What is PPTP?

The Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used to secure the connection between your device and a VPN server. One of the oldest VPN protocols, PPTP is plagued by multiple security issues and is now considered obsolete.

Despite this, its broad compatibility with a huge range of legacy software and hardware, its ease of setup, its lightweight nature, plus the high cost for businesses to upgrade their old PPTP corporate intranet VPN systems, means that in 2021 the protocol remains in widespread use.

What is a VPN protocol?

The VPN protocol is a mix of transmission protocols and encryption standards that establish a secure connection between your device and a VPN server, and encrypts data as it travels between them. 

A VPN protocol should provide three things:

  • Authentication – prevents unauthorized users from connecting to the VPN server
  • Confidentially – using encryption to ensure that no one can access (“sniff”) the contents of data packets sent over the VPN network
  • Integrity – detects if transmitted data has been tampered with in any way

VPN protocols used today include:

  • PPTP
  • L2TP/IPsec
  • IKEv2 (/IPsec)
  • OpenVPN
  • WireGuard®
  • SSTP
  • SoftEther
  • Cisco AnyConnect (and its open-source variant OpenConnect) – these protocols are used almost exclusively by corporate VPN intranets, not by commercial VPN services, such as Proton VPN.

Learn more about VPN protocols(neues Fenster)

Learn more about WireGuard(neues Fenster)

What is PPTP VPN?

History

Developed by a consortium founded by Microsoft, the specification for PPTP was designed for creating VPN connections over dial-up networks and was published in 1999. Microsoft quickly added PPTP support to Windows 95, with the result that it quickly became the default VPN protocol for corporate intranets everywhere.  

Support

Over the last 20+ years, support for PPTP has been built-in to almost every VPN-capable platform, and it continues to be natively supported by Windows 11, Android 12, most Linux distros, and the vast majority of VPN-capable routers.

Apple, however, removed(neues Fenster) support for PPTP from iOS 10+ and macOS 10.12 Sierra in 2018, and recommended against its use on older versions of its operating systems.

Recent versions of Chrome OS do not support PPTP directly, but it is possible to configure PPTP connections using the Android subsystem on Chromebooks that support the Google Play Store. 

How it works

PPTP is a tunneling protocol(neues Fenster), not, in itself, a complete VPN protocol. Encryption and authentication are handled by the Point-to-Point Protocol(neues Fenster) (PPP), but PPP includes no routing mechanism to direct packets to their destination.

PPTP establishes a TCP connection to the VPN server over port 1723, repackaging the PPP IP packets using Generic Routing Encapsulation(neues Fenster) (GRE). These packets are encrypted with Microsoft Point-to-Point Encryption(neues Fenster) (MPPE), which uses an RSA RC4 stream cipher(neues Fenster) with a maximum key size of 128-bits. 

Authentication is usually achieved using the MS-CHAP (now v2) protocol. (It is possible(neues Fenster) to use the more secure AEP-TLS, but this involves implementing a server certificate system, which largely negates the advantages of using PPTP in the first place.)

Speed

PPTP is a very simple and lightweight VPN protocol. This makes for good speed performance (especially on devices with low processing power), and good battery life on mobile devices. This is especially true when compared to the much more secure (but also more cumbersome) OpenVPN protocol. 

Security

PPTP is known to have numerous critical security issues. One the most serious of these is the possibility of un-encapsulated MS-CHAP v2 authentication, which can allow an attacker to exploit cryptographic weaknesses to obtain user credentials.

Using this exploit, tools first released by crypto-legend Moxie Marlinspike in 2012 allow PPTP to be cracked in under a day(neues Fenster). This flaw led Microsoft itself to recommend(neues Fenster) using L2TP/IP, IKEv2, IPsec, or SSTP instead. 

In 2019, Microsoft also issued an “Applicability Statement(neues Fenster)”, noting that the authentication method used by MS-CHAP v2 is susceptible to dictionary attacks(neues Fenster). To make matters worse, the RC4 cipher used by PPTP to encrypt data is vulnerable to bit-flipping attacks(neues Fenster).

It therefore came as very little surprise when, in 2014, Der Spiegel (neues Fenster)released documents obtained from whistleblower Edward Snowden that confirmed the United States’ NSA has little problem accessing data secured using PPTP. 

Top secret slide obtained from Edward Snowden detailing how the NSA easily breaks PPTP encryption

Resistance to censorship

PPTP uses TCP port 1723, and packets encapsulated by GRE use IP protocol number(neues Fenster) 47, both of which are trivial to block using a firewall. 

Summary

PPTP is not a secure VPN protocol, and should never be used in any situation where security is a factor.

Its ease of use, lightweight nature, and almost ubiquitous support mean that it can still be useful in situations where security is not an issue. For example, use cases include when you need to overcome IPS throttling, unblock geo-restricted websites, and stream Netflix content that you’ve subscribed to while traveling abroad.

However, at Proton VPN we believe this obsolete protocol’s security weaknesses make it unfit for purpose, and that it is irresponsible for modern commercial VPN services to provide PPTP as an option to their users.

At Proton VPN we only offer cryptographically secure VPN protocols implemented at their highest security settings. These protocols are:

  • OpenVPN 
  • IKEv2
  • WireGuard

Frequently asked questions

What port does PPTP use?

PPT uses TCP port 1723.

What is PPTP passthrough?

All routers use Network Address Translation (NAT) to map incoming and outgoing connections to local devices that are connected to them. However, not all routers understand what to do with packets that have been encrypted using older VPN protocols, such as PPTP, IPSec, and L2TP. 

To handle traffic that uses these VPN protocols, a router must support VPN passthrough. If it doesn’t, the VPN traffic will be blocked by the router. A PPTP passthrough replaces the basic GRE protocol used by PPTP with an enhanced version that includes a call ID it can use to identify PPTP clients and correctly route their packets. 

Most modern routers include a VPN passthrough that can handle all the common VPN protocols that are affected by this issue (including PPTP). In addition to this, modern VPN protocols, such as OpenVPN, IKEv2, and Wireguard are not affected by this issue as they have been designed to address it. 

Do I need a PPTP client?

Most VPN-capable devices and operating systems include a native PPTP VPN client. A major exception is Apple devices, which no longer support PPTP. This is a good move on Apple’s part because more modern VPN protocols can do everything PPTP does while also being much more secure. 

Verwandte Artikel

How to fix a 502 error
en
In this article, we explain what a 502 bad gateway error is and explore possible ways to fix it as a visitor to a website.
Watch Thanksgiving Day football with Proton VPN
en
Here's how you can live stream this year's Thanksgiving football games using Proton VPN, whether you're watching from home or abroad.
Where to watch Macy's Thanksgiving day parade
en
Here's how and where to watch Macy's Thanksgiving Day Parade live from anywhere in the world with Proton VPN.
What we've been up to, and what's next
en
  • Proton VPN – Neuigkeiten
Here are the main things Proton VPN delivered this spring and summer and the exciting changes that lie ahead on our product roadmap this winter.
Proton VPN for Windows ARM
en
  • Proton VPN – Neuigkeiten
We’re pleased to announce a new Proton VPN app with native support for Windows devices that use the ARM chipset.
What is doxing and is doxing illegal
en
  • Grundlagen der Privatsphäre
We look at what doxing is, who does it (and why), and at how to protect yourself from doxing .