Computer Engineering & Science ›› 2025, Vol. 47 ›› Issue (06): 998-1007.
• Computer Network and Znformation Security • Previous Articles Next Articles
LI Ziyu,HE Jun,LIU Yixi
Received:
Revised:
Online:
Published:
Abstract: OpenVPN, as a typical application for channel encryption, faces severe threats from large-scale surveillance and subversion attacks on its security. By studying the communication characteristics of the four stages of the protocol and conducting a detailed analysis of the attack surfaces and conditions at each stage, researchers construct a security game model and attack framework for subversion attacks targeting the data encryption and decryption stages of the OpenVPN protocol. To address the challenge of traditional models struggling to accurately assess attack effectiveness in complex real-world communication environments, a definition of attack advantage is proposed, with data decryption probability serv- ing as the primary evaluation criterion. This aids in a more precise quantitative assessment of attack effectiveness under the influence of different factors. Based on this, an IV (Initialization Vector) replacement attack method is designed and instantiated, with the fundamental properties of the attack method proven. Systematic analysis and comparison of attack advantages against different encryption algorithms of the OpenVPN protocol are conducted, and specific mitigation measures are proposed.
Key words: mass surveillance, subversion attack, OpenVPN protocol
LI Ziyu, HE Jun, LIU Yixi. Research on OpenVPN protocol subversion attack technology[J]. Computer Engineering & Science, 2025, 47(06): 998-1007.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2025/V47/I06/998