Bitcoin Forum
November 02, 2024, 06:40:30 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Chipmixer.com SSL cert Domain value  (Read 508 times)
btctaipei (OP)
Member
**
Offline Offline

Activity: 141
Merit: 62


View Profile
August 19, 2019, 05:26:38 PM
Last edit: August 19, 2019, 05:38:52 PM by btctaipei
 #1

I think Feds might be actively figuring out ways to hi-jack Chipmixer non-onion .com site and interdict chipmixer users.  It didn't happen often before, but now occasionally I am getting invalid cert warning on Chipmixer's .com site.

so far since chipmixer isn't using CDN network such as cloudflare and Akamai; harvesting (or "leaks") of user session and address data isn't exactly easy (common tactics used in the past against crypto exchanges).

However, manually hijack and present an fake SSL using specialized MITM appliances to stole and to analyze chipmixer user's fund should be deemed plausible given mass surveillance and maturity of man-in-the-side operations given the past cyber incidents. (i.e., Fed Spy on chipmixer user, once session data's btc address were observed and funded, lets hit that and put it up for federal auction)



Would anyone able to analyze and provide genuine TLS signature value of Chipmixer?

thanks!

my PGP Key https://pastebin.com/b7nYutWC
pgp key server search 0x4BCC117F9EFB1A97
btctaipei (OP)
Member
**
Offline Offline

Activity: 141
Merit: 62


View Profile
August 19, 2019, 05:45:04 PM
 #2

I wish Tor meek-azure works.. it dosn't (I work from shenzhen)

When I use a us based tor bridge a spoof TLS certs were presented and that is what I saw. 

3e e6 c2 42 02


my PGP Key https://pastebin.com/b7nYutWC
pgp key server search 0x4BCC117F9EFB1A97
BitcoinFX
Legendary
*
Offline Offline

Activity: 2646
Merit: 1722


https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF


View Profile WWW
June 18, 2020, 02:16:24 PM
Last edit: June 18, 2020, 02:29:56 PM by BitcoinFX
 #3

...snip...

Would anyone able to analyze and provide genuine TLS signature value of Chipmixer?

thanks!

I tried to inform chip mixer about this stuff around a year ago or so ...

@ChipMixer

"Re: Anonymous Bitcoins"
- https://bitcointalk.org/index.php?topic=5255631.msg54641364#msg54641364

Notification - Kindly fix up your Lets Encrypt SSL Certificate ... it is currently capped to a grade B ...

- https://www.ssllabs.com/ssltest/analyze.html?d=chipmixer.com&hideResults=on

SSL Labs Grade Change for TLS 1.0 and TLS 1.1 Protocols ...
- https://blog.qualys.com/ssllabs/2018/11/19/grade-change-for-tls-1-0-and-tls-1-1-protocols

Has insecure cypher suites ...
- https://en.wikipedia.org/wiki/Cipher_suite

Is therefore vulnerable to the BEAST attack ...
- https://blog.qualys.com/ssllabs/2013/09/10/is-beast-still-a-threat

Your also using an RSA 2048 bits publickey certificate despite Lets Encrypt supporting RSA 4096 bits publickey certificates, out-of-the box ...

...

How to Guide ...

See: https://ssl-config.mozilla.org/#server=nginx&version=1.14.0&config=intermediate&openssl=1.1.1d&hsts=false&ocsp=false&guideline=5.4

Example;

Code:
# generated 2020-06-18, Mozilla Guideline v5.4, nginx 1.14.0, OpenSSL 1.1.1d, intermediate configuration, no HSTS, no OCSP
# https://ssl-config.mozilla.org/#server=nginx&version=1.14.0&config=intermediate&openssl=1.1.1d&hsts=false&ocsp=false&guideline=5.4
server {
    listen 443 ssl http2;
    listen [::]:443 ssl http2;

    ssl_certificate /path/to/signed_cert_plus_intermediates;
    ssl_certificate_key /path/to/private_key;
    ssl_session_timeout 1d;
    ssl_session_cache shared:MozSSL:10m;  # about 40000 sessions
    ssl_session_tickets off;

    # curl https://ssl-config.mozilla.org/ffdhe2048.txt > /path/to/dhparam
    ssl_dhparam /path/to/dhparam;

    # intermediate configuration
    ssl_protocols TLSv1.2 TLSv1.3;
    ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
    ssl_prefer_server_ciphers off;
}

You need to update the # intermediate configuration ssl_protocols and ssl_ciphers .

Then use certbot to upgrade your certificate publickey to RSA 4096 bit

Code:
sudo certbot --nginx -d chipmixer.com --rsa-key-size 4096

Cheers!

Also review your torrc for 'compliance' here (donations welcome!) ...
- https://bitcointalk.org/index.php?topic=5177001.msg52455267#msg52455267

 Cool

P.S. Just ignore me, I don't know anything about crypto or infosec ...

"Bitcoin OG" 1JXFXUBGs2ZtEDAQMdZ3tkCKo38nT2XSEp | Bitcoin logo™ Enforcer? | Bitcoin is BTC | CSW is NOT Satoshi Nakamoto | I Mine BTC, LTC, ZEC, XMR and GAP | BTC on Tor addnodes Project | Media enquiries : Wu Ming | Enjoy The Money Machine | "You cannot compete with Open Source" and "Cryptography != Banana" | BSV and BCH are COUNTERFEIT.
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
June 18, 2020, 05:34:28 PM
 #4

P.S. Just ignore me, I don't know anything about crypto or infosec ...

That's the most important part here.

You are able to enter an URL into the bar of another website. Congratulations.

With that, you are almost as technically experienced as the guy who claimed to have found an incredibly dangerous vulnerability on a betting site.
This was a XSS on the (community hosted) forum instead of the actual betting site.


But don't worry. Read a few more tutorials and watch a few more youtube videos, and you'll also be able to find a huuuuuge vulnerability. I believe in you.

buwaytress
Legendary
*
Offline Offline

Activity: 2982
Merit: 3687


Join the world-leading crypto sportsbook NOW!


View Profile
June 20, 2020, 02:07:06 PM
 #5

Jumping in from a completely uneducated pov here but has CM ever responded to any of these in the past? My personal feeling is that they're not unaware of possible modes of attack, but even if successful -- and not being rhetorical here, genuinely asking -- what's the worst-case scenario for a US user if the Feds were successful in such an attack?

But don't worry. Read a few more tutorials and watch a few more youtube videos, and you'll also be able to find a huuuuuge vulnerability. I believe in you.

Your faith in humanity is like that of Buddha. I respect you, and believe in your belief in others. I too, will read a few more tutorials to try and keep up.

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
layoutph
Sr. Member
****
Offline Offline

Activity: 1372
Merit: 255


View Profile WWW
June 21, 2020, 05:28:03 AM
 #6

If a hacker could hack the domain of chipmixer just like what happened to etherdelta. They will stole a huge number of Bitcoin. Chipmixer is a handy tool of thieves to break the connection from blockchain and getting traced from money laundering, and hacked money.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!