Security Concern with VPNAzure
Posted: Mon Apr 20, 2020 9:12 am
I am using VPNAzure to connect to my VPN server since without VPNAzure a connection is not possible.
I understand that all my traffic is relayed through the VPNAzure server (since UDP hole punching seems to be unsuccessful in my case).
I also understand that this relayed traffic is encrypted and therefore the VPNAzure server is not able to sniff any content.
However, here comes the catch:
I know that for VPNAzure you can only establish connections using either SoftEther VPN client or using MS-SSTP (L2TP does not work, at least not for traffic relaying). I don't know how exactly the connection is established when the SoftEther client is usedd (what authentication method is used to establish the tunnel), however, when SSTP is used where I can specifically select the authentication method, I noticed that I can only establish a connection using PAP authentication. If I try to use CHAP or CHAP2, it doesn't work. This means while the VPN traffic being relayed through VPN azure is still encrypted, the VPN Azure server does see my VPN password as unencrypted clear text (since that's how PAP transmits passwords). This in turn means the people who are running VPNAzure could at any time access any VPN network that makes use of VPN azure. (again, I don't know how the connection is established in the case of using the SoftEther VPN client, but if only PAP works with SSTP, I could Imagine the SoftEther VPN client using the same authentication mechanism in that case).
Thoughts?
I understand that all my traffic is relayed through the VPNAzure server (since UDP hole punching seems to be unsuccessful in my case).
I also understand that this relayed traffic is encrypted and therefore the VPNAzure server is not able to sniff any content.
However, here comes the catch:
I know that for VPNAzure you can only establish connections using either SoftEther VPN client or using MS-SSTP (L2TP does not work, at least not for traffic relaying). I don't know how exactly the connection is established when the SoftEther client is usedd (what authentication method is used to establish the tunnel), however, when SSTP is used where I can specifically select the authentication method, I noticed that I can only establish a connection using PAP authentication. If I try to use CHAP or CHAP2, it doesn't work. This means while the VPN traffic being relayed through VPN azure is still encrypted, the VPN Azure server does see my VPN password as unencrypted clear text (since that's how PAP transmits passwords). This in turn means the people who are running VPNAzure could at any time access any VPN network that makes use of VPN azure. (again, I don't know how the connection is established in the case of using the SoftEther VPN client, but if only PAP works with SSTP, I could Imagine the SoftEther VPN client using the same authentication mechanism in that case).
Thoughts?