• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2025, Vol. 47 ›› Issue (06): 998-1007.

• 计算机网络与信息安全 • 上一篇    下一篇

OpenVPN协议颠覆攻击技术研究

李子玉,何俊,刘羿希   

  1. (国防科技大学信息通信学院,湖北 武汉 430000) 
  • 收稿日期:2023-08-22 修回日期:2024-06-27 出版日期:2025-06-25 发布日期:2025-06-26

Research on OpenVPN protocol subversion attack technology

LI Ziyu,HE Jun,LIU Yixi   

  1. (College of Information and Communication,National University of Defense Technology,Wuhan 430000,China)
  • Received:2023-08-22 Revised:2024-06-27 Online:2025-06-25 Published:2025-06-26

摘要: OpenVPN作为信道密码的典型应用,其安全性受到大规模监视和颠覆攻击等严重威胁。通过研究协议4个阶段的通信特点,详细分析各阶段攻击面和攻击条件,构建了OpenVPN协议数据加解密阶段的颠覆攻击安全博弈模型和攻击框架。针对复杂通信环境下传统模型无法准确评估攻击效果的问题,提出了以数据破译概率为主要评价标准的攻击优势定义,有利于对不同因素影响下的攻击效果进行更加准确的量化评估,在此基础上,设计并实例化了IV替换攻击方法,对攻击方法进行了基本性质证明,对OpenVPN协议不同加密算法的攻击优势进行了系统性分析与比对,并提出了具体缓解措施。

关键词: 大规模监视, 颠覆攻击, OpenVPN协议

Abstract: OpenVPN, as a typical application for channel encryption, faces severe threats from large-scale surveillance and subversion attacks on its security. By studying the communication characteristics of the four stages of the protocol and conducting a detailed analysis of the attack surfaces and conditions at each stage, researchers construct a security game model and attack framework for subversion attacks targeting the data encryption and decryption stages of the OpenVPN protocol. To address the challenge of traditional models struggling to accurately assess attack effectiveness in complex real-world communication environments, a definition of attack advantage is proposed, with data decryption probability serv- ing as the primary evaluation criterion. This aids in a more precise quantitative assessment of attack effectiveness under the influence of different factors. Based on this, an IV (Initialization Vector) replacement attack method is designed and instantiated, with the fundamental properties of the attack method proven. Systematic analysis and comparison of attack advantages against different encryption algorithms of the OpenVPN protocol are conducted, and specific mitigation measures are proposed.

Key words: mass surveillance, subversion attack, OpenVPN protocol