1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
const https = require('https');
const fs = require('fs');
const express = require('express');
const {
// Registration ("Attestation")
generateAttestationOptions,
verifyAttestationResponse,
// Login ("Assertion")
generateAssertionOptions,
verifyAssertionResponse,
} = require('@webauthntine/server');
const app = express();
const host = '0.0.0.0';
const port = 443;
app.use(express.static('./public/'));
app.use(express.json());
// Domain where the WebAuthn interactions are expected to occur
const origin = 'dev.dontneeda.pw';
// GENERATE A NEW VALUE FOR THIS EVERY TIME! The server needs to temporarily remember this value,
// so don't lose it until after you verify
const randomChallenge = 'totallyUniqueValueEveryTime';
// Your internal, _unique_ ID for the user (uuid, etc...). Avoid using identifying information here,
// like an email address
const userId = 'webauthntineInternalUserId';
// A username for the user
const username = 'user@webauthntine.foo';
const inMemoryUserDeviceDB = {
[userId]: [
/**
* After an attestation, the following authenticator info returned by
* verifyAttestationResponse() should be persisted somewhere that'll tie it back to the user
* specified during attestation:
*
* {
* base64PublicKey: string,
* base64CredentialID: string,
* counter: number,
* }
*
* After an assertion, the `counter` value above should be updated to the value returned by
* verifyAssertionResponse(). This method will also return a credential ID of the device that
* needs to have its `counter` value updated.
*
*/
],
};
/**
* Registration (a.k.a. "Attestation")
*/
app.get('/generate-attestation-options', (req, res) => {
res.send(generateAttestationOptions(
'WebAuthntine Example',
origin,
randomChallenge,
userId,
username,
));
});
app.post('/verify-attestation', (req, res) => {
const { body } = req;
const verification = verifyAttestationResponse(body, `https://${origin}`);
console.log('verification:', verification);
const { verified, authenticatorInfo } = verification;
if (verified) {
const { base64PublicKey, base64CredentialID, counter } = authenticatorInfo;
const user = inMemoryUserDeviceDB[userId];
const existingDevice = user.find((device) => device.base64CredentialID === base64CredentialID);
if (existingDevice) {
console.log('device already exists, skipping insertion');
console.debug(existingDevice);
} else {
console.log(`storing public key, credential ID, and counter for ${userId}`);
inMemoryUserDeviceDB[userId].push({
base64PublicKey,
base64CredentialID,
counter,
});
}
}
res.send({ verified });
});
/**
* Login (a.k.a. "Assertion")
*/
app.get('/generate-assertion-options', (req, res) => {
// You need to know the user by this point
const user = inMemoryUserDeviceDB[userId];
res.send(generateAssertionOptions(
randomChallenge,
user.map(data => data.base64CredentialID),
));
});
app.post('/verify-assertion', (req, res) => {
const { body } = req;
console.log('verifying assertion:', body);
});
https.createServer({
key: fs.readFileSync('./dev.dontneeda.pw.key'),
cert: fs.readFileSync('./dev.dontneeda.pw.crt'),
}, app).listen(port, host, () => {
console.log(`🚀 Server ready at https://${host}:${port}`);
});
|