=${DISPLAY} proxy=${PROXY_HOST}:${PROXY_PORT}" + +exec browser \ + --no-sandbox \ + --disable-dev-shm-usage \ + --disable-gpu \ + --disable-software-rasterizer \ + --use-gl=swiftshader \ + --use-angle=swiftshader \ + --enable-unsafe-swiftshader \ + --in-process-gpu \ + --disable-setuid-sandbox \ + --user-data-dir="/opt/chrome-profile" \ + --proxy-server="http://${PROXY_HOST}:${PROXY_PORT}" \ + --ignore-certificate-errors \ + --ignore-certificate-errors-spki-list \ + --test-type \ + --remote-debugging-port="${REMOTE_DEBUG_PORT}" \ + --remote-debugging-address=0.0.0.0 \ + --window-size=1920,1080 \ + --start-fullscreen \ + --kiosk \ + --disable-extensions \ + --no-first-run \ + --no-default-browser-check \ + --password-store=basic \ + --use-mock-keychain \ + --enable-logging=stderr \ + --v=1 \ + "${START_URL}" 2>&1 +SCRIPT +RUN chmod +x /opt/start-chrome.sh + + +# --------------------------------------------------------------------------- +# 8. entrypoint.sh +# --------------------------------------------------------------------------- +RUN cat > /entrypoint.sh << 'SCRIPT' +#!/bin/bash +set -e + +export HOME=/root +PROXY_PORT="${PROXY_PORT:-8080}" +VNC_PORT="${VNC_PORT:-5900}" +NOVNC_PORT="${NOVNC_PORT:-6080}" +DISPLAY="${DISPLAY:-:99}" +# LOG_DIR is bind-mounted to ./logs/ on the host. +# CERTDIR is set to the same path so tlsproxy writes captured_tokens.json, +# session files, and the CA cert directly into the host-visible logs folder. +LOG_DIR="/var/log/tlsdebug" +CERTDIR="${LOG_DIR}" +NOVNC_WEB=$(cat /opt/novnc_path 2>/dev/null || echo "/usr/share/novnc") + +mkdir -p "${LOG_DIR}" + +log() { echo "[$(date '+%H:%M:%S')] $*"; } +wait_port() { + local port=$1 label=$2 tries=${3:-30} + for i in $(seq 1 "${tries}"); do + if nc -z 127.0.0.1 "${port}" 2>/dev/null; then + log "[+] ${label} ready on port ${port}." + return 0 + fi + sleep 0.5 + done + log "[!] TIMEOUT waiting for ${label} on port ${port}." + return 1 +} + +log "============================================" +log " TLSDebug + Headless Chrome Container" +log " noVNC Web UI : http://localhost:${NOVNC_PORT}" +log " TLS Proxy : localhost:${PROXY_PORT}" +log " noVNC root : ${NOVNC_WEB}" +log "============================================" + +# ---- Diagnostics ----------------------------------------------------------- +log "[diag] novnc web root contents:" +ls -la "${NOVNC_WEB}" 2>&1 | head -20 || log " (none)" +log "[diag] websockify location: $(which websockify 2>/dev/null || echo NOT FOUND)" +log "[diag] x11vnc location: $(which x11vnc 2>/dev/null || echo NOT FOUND)" +log "[diag] browser symlink: $(which browser 2>/dev/null || echo NOT FOUND) -> $(readlink /usr/local/bin/browser 2>/dev/null || echo none)" +log "[diag] tlsproxy location: $(which tlsproxy 2>/dev/null || echo NOT FOUND)" + +# ---- 1. Xvfb --------------------------------------------------------------- +log "[*] Starting Xvfb on ${DISPLAY} ..." +rm -f /tmp/.X99-lock /tmp/.X11-unix/X99 2>/dev/null || true +Xvfb "${DISPLAY}" \ + -screen 0 1920x1080x24 \ + -ac \ + +extension GLX \ + +extension RANDR \ + +render \ + -noreset \ + >> "${LOG_DIR}/xvfb.log" 2>&1 & +XVFB_PID=$! + +log "[*] Waiting for Xvfb ..." +for i in $(seq 1 30); do + if DISPLAY="${DISPLAY}" xdpyinfo >/dev/null 2>&1; then + log "[+] Xvfb ready." + break + fi + sleep 0.5 +done +export DISPLAY="${DISPLAY}" + +# ---- 2. Openbox window manager --------------------------------------------- +log "[*] Starting openbox ..." +openbox --config-file /root/.config/openbox/rc.xml --display "${DISPLAY}" >> "${LOG_DIR}/openbox.log" 2>&1 & +sleep 1 + +# ---- 3. TLSDebug proxy ----------------------------------------------------- +log "[*] Starting TLSDebug proxy on port ${PROXY_PORT} ..." +cd "${CERTDIR}" +tlsproxy \ + -port "${PROXY_PORT}" \ + -certdir "${CERTDIR}" \ + -skip-install \ + 2>&1 | grep -v 'SSLV3_ALERT_CERTIFICATE_UNKNOWN' | tee -a "${LOG_DIR}/tlsproxy.log" & +PROXY_PID=$! + +log "[*] Waiting for CA certificate ..." +for i in $(seq 1 30); do + if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + log "[+] CA certificate ready." + break + fi + sleep 1 +done +# Install CA before Chrome launches — must succeed +if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + if /opt/install-ca.sh "${CERTDIR}/proxy-ca.crt"; then + log "[+] CA trusted by OS and Chrome NSS." + else + log "[!] CA install failed — Chrome may show cert errors." + fi +else + log "[!] proxy-ca.crt missing — Chrome may show cert errors." +fi + +# ---- 4. x11vnc ------------------------------------------------------------- +log "[*] Starting x11vnc on port ${VNC_PORT} ..." +x11vnc \ + -display "${DISPLAY}" \ + -forever \ + -shared \ + -nopw \ + -rfbport "${VNC_PORT}" \ + -noxdamage \ + -noxfixes \ + -noxcomposite \ + -cursor arrow \ + -loop \ + -repeat \ + -xkb \ + >> "${LOG_DIR}/x11vnc.log" 2>&1 & + +sleep 2 +wait_port "${VNC_PORT}" "x11vnc" 40 + +# ---- 5. noVNC -------------------------------------------------------------- +# Check for custom certificate or generate self-signed +CERT_DIR="/opt/novnc-certs" +CUSTOM_CERT="/certs/novnc.pem" +CERT_FILE="${CERT_DIR}/novnc.pem" + +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[*] HTTPS mode enabled" + + # Use custom cert if provided, otherwise generate self-signed + if [ -f "${CUSTOM_CERT}" ]; then + log "[*] Using custom certificate: ${CUSTOM_CERT}" + mkdir -p "${CERT_DIR}" + cp "${CUSTOM_CERT}" "${CERT_FILE}" + chmod 600 "${CERT_FILE}" + else + log "[*] No custom cert found, generating self-signed..." + /opt/generate-novnc-cert.sh "${CERT_DIR}" + fi + + NOVNC_PORT="${NOVNC_HTTPS_PORT:-6443}" + SSL_ARGS="--cert=${CERT_FILE} --ssl-only" + SCHEME="https" +else + log "[*] HTTP mode (set NOVNC_ENABLE_HTTPS=true for HTTPS)" + SSL_ARGS="" + SCHEME="http" +fi + +log "[*] Starting noVNC websockify on port ${NOVNC_PORT} (${SCHEME}) ..." +log "[*] web root : ${NOVNC_WEB}" +log "[*] target : 127.0.0.1:${VNC_PORT}" + +# note: SSL_ARGS may include --ssl-only; omit to allow fallbacks when certs are untrusted +tmp_args="${SSL_ARGS}" +# remove ssl-only if present to avoid 'non-SSL connection received but disallowed' errors +tmp_args=$(echo "${tmp_args}" | sed 's/--ssl-only//g') +websockify \ + --web "${NOVNC_WEB}" \ + --heartbeat 30 \ + ${tmp_args} \ + --log-file "${LOG_DIR}/novnc.log" \ + "${NOVNC_PORT}" \ + "127.0.0.1:${VNC_PORT}" & +NOVNC_PID=$! + +wait_port "${NOVNC_PORT}" "noVNC" 40 + +# Confirm websockify process +log "[diag] websockify process: $(pgrep -a websockify 2>/dev/null || echo NOT RUNNING)" +log "[diag] listening ports: $(ss -tlnp 2>/dev/null | grep -E '5900|6080|8080' || echo none)" + +# ---- 6. Chrome ------------------------------------------------------------- +# remove stale profile locks which can prevent Chrome from launching +rm -f /opt/chrome-profile/Singleton* /opt/chrome-profile/Default/Singleton* + +log "[*] Starting Chrome ..." +/opt/start-chrome.sh >> "${LOG_DIR}/chrome.log" 2>&1 & +CHROME_PID=$! + +# ---- 7. Log viewer on port 4040 -------------------------------------------- +log "[*] Starting log viewer on port 4040 ..." +python3 /opt/logviewer.py >> "${LOG_DIR}/logviewer.log" 2>&1 & +LOGVIEWER_PID=$! +wait_port 4040 "log viewer" 20 + +log "" +log "[+] All services started." +log "[+] Browser (noVNC) : ${SCHEME}://localhost:${NOVNC_PORT}" +log "[+] Log viewer : http://localhost:4040" +log "[+] TLS proxy : localhost:${PROXY_PORT}" +log "[+] Host logs dir : ${LOG_DIR} (mounted to ./logs/ on host)" +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[+] Certificate : ${CERT_FILE}" +fi +log "" + +cleanup() { + log "[*] Shutting down ..." + kill "${CHROME_PID}" "${NOVNC_PID}" "${PROXY_PID}" "${XVFB_PID}" "${LOGVIEWER_PID}" 2>/dev/null || true + exit 0 +} +trap cleanup SIGTERM SIGINT + +# Stream proxy traffic to docker logs so 'docker logs -f tlsdebug' shows live traffic +tail -f "${LOG_DIR}/tlsproxy.log" +SCRIPT +RUN chmod +x /entrypoint.sh + +# --------------------------------------------------------------------------- +# 9. Ports +# --------------------------------------------------------------------------- +EXPOSE 6080 6443 80 443 5900 8080 4040 9222 + +WORKDIR /opt/tlsdebug +ENTRYPOINT ["/entrypoint.sh"] diff --git a/labs/remotebrowser_TLS/README.md b/labs/remotebrowser_TLS/README.md index 8b13789..6ad042d 100644 --- a/labs/remotebrowser_TLS/README.md +++ b/labs/remotebrowser_TLS/README.md @@ -1 +1 @@ - +### Allow Testing of Browser In Browser diff --git a/labs/remotebrowser_TLS/docker-compose.yml b/labs/remotebrowser_TLS/docker-compose.yml new file mode 100644 index 0000000..05a300a --- /dev/null +++ b/labs/remotebrowser_TLS/docker-compose.yml @@ -0,0 +1,58 @@ +services: + tlsdebug: + build: + context: . + dockerfile: Dockerfile + image: tlsdebug:latest + container_name: tlsdebug + ports: + # noVNC web UI — HTTP on port 6080, HTTPS on port 6443 + - "6080:6080" # noVNC HTTP (default) + - "6443:6443" # noVNC HTTPS (when NOVNC_ENABLE_HTTPS=true) + # - "80:6080" # Optional: expose HTTP on port 80 + - "443:6443" # Optional: expose HTTPS on port 443 + # Raw VNC (optional — use any VNC client against localhost:5900) + - "5900:5900" + # TLSDebug intercepting proxy (change host port if 8080 is taken) + - "8888:8080" + # TLSDebug built-in HTTP log viewer + - "4040:4040" + # Chrome remote debugging (optional) + - "9222:9222" + volumes: + # All logs, CA cert, captured_tokens.json and session files + # are written here — readable on the host at ./logs/ + - ./logs:/var/log/tlsdebug + # Persist Chrome profile (bookmarks, saved state, etc.) + - chrome-profile:/opt/chrome-profile + # Optional: Mount custom noVNC certificate (PEM format) + # - ./certs/novnc.pem:/certs/novnc.pem:ro + environment: + PROXY_PORT: "8080" + VNC_PORT: "5900" + NOVNC_PORT: "6080" + NOVNC_HTTPS_PORT: "6443" + DISPLAY: ":99" + CHROME_REMOTE_DEBUGGING_PORT: "9222" + # Change START_URL to set the browser's home page + START_URL: "https://www.google.com" + # Enable HTTPS for noVNC (set to "true" to enable) + NOVNC_ENABLE_HTTPS: "true" + # When HTTPS is enabled: + # - Self-signed cert is auto-generated if no custom cert provided + # - Mount custom cert at /certs/novnc.pem to use your own + cap_add: + - SYS_ADMIN + security_opt: + - seccomp:unconfined + restart: unless-stopped + shm_size: "2gb" + healthcheck: + test: ["CMD", "sh", "-c", "[ \"${NOVNC_ENABLE_HTTPS}\" = \"true\" ] && curl -k -sf https://localhost:6443 || curl -sf http://localhost:6080"] + interval: 15s + timeout: 5s + retries: 5 + start_period: 30s + +volumes: + chrome-profile: \ No newline at end of file From 3390caf9e939f74a1a086daa71ad4f244716a4bf Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Sun, 8 Mar 2026 20:10:03 -0600 Subject: [PATCH 5/9] Add files via upload --- labs/remotebrowser_TLS/docker-compose.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/labs/remotebrowser_TLS/docker-compose.yml b/labs/remotebrowser_TLS/docker-compose.yml index 05a300a..6cebb0b 100644 --- a/labs/remotebrowser_TLS/docker-compose.yml +++ b/labs/remotebrowser_TLS/docker-compose.yml @@ -35,7 +35,7 @@ services: DISPLAY: ":99" CHROME_REMOTE_DEBUGGING_PORT: "9222" # Change START_URL to set the browser's home page - START_URL: "https://www.google.com" + START_URL: "https://microsoft.com" # Enable HTTPS for noVNC (set to "true" to enable) NOVNC_ENABLE_HTTPS: "true" # When HTTPS is enabled: From 6c4e10281b200f7770381d0ed978038e5795be44 Mon Sep 17 00:00:00 2001 From: Casey Smith Date: Sun, 8 Mar 2026 20:32:18 -0600 Subject: [PATCH 6/9] Update Dockerfile --- labs/remotebrowser_TLS/Dockerfile | 21 +++++++++++++++++++-- 1 file changed, 19 insertions(+), 2 deletions(-) diff --git a/labs/remotebrowser_TLS/Dockerfile b/labs/remotebrowser_TLS/Dockerfile index ee8c77a..158cbce 100644 --- a/labs/remotebrowser_TLS/Dockerfile +++ b/labs/remotebrowser_TLS/Dockerfile @@ -123,6 +123,14 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML overflow:hidden; background:#000; } #screen { position:fixed; top:0; left:0; width:100vw; height:100vh; background:#000; } + /* Force the injected noVNC canvas to fill the container exactly */ + #screen canvas, #noVNC_canvas { + display:block!important; + position:absolute!important; + top:0!important; left:0!important; + width:100%!important; height:100%!important; + border:none!important; outline:none!important; + } /* Nuke every noVNC chrome element by ID and class */ #noVNC_control_bar_anchor, #noVNC_control_bar, #noVNC_control_bar_handle, #noVNC_hint_anchor, @@ -174,15 +182,24 @@ RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML const url = proto + '//' + location.hostname + ':' + port; rfb = new RFB(scrn, url, { credentials: {password:''} }); rfb.scaleViewport = true; - rfb.resizeSession = false; + rfb.resizeSession = true; rfb.clipViewport = false; rfb.showDotCursor = false; rfb.background = '#000000'; - rfb.addEventListener('connect', () => { strip(); msg('TLSDebug Active'); }); + rfb.addEventListener('connect', () => { + strip(); + msg('TLSDebug Active'); + // Immediately sync session size to the actual viewport + rfb.resizeSession = true; + }); rfb.addEventListener('disconnect', () => { msg('Reconnecting...', true); setTimeout(connect, 3000); }); rfb.addEventListener('credentialsrequired', () => rfb.sendCredentials({password:''})); } + // Keep session size in sync whenever the browser window is resized + new ResizeObserver(() => { if (rfb) rfb.resizeSession = true; }) + .observe(document.documentElement); + connect(); From 934664e5dff8bd3e635540fc3d79cfbf7168496b Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Tue, 10 Mar 2026 14:05:31 -0600 Subject: [PATCH 7/9] Revise README for TLSDebug Remote Browser Lab Updated README to provide detailed setup instructions and features for TLSDebug Remote Browser Lab. --- labs/remotebrowser/README.md | 66 +++++++++++++++++++++++++++++++++++- 1 file changed, 65 insertions(+), 1 deletion(-) diff --git a/labs/remotebrowser/README.md b/labs/remotebrowser/README.md index 6ad042d..3582fd2 100644 --- a/labs/remotebrowser/README.md +++ b/labs/remotebrowser/README.md @@ -1 +1,65 @@ -### Allow Testing of Browser In Browser +# TLSDebug Remote Browser Lab + +Browser-in-browser setup for testing HTTPS interception with TLSDebug. All-in-one Docker container with Chrome, noVNC, and the TLS intercepting proxy pre-configured. + +## Quick Start + +```bash +docker-compose up +``` + +Open your browser: +- **http://localhost:6080** - Chrome browser interface (proxy already configured) +- **http://localhost:4040** - Real-time traffic monitor + +Browse any HTTPS site in the remote Chrome - all traffic will be intercepted and logged. + +## What's Included + +- **Headless Chrome** - Full browser with TLS proxy pre-configured +- **noVNC** - Web-based VNC viewer (no VNC client needed) +- **TLSDebug Proxy** - Intercepts and logs all HTTPS traffic +- **Debug Monitor** - Port 4040 shows live traffic, tokens, and sessions +- **Auto CA Trust** - Proxy certificate automatically trusted in Chrome + +## Ports + +| Port | Service | Description | +|------|---------|-------------| +| 6080 | noVNC | Browser interface - start here | +| 4040 | Monitor | Real-time traffic viewer | +| 8888 | Proxy | TLS proxy (mapped from internal 8080) | +| 5900 | VNC | Raw VNC access (optional) | +| 9222 | DevTools | Chrome debugging protocol (optional) | + +## Debug Monitor (Port 4040) + +The monitor shows: +- **All HTTP requests/responses** with full headers +- **Session cookies** - Marked with `"session": true` +- **JWT tokens** - Automatically decoded with claims visible +- **OAuth tokens** - Access and refresh tokens +- **POST data** - Form parameters and JSON payloads + +## Captured Data + +All logs and tokens are saved to `./logs/` on your host: +- `proxy.log` - Full request/response logs +- `EditThisCookie_Sessions.json` - All captured cookies and sessions +- `captured_tokens.json` - JWT and OAuth tokens +- `proxy-ca.crt` - CA certificate (if you need to trust it elsewhere) + +## Configuration + +Edit `docker-compose.yml` to customize: +- `START_URL` - Set the browser's starting page +- Port mappings - Change if ports conflict +- `./logs` volume - Where captured data is saved + +## Use Cases + +- Debug OAuth/SAML flows +- Inspect JWT token contents +- Extract session cookies for testing +- Analyze API request/response patterns +- Troubleshoot TLS/HTTPS issues From c0029d5a01ccdab7fe517a1c2f83532dd15e15b9 Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Tue, 10 Mar 2026 14:55:34 -0600 Subject: [PATCH 8/9] Update Dockerfile fix web socket - tls - false --- labs/remotebrowser/Dockerfile | 594 ++++------------------------------ 1 file changed, 58 insertions(+), 536 deletions(-) diff --git a/labs/remotebrowser/Dockerfile b/labs/remotebrowser/Dockerfile index 667255a..a5afa4b 100644 --- a/labs/remotebrowser/Dockerfile +++ b/labs/remotebrowser/Dockerfile @@ -1,536 +1,58 @@ -# ============================================================================= -# TLSDebug + Headless Chrome + noVNC — single self-contained Dockerfile -# ============================================================================= -FROM debian:bookworm-slim - -ENV DEBIAN_FRONTEND=noninteractive \ - DISPLAY=:99 \ - VNC_PORT=5900 \ - NOVNC_PORT=6080 \ - PROXY_PORT=8080 \ - CHROME_REMOTE_DEBUGGING_PORT=9222 \ - PROXY_HOST=127.0.0.1 - -# --------------------------------------------------------------------------- -# 1. Base packages -# --------------------------------------------------------------------------- -RUN apt-get update && apt-get install -y --no-install-recommends \ - golang-go \ - git \ - xvfb \ - x11vnc \ - openbox \ - xterm \ - python3 \ - python3-pip \ - python3-websockify \ - novnc \ - wget \ - gnupg \ - ca-certificates \ - fonts-liberation \ - libasound2 \ - libatk-bridge2.0-0 \ - libatk1.0-0 \ - libcups2 \ - libdbus-1-3 \ - libgdk-pixbuf2.0-0 \ - libgtk-3-0 \ - libnspr4 \ - libnss3 \ - libnss3-tools \ - libx11-xcb1 \ - libxcomposite1 \ - libxdamage1 \ - libxfixes3 \ - libxkbcommon0 \ - libxrandr2 \ - libxshmfence1 \ - xdg-utils \ - openssl \ - curl \ - netcat-openbsd \ - procps \ - psmisc \ - x11-utils \ - unclutter \ - && rm -rf /var/lib/apt/lists/* - -# --------------------------------------------------------------------------- -# --------------------------------------------------------------------------- -# --------------------------------------------------------------------------- -# --------------------------------------------------------------------------- -# 2. Install browser -# amd64 -> Google Chrome stable (official Google .deb) -# arm64 -> Chromium from Debian bookworm (native deb, no snap) -# -# Base image is debian:bookworm-slim which has real chromium packages -# on all architectures — no snap wrappers. -# --------------------------------------------------------------------------- -RUN ARCH=$(dpkg --print-architecture) && \ - if [ "${ARCH}" = "amd64" ]; then \ - echo "[browser] amd64: installing Google Chrome ..." && \ - wget -q -O /tmp/chrome.deb \ - "https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb" && \ - apt-get update && \ - apt-get install -y --no-install-recommends /tmp/chrome.deb && \ - rm /tmp/chrome.deb && \ - rm -rf /var/lib/apt/lists/* && \ - ln -sf /usr/bin/google-chrome /usr/local/bin/browser && \ - echo "[browser] installed: $(google-chrome --version)"; \ - elif [ "${ARCH}" = "arm64" ]; then \ - echo "[browser] arm64: installing Chromium from Debian bookworm ..." && \ - apt-get update && \ - apt-get install -y --no-install-recommends chromium && \ - rm -rf /var/lib/apt/lists/* && \ - ln -sf /usr/bin/chromium /usr/local/bin/browser && \ - echo "[browser] installed: $(chromium --version)"; \ - else \ - echo "[browser] ERROR: unsupported arch ${ARCH}" && exit 1; \ - fi - -# --------------------------------------------------------------------------- -# 3. Build TLSDebug from source -# AllTrafficModule is already active by default and logs every request, -# response, headers and body — no source patching needed. -# We set log flags via the LOG_FLAGS env var at runtime instead. -# --------------------------------------------------------------------------- -WORKDIR /build -RUN git clone --depth 1 https://github.com/secdev02/TLSDebug.git . \ - && CGO_ENABLED=0 go build -ldflags "-s -w" -o /usr/local/bin/tlsproxy tlsproxy.go \ - && chmod +x /usr/local/bin/tlsproxy \ - && rm -rf /build - -# 4. Locate noVNC web root and write kiosk index.html -# Kiosk mode: auto-connects, scales to fill browser window, hides toolbar, -# no password prompt, no connection dialog — just the desktop. -# --------------------------------------------------------------------------- -RUN find /usr -name "vnc.html" 2>/dev/null | head -1 | xargs -I{} dirname {} > /opt/novnc_path \ - && NOVNC_WEB=$(cat /opt/novnc_path) \ - && echo "noVNC web root: ${NOVNC_WEB}" \ - && ls -la "${NOVNC_WEB}" - -RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML' - - - - - TLSDebug - - - -
-
Connecting...
- - - -HTML - -# Also overwrite vnc.html so any direct /vnc.html request shows our kiosk too -RUN NOVNC_WEB=$(cat /opt/novnc_path) && cp "${NOVNC_WEB}/index.html" "${NOVNC_WEB}/vnc.html" - -# --------------------------------------------------------------------------- -# 5. Working directories -# --------------------------------------------------------------------------- -RUN mkdir -p /opt/tlsdebug /opt/chrome-profile /var/log/tlsdebug /root/.config - -# --------------------------------------------------------------------------- -# --------------------------------------------------------------------------- -# 4b. Openbox config — fullscreen enforcement + black desktop, no decorations -# --------------------------------------------------------------------------- -RUN mkdir -p /root/.config/openbox - -# rc.xml — force every window fullscreen, no decorations, black desktop -RUN cat > /root/.config/openbox/rc.xml << 'RCXML' - - - - Clearlooks - - no - no - - 1 - - - yes - yes - no - yes - - - -RCXML - -# autostart — black root window, hide idle cursor -RUN cat > /root/.config/openbox/autostart << 'OBSTART' -xsetroot -solid black -unclutter -idle 0 -root -noevents & -OBSTART - -# --------------------------------------------------------------------------- -# 5b. Log viewer — real-time web UI on port 4040 -# --------------------------------------------------------------------------- -RUN echo 'import http.server, os, json
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import urlparse, parse_qs

LOG_DIR = os.environ.get("LOG_DIR", "/var/log/tlsdebug")
PORT    = 4040

LOG_FILES = ["tlsproxy.log", "captured_tokens.json", "chrome.log",
             "x11vnc.log", "novnc.log", "xvfb.log", "openbox.log"]

def build_page():
    files_js = json.dumps(LOG_FILES)
    return f"""<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width,initial-scale=1">
<title>TLSDebug Log Viewer</title>
<style>
  :root{{--bg:#0d1117;--panel:#161b22;--border:#30363d;--accent:#58a6ff;
        --green:#3fb950;--text:#c9d1d9;--muted:#8b949e}}
  *{{box-sizing:border-box;margin:0;padding:0}}
  body{{background:var(--bg);color:var(--text);font-family:'SF Mono',Monaco,monospace;
       font-size:13px;display:flex;flex-direction:column;height:100vh}}
  header{{background:var(--panel);border-bottom:1px solid var(--border);
          padding:12px 20px;display:flex;align-items:center;gap:16px;flex-shrink:0}}
  header h1{{font-size:15px;font-weight:600;color:var(--accent)}}
  .badge{{background:var(--green);color:#000;font-size:10px;font-weight:700;
          padding:2px 8px;border-radius:10px}}
  #statusbar{{font-size:11px;color:var(--muted);margin-left:auto}}
  .tabs{{display:flex;gap:4px;overflow-x:auto;background:var(--panel);
         padding:8px 16px 0;border-bottom:1px solid var(--border);flex-shrink:0}}
  .tab{{padding:6px 14px;border-radius:6px 6px 0 0;cursor:pointer;color:var(--muted);
        border:1px solid transparent;border-bottom:none;font-size:12px;white-space:nowrap}}
  .tab:hover{{color:var(--text);background:rgba(255,255,255,.05)}}
  .tab.active{{color:var(--accent);background:var(--bg);border-color:var(--border)}}
  .toolbar{{display:flex;gap:8px;padding:8px 16px;background:var(--bg);
            border-bottom:1px solid var(--border);flex-shrink:0;align-items:center}}
  .toolbar input{{flex:1;background:var(--panel);border:1px solid var(--border);
                  color:var(--text);padding:5px 10px;border-radius:6px;font-family:inherit}}
  .toolbar label{{color:var(--muted);font-size:12px;display:flex;align-items:center;gap:5px}}
  .toolbar button{{background:var(--panel);border:1px solid var(--border);color:var(--text);
                   padding:5px 12px;border-radius:6px;cursor:pointer;font-family:inherit}}
  .toolbar button:hover{{border-color:var(--accent);color:var(--accent)}}
  #logview{{flex:1;overflow-y:auto;padding:12px 16px;white-space:pre-wrap;
            word-break:break-all;line-height:1.6}}
  .ln{{padding:1px 0}} .ln:hover{{background:rgba(255,255,255,.04)}}
  .match{{background:rgba(88,166,255,.12)}} .hl{{background:#e3b34144;border-radius:2px}}
</style>
</head>
<body>
<header>
  <h1>&#x1F50D; TLSDebug Log Viewer</h1>
  <span class="badge">LIVE</span>
  <span id="statusbar">Connecting...</span>
</header>
<div class="tabs" id="tabs"></div>
<div class="toolbar">
  <input id="filter" placeholder="Filter lines..." oninput="applyFilter()">
  <label><input type="checkbox" id="auto" checked> Auto-scroll</label>
  <button onclick="document.getElementById('filter').value='';applyFilter()">Clear</button>
  <button onclick="location.href='/api/download?file='+cur">Download</button>
</div>
<div id="logview"></div>
<script>
const LOGS={files_js};
let cur=LOGS[0],off=0,raw=[];
function init(){{
  const t=document.getElementById('tabs');
  LOGS.forEach(f=>{{
    const d=document.createElement('div');
    d.className='tab'+(f===cur?' active':'');
    d.textContent=f;d.onclick=()=>sw(f);t.appendChild(d);
  }});
  poll();setInterval(poll,1500);
}}
function sw(f){{cur=f;off=0;raw=[];
  document.querySelectorAll('.tab').forEach(t=>t.className='tab'+(t.textContent===f?' active':''));
  document.getElementById('logview').innerHTML='';poll();}}
async function poll(){{
  try{{
    const r=await fetch('/api/log?file='+encodeURIComponent(cur)+'&offset='+off);
    if(!r.ok)return;
    const d=await r.json();off=d.size;
    if(d.lines&&d.lines.length){{raw=raw.concat(d.lines);if(raw.length>5000)raw=raw.slice(-5000);applyFilter();}}
    document.getElementById('statusbar').textContent='Updated '+new Date().toLocaleTimeString();
  }}catch(e){{document.getElementById('statusbar').textContent='Error: '+e;}}
}}
function applyFilter(){{
  const fv=document.getElementById('filter').value.toLowerCase();
  const lv=document.getElementById('logview');
  const rows=fv?raw.filter(l=>l.toLowerCase().includes(fv)):raw;
  lv.innerHTML=rows.map(l=>{{
    const e=l.replace(/&/g,'&amp;').replace(/</g,'&lt;').replace(/>/g,'&gt;');
    const h=fv?e.replace(new RegExp(fv.replace(/[.*+?^${{}}()|[\\]\\\\]/g,'\\\\$&'),'gi'),m=>'<span class="hl">'+m+'</span>'):e;
    return '<div class="ln'+(fv&&l.toLowerCase().includes(fv)?' match':'')+'">'+h+'</div>';
  }}).join('');
  if(document.getElementById('auto').checked)lv.scrollTop=lv.scrollHeight;
}}
init();
</script>
</body></html>"""

PAGE = build_page()

class Handler(BaseHTTPRequestHandler):
    def log_message(self, fmt, *args): pass
    def do_GET(self):
        p = self.path.split('?')[0]
        if p in ('/', '/index.html'):
            body = PAGE.encode()
            self.send_response(200)
            self.send_header('Content-Type','text/html; charset=utf-8')
            self.send_header('Content-Length', str(len(body)))
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/log':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            offset = int(q.get('offset',['0'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            lines = []; size = offset
            if os.path.exists(fpath):
                with open(fpath,'rb') as f:
                    f.seek(offset); chunk = f.read()
                    size = offset + len(chunk)
                    raw_text = chunk.decode('utf-8', errors='replace')
                    if fname.endswith('.json'):
                        try:
                            import json as _json
                            parsed = _json.loads(open(fpath).read())
                            pretty = _json.dumps(parsed, indent=2)
                            lines  = pretty.splitlines()
                            size   = os.path.getsize(fpath)
                        except Exception:
                            lines = raw_text.splitlines()
                    else:
                        lines = raw_text.splitlines()
            body = json.dumps({'lines':lines,'size':size}).encode()
            self.send_response(200)
            self.send_header('Content-Type','application/json')
            self.send_header('Access-Control-Allow-Origin','*')
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/download':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            if os.path.exists(fpath):
                with open(fpath,'rb') as f: data = f.read()
                self.send_response(200)
                self.send_header('Content-Type','text/plain')
                self.send_header('Content-Disposition','attachment; filename='+fname)
                self.end_headers(); self.wfile.write(data)
            else:
                self.send_response(404); self.end_headers()
        else:
            self.send_response(404); self.end_headers()

os.makedirs(LOG_DIR, exist_ok=True)
print(f"[logviewer] 0.0.0.0:{PORT}  logs={LOG_DIR}")
HTTPServer(('0.0.0.0', PORT), Handler).serve_forever()
' | base64 -d > /opt/logviewer.py - -# --------------------------------------------------------------------------- -# 6. install-ca.sh -# Installs TLSDebug CA into: -# (a) Debian/OS system trust store -# (b) ~/.pki/nssdb — where Chromium/Chrome actually looks on Linux -# (c) Chrome profile NSS db — belt-and-suspenders -# --------------------------------------------------------------------------- -RUN cat > /opt/install-ca.sh << 'SCRIPT' -#!/bin/bash -set -e -CA_CERT="${1:-/opt/tlsdebug/proxy-ca.crt}" -CA_NAME="TLSDebug CA" -HOME_NSS="/root/.pki/nssdb" -PROFILE_NSS="/opt/chrome-profile/nssdb" - -log() { echo "[CA] $*"; } - -if [ ! -f "${CA_CERT}" ]; then - log "ERROR: cert not found at ${CA_CERT}"; exit 1 -fi - -log "=== Installing TLSDebug CA ===" -log "Subject : $(openssl x509 -noout -subject -in "${CA_CERT}" 2>/dev/null)" -log "Expires : $(openssl x509 -noout -enddate -in "${CA_CERT}" 2>/dev/null)" - -# ------------------------------------------------------------------ -# (a) OS / system trust store -# ------------------------------------------------------------------ -log "--- System trust store ---" -cp "${CA_CERT}" /usr/local/share/ca-certificates/tlsdebug.crt -update-ca-certificates --fresh -log "System store updated." - -# ------------------------------------------------------------------ -# (b) ~/.pki/nssdb (THIS is where Chromium on Linux actually looks) -# ------------------------------------------------------------------ -log "--- ~/.pki/nssdb (Chromium default location) ---" -mkdir -p "${HOME_NSS}" -if [ ! -f "${HOME_NSS}/cert9.db" ]; then - certutil -N -d "sql:${HOME_NSS}" --empty-password - log "Created new NSS db at ${HOME_NSS}" -fi -certutil -d "sql:${HOME_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true -certutil -d "sql:${HOME_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" -log "Installed into ${HOME_NSS}" - -# Verify -if certutil -d "sql:${HOME_NSS}" -L -n "${CA_NAME}" 2>/dev/null | grep -q "CT"; then - log "OK: ${HOME_NSS} verification passed." -else - log "WARNING: cert not found in ${HOME_NSS} after install" -fi - -# ------------------------------------------------------------------ -# (c) Chrome profile NSS db (belt-and-suspenders) -# ------------------------------------------------------------------ -log "--- Chrome profile NSS db ---" -mkdir -p "${PROFILE_NSS}" -if [ ! -f "${PROFILE_NSS}/cert9.db" ]; then - certutil -N -d "sql:${PROFILE_NSS}" --empty-password - log "Created new NSS db at ${PROFILE_NSS}" -fi -certutil -d "sql:${PROFILE_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true -certutil -d "sql:${PROFILE_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" -log "Installed into ${PROFILE_NSS}" - -log "=== CA installation complete ===" -SCRIPT -RUN chmod +x /opt/install-ca.sh - -# 7. start-chrome.sh -# --------------------------------------------------------------------------- -RUN cat > /opt/start-chrome.sh << 'SCRIPT' -#!/bin/bash -export DISPLAY="${DISPLAY:-:99}" -export HOME=/root - -PROXY_HOST="${PROXY_HOST:-127.0.0.1}" -PROXY_PORT="${PROXY_PORT:-8080}" -REMOTE_DEBUG_PORT="${CHROME_REMOTE_DEBUGGING_PORT:-9222}" -START_URL="${START_URL:-https://www.google.com}" - -echo "[Browser] $(browser --version 2>/dev/null || echo unknown)" -echo "[Browser] DISPLAY=${DISPLAY} proxy=${PROXY_HOST}:${PROXY_PORT}" - -exec browser \ - --no-sandbox \ - --disable-dev-shm-usage \ - --disable-gpu \ - --disable-software-rasterizer \ - --use-gl=swiftshader \ - --use-angle=swiftshader \ - --enable-unsafe-swiftshader \ - --in-process-gpu \ - --disable-setuid-sandbox \ - --user-data-dir="/opt/chrome-profile" \ - --proxy-server="http://${PROXY_HOST}:${PROXY_PORT}" \ - --ignore-certificate-errors \ - --ignore-certificate-errors-spki-list \ - --test-type \ - --remote-debugging-port="${REMOTE_DEBUG_PORT}" \ - --remote-debugging-address=0.0.0.0 \ - --window-size=1920,1080 \ - --start-fullscreen \ - --kiosk \ - --disable-extensions \ - --no-first-run \ - --no-default-browser-check \ - --password-store=basic \ - --use-mock-keychain \ - --enable-logging=stderr \ - --v=1 \ - "${START_URL}" 2>&1 -SCRIPT -RUN chmod +x /opt/start-chrome.sh - - -# --------------------------------------------------------------------------- -# 8. entrypoint.sh -# --------------------------------------------------------------------------- -RUN cat > /entrypoint.sh << 'SCRIPT' -#!/bin/bash -set -e - -export HOME=/root -PROXY_PORT="${PROXY_PORT:-8080}" -VNC_PORT="${VNC_PORT:-5900}" -NOVNC_PORT="${NOVNC_PORT:-6080}" -DISPLAY="${DISPLAY:-:99}" -# LOG_DIR is bind-mounted to ./logs/ on the host. -# CERTDIR is set to the same path so tlsproxy writes captured_tokens.json, -# session files, and the CA cert directly into the host-visible logs folder. -LOG_DIR="/var/log/tlsdebug" -CERTDIR="${LOG_DIR}" -NOVNC_WEB=$(cat /opt/novnc_path 2>/dev/null || echo "/usr/share/novnc") - -mkdir -p "${LOG_DIR}" - -log() { echo "[$(date '+%H:%M:%S')] $*"; } -wait_port() { - local port=$1 label=$2 tries=${3:-30} - for i in $(seq 1 "${tries}"); do - if nc -z 127.0.0.1 "${port}" 2>/dev/null; then - log "[+] ${label} ready on port ${port}." - return 0 - fi - sleep 0.5 - done - log "[!] TIMEOUT waiting for ${label} on port ${port}." - return 1 -} - -log "============================================" -log " TLSDebug + Headless Chrome Container" -log " noVNC Web UI : http://localhost:${NOVNC_PORT}" -log " TLS Proxy : localhost:${PROXY_PORT}" -log " noVNC root : ${NOVNC_WEB}" -log "============================================" - -# ---- Diagnostics ----------------------------------------------------------- -log "[diag] novnc web root contents:" -ls -la "${NOVNC_WEB}" 2>&1 | head -20 || log " (none)" -log "[diag] websockify location: $(which websockify 2>/dev/null || echo NOT FOUND)" -log "[diag] x11vnc location: $(which x11vnc 2>/dev/null || echo NOT FOUND)" -log "[diag] browser symlink: $(which browser 2>/dev/null || echo NOT FOUND) -> $(readlink /usr/local/bin/browser 2>/dev/null || echo none)" -log "[diag] tlsproxy location: $(which tlsproxy 2>/dev/null || echo NOT FOUND)" - -# ---- 1. Xvfb --------------------------------------------------------------- -log "[*] Starting Xvfb on ${DISPLAY} ..." -rm -f /tmp/.X99-lock /tmp/.X11-unix/X99 2>/dev/null || true -Xvfb "${DISPLAY}" \ - -screen 0 1920x1080x24 \ - -ac \ - +extension GLX \ - +extension RANDR \ - +render \ - -noreset \ - >> "${LOG_DIR}/xvfb.log" 2>&1 & -XVFB_PID=$! - -log "[*] Waiting for Xvfb ..." -for i in $(seq 1 30); do - if DISPLAY="${DISPLAY}" xdpyinfo >/dev/null 2>&1; then - log "[+] Xvfb ready." - break - fi - sleep 0.5 -done -export DISPLAY="${DISPLAY}" - -# ---- 2. Openbox window manager --------------------------------------------- -log "[*] Starting openbox ..." -openbox --config-file /root/.config/openbox/rc.xml --display "${DISPLAY}" >> "${LOG_DIR}/openbox.log" 2>&1 & -sleep 1 - -# ---- 3. TLSDebug proxy ----------------------------------------------------- -log "[*] Starting TLSDebug proxy on port ${PROXY_PORT} ..." -cd "${CERTDIR}" -tlsproxy \ - -port "${PROXY_PORT}" \ - -certdir "${CERTDIR}" \ - -skip-install \ - 2>&1 | tee -a "${LOG_DIR}/tlsproxy.log" & -PROXY_PID=$! - -log "[*] Waiting for CA certificate ..." -for i in $(seq 1 30); do - if [ -f "${CERTDIR}/proxy-ca.crt" ]; then - log "[+] CA certificate ready." - break - fi - sleep 1 -done -# Install CA before Chrome launches — must succeed -if [ -f "${CERTDIR}/proxy-ca.crt" ]; then - if /opt/install-ca.sh "${CERTDIR}/proxy-ca.crt"; then - log "[+] CA trusted by OS and Chrome NSS." - else - log "[!] CA install failed — Chrome may show cert errors." - fi -else - log "[!] proxy-ca.crt missing — Chrome may show cert errors." -fi - -# ---- 4. x11vnc ------------------------------------------------------------- -log "[*] Starting x11vnc on port ${VNC_PORT} ..." -x11vnc \ - -display "${DISPLAY}" \ - -forever \ - -shared \ - -nopw \ - -rfbport "${VNC_PORT}" \ - -o "${LOG_DIR}/x11vnc.log" \ - -bg \ - -noipv6 \ - -xkb \ - -noxrecord \ - -noxfixes \ - -noxdamage \ - -cursor arrow \ - -wait 5 \ - -defer 5 - -wait_port "${VNC_PORT}" "x11vnc" 40 - -# ---- 5. noVNC -------------------------------------------------------------- -log "[*] Starting noVNC websockify on port ${NOVNC_PORT} ..." -log "[*] web root : ${NOVNC_WEB}" -log "[*] target : 127.0.0.1:${VNC_PORT}" - -websockify \ - --web "${NOVNC_WEB}" \ - --heartbeat 30 \ - --log-file "${LOG_DIR}/novnc.log" \ - "${NOVNC_PORT}" \ - "127.0.0.1:${VNC_PORT}" & -NOVNC_PID=$! - -wait_port "${NOVNC_PORT}" "noVNC" 40 - -# Confirm websockify process -log "[diag] websockify process: $(pgrep -a websockify 2>/dev/null || echo NOT RUNNING)" -log "[diag] listening ports: $(ss -tlnp 2>/dev/null | grep -E '5900|6080|8080' || echo none)" - -# ---- 6. Chrome ------------------------------------------------------------- -log "[*] Starting Chrome ..." -/opt/start-chrome.sh >> "${LOG_DIR}/chrome.log" 2>&1 & -CHROME_PID=$! - -# ---- 7. Log viewer on port 4040 -------------------------------------------- -log "[*] Starting log viewer on port 4040 ..." -python3 /opt/logviewer.py >> "${LOG_DIR}/logviewer.log" 2>&1 & -LOGVIEWER_PID=$! -wait_port 4040 "log viewer" 20 - -log "" -log "[+] All services started." -log "[+] Browser (noVNC) : http://localhost:${NOVNC_PORT}" -log "[+] Log viewer : http://localhost:4040" -log "[+] TLS proxy : localhost:${PROXY_PORT}" -log "[+] Host logs dir : ${LOG_DIR} (mounted to ./logs/ on host)" -log "" - -cleanup() { - log "[*] Shutting down ..." - kill "${CHROME_PID}" "${NOVNC_PID}" "${PROXY_PID}" "${XVFB_PID}" "${LOGVIEWER_PID}" 2>/dev/null || true - exit 0 -} -trap cleanup SIGTERM SIGINT - -# Stream proxy traffic to docker logs so 'docker logs -f tlsdebug' shows live traffic -tail -f "${LOG_DIR}/tlsproxy.log" -SCRIPT -RUN chmod +x /entrypoint.sh - -# --------------------------------------------------------------------------- -# 9. Ports -# --------------------------------------------------------------------------- -EXPOSE 6080 5900 8080 4040 9222 - -WORKDIR /opt/tlsdebug -ENTRYPOINT ["/entrypoint.sh"] +services: + tlsdebug: + build: + context: . + dockerfile: Dockerfile + image: tlsdebug:latest + container_name: tlsdebug + ports: + # noVNC web UI — HTTP on port 6080, HTTPS on port 6443 + - "6080:6080" # noVNC HTTP (default) + - "6443:6443" # noVNC HTTPS (when NOVNC_ENABLE_HTTPS=true) + # - "80:6080" # Optional: expose HTTP on port 80 + - "443:6443" # Optional: expose HTTPS on port 443 + # Raw VNC (optional — use any VNC client against localhost:5900) + - "5900:5900" + # TLSDebug intercepting proxy (change host port if 8080 is taken) + - "8888:8080" + # TLSDebug built-in HTTP log viewer + - "4040:4040" + # Chrome remote debugging (optional) + - "9222:9222" + volumes: + # All logs, CA cert, captured_tokens.json and session files + # are written here — readable on the host at ./logs/ + - ./logs:/var/log/tlsdebug + # Persist Chrome profile (bookmarks, saved state, etc.) + - chrome-profile:/opt/chrome-profile + # Optional: Mount custom noVNC certificate (PEM format) + # - ./certs/novnc.pem:/certs/novnc.pem:ro + environment: + PROXY_PORT: "8080" + VNC_PORT: "5900" + NOVNC_PORT: "6080" + NOVNC_HTTPS_PORT: "6443" + DISPLAY: ":99" + CHROME_REMOTE_DEBUGGING_PORT: "9222" + # Change START_URL to set the browser's home page + START_URL: "https://google.com" + # Enable HTTPS for noVNC (set to "true" to enable) + NOVNC_ENABLE_HTTPS: "false" + # When HTTPS is enabled: + # - Self-signed cert is auto-generated if no custom cert provided + # - Mount custom cert at /certs/novnc.pem to use your own + cap_add: + - SYS_ADMIN + security_opt: + - seccomp:unconfined + restart: unless-stopped + shm_size: "2gb" + healthcheck: + test: ["CMD", "sh", "-c", "[ \"${NOVNC_ENABLE_HTTPS}\" = \"true\" ] && curl -k -sf https://localhost:6443 || curl -sf http://localhost:6080"] + interval: 15s + timeout: 5s + retries: 5 + start_period: 30s + +volumes: + chrome-profile: From 86d35dd755c3024a2c11bc3c4edd7f07b9ac03dd Mon Sep 17 00:00:00 2001 From: Casey <151179166+secdev02@users.noreply.github.com> Date: Tue, 10 Mar 2026 14:56:28 -0600 Subject: [PATCH 9/9] fix - TLS No TLS - fix websockify --- labs/remotebrowser/Dockerfile | 691 +++++++++++++++++++++++++++++++--- 1 file changed, 633 insertions(+), 58 deletions(-) diff --git a/labs/remotebrowser/Dockerfile b/labs/remotebrowser/Dockerfile index a5afa4b..158cbce 100644 --- a/labs/remotebrowser/Dockerfile +++ b/labs/remotebrowser/Dockerfile @@ -1,58 +1,633 @@ -services: - tlsdebug: - build: - context: . - dockerfile: Dockerfile - image: tlsdebug:latest - container_name: tlsdebug - ports: - # noVNC web UI — HTTP on port 6080, HTTPS on port 6443 - - "6080:6080" # noVNC HTTP (default) - - "6443:6443" # noVNC HTTPS (when NOVNC_ENABLE_HTTPS=true) - # - "80:6080" # Optional: expose HTTP on port 80 - - "443:6443" # Optional: expose HTTPS on port 443 - # Raw VNC (optional — use any VNC client against localhost:5900) - - "5900:5900" - # TLSDebug intercepting proxy (change host port if 8080 is taken) - - "8888:8080" - # TLSDebug built-in HTTP log viewer - - "4040:4040" - # Chrome remote debugging (optional) - - "9222:9222" - volumes: - # All logs, CA cert, captured_tokens.json and session files - # are written here — readable on the host at ./logs/ - - ./logs:/var/log/tlsdebug - # Persist Chrome profile (bookmarks, saved state, etc.) - - chrome-profile:/opt/chrome-profile - # Optional: Mount custom noVNC certificate (PEM format) - # - ./certs/novnc.pem:/certs/novnc.pem:ro - environment: - PROXY_PORT: "8080" - VNC_PORT: "5900" - NOVNC_PORT: "6080" - NOVNC_HTTPS_PORT: "6443" - DISPLAY: ":99" - CHROME_REMOTE_DEBUGGING_PORT: "9222" - # Change START_URL to set the browser's home page - START_URL: "https://google.com" - # Enable HTTPS for noVNC (set to "true" to enable) - NOVNC_ENABLE_HTTPS: "false" - # When HTTPS is enabled: - # - Self-signed cert is auto-generated if no custom cert provided - # - Mount custom cert at /certs/novnc.pem to use your own - cap_add: - - SYS_ADMIN - security_opt: - - seccomp:unconfined - restart: unless-stopped - shm_size: "2gb" - healthcheck: - test: ["CMD", "sh", "-c", "[ \"${NOVNC_ENABLE_HTTPS}\" = \"true\" ] && curl -k -sf https://localhost:6443 || curl -sf http://localhost:6080"] - interval: 15s - timeout: 5s - retries: 5 - start_period: 30s - -volumes: - chrome-profile: +# ============================================================================= +# TLSDebug + Headless Chrome + noVNC — single self-contained Dockerfile +# ============================================================================= +FROM debian:bookworm-slim + +ENV DEBIAN_FRONTEND=noninteractive \ + DISPLAY=:99 \ + VNC_PORT=5900 \ + NOVNC_PORT=6080 \ + NOVNC_HTTPS_PORT=6443 \ + PROXY_PORT=8080 \ + CHROME_REMOTE_DEBUGGING_PORT=9222 \ + PROXY_HOST=127.0.0.1 \ + NOVNC_ENABLE_HTTPS=false + +# --------------------------------------------------------------------------- +# 1. Base packages +# --------------------------------------------------------------------------- +RUN apt-get update && apt-get install -y --no-install-recommends \ + golang-go \ + git \ + xvfb \ + x11vnc \ + openbox \ + xterm \ + python3 \ + python3-pip \ + python3-websockify \ + novnc \ + wget \ + gnupg \ + ca-certificates \ + fonts-liberation \ + libasound2 \ + libatk-bridge2.0-0 \ + libatk1.0-0 \ + libcups2 \ + libdbus-1-3 \ + libgdk-pixbuf2.0-0 \ + libgtk-3-0 \ + libnspr4 \ + libnss3 \ + libnss3-tools \ + libx11-xcb1 \ + libxcomposite1 \ + libxdamage1 \ + libxfixes3 \ + libxkbcommon0 \ + libxrandr2 \ + libxshmfence1 \ + xdg-utils \ + openssl \ + curl \ + netcat-openbsd \ + procps \ + psmisc \ + x11-utils \ + unclutter \ + && rm -rf /var/lib/apt/lists/* + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 2. Install browser +# amd64 -> Google Chrome stable (official Google .deb) +# arm64 -> Chromium from Debian bookworm (native deb, no snap) +# +# Base image is debian:bookworm-slim which has real chromium packages +# on all architectures — no snap wrappers. +# --------------------------------------------------------------------------- +RUN ARCH=$(dpkg --print-architecture) && \ + if [ "${ARCH}" = "amd64" ]; then \ + echo "[browser] amd64: installing Google Chrome ..." && \ + wget -q -O /tmp/chrome.deb \ + "https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb" && \ + apt-get update && \ + apt-get install -y --no-install-recommends /tmp/chrome.deb && \ + rm /tmp/chrome.deb && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/google-chrome /usr/local/bin/browser && \ + echo "[browser] installed: $(google-chrome --version)"; \ + elif [ "${ARCH}" = "arm64" ]; then \ + echo "[browser] arm64: installing Chromium from Debian bookworm ..." && \ + apt-get update && \ + apt-get install -y --no-install-recommends chromium && \ + rm -rf /var/lib/apt/lists/* && \ + ln -sf /usr/bin/chromium /usr/local/bin/browser && \ + echo "[browser] installed: $(chromium --version)"; \ + else \ + echo "[browser] ERROR: unsupported arch ${ARCH}" && exit 1; \ + fi + +# --------------------------------------------------------------------------- +# 3. Build TLSDebug from source +# AllTrafficModule is already active by default and logs every request, +# response, headers and body — no source patching needed. +# We set log flags via the LOG_FLAGS env var at runtime instead. +# --------------------------------------------------------------------------- +WORKDIR /build +RUN git clone --depth 1 https://github.com/secdev02/TLSDebug.git . \ + && CGO_ENABLED=0 go build -ldflags "-s -w" -o /usr/local/bin/tlsproxy tlsproxy.go \ + && chmod +x /usr/local/bin/tlsproxy \ + && rm -rf /build + +# 4. Locate noVNC web root and write kiosk index.html +# Kiosk mode: auto-connects, scales to fill browser window, hides toolbar, +# no password prompt, no connection dialog — just the desktop. +# --------------------------------------------------------------------------- +RUN find /usr -name "vnc.html" 2>/dev/null | head -1 | xargs -I{} dirname {} > /opt/novnc_path \ + && NOVNC_WEB=$(cat /opt/novnc_path) \ + && echo "noVNC web root: ${NOVNC_WEB}" \ + && ls -la "${NOVNC_WEB}" + +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cat > "${NOVNC_WEB}/index.html" << 'HTML' + + + + + TLSDebug + + + +
+
Connecting...
+ + + +HTML + +# Also overwrite vnc.html so any direct /vnc.html request shows our kiosk too +RUN NOVNC_WEB=$(cat /opt/novnc_path) && cp "${NOVNC_WEB}/index.html" "${NOVNC_WEB}/vnc.html" + +# --------------------------------------------------------------------------- +# 5. Working directories +# --------------------------------------------------------------------------- +RUN mkdir -p /opt/tlsdebug /opt/chrome-profile /var/log/tlsdebug /root/.config + +# --------------------------------------------------------------------------- +# --------------------------------------------------------------------------- +# 4b. Openbox config — fullscreen enforcement + black desktop, no decorations +# --------------------------------------------------------------------------- +RUN mkdir -p /root/.config/openbox + +# rc.xml — force every window fullscreen, no decorations, black desktop +RUN cat > /root/.config/openbox/rc.xml << 'RCXML' + + + + Clearlooks + + no + no + + 1 + + + yes + yes + no + yes + + + +RCXML + +# autostart — black root window, hide idle cursor +RUN cat > /root/.config/openbox/autostart << 'OBSTART' +xsetroot -solid black +unclutter -idle 0 -root -noevents & +OBSTART + +# --------------------------------------------------------------------------- +# 5b. Log viewer — real-time web UI on port 4040 +# --------------------------------------------------------------------------- +RUN echo 'import http.server, os, json
from http.server import BaseHTTPRequestHandler, HTTPServer
from urllib.parse import urlparse, parse_qs

LOG_DIR = os.environ.get("LOG_DIR", "/var/log/tlsdebug")
PORT    = 4040

LOG_FILES = ["tlsproxy.log", "captured_tokens.json", "chrome.log",
             "x11vnc.log", "novnc.log", "xvfb.log", "openbox.log"]

def build_page():
    files_js = json.dumps(LOG_FILES)
    return f"""<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width,initial-scale=1">
<title>TLSDebug Log Viewer</title>
<style>
  :root{{--bg:#0d1117;--panel:#161b22;--border:#30363d;--accent:#58a6ff;
        --green:#3fb950;--text:#c9d1d9;--muted:#8b949e}}
  *{{box-sizing:border-box;margin:0;padding:0}}
  body{{background:var(--bg);color:var(--text);font-family:'SF Mono',Monaco,monospace;
       font-size:13px;display:flex;flex-direction:column;height:100vh}}
  header{{background:var(--panel);border-bottom:1px solid var(--border);
          padding:12px 20px;display:flex;align-items:center;gap:16px;flex-shrink:0}}
  header h1{{font-size:15px;font-weight:600;color:var(--accent)}}
  .badge{{background:var(--green);color:#000;font-size:10px;font-weight:700;
          padding:2px 8px;border-radius:10px}}
  #statusbar{{font-size:11px;color:var(--muted);margin-left:auto}}
  .tabs{{display:flex;gap:4px;overflow-x:auto;background:var(--panel);
         padding:8px 16px 0;border-bottom:1px solid var(--border);flex-shrink:0}}
  .tab{{padding:6px 14px;border-radius:6px 6px 0 0;cursor:pointer;color:var(--muted);
        border:1px solid transparent;border-bottom:none;font-size:12px;white-space:nowrap}}
  .tab:hover{{color:var(--text);background:rgba(255,255,255,.05)}}
  .tab.active{{color:var(--accent);background:var(--bg);border-color:var(--border)}}
  .toolbar{{display:flex;gap:8px;padding:8px 16px;background:var(--bg);
            border-bottom:1px solid var(--border);flex-shrink:0;align-items:center}}
  .toolbar input{{flex:1;background:var(--panel);border:1px solid var(--border);
                  color:var(--text);padding:5px 10px;border-radius:6px;font-family:inherit}}
  .toolbar label{{color:var(--muted);font-size:12px;display:flex;align-items:center;gap:5px}}
  .toolbar button{{background:var(--panel);border:1px solid var(--border);color:var(--text);
                   padding:5px 12px;border-radius:6px;cursor:pointer;font-family:inherit}}
  .toolbar button:hover{{border-color:var(--accent);color:var(--accent)}}
  #logview{{flex:1;overflow-y:auto;padding:12px 16px;white-space:pre-wrap;
            word-break:break-all;line-height:1.6}}
  .ln{{padding:1px 0}} .ln:hover{{background:rgba(255,255,255,.04)}}
  .match{{background:rgba(88,166,255,.12)}} .hl{{background:#e3b34144;border-radius:2px}}
</style>
</head>
<body>
<header>
  <h1>&#x1F50D; TLSDebug Log Viewer</h1>
  <span class="badge">LIVE</span>
  <span id="statusbar">Connecting...</span>
</header>
<div class="tabs" id="tabs"></div>
<div class="toolbar">
  <input id="filter" placeholder="Filter lines..." oninput="applyFilter()">
  <label><input type="checkbox" id="auto" checked> Auto-scroll</label>
  <button onclick="document.getElementById('filter').value='';applyFilter()">Clear</button>
  <button onclick="location.href='/api/download?file='+cur">Download</button>
</div>
<div id="logview"></div>
<script>
const LOGS={files_js};
let cur=LOGS[0],off=0,raw=[];
function init(){{
  const t=document.getElementById('tabs');
  LOGS.forEach(f=>{{
    const d=document.createElement('div');
    d.className='tab'+(f===cur?' active':'');
    d.textContent=f;d.onclick=()=>sw(f);t.appendChild(d);
  }});
  poll();setInterval(poll,1500);
}}
function sw(f){{cur=f;off=0;raw=[];
  document.querySelectorAll('.tab').forEach(t=>t.className='tab'+(t.textContent===f?' active':''));
  document.getElementById('logview').innerHTML='';poll();}}
async function poll(){{
  try{{
    const r=await fetch('/api/log?file='+encodeURIComponent(cur)+'&offset='+off);
    if(!r.ok)return;
    const d=await r.json();off=d.size;
    if(d.lines&&d.lines.length){{raw=raw.concat(d.lines);if(raw.length>5000)raw=raw.slice(-5000);applyFilter();}}
    document.getElementById('statusbar').textContent='Updated '+new Date().toLocaleTimeString();
  }}catch(e){{document.getElementById('statusbar').textContent='Error: '+e;}}
}}
function applyFilter(){{
  const fv=document.getElementById('filter').value.toLowerCase();
  const lv=document.getElementById('logview');
  const rows=fv?raw.filter(l=>l.toLowerCase().includes(fv)):raw;
  lv.innerHTML=rows.map(l=>{{
    const e=l.replace(/&/g,'&amp;').replace(/</g,'&lt;').replace(/>/g,'&gt;');
    const h=fv?e.replace(new RegExp(fv.replace(/[.*+?^${{}}()|[\\]\\\\]/g,'\\\\$&'),'gi'),m=>'<span class="hl">'+m+'</span>'):e;
    return '<div class="ln'+(fv&&l.toLowerCase().includes(fv)?' match':'')+'">'+h+'</div>';
  }}).join('');
  if(document.getElementById('auto').checked)lv.scrollTop=lv.scrollHeight;
}}
init();
</script>
</body></html>"""

PAGE = build_page()

class Handler(BaseHTTPRequestHandler):
    def log_message(self, fmt, *args): pass
    def do_GET(self):
        p = self.path.split('?')[0]
        if p in ('/', '/index.html'):
            body = PAGE.encode()
            self.send_response(200)
            self.send_header('Content-Type','text/html; charset=utf-8')
            self.send_header('Content-Length', str(len(body)))
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/log':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            offset = int(q.get('offset',['0'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            lines = []; size = offset
            if os.path.exists(fpath):
                with open(fpath,'rb') as f:
                    f.seek(offset); chunk = f.read()
                    size = offset + len(chunk)
                    raw_text = chunk.decode('utf-8', errors='replace')
                    if fname.endswith('.json'):
                        try:
                            import json as _json
                            parsed = _json.loads(open(fpath).read())
                            pretty = _json.dumps(parsed, indent=2)
                            lines  = pretty.splitlines()
                            size   = os.path.getsize(fpath)
                        except Exception:
                            lines = raw_text.splitlines()
                    else:
                        lines = raw_text.splitlines()
            body = json.dumps({'lines':lines,'size':size}).encode()
            self.send_response(200)
            self.send_header('Content-Type','application/json')
            self.send_header('Access-Control-Allow-Origin','*')
            self.end_headers(); self.wfile.write(body)
        elif p == '/api/download':
            q = parse_qs(urlparse(self.path).query)
            fname = os.path.basename(q.get('file',['tlsproxy.log'])[0])
            fpath = os.path.join(LOG_DIR, fname)
            if os.path.exists(fpath):
                with open(fpath,'rb') as f: data = f.read()
                self.send_response(200)
                self.send_header('Content-Type','text/plain')
                self.send_header('Content-Disposition','attachment; filename='+fname)
                self.end_headers(); self.wfile.write(data)
            else:
                self.send_response(404); self.end_headers()
        else:
            self.send_response(404); self.end_headers()

os.makedirs(LOG_DIR, exist_ok=True)
print(f"[logviewer] 0.0.0.0:{PORT}  logs={LOG_DIR}")
HTTPServer(('0.0.0.0', PORT), Handler).serve_forever()
' | base64 -d > /opt/logviewer.py + +# --------------------------------------------------------------------------- +# 6. install-ca.sh +# Installs TLSDebug CA into: +# (a) Debian/OS system trust store +# (b) ~/.pki/nssdb — where Chromium/Chrome actually looks on Linux +# (c) Chrome profile NSS db — belt-and-suspenders +# --------------------------------------------------------------------------- +RUN cat > /opt/install-ca.sh << 'SCRIPT' +#!/bin/bash +set -e +CA_CERT="${1:-/opt/tlsdebug/proxy-ca.crt}" +CA_NAME="TLSDebug CA" +HOME_NSS="/root/.pki/nssdb" +PROFILE_NSS="/opt/chrome-profile/nssdb" + +log() { echo "[CA] $*"; } + +if [ ! -f "${CA_CERT}" ]; then + log "ERROR: cert not found at ${CA_CERT}"; exit 1 +fi + +log "=== Installing TLSDebug CA ===" +log "Subject : $(openssl x509 -noout -subject -in "${CA_CERT}" 2>/dev/null)" +log "Expires : $(openssl x509 -noout -enddate -in "${CA_CERT}" 2>/dev/null)" + +# ------------------------------------------------------------------ +# (a) OS / system trust store +# ------------------------------------------------------------------ +log "--- System trust store ---" +cp "${CA_CERT}" /usr/local/share/ca-certificates/tlsdebug.crt +update-ca-certificates --fresh +log "System store updated." + +# ------------------------------------------------------------------ +# (b) ~/.pki/nssdb (THIS is where Chromium on Linux actually looks) +# ------------------------------------------------------------------ +log "--- ~/.pki/nssdb (Chromium default location) ---" +mkdir -p "${HOME_NSS}" +if [ ! -f "${HOME_NSS}/cert9.db" ]; then + certutil -N -d "sql:${HOME_NSS}" --empty-password + log "Created new NSS db at ${HOME_NSS}" +fi +certutil -d "sql:${HOME_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${HOME_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${HOME_NSS}" + +# Verify +if certutil -d "sql:${HOME_NSS}" -L -n "${CA_NAME}" 2>/dev/null | grep -q "CT"; then + log "OK: ${HOME_NSS} verification passed." +else + log "WARNING: cert not found in ${HOME_NSS} after install" +fi + +# ------------------------------------------------------------------ +# (c) Chrome profile NSS db (belt-and-suspenders) +# ------------------------------------------------------------------ +log "--- Chrome profile NSS db ---" +mkdir -p "${PROFILE_NSS}" +if [ ! -f "${PROFILE_NSS}/cert9.db" ]; then + certutil -N -d "sql:${PROFILE_NSS}" --empty-password + log "Created new NSS db at ${PROFILE_NSS}" +fi +certutil -d "sql:${PROFILE_NSS}" -D -n "${CA_NAME}" 2>/dev/null || true +certutil -d "sql:${PROFILE_NSS}" -A -t "CT,C,C" -n "${CA_NAME}" -i "${CA_CERT}" +log "Installed into ${PROFILE_NSS}" + +log "=== CA installation complete ===" +SCRIPT +RUN chmod +x /opt/install-ca.sh + +# --------------------------------------------------------------------------- +# 6b. generate-novnc-cert.sh — Self-signed certificate for noVNC HTTPS +# --------------------------------------------------------------------------- +RUN cat > /opt/generate-novnc-cert.sh << 'SCRIPT' +#!/bin/bash +set -e + +CERT_DIR="${1:-/opt/novnc-certs}" +CERT_FILE="${CERT_DIR}/novnc.pem" + +log() { echo "[cert] $*"; } + +mkdir -p "${CERT_DIR}" + +if [ -f "${CERT_FILE}" ]; then + log "Certificate already exists: ${CERT_FILE}" + log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null || echo 'unknown')" + exit 0 +fi + +log "Generating self-signed certificate for noVNC..." + +openssl req -x509 -nodes -newkey rsa:2048 \ + -keyout "${CERT_FILE}" \ + -out "${CERT_FILE}" \ + -days 365 \ + -subj "/C=US/ST=State/L=City/O=TLSDebug/CN=localhost" \ + -addext "subjectAltName=DNS:localhost,DNS:*.local,IP:127.0.0.1" \ + 2>/dev/null + +chmod 600 "${CERT_FILE}" + +log "Certificate generated: ${CERT_FILE}" +log "Subject: $(openssl x509 -noout -subject -in "${CERT_FILE}" 2>/dev/null)" +log "Expires: $(openssl x509 -noout -enddate -in "${CERT_FILE}" 2>/dev/null)" +SCRIPT +RUN chmod +x /opt/generate-novnc-cert.sh + +# 7. start-chrome.sh +# --------------------------------------------------------------------------- +RUN cat > /opt/start-chrome.sh << 'SCRIPT' +#!/bin/bash +export DISPLAY="${DISPLAY:-:99}" +export HOME=/root + +PROXY_HOST="${PROXY_HOST:-127.0.0.1}" +PROXY_PORT="${PROXY_PORT:-8080}" +REMOTE_DEBUG_PORT="${CHROME_REMOTE_DEBUGGING_PORT:-9222}" +START_URL="${START_URL:-https://www.google.com}" + +echo "[Browser] $(browser --version 2>/dev/null || echo unknown)" +echo "[Browser] DISPLAY=${DISPLAY} proxy=${PROXY_HOST}:${PROXY_PORT}" + +exec browser \ + --no-sandbox \ + --disable-dev-shm-usage \ + --disable-gpu \ + --disable-software-rasterizer \ + --use-gl=swiftshader \ + --use-angle=swiftshader \ + --enable-unsafe-swiftshader \ + --in-process-gpu \ + --disable-setuid-sandbox \ + --user-data-dir="/opt/chrome-profile" \ + --proxy-server="http://${PROXY_HOST}:${PROXY_PORT}" \ + --ignore-certificate-errors \ + --ignore-certificate-errors-spki-list \ + --test-type \ + --remote-debugging-port="${REMOTE_DEBUG_PORT}" \ + --remote-debugging-address=0.0.0.0 \ + --window-size=1920,1080 \ + --start-fullscreen \ + --kiosk \ + --disable-extensions \ + --no-first-run \ + --no-default-browser-check \ + --password-store=basic \ + --use-mock-keychain \ + --enable-logging=stderr \ + --v=1 \ + "${START_URL}" 2>&1 +SCRIPT +RUN chmod +x /opt/start-chrome.sh + + +# --------------------------------------------------------------------------- +# 8. entrypoint.sh +# --------------------------------------------------------------------------- +RUN cat > /entrypoint.sh << 'SCRIPT' +#!/bin/bash +set -e + +export HOME=/root +PROXY_PORT="${PROXY_PORT:-8080}" +VNC_PORT="${VNC_PORT:-5900}" +NOVNC_PORT="${NOVNC_PORT:-6080}" +DISPLAY="${DISPLAY:-:99}" +# LOG_DIR is bind-mounted to ./logs/ on the host. +# CERTDIR is set to the same path so tlsproxy writes captured_tokens.json, +# session files, and the CA cert directly into the host-visible logs folder. +LOG_DIR="/var/log/tlsdebug" +CERTDIR="${LOG_DIR}" +NOVNC_WEB=$(cat /opt/novnc_path 2>/dev/null || echo "/usr/share/novnc") + +mkdir -p "${LOG_DIR}" + +log() { echo "[$(date '+%H:%M:%S')] $*"; } +wait_port() { + local port=$1 label=$2 tries=${3:-30} + for i in $(seq 1 "${tries}"); do + if nc -z 127.0.0.1 "${port}" 2>/dev/null; then + log "[+] ${label} ready on port ${port}." + return 0 + fi + sleep 0.5 + done + log "[!] TIMEOUT waiting for ${label} on port ${port}." + return 1 +} + +log "============================================" +log " TLSDebug + Headless Chrome Container" +log " noVNC Web UI : http://localhost:${NOVNC_PORT}" +log " TLS Proxy : localhost:${PROXY_PORT}" +log " noVNC root : ${NOVNC_WEB}" +log "============================================" + +# ---- Diagnostics ----------------------------------------------------------- +log "[diag] novnc web root contents:" +ls -la "${NOVNC_WEB}" 2>&1 | head -20 || log " (none)" +log "[diag] websockify location: $(which websockify 2>/dev/null || echo NOT FOUND)" +log "[diag] x11vnc location: $(which x11vnc 2>/dev/null || echo NOT FOUND)" +log "[diag] browser symlink: $(which browser 2>/dev/null || echo NOT FOUND) -> $(readlink /usr/local/bin/browser 2>/dev/null || echo none)" +log "[diag] tlsproxy location: $(which tlsproxy 2>/dev/null || echo NOT FOUND)" + +# ---- 1. Xvfb --------------------------------------------------------------- +log "[*] Starting Xvfb on ${DISPLAY} ..." +rm -f /tmp/.X99-lock /tmp/.X11-unix/X99 2>/dev/null || true +Xvfb "${DISPLAY}" \ + -screen 0 1920x1080x24 \ + -ac \ + +extension GLX \ + +extension RANDR \ + +render \ + -noreset \ + >> "${LOG_DIR}/xvfb.log" 2>&1 & +XVFB_PID=$! + +log "[*] Waiting for Xvfb ..." +for i in $(seq 1 30); do + if DISPLAY="${DISPLAY}" xdpyinfo >/dev/null 2>&1; then + log "[+] Xvfb ready." + break + fi + sleep 0.5 +done +export DISPLAY="${DISPLAY}" + +# ---- 2. Openbox window manager --------------------------------------------- +log "[*] Starting openbox ..." +openbox --config-file /root/.config/openbox/rc.xml --display "${DISPLAY}" >> "${LOG_DIR}/openbox.log" 2>&1 & +sleep 1 + +# ---- 3. TLSDebug proxy ----------------------------------------------------- +log "[*] Starting TLSDebug proxy on port ${PROXY_PORT} ..." +cd "${CERTDIR}" +tlsproxy \ + -port "${PROXY_PORT}" \ + -certdir "${CERTDIR}" \ + -skip-install \ + 2>&1 | grep -v 'SSLV3_ALERT_CERTIFICATE_UNKNOWN' | tee -a "${LOG_DIR}/tlsproxy.log" & +PROXY_PID=$! + +log "[*] Waiting for CA certificate ..." +for i in $(seq 1 30); do + if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + log "[+] CA certificate ready." + break + fi + sleep 1 +done +# Install CA before Chrome launches — must succeed +if [ -f "${CERTDIR}/proxy-ca.crt" ]; then + if /opt/install-ca.sh "${CERTDIR}/proxy-ca.crt"; then + log "[+] CA trusted by OS and Chrome NSS." + else + log "[!] CA install failed — Chrome may show cert errors." + fi +else + log "[!] proxy-ca.crt missing — Chrome may show cert errors." +fi + +# ---- 4. x11vnc ------------------------------------------------------------- +log "[*] Starting x11vnc on port ${VNC_PORT} ..." +x11vnc \ + -display "${DISPLAY}" \ + -forever \ + -shared \ + -nopw \ + -rfbport "${VNC_PORT}" \ + -noxdamage \ + -noxfixes \ + -noxcomposite \ + -cursor arrow \ + -loop \ + -repeat \ + -xkb \ + >> "${LOG_DIR}/x11vnc.log" 2>&1 & + +sleep 2 +wait_port "${VNC_PORT}" "x11vnc" 40 + +# ---- 5. noVNC -------------------------------------------------------------- +# Check for custom certificate or generate self-signed +CERT_DIR="/opt/novnc-certs" +CUSTOM_CERT="/certs/novnc.pem" +CERT_FILE="${CERT_DIR}/novnc.pem" + +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[*] HTTPS mode enabled" + + # Use custom cert if provided, otherwise generate self-signed + if [ -f "${CUSTOM_CERT}" ]; then + log "[*] Using custom certificate: ${CUSTOM_CERT}" + mkdir -p "${CERT_DIR}" + cp "${CUSTOM_CERT}" "${CERT_FILE}" + chmod 600 "${CERT_FILE}" + else + log "[*] No custom cert found, generating self-signed..." + /opt/generate-novnc-cert.sh "${CERT_DIR}" + fi + + NOVNC_PORT="${NOVNC_HTTPS_PORT:-6443}" + SSL_ARGS="--cert=${CERT_FILE} --ssl-only" + SCHEME="https" +else + log "[*] HTTP mode (set NOVNC_ENABLE_HTTPS=true for HTTPS)" + SSL_ARGS="" + SCHEME="http" +fi + +log "[*] Starting noVNC websockify on port ${NOVNC_PORT} (${SCHEME}) ..." +log "[*] web root : ${NOVNC_WEB}" +log "[*] target : 127.0.0.1:${VNC_PORT}" + +# note: SSL_ARGS may include --ssl-only; omit to allow fallbacks when certs are untrusted +tmp_args="${SSL_ARGS}" +# remove ssl-only if present to avoid 'non-SSL connection received but disallowed' errors +tmp_args=$(echo "${tmp_args}" | sed 's/--ssl-only//g') +websockify \ + --web "${NOVNC_WEB}" \ + --heartbeat 30 \ + ${tmp_args} \ + --log-file "${LOG_DIR}/novnc.log" \ + "${NOVNC_PORT}" \ + "127.0.0.1:${VNC_PORT}" & +NOVNC_PID=$! + +wait_port "${NOVNC_PORT}" "noVNC" 40 + +# Confirm websockify process +log "[diag] websockify process: $(pgrep -a websockify 2>/dev/null || echo NOT RUNNING)" +log "[diag] listening ports: $(ss -tlnp 2>/dev/null | grep -E '5900|6080|8080' || echo none)" + +# ---- 6. Chrome ------------------------------------------------------------- +# remove stale profile locks which can prevent Chrome from launching +rm -f /opt/chrome-profile/Singleton* /opt/chrome-profile/Default/Singleton* + +log "[*] Starting Chrome ..." +/opt/start-chrome.sh >> "${LOG_DIR}/chrome.log" 2>&1 & +CHROME_PID=$! + +# ---- 7. Log viewer on port 4040 -------------------------------------------- +log "[*] Starting log viewer on port 4040 ..." +python3 /opt/logviewer.py >> "${LOG_DIR}/logviewer.log" 2>&1 & +LOGVIEWER_PID=$! +wait_port 4040 "log viewer" 20 + +log "" +log "[+] All services started." +log "[+] Browser (noVNC) : ${SCHEME}://localhost:${NOVNC_PORT}" +log "[+] Log viewer : http://localhost:4040" +log "[+] TLS proxy : localhost:${PROXY_PORT}" +log "[+] Host logs dir : ${LOG_DIR} (mounted to ./logs/ on host)" +if [ "${NOVNC_ENABLE_HTTPS}" = "true" ]; then + log "[+] Certificate : ${CERT_FILE}" +fi +log "" + +cleanup() { + log "[*] Shutting down ..." + kill "${CHROME_PID}" "${NOVNC_PID}" "${PROXY_PID}" "${XVFB_PID}" "${LOGVIEWER_PID}" 2>/dev/null || true + exit 0 +} +trap cleanup SIGTERM SIGINT + +# Stream proxy traffic to docker logs so 'docker logs -f tlsdebug' shows live traffic +tail -f "${LOG_DIR}/tlsproxy.log" +SCRIPT +RUN chmod +x /entrypoint.sh + +# --------------------------------------------------------------------------- +# 9. Ports +# --------------------------------------------------------------------------- +EXPOSE 6080 6443 80 443 5900 8080 4040 9222 + +WORKDIR /opt/tlsdebug +ENTRYPOINT ["/entrypoint.sh"]