Update user.html

This commit is contained in:
jakani24
2024-04-04 20:15:08 +02:00
parent 6632604528
commit 4e6c96bcdf

View File

@@ -1,96 +1,71 @@
<!DOCTYPE html>
<html>
<head>
<title>lbuchs/WebAuthn Test</title>
<meta charset="UTF-8">
<script>
</head>
<body>
<h1>lbuchs/WebAuthn</h1>
<div>
<button type="button" onclick="createRegistration()">Register</button>
<button type="button" onclick="checkRegistration()">Login</button>
</div>
/**
* creates a new FIDO2 registration
* @returns {undefined}
*/
<script>
async function createRegistration() {
try {
// check browser support
if (!window.fetch || !navigator.credentials || !navigator.credentials.create) {
throw new Error('Browser not supported.');
}
// get create args
let rep = await window.fetch('server.php?fn=getCreateArgs' + getGetParams(), {method:'GET', cache:'no-cache'});
let rep = await window.fetch('server.php?fn=getCreateArgs', { method: 'GET', cache: 'no-cache' });
const createArgs = await rep.json();
// error handling
if (createArgs.success === false) {
throw new Error(createArgs.msg || 'unknown error occured');
throw new Error(createArgs.msg || 'Unknown error occurred');
}
// replace binary base64 data with ArrayBuffer. a other way to do this
// is the reviver function of JSON.parse()
recursiveBase64StrToArrayBuffer(createArgs);
// create credentials
const cred = await navigator.credentials.create(createArgs);
// create object
const authenticatorAttestationResponse = {
transports: cred.response.getTransports ? cred.response.getTransports() : null,
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
attestationObject: cred.response.attestationObject ? arrayBufferToBase64(cred.response.attestationObject) : null
};
// check auth on server side
rep = await window.fetch('server.php?fn=processCreate' + getGetParams(), {
rep = await window.fetch('server.php?fn=processCreate', {
method: 'POST',
body: JSON.stringify(authenticatorAttestationResponse),
cache: 'no-cache'
});
const authenticatorAttestationServerResponse = await rep.json();
// prompt server response
if (authenticatorAttestationServerResponse.success) {
reloadServerPreview();
window.alert(authenticatorAttestationServerResponse.msg || 'registration success');
window.alert(authenticatorAttestationServerResponse.msg || 'Registration success');
} else {
throw new Error(authenticatorAttestationServerResponse.msg);
}
} catch (err) {
reloadServerPreview();
window.alert(err.message || 'unknown error occured');
window.alert(err.message || 'Unknown error occurred');
}
}
/**
* checks a FIDO2 registration
* @returns {undefined}
*/
async function checkRegistration() {
try {
if (!window.fetch || !navigator.credentials || !navigator.credentials.create) {
throw new Error('Browser not supported.');
}
// get check args
let rep = await window.fetch('server.php?fn=getGetArgs' + getGetParams(), {method:'GET',cache:'no-cache'});
let rep = await window.fetch('server.php?fn=getGetArgs', { method: 'GET', cache: 'no-cache' });
const getArgs = await rep.json();
// error handling
if (getArgs.success === false) {
throw new Error(getArgs.msg);
}
// replace binary base64 data with ArrayBuffer. a other way to do this
// is the reviver function of JSON.parse()
recursiveBase64StrToArrayBuffer(getArgs);
// check credentials with hardware
const cred = await navigator.credentials.get(getArgs);
// create object for transmission to server
const authenticatorAttestationResponse = {
id: cred.rawId ? arrayBufferToBase64(cred.rawId) : null,
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
@@ -99,96 +74,24 @@
userHandle: cred.response.userHandle ? arrayBufferToBase64(cred.response.userHandle) : null
};
// send to server
rep = await window.fetch('server.php?fn=processGet' + getGetParams(), {
rep = await window.fetch('server.php?fn=processGet', {
method: 'POST',
body: JSON.stringify(authenticatorAttestationResponse),
cache: 'no-cache'
});
const authenticatorAttestationServerResponse = await rep.json();
// check server response
if (authenticatorAttestationServerResponse.success) {
reloadServerPreview();
window.alert(authenticatorAttestationServerResponse.msg || 'login success');
window.alert(authenticatorAttestationServerResponse.msg || 'Login success');
} else {
throw new Error(authenticatorAttestationServerResponse.msg);
}
} catch (err) {
reloadServerPreview();
window.alert(err.message || 'unknown error occured');
window.alert(err.message || 'Unknown error occurred');
}
}
function clearRegistration() {
window.fetch('server.php?fn=clearRegistrations' + getGetParams(), {method:'GET',cache:'no-cache'}).then(function(response) {
return response.json();
}).then(function(json) {
if (json.success) {
reloadServerPreview();
window.alert(json.msg);
} else {
throw new Error(json.msg);
}
}).catch(function(err) {
reloadServerPreview();
window.alert(err.message || 'unknown error occured');
});
}
function queryFidoMetaDataService() {
window.fetch('server.php?fn=queryFidoMetaDataService' + getGetParams(), {method:'GET',cache:'no-cache'}).then(function(response) {
return response.json();
}).then(function(json) {
if (json.success) {
window.alert(json.msg);
} else {
throw new Error(json.msg);
}
}).catch(function(err) {
window.alert(err.message || 'unknown error occured');
});
}
/**
* convert RFC 1342-like base64 strings to array buffer
* @param {mixed} obj
* @returns {undefined}
*/
function recursiveBase64StrToArrayBuffer(obj) {
let prefix = '=?BINARY?B?';
let suffix = '?=';
if (typeof obj === 'object') {
for (let key in obj) {
if (typeof obj[key] === 'string') {
let str = obj[key];
if (str.substring(0, prefix.length) === prefix && str.substring(str.length - suffix.length) === suffix) {
str = str.substring(prefix.length, str.length - suffix.length);
let binary_string = window.atob(str);
let len = binary_string.length;
let bytes = new Uint8Array(len);
for (let i = 0; i < len; i++) {
bytes[i] = binary_string.charCodeAt(i);
}
obj[key] = bytes.buffer;
}
} else {
recursiveBase64StrToArrayBuffer(obj[key]);
}
}
}
}
/**
* Convert a ArrayBuffer to Base64
* @param {ArrayBuffer} buffer
* @returns {String}
*/
function arrayBufferToBase64(buffer) {
let binary = '';
let bytes = new Uint8Array(buffer);
@@ -198,345 +101,6 @@
}
return window.btoa(binary);
}
/**
* Get URL parameter
* @returns {String}
*/
function getGetParams() {
let url = '';
url += '&apple=' + (document.getElementById('cert_apple').checked ? '1' : '0');
url += '&yubico=' + (document.getElementById('cert_yubico').checked ? '1' : '0');
url += '&solo=' + (document.getElementById('cert_solo').checked ? '1' : '0');
url += '&hypersecu=' + (document.getElementById('cert_hypersecu').checked ? '1' : '0');
url += '&google=' + (document.getElementById('cert_google').checked ? '1' : '0');
url += '&microsoft=' + (document.getElementById('cert_microsoft').checked ? '1' : '0');
url += '&mds=' + (document.getElementById('cert_mds').checked ? '1' : '0');
url += '&requireResidentKey=' + (document.getElementById('requireResidentKey').checked ? '1' : '0');
url += '&type_usb=' + (document.getElementById('type_usb').checked ? '1' : '0');
url += '&type_nfc=' + (document.getElementById('type_nfc').checked ? '1' : '0');
url += '&type_ble=' + (document.getElementById('type_ble').checked ? '1' : '0');
url += '&type_int=' + (document.getElementById('type_int').checked ? '1' : '0');
url += '&type_hybrid=' + (document.getElementById('type_hybrid').checked ? '1' : '0');
url += '&fmt_android-key=' + (document.getElementById('fmt_android-key').checked ? '1' : '0');
url += '&fmt_android-safetynet=' + (document.getElementById('fmt_android-safetynet').checked ? '1' : '0');
url += '&fmt_apple=' + (document.getElementById('fmt_apple').checked ? '1' : '0');
url += '&fmt_fido-u2f=' + (document.getElementById('fmt_fido-u2f').checked ? '1' : '0');
url += '&fmt_none=' + (document.getElementById('fmt_none').checked ? '1' : '0');
url += '&fmt_packed=' + (document.getElementById('fmt_packed').checked ? '1' : '0');
url += '&fmt_tpm=' + (document.getElementById('fmt_tpm').checked ? '1' : '0');
url += '&rpId=' + encodeURIComponent(document.getElementById('rpId').value);
url += '&userId=' + encodeURIComponent(document.getElementById('userId').value);
url += '&userName=' + encodeURIComponent(document.getElementById('userName').value);
url += '&userDisplayName=' + encodeURIComponent(document.getElementById('userDisplayName').value);
if (document.getElementById('userVerification_required').checked) {
url += '&userVerification=required';
} else if (document.getElementById('userVerification_preferred').checked) {
url += '&userVerification=preferred';
} else if (document.getElementById('userVerification_discouraged').checked) {
url += '&userVerification=discouraged';
}
return url;
}
function reloadServerPreview() {
let iframe = document.getElementById('serverPreview');
iframe.src = iframe.src;
}
function setAttestation(attestation) {
let inputEls = document.getElementsByTagName('input');
for (const inputEl of inputEls) {
if (inputEl.id && inputEl.id.match(/^(fmt|cert)\_/)) {
inputEl.disabled = !attestation;
}
if (inputEl.id && inputEl.id.match(/^fmt\_/)) {
inputEl.checked = attestation ? inputEl.id !== 'fmt_none' : inputEl.id === 'fmt_none';
}
if (inputEl.id && inputEl.id.match(/^cert\_/)) {
inputEl.checked = attestation ? inputEl.id === 'cert_mds' : false;
}
}
}
/**
* force https on load
* @returns {undefined}
*/
window.onload = function() {
if (location.protocol !== 'https:' && location.host !== 'localhost') {
location.href = location.href.replace('http', 'https');
}
if (!document.getElementById('rpId').value) {
document.getElementById('rpId').value = location.hostname;
}
if (!document.getElementById('attestation_yes').checked) {
setAttestation(false);
}
}
</script>
<style>
body {
font-family:sans-serif;
margin: 0 20px;
padding: 0;
}
.splitter {
display: flex;
flex-direction: row;
flex-wrap: wrap;
margin: 0;
padding: 0;
}
.splitter > .form {
flex: 1;
min-width: 600px;
}
.splitter > .serverPreview {
width: 740px;
min-height: 700px;
margin: 0;
padding: 0;
border: 1px solid grey;
display: flex;
flex-direction: column;
}
.splitter > .serverPreview iframe {
width: 700px;
flex: 1;
border: 0;
}
</style>
</head>
<body>
<h1 style="margin: 40px 10px 2px 0;">lbuchs/WebAuthn</h1>
<div style="font-style: italic;">A simple PHP WebAuthn (FIDO2) server library.</div>
<div class="splitter">
<div class="form">
<div>&nbsp;</div>
<div>&nbsp;</div>
<div>Simple working demo for the <a href="https://github.com/lbuchs/WebAuthn">lbuchs/WebAuthn</a> library.</div>
<div>
<div>&nbsp;</div>
<table>
<tbody><tr>
<td>
<button type="button" onclick="createRegistration()">&#10133; new registration</button>
</td>
<td>
<button type="button" onclick="checkRegistration()">&#10068; check registration</button>
</td>
<td>
<button type="button" onclick="clearRegistration()">&#9249; clear all registrations</button>
</td>
</tr>
</tbody>
</table>
<div>&nbsp;</div>
<div>
<input type="checkbox" id="requireResidentKey" name="requireResidentKey">
<label for="requireResidentKey">Use Client-side discoverable Credentials / Passkeys
<i style="font-size: 0.8em;">Warning: most client-side modules and authenticators don't allow to delete single client side credentials.
You have to reset the full device to remove the credentials again.</i>
</label>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">Relying Party</div>
<p style="margin:0 0 5px 0;font-size:0.9em;font-style: italic;">A valid domain string that identifies the
WebAuthn Relying Party<br/>on whose behalf a given registration or authentication ceremony is being performed.</p>
<div>
<label for="rpId">RP ID:</label>
<input type="text" id="rpId" name="rpId" value="">
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">User</div>
<div style="margin-bottom:12px">
<label for="userId">User ID (Hex):</label>
<input type="text" id="userId" name="userId" value="64656d6f64656d6f" required pattern="[0-9a-fA-F]{2,}">
<i style="font-size: 0.8em;">You get the user ID back when checking registration (as userHandle), if you're using client-side discoverable credentials.
You can identify with this ID the user who wants to login.
A user handle is an opaque byte sequence with a maximum size of 64 bytes, and is not meant to be displayed to the user.
The user handle MUST NOT contain personally identifying information about the user, such as a username or e-mail address.</i>
</div>
<div style="margin-bottom:12px">
<label for="userName">User Name:</label>
<input type="text" id="userName" name="userName" value="demo" required pattern="[0-9a-zA-Z]{2,}">
<i style="font-size: 0.8em;">only for display, i.e., aiding the user in determining the difference between user accounts with similar display names.</i>
</div>
<div style="margin-bottom:6px">
<label for="userDisplayName">User Display Name:</label>
<input type="text" id="userDisplayName" name="userDisplayName" value="Demo Demolin" required>
<i style="font-size: 0.8em;">A human-palatable name for the user account, intended only for display.</i>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">user verification</div>
<div>
<input type="radio" id="userVerification_required" name="userVerification">
<label for="userVerification_required">required <i style="font-size: 0.8em;">User verification is required (e.g. by pin), the operation will fail if the response does not have the UV flag.</i></label>
</div>
<div>
<input type="radio" id="userVerification_preferred" name="userVerification">
<label for="userVerification_preferred">preferred <i style="font-size: 0.8em;">user verification is prefered, the operation will not fail if the response does not have the UV flag.</i></label>
</div>
<div>
<input type="radio" id="userVerification_discouraged" name="userVerification" checked>
<label for="userVerification_discouraged">discouraged <i style="font-size: 0.8em;">user verification should not be employed as to minimize the user interaction during the process.</i></label>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">type of authenticator</div>
<div>
<input type="checkbox" id="type_usb" name="type_usb" checked>
<label for="type_usb">USB</label>
</div>
<div>
<input type="checkbox" id="type_nfc" name="type_nfc" checked>
<label for="type_nfc">NFC</label>
</div>
<div>
<input type="checkbox" id="type_ble" name="type_ble" checked>
<label for="type_ble">BLE</label>
</div>
<div>
<input type="checkbox" id="type_hybrid" name="type_hybrid" checked>
<label for="type_hybrid">hybrid <i style="font-size: 0.8em;">Passkeys via mobile device, ...</i></label>
</div>
<div>
<input type="checkbox" id="type_int" name="type_int" checked>
<label for="type_int">internal <i style="font-size: 0.8em;">Passkeys on the device, Windows Hello, Android SafetyNet, Apple, ...</i></label>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">attestation</div>
<div>
<input type="radio" id="attestation_yes" value="yes" name="attestation" onchange="setAttestation(this.value === 'yes')" checked>
<label for="attestation_yes">yes</label>
</div>
<div>
<input type="radio" id="attestation_no" value="no" name="attestation" onchange="setAttestation(this.value === 'yes')">
<label for="attestation_no">no</label>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">attestation statement format</div>
<div>
<input type="checkbox" id="fmt_android-key" name="fmt_android-key" checked>
<label for="fmt_android-key">android-key</label>
</div>
<div>
<input type="checkbox" id="fmt_android-safetynet" name="fmt_android-safetynet" checked>
<label for="fmt_android-safetynet">android-safetynet</label>
</div>
<div>
<input type="checkbox" id="fmt_apple" name="fmt_apple" checked>
<label for="fmt_apple">apple</label>
</div>
<div>
<input type="checkbox" id="fmt_fido-u2f" name="fmt_fido-u2f" checked>
<label for="fmt_fido-u2f">fido-u2f</label>
</div>
<div>
<input type="checkbox" id="fmt_none" name="fmt_none">
<label for="fmt_none">none</label>
</div>
<div>
<input type="checkbox" id="fmt_packed" name="fmt_packed" checked>
<label for="fmt_packed">packed</label>
</div>
<div>
<input type="checkbox" id="fmt_tpm" name="fmt_tpm" checked>
<label for="fmt_tpm">tpm</label>
</div>
<div>&nbsp;</div>
<div style="font-weight: bold">attestation root certificates</div>
<div>
<input type="checkbox" id="cert_mds" name="mds" checked>
<label for="cert_mds">Accept keys signed by <a href="https://fidoalliance.org/metadata/" target="_blank">FIDO Alliance Metadata Service</a></label>
</div>
<div>
<input type="checkbox" id="cert_apple" name="apple">
<label for="cert_apple">Accept keys signed by apple root ca</label>
</div>
<div>
<input type="checkbox" id="cert_yubico" name="yubico">
<label for="cert_yubico">Accept keys signed by yubico root ca</label>
</div>
<div>
<input type="checkbox" id="cert_solo" name="solo">
<label for="cert_solo">Accept keys signed by solokeys root ca</label>
</div>
<div>
<input type="checkbox" id="cert_hypersecu" name="hypersecu">
<label for="cert_hypersecu">Accept keys signed by hypersecu root ca</label>
</div>
<div>
<input type="checkbox" id="cert_google" name="google">
<label for="cert_google">Accept keys signed by google root ca</label>
</div>
<div>
<input type="checkbox" id="cert_microsoft" name="microsoft">
<label for="cert_microsoft">Accept keys signed by Microsofts collection of trusted TPM root ca</label>
</div>
<div style="font-size: 0.7em">(Nothing checked = accept all)</div>
<div>&nbsp;</div>
<div>
<button type="button" onclick="queryFidoMetaDataService()">&#128472; update root certificates from FIDO Alliance Metadata Service (MDS)</button>
</div>
<div>&nbsp;</div>
<div>If you select a root ca, direct attestation is required to validate your client with the root.<br>
The browser may warn you that he will provide informations about your device.<br>
When not checking against any root ca (deselect all certificates),
the client may change the assertion from the authenticator (for instance, using an anonymization CA),<br>
the browser may not warn about providing informations about your device.
</div>
<div style="margin-top:20px;font-size: 0.7em;font-style: italic">
Copyright &copy; 2023 Lukas Buchs - <a href="https://raw.githubusercontent.com/lbuchs/WebAuthn/master/LICENSE">license therms</a>
</div>
</div>
</div>
<div class="serverPreview">
<p style="margin-left:10px;font-weight: bold;">Here you can see what's saved on the server:</p>
<iframe src="server.php?fn=getStoredDataHtml" id="serverPreview"></iframe>
</div>
<div>
</body>
</html>