FINDING · DETECTION
34 of 41 obfuscated OpenVPN configurations and 18 of 20 UDP configurations were co-located with vanilla TCP OpenVPN servers within the same /29 subnet; probing the /29 subnet of a suspected obfuscated or UDP endpoint revealed nearby vanilla TCP servers, enabling confirmation by 'guilt by association' even when the obfuscated endpoint itself resisted direct fingerprinting. Some providers additionally share infrastructure across different VPN brands, further compounding exposure.
From 2022-xue-openvpn — OpenVPN is Open to VPN Fingerprinting · §7.5, §9.1 · 2022 · USENIX Security Symposium
Implications
- Obfuscated VPN bridge servers must be hosted on entirely separate network address blocks — ideally separate ASNs — from vanilla VPN infrastructure; sharing a /29 or /24 with known OpenVPN endpoints allows adversaries to identify obfuscated services through subnet-level probing without ever directly fingerprinting the obfuscated traffic.
- Treat bridge infrastructure as a one-way secret: once a bridge IP's subnet is linked to a known VPN provider, assume the entire /29 is compromised and rotate to a fresh, isolated address block.
Tags
Extracted by claude-sonnet-4-6 — review before relying.