Point-to-point tunneling protocol

Point-to-point tunneling protocol

The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. Layer 2 Tunneling Protocol (L2TP) [ [http://www.ietf.org/rfc/rfc2661.txt Layer Two Tunneling Protocol "L2TP"] ,RFC 2661, W. Townsley "et al.",August 1999] or IPSec are the standards-based replacements for PPTP.

PPTP specification

A specification for PPTP was published as RFC 2637. PPTP has not been proposed or ratified as a standard by the IETF.

PPTP works by sending a regular PPP session to the peer with the Generic Routing Encapsulation (GRE) protocol. A second session on TCP port 1723 is used to initiate and manage the GRE session. PPTP is difficult to forward past a network firewall because it requires two network sessions. As such, some firewalls are unable to let pass this traffic flawlessly, resulting in an inability to connect. This rarely happens in Windows or Mac OS, though.

PPTP connections are authenticated with Microsoft MSCHAP-v2 or EAP-TLS. VPN traffic is optionally protected by Microsoft Point-to-Point Encryption (MPPE), which is described by RFC 3078.

The protocol was developed by a vendor consortium formed by Microsoft, Ascend Communications (today part of Lucent/Alcatel), 3COM, and others, as described by the RFC document. [RFC 2637]

MSCHAP-v2 can be compromised if users choose weak passwords. The certificate-based EAP-TLS provides a superior security option for PPTP.

PPTP implementations

PPTP is popular because it is easy to configure and it was the first VPN protocol that was supported by Microsoft Dial-up Networking. All releases of Microsoft Windows since Windows 95 OSR2 are bundled with a PPTP client, although they are limited to only 2 concurrent outbound connections. The Routing And Remote Access Service for Microsoft Windows contains a PPTP server.

Until recently, Linux distributions lacked full PPTP support because MPPE was believed to be patent encumbered. Full MPPE support was added to the Linux 2.6.13 branch that is maintained by Andrew Morton. SuSE Linux 10 was the first Linux distribution to provide a complete working PPTP client. Official support for PPTP was added to the official kernel release in version 2.6.14 on October 28, 2005.

Mac OS X (including the version loaded on the iPhone) is bundled with a PPTP client. Cisco and Efficient Networks sell PPTP clients for older Mac OS releases. Palm PDA devices with Wi-Fi are bundled with the Mergic PPTP client.

Microsoft Windows Mobile 2003 and higher also support the PPTP protocol.

PPTP security concerns

"Security concerns have dogged PPTP since its inception. It is the author’s opinion that PPTP is inherently insecure because there are too many unauthenticated control packets that are readily spoofed." [ [http://www.ja.net/documents/publications/technical-guides/tg-vpn.pdf JANET Technical Guides: Secure Virtual Private Networks, (2003)] ] Crackers used to breach PPTP are Anger, Deceit and Ettercap.

A typical upgrade path for PPTP will be L2TP/IPsec. The adoption of improved VPN technologies has been slow because PPTP is convenient and easy to configure, whereas L2TP/IPsec requires a shared key or machine certificates.

References

External links

* [http://the.taoofmac.com/space/PPTP On PPTP security]
* [http://www.microsoft.com/technet/archive/winntas/plan/pptpudst.mspx Windows NT: Understanding PPTP] from Microsoft
* [http://www.schneier.com/pptp-faq.html FAQ on security flaws in Microsoft's implementation] , Bruce Schneier, 1998
* [http://www.schneier.com/paper-pptpv2.html Cryptanalysis of Microsoft's PPTP Authentication Extensions] (MS-CHAPv2), Bruce Schneier, 1999
* [http://www.poptop.org/ Poptop] , a PPTP Server for Linux
* [http://pptpclient.sourceforge.net/ PPTP Client] , a Linux, FreeBSD, NetBSD and OpenBSD client
* [http://www.mgix.com/pptpproxy pptpproxy] , a Linux, FreeBSD, NetBSD and OpenBSD pptp protocol forwarder (proxy)
* [http://asleap.sourceforge.net/ ASLEAP] , a PPTP password cracker and traffic sniffer
* [http://pptpclient.sourceforge.net/protocol-security.phtml PPTP Protocol Security] by James Cameron and Peter Mueller
* [http://www.microsoft.com/windows2000/techinfo/reskit/deploymentscenarios/scenarios/route04_config_iasservice_iasserver.asp Setting up EAP-TLS security for PPTP]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Point-to-point tunneling protocol — PPTP (Point to point tunneling protocol) est un protocole d encapsulation PPP sur IP conçu par Microsoft, permettant la mise en place de réseaux privés virtuels (VPN) au dessus d un réseau public. Layer 2 Tunneling Protocol (L2TP) et IPsec sont… …   Wikipédia en Français

  • Point to Point Tunneling Protocol — (PPTP) protocol that enables the transfer of data packets of TCP/IP through a foreign network that is not based on these protocols (by marking the packet with an address suited to the foreign network) …   English contemporary dictionary

  • Point to Point Tunneling Protocol — Point to Point Tunneling Protocol,   PPP …   Universal-Lexikon

  • Point-to-Point Tunneling Protocol — Das Point to Point Tunneling Protocol (PPTP) ist ein Netzwerkprotokoll, das auf das Internet Protocol aufsetzt und dem Aufbau eines Virtual Private Network (VPN) in einem Rechnernetz dient. Mittels PPTP wird ein VPN geschaffen, indem ein Tunnel… …   Deutsch Wikipedia

  • Point-to-Point Tunneling Protocol — PPTP (Point to point tunneling protocol), protocole de tunnel point à point, est un protocole d encapsulation PPP sur IP conçu par Microsoft. Il permet de mettre en place de réseaux privés virtuels (VPN) au dessus d un réseau public. Layer 2… …   Wikipédia en Français

  • Point-to-Point Tunneling Protocol —    Abbreviated PPTP. A proprietary networking protocol proposed by Microsoft that supports virtual private networks, allowing remote users to access Windows NT Server systems across the Internet without compromising security. PPTP allows… …   Dictionary of networking

  • Point-to-point tunneling protocol — …   Википедия

  • Tunneling protocol — Computer networks use a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. By using tunneling one can (for example) carry a payload over an incompatible delivery network, or provide a… …   Wikipedia

  • Layer 2 Tunneling Protocol — In computer networking, the Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). History and future Published in 1999 as proposed standard RFC 2661, L2TP has its origins primarily in two older …   Wikipedia

  • Layer Two Tunneling Protocol — L2TP im TCP/IP‑Protokollstapel: Anwendung L2TP Transport UDP Internet IP (IPv4, IPv6) Netzzugang Ethernet Token …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”