OpenVPN is based on SSL/TLS, which https also uses, but no, it wasn’t designed to look like https traffic.
For one thing, OpenVPN uses UDP on port 1194 by default due to technical issues running TCP over TCP. You can switch it to use TCP and run it on port 443, but the underlying VPN traffic usually doesn’t have the same pattern as a typical http connection so it is discernible from https via side-channel attacks. You can try obfuscating the traffic but my guess is that makes it look even less like https.
For one thing, OpenVPN uses UDP on port 1194 by default due to technical issues running TCP over TCP. You can switch it to use TCP and run it on port 443, but the underlying VPN traffic usually doesn’t have the same pattern as a typical http connection so it is discernible from https via side-channel attacks. You can try obfuscating the traffic but my guess is that makes it look even less like https.
References:
- http://sites.inka.de/~W1011/devel/tcp-tcp.html
- https://wiki.wireshark.org/OpenVPN
- https://github.com/OpenVPN/openvpn/pull/3
- https://community.openvpn.net/openvpn/wiki/TrafficObfuscatio...
- http://blog.zorinaq.com/my-experience-with-the-great-firewal...
- https://news.ycombinator.com/item?id=10905076