We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing

Abstract: Many systems today rely heavily on virtual private network (VPN) technology to connect networks and protect their services on the Internet. While prior studies compare the performance of different implementations, they do not consider adversarial settings. To address this gap, we evaluate the resilience of VPN implementations to flooding-based denial-of-service (DoS) attacks. We focus on a class of stateless flooding attacks, which are particularly threatening to real connections, as they can be carried out by an off-path attacker using spoofed IP addresses. We have implemented various attacks to evaluate DoS resilience for three major open-source VPN solutions, with surprising results: On high-performance hardware with a $40\,\mathrm{Gb/s}$ interface, data transfer over established WireGuard connections can be fully denied with $700\,\mathrm{Mb/s}$ of attack traffic. For strongSwan (IPsec), an adversary can block any legitimate connections from being established using only $75\,\mathrm{Mb/s}$ of attack traffic. OpenVPN can be overwhelmed with $100\,\mathrm{Mb/s}$ of flood traffic denying data transfer through the VPN connection as well as connection establishment completely. Further analysis has revealed implementation bugs and major inefficiencies in the implementations related to concurrency aspects. These findings demonstrate a need for more adversarial testing of VPN implementations with respect to DoS resilience.
Comments: Major update has been made and will be published at a later point in time
Subjects: Cryptography and Security (cs.CR)
Journal reference: Network and Distributed Systems Security (NDSS) Symposium 2022
DOI: 10.14722/ndss.2022.24043
Cite as: arXiv:2110.00407 [cs.CR]
  (or arXiv:2110.00407v2 [cs.CR] for this version)

Submission history

From: Joel Wanner [view email]
[v1] Fri, 1 Oct 2021 13:51:33 GMT (551kb,D)
[v2] Tue, 25 Jan 2022 20:24:14 GMT (0kb,I)

Link back to: arXiv, form interface, contact.