FINDING · DETECTION

Even with tls-auth/tls-crypt HMAC protection making OpenVPN servers nominally 'probe-resistant' (silent to unauthenticated clients), the framework fingerprints servers via TCP-level timing side channels: a complete 16-byte client-reset probe triggers an immediate connection drop (HMAC validation fails after full packet reassembly), while a 15-byte truncated probe causes the server to stall awaiting the final byte until a server-specific handshake timeout expires. Over 97% of non-OpenVPN endpoints have RST thresholds below 500 or above 4,000 bytes, versus OpenVPN's characteristic 1,550–1,660 bytes derived from default MTU configurations.

From 2022-xue-openvpnOpenVPN is Open to VPN Fingerprinting · §6.3 · 2022 · USENIX Security Symposium

Implications

Tags

censors
genericcn
techniques
dpiactive-probing
defenses
obfs4

Extracted by claude-sonnet-4-6 — review before relying.