Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Secure Socket Tunneling Protocol

From Wikipedia, the free encyclopedia
Form of virtual private network tunnel
Not to be confused withSimple Symmetric Transport Protocol.
SSTP
Secure Socket Tunneling Protocol
Year started2007
First published22 February 2007 (2007-02-22)
OrganizationMicrosoft
Base standardsMS-SSTP

Incomputer networking,Secure Socket Tunneling Protocol (SSTP) is a form ofvirtual private network (VPN) tunnel that provides a mechanism to transportPoint-to-Point Protocol (PPP) traffic through anSSL/TLS channel.

Protocol

[edit]

SSL/TLS provides transport-level security with key negotiation,encryption and traffic integrity checking. The use of SSL/TLS overTCP port 443 (by default; port can be changed) allows SSTP to pass through virtually allfirewalls andproxy servers except for authenticated web proxies.[1]

SSTP servers must beauthenticated during the SSL/TLS phase. SSTP clients can optionally be authenticated during the SSL/TLS phase and must be authenticated in the PPP phase. The use of PPP allows support for common authentication methods, such asEAP-TLS andMS-CHAP.

SSTP is available forLinux,BSD, andWindows.[2]

SSTP was introduced in 2007[3] and available onWindows Vista SP1 and later, inRouterOS since version 5.0, and inSEIL since its firmware version 3.50. It is fully integrated with the RRAS architecture in these operating systems, allowing its use withWinlogon orsmart-card authentication, remote-access policies and the Windows VPN client.[4] The protocol is also used byWindows Azure for Point-to-Site Virtual Network.[5]

SSTP is intended only for remote client access, it generally does not support site-to-site VPN tunnels.[6]

SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will be acceptable only as long as there is sufficient excess bandwidth on the un-tunneled network link to guarantee that the tunneled TCP timers do not expire. If this becomes untrue, performance falls off dramatically due to theTCP meltdown problem.[7][8]

SSTP supports user authentication only; it does not support device authentication or computer authentication.

Packet structure

[edit]

The following header structure is common to all types of SSTP packets:[9]

SSTP header
Bit offsetBits 0–78–141516–31
0VersionReservedCLength
32+Data
  • Version (8 bits) – communicates and negotiates the version of SSTP that is used.
  • Reserved (7 bits) – reserved for future use.
  • C (1 bit) – control bit indicating whether the SSTP packet represents an SSTP control packet or an SSTP data packet. This bit is set if the SSTP packet is a control packet.
  • Length (16 bits) – packet length field, composed of two values: a Reserved portion and a Length portion.
  • Reserved (4 bits) – reserved for future use.
  • Length (12 bits) – contains the length of the entire SSTP packet, including the SSTP header.
  • Data (variable) – when control bit C is set, this field contains an SSTP control message. Otherwise, the data field would contain a higher-level protocol. At the moment, this can only bePPP.

Control message

[edit]

The data field of the SSTP header contains an SSTP control message only when the header's Control bit C is set.

SSTP control message
Bit offsetBits 0–1516–31
0Message typeAttributes count
32+Attributes
  • Message type (16 bits) – specifies the type of SSTP control message being communicated. This dictates the number and types of attributes that can be carried in the SSTP control packet.
  • Attributes count (16 bits) – specifies the number of attributes appended to the SSTP control message.
  • Attributes (variable) – contains a list of attributes associated with the SSTP control message. The number of attributes is specified by the Attributes count field.

See also

[edit]

References

[edit]
  1. ^Jain, Samir (2007-01-17)."SSTP FAQ - Part 2: Client Specific".Microsoft TechNet. Retrieved2015-10-17.
  2. ^"SSTP-Client". 2011-09-17. Retrieved2015-10-17.
  3. ^"[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP)".learn.microsoft.com. 2022-11-04. Retrieved2024-08-30.
  4. ^Tulloch, Mitch (2008-01-22)."SSTP Makes Secure Remote Access Easier". Retrieved2015-10-17.
  5. ^McGuire, Cheryl (2015-08-11)."Configure a point-to-site VPN connection to an Azure Virtual Network". Retrieved2015-10-17.
  6. ^Jain, Samir (2007-01-10)."SSTP FAQ - Part 1: Generic".TechNet Blogs. Archived fromthe original on 2010-10-12.
  7. ^Titz, Olaf (2001-04-23)."Why TCP Over TCP Is A Bad Idea". Retrieved2015-10-17.
  8. ^Honda, Osamu; Ohsaki, Hiroyuki; Imase, Makoto; Ishizuka, Mika; Murayama, Junichi (October 2005). "Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency". In Atiquzzaman, Mohammed; Balandin, Sergey I (eds.).Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III. Vol. 6011. p. 60110H.Bibcode:2005SPIE.6011..138H.doi:10.1117/12.630496.S2CID 8945952.
  9. ^"MS-SSTP: Secure Socket Tunneling Protocol (SSTP)". Microsoft TechNet. 2015-10-16. Retrieved2015-10-17.

External links

[edit]
Communication protocols
Connection applications
Enterprise software
Risk vectors
VPN services
Avast
Kape Technologies
McAfee
Tesonet
Ziff Davis
Retrieved from "https://en.wikipedia.org/w/index.php?title=Secure_Socket_Tunneling_Protocol&oldid=1305276208"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp