Secure Socket Tunneling Protocol
Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL provides transport-level security with key-negotiation, encryption and traffic integrity checking. The use of SSL over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.
SSTP servers must be authenticated during the SSL phase. SSTP clients can optionally be authenticated during the SSL phase, and must be authenticated in the PPP phase. The use of PPP allows support for common authentication methods, such as EAP-TLS and MS-CHAP.
SoftEther VPN Server, a cross-platform open-source VPN server, also supports SSTP as one of its multi-protocol capability.
Similar functionality can be obtained by using open-source solutions like OpenVPN.
For Windows, SSTP is available on Windows Vista SP1 and later, in RouterOS, and in SEIL since its firmware version 3.50. It is fully integrated with the RRAS architecture in these operating systems, allowing its use with Winlogon or smart card authentication, remote access policies and the Windows VPN client. The protocol is also used by Windows Azure for Point-to-Site Virtual Network.
SSTP was intended only for remote client access, it generally does not support site-to-site VPN tunnels. The RouterOS version has no such restrictions.
SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will be acceptable only as long as there is sufficient excess bandwidth on the un-tunneled network link to guarantee that the tunneled TCP timers do not expire. If this becomes untrue, performance falls off dramatically. This is known as the "TCP meltdown problem"
The following header structure is common to all types of SSTP packets:
|Bit offset||Bits 0–7||8–14||15||16–31|
- Version (8 bits) – communicates and negotiates the version of SSTP that is used.
- Reserved (7 bits) – reserved for future use.
- C (1 bit) – Control bit indicating whether the SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet.
- Length (16 bits) – packet length field, composed of two values: a Reserved portion and a Length portion.
- Reserved (4 bits) – reserved for future use.
- Length (12 bits) – contains the length of the entire SSTP packet, including the SSTP header.
- Data (variable) – when Control bit C is set, this field contains an SSTP control message. Otherwise, the data field would contain a higher level protocol. At the moment, this can only be PPP.
The data field of the SSTP header contains an SSTP control message only when the header's Control bit C is set.
|Bit offset||Bits 0–15||16–31|
|0||Message Type||Attributes Count|
- Message Type (16 bits) – specifies the type of SSTP control message being communicated. This dictates the number and types of attributes that can be carried in the SSTP control packet.
- Attributes Count (16 bits) – specifies the number of attributes appended to the SSTP control message.
- Attributes (variable) – contains a list of attributes associated with the SSTP control message. The number of attributes is specified by the Attributes Count field.
- OpenConnect VPN
- SoftEther VPN, an open-source VPN server program which supports SSTP-VPN protocol.
- SSTP FAQ - Part 2: Client Specific
- SSTP Client Project
- SSTP Makes Secure Remote Access Easier
- Configure a Point-to-Site VPN in the Management Portal
- SSTP FAQ
- Why TCP Over TCP Is A Bad Idea
- Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency
- MS-SSTP specification
- RRAS Technet Blog
- Microsoft develops new tunneling protocol
- How SSTP based VPN connection works
- Configuring SSTP in RouterOS
- HSC's SSTP Client for Linux
- SSTP Client for Linux