Table of Contents

Protocol
Packet structure
Control message
See also
References
External links

Secure Socket Tunneling Protocol

TitleSSTP
Long NameSecure Socket Tunneling Protocol
Year Started2007
First Published2007-02-22
OrganizationMicrosoft
Base StandardsMS-SSTP

In computer networking, Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport Point-to-Point Protocol (PPP) traffic through an SSL/TLS channel.

Protocol

SSL/TLS provides transport-level security with key negotiation, encryption and traffic integrity checking. The use of SSL/TLS over TCP port 443 (by default; port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.

SSTP servers must be authenticated during the SSL/TLS phase. SSTP clients can optionally be authenticated during the SSL/TLS phase and must be authenticated in the PPP phase. The use of PPP allows support for common authentication methods, such as EAP-TLS and MS-CHAP.

SSTP is available for Linux, BSD, and Windows.

SSTP was introduced in 2007 and available on Windows Vista SP1 and later, in RouterOS since version 5.0, and in SEIL since its firmware version 3.50. It is fully integrated with the RRAS architecture in these operating systems, allowing its use with Winlogon or smart-card authentication, remote-access policies and the Windows VPN client. The protocol is also used by Windows Azure for Point-to-Site Virtual Network.

SSTP is intended only for remote client access, it generally does not support site-to-site VPN tunnels.

SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will be acceptable only as long as there is sufficient excess bandwidth on the un-tunneled network link to guarantee that the tunneled TCP timers do not expire. If this becomes untrue, performance falls off dramatically due to the TCP meltdown problem.

SSTP supports user authentication only; it does not support device authentication or computer authentication.

Packet structure

The following header structure is common to all types of SSTP packets:

Bit offsetBits 0–78–141516–31
0VersionReservedCLength
32+Data


Control message

The data field of the SSTP header contains an SSTP control message only when the header's Control bit C is set.

Bit offsetBits 0–1516–31
0Message typeAttributes count
32+Attributes


See also


References


External links


Category:Network protocols
Category:Tunneling protocols