/Open-SSTP-Client

Open SSTP Client for Android

Primary LanguageKotlinMIT LicenseMIT

Open SSTP Client for Android

This is an open-sourced Secure Socket Tunneling Protocol (MS-SSTP) client for Android, developed for accessing to VPN Azure Cloud (or SoftEther VPN Server). So no test with other servers is done. Its behavior may be still unstable.

Installation

Usage

Fill Host, Username and Password fields and turn the switch on. If a key icon gets to show on the right side of the status bar, establishing a VPN connection has been succeeded. To disconnect the connection, turn the switch off in the home tab or push DISCONNECT in the notification.

Setting tab

You can configure some settings in the setting tab. You need to push SAVE button to apply the settings before connecting.

Notice

  • Host field can also contain IP address, but cannot include a port number. You can configure it in the setting tab.

  • Your device needs to install a self-signed certificate and enable Disable Hostname Verifier option to access to a server using it

  • A server must enable DHCP

  • Only PAP and MS-CHAPv2 authentication protocols can be enabled. No EAP.

Debugging

It is almost impossible that I can debug a problem caused in any environments but my own. In a networking app, there are many possible reasons to cause the problem and I cannot identify the real one unless the problem can be reproduced in my environment.

So it is strongly encouraged that you should debug by yourself. With Decryptable Mode, this client tries to use TLS_RSA_WITH_AES_128_CBC_SHA or TLS_RSA_WITH_AES_256_CBC_SHA as a cipher suite so that you can decrypt and investigate packets with software like WireShark. I think there can be a similar app for Android. In my experience, Specifying TLS version explicitly is necessary to decrypt. Don't forget the great software, Android Studio and its emulator (v^ー°)

I don't have Windows Server OS. So I don't officially support accessing to it, but there is a successful case. See this issue.

License

Licensed under MIT. Be sure you use this software at your own risk.