Jan 7, 2016
PPTP vs L2Tp vs OpenVPN vs SSTP vs IKEv2
- Author Ermias Teffera
- Jan 7, 2016
- 7 min read
Every now and then I find myself googling some stuff to find the best answers for my questions sometimes I get to much of information and sometimes I get the most precise and very descriptive answers and today happens to be one of those days where I run in to a website called bestvpn.com and found a very descriptive comparison between different VPN Technologies and I thought you might want to know these things. Below you will find the article I found on their website.
PPTP
Point-to-Point Tunneling Protocol was developed by a consortium founded by Microsoft for creating VPN over dialup networks, and as such has long been the standard protocol for internal business VPN. It is a VPN protocol only, and relies on various authentication methods to provide security (with MS-CHAP v2 being the most common). Available as standard on just about every VPN capable platform and device, and thus being easy to set up without the need to install additional software, it remains a popular choice both for businesses and VPN providers. It also has the advantage of requiring a low computational overhead to implement (i.e. it’s quick).
However, although now usually only found using 128-bit encryption keys, in the years since it was first bundled with Windows 95 OSR2 back in 1999, a number of security vulnerabilities have come to light, the most serious of which is the possibility of unencapsulated MS-CHAP v2 Authentication. Using this exploit, PPTP has been cracked within 2 days, and although Microsoft has patched the flaw (through the use of Protect Extensible Authentication Protocol PEAP authentication), Microsoft issued a recommendation that VPN users should use L2TP/IPsec or SSTP instead.
Knowing that PPTP was insecure anyway, it came as no surprise to anybody that the NSA almost certainly decrypts PPTP encrypted communications as standard. Perhaps more worrying is that the NSA has (or is in the process of) almost certainly decrypted the vast amounts of older data it has stored, which was encrypted back when even security experts considered PPTP to be secure.
Pros
Client built-in to just about all platforms
Very easy to set up
Fast
Cons
Not at all secure (the vulnerable MS CHAPv2 authentication is still the most common in use)
Definitely compromised by the NSA
L2TP and L2TP/IPsec
Layer 2 Tunnel Protocol is a VPN protocol that on its own does not provide any encryption or confidentiality to traffic that passes through it. For this reason it is usually implemented with the IPsec encryption suite (similar to a cipher, as discussed below) to provide security and privacy.
L2TP/IPsec is built-in to all modern operating systems and VPN capable devices, and is just as easy and quick to set up as PPTP (in fact it usually uses the same client). Problems can arise however, because the L2TP protocol uses UDP port 500, which is more easily blocked by NAT firewalls, and may therefore require advanced configuration (port forwarding) when used behind a firewall (this is unlike SSL which can use TCP port 443 to make it indistinguishable from normal HTTPS traffic).
IPsec encryption has no major known vulnerabilities, and if properly implemented may still be secure. However, Edward Snowden’s revelations have strongly hinted at the standard being compromised by the NSA, and as John Gilmore (security specialist and founding member of the Electronic Frontier Foundation) explains in this post, it is likely that it has been deliberately weakened during its design phase.
Relatively minor compared to the last point, but probably worth mentioning, is that because L2TP/IPsec encapsulates data twice, it is not as efficient as SSL based solutions (such as OpenVPN and SSTP,) and is therefore slightly slower.
Pros
Usually considered very secure but see cons
Easy to set up
Available on all modern platforms Cons
Cons
May be compromised by the NSA
Likely deliberately weakened by the NSA
Slower than OpenVPN
Can struggle with restrictive firewalls
OpenVPN
OpenVPN is a fairly new open source technology that uses the OpenSSL library and Secure Socket Layer and Transport Layer Security SSLv3/TLSv1 protocols, along with an amalgam of other technologies, to provide a strong and reliable VPN solution. One of its major strengths is that it is highly configurable, and although it runs best on a UDP port, it can be set to run on any port, including TCP port 443. This makes traffic on it impossible to tell apart from traffic using standard HTTPS over SSL (as used by for example Gmail), and it is therefore extremely difficult to block.
Another advantage of OpenVPN is that the OpenSSL library used to provide encryption supports a number of cryptographic algorithms (e.g. AES, Blowfish, 3DES, CAST-128, Camellia and more), although VPN providers almost exclusively use either AES or Blowfish. 128-bit Blowfish is the default cipher built in to OpenVPN, and although it is generally considered secure, it does have known weaknesses, and even its creator was quoted in 2007 as saying ‘at this point, though, I’m amazed it’s still being used. If people ask, I recommend Twofish instead’.
AES is the newer technology, has no known weaknesses, and thanks to its adoption by the US government for use in protecting ‘secure’ data, is generally considered the ‘gold standard’ when it comes to encryption. The fact that it has a 128-bit block size rather than Blowfish’s 64-bit block size also means that it can handle larger (over 1 GB) files better than Blowfish. However, both ciphers are NIST certified, which while not widely recognized as problem, we have issues with. See below for a discussion about this.
How fast OpenVPN performs depends on the level of encryption employed, but it is generally faster than IPsec.
OpenVPN has become the default VPN connection type, and while natively supported by no platform, is widely supported on most through third party software (including both iOS and Android).
Compared to PPTP and L2TP/IPsec, OpenVPN can be a bit fiddly to set up. When using generic OpenVPN software in particular (such as the standard open source OpenVPN client for Windows), it is necessary to not only download and install the client, but also to download and setup additional configuration files. Many VPN providers get around this configuration problem by supplying customized VPN clients.
Perhaps most importantly in light of the information obtained from Edward Snowden, it seems OpenVPN has not been compromised or weakened by the NSA, and is also (thanks to its use of ephemeral key exchanges, as we will discuss later) immune to NSA attacks on RSA key encryption. Although no-one knows the full capabilities of the NSA for sure, both the evidence and the mathematics strongly point to OpenVPN, if used in conjunction with a strong cipher, being the only VPN protocol that can be considered truly secure.
Pros
Highly configurable
Very secure (probably even against the NSA)
Can bypass firewalls
Can use a wide range of encryption algorithms
Open source (and can therefore be readily vetted for back doors and other NSA style tampering)
Cons
Needs third party software
Can be fiddly to set up
Support on mobile devices is improving, but is not as good as on the desktop
SSTP
Secure Socket Tunneling Protocol was introduced by Microsoft in Windows Vista SP1, and although it is now available for Linux, RouterOS and SEIL, it is still largely a Windows-only platform (and there is a snowball’s chance in hell of it ever appearing on an Apple device!). SSTP uses SSL v3, and therefore offers similar advantages to OpenVPN (such as the ability to use to TCP port 443 to avoid NAT firewall issues), and because it is integrated into Windows may be easier to use and more stable.
However unlike OpenVPN, SSTP is a proprietary standard owned by Microsoft. This means that the code is not open to public scrutiny, and Microsoft’s history of co-operating with the NSA, and on-going speculation about possible backdoors built-in to the Windows operating system, do not inspire us with confidence in the standard.
Pros
Very secure (depends on cipher, but usually very strong AES)
Completely integrated into Windows (Windows Vista SP1, Windows 7, Windows 8)
Microsoft support
Can bypass most firewalls
Cons
Only really works in a Windows only environment
Proprietary standard owned by Microsoft so cannot be independently audited for back doors and suchlike
IKEv2
Internet Key Exchange (version 2) is an IPSec based tunneling protocol that was jointly developed by Microsoft and Cisco, and which is baked into Windows versions 7 and above. The standard is supported by Blackberry devices, and independently developed (and compatible) open source implementations are available for Linux and other operating systems. As always, we are wary of anything developed by Microsoft, but if open source versions are used then there should be no problem.
Dubbed VPN Connect by Microsoft, IKEv2 is particularly good at automatically re-establishing a VPN connection when users temporarily lose their internet connections (such as when entering or leaving a train tunnel).
Mobile users in particular, therefore, benefit the most from using IKEv2, which because of its support for the Mobility and Multihoming (MOBIKE) protocol, also makes it highly resilient to changing networks. This is great news for cell phone users who, for example, connect their smart phones to a WiFi network while at home but switch to mobile data use when out and about, or who regularly switch between hotspots.
IKEv2 is even more useful to Blackberry users, as it is one of the few VPN protocols supported by Blackberry devices.
It is not as ubiquitous as IPSec (i.e. it is supported on much fewer platforms), but IKEv2 is considered at least as good as, if not superior to, L2TP/IPsec in terms of security, performance (speed), and stability.
Pros
Faster than PPTP, SSTP and L2TP, as it does not involve the overhead associated with Point-to-Point protocols (PPP)
Very stable – especially when switching network or reconnecting after a lost internet connection
Very secure – supports AES 128, AES 192, AES 256 and 3DES ciphers
Easy to setup (at least at the user-end!)
Protocol is supported on Blackberry devices
Cons
Not supported on many platforms
Uses the same UDP port 500 as IPSec (and PPTP), which is easier to block than SSL based solutions such as OpenVPN or SSTP
Implementing IKEv2 at the server-end is tricky, which is something that could potentially result in issues developing
We only trust open source implementations
Comments