• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2025, Vol. 47 ›› Issue (06): 998-1007.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Research on OpenVPN protocol subversion attack technology

LI Ziyu,HE Jun,LIU Yixi   

  1. (College of Information and Communication,National University of Defense Technology,Wuhan 430000,China)
  • Received:2023-08-22 Revised:2024-06-27 Online:2025-06-25 Published:2025-06-26

Abstract: OpenVPN, as a typical application for channel encryption, faces severe threats from large-scale surveillance and subversion attacks on its security. By studying the communication characteristics of the four stages of the protocol and conducting a detailed analysis of the attack surfaces and conditions at each stage, researchers construct a security game model and attack framework for subversion attacks targeting the data encryption and decryption stages of the OpenVPN protocol. To address the challenge of traditional models struggling to accurately assess attack effectiveness in complex real-world communication environments, a definition of attack advantage is proposed, with data decryption probability serv- ing as the primary evaluation criterion. This aids in a more precise quantitative assessment of attack effectiveness under the influence of different factors. Based on this, an IV (Initialization Vector) replacement attack method is designed and instantiated, with the fundamental properties of the attack method proven. Systematic analysis and comparison of attack advantages against different encryption algorithms of the OpenVPN protocol are conducted, and specific mitigation measures are proposed.

Key words: mass surveillance, subversion attack, OpenVPN protocol