1. Ports
  2. Port 1723

Port 1723 carries PPTP traffic, the Point-to-Point Tunneling Protocol. This is the control channel for what was once the world's most widely deployed VPN technology. Every time a PPTP client connects to a server, the negotiation happens here on TCP port 1723, before the actual encrypted tunnel opens on GRE protocol 47.

PPTP was revolutionary. It was also catastrophically insecure. Understanding port 1723 means understanding both.

What PPTP Does

PPTP creates encrypted tunnels across the Internet. It wraps your network traffic in layers of encapsulation, making it appear as though your laptop in a coffee shop is directly connected to your corporate network in another city.

The protocol operates on two channels. The control channel runs on TCP port 1723, handling session setup, teardown, and management. The data channel uses Generic Routing Encapsulation (GRE) with IP protocol 47, carrying the actual encrypted packets.1

When you connect:

  1. Your client opens a TCP connection to port 1723 on the VPN server
  2. They negotiate authentication using MS-CHAP (Microsoft Challenge-Handshake Authentication Protocol)
  3. Once authenticated, a GRE tunnel opens alongside the control connection
  4. Your PPP frames get encrypted with MPPE (Microsoft Point-to-Point Encryption) and flow through the GRE tunnel
  5. The control channel stays open, sending keep-alive messages and managing the session

This architecture was elegant for 1996. The control channel provides reliability through TCP. The data channel provides speed through GRE. The separation lets them optimize each path independently.

The History

In 1996, a Microsoft engineer named Gurdeep Singh Pall had a problem.2 Remote access servers were expensive, proprietary boxes. If you wanted employees to dial into your corporate network from home, you needed dedicated hardware and dedicated phone lines. Every remote worker meant another modem, another line, another cost.

Pall saw that the Internet could change this. Instead of dialing directly into a corporate modem bank, workers could dial into their local ISP, then tunnel through the Internet to reach the corporate network. The ISP handles the modem infrastructure. The company just needs to run software on a server.

Microsoft partnered with Ascend Communications, 3Com, U.S. Robotics, and ECI Telematics to form the PPTP Forum.3 Together they designed a protocol that could tunnel PPP (the same protocol used for dial-up connections) through an IP network.

The specification landed at the IETF in June 1996. Microsoft shipped PPTP support in Windows NT 4.0 and, crucially, in Windows 95. Suddenly, anyone with a Windows PC could set up a VPN connection without buying specialized software or hardware.

PPTP won PC Magazine's Innovation of the Year award in 1996.4 It democratized secure remote access. For the first time, small businesses could afford VPNs. Home workers could connect to the office. The technology that had been locked inside expensive enterprise equipment was now built into the operating system on your desk.

"It really allowed people to work effectively and securely from home," Pall later explained during a 2010 patent trial.5

There was just one problem.

The Breaking

In the summer of 1998, Bruce Schneier and Peter "Mudge" Zatko published a paper that ended PPTP's credibility forever.6

"Microsoft's implementation is seriously flawed on several levels," Schneier wrote in the press release. "It uses weak authentication and poor encryption."7

The problems were fundamental:

MS-CHAP v1 leaked password hashes. The authentication protocol sent enough information that attackers could extract NT password hashes directly from captured traffic. Tools emerged to do this trivially.

MPPE used RC4 wrong. The encryption depended on the user's password, not on cryptographically strong keys. When using MS-CHAP v1, both directions of the connection used the same RC4 keystream. XOR the two streams together and you could recover plaintext without ever cracking the key.

No integrity checking. RC4 is a stream cipher, not authenticated encryption. PPTP packets could be modified in transit without detection. Bit-flipping attacks let attackers manipulate encrypted data.

The control channel was unprotected. Session management traffic on port 1723 wasn't encrypted at all, enabling various injection and spoofing attacks.

Microsoft responded quickly, releasing MS-CHAP v2 and updating MPPE. Schneier, Mudge, and David Wagner analyzed the fixes in 1999.8 Their verdict: better, but still fundamentally limited. The underlying architecture couldn't support strong cryptography.

The final nail came in 2012. At DEF CON 20, Moxie Marlinspike and David Hulton demonstrated CloudCracker, a tool that could break any MS-CHAP v2 handshake in under 24 hours.9

The math was simple. MS-CHAP v2's security ultimately depended on a single DES key. DES uses 56-bit keys. Hulton built custom FPGA hardware that could try 18 billion DES keys per second. With 48 FPGAs running in parallel, the worst-case crack time was 23 hours.

Marlinspike released chapcrack, a tool to extract the relevant data from captured PPTP traffic. Feed it to CloudCracker. Wait a day. Get the user's credentials.

"All users and providers of PPTP VPN solutions should immediately start migrating to a different VPN protocol," Marlinspike announced. "PPTP traffic should be considered unencrypted."10

The Technical Reality

RFC 2637 was published in July 1999, but it was never ratified as an Internet standard.1 The document explicitly states it provides information to the Internet community, not a specification for implementation. The IETF looked at PPTP and decided not to endorse it.

The protocol's design reflects its era. In 1996, everyone was trying to figure out how to make the Internet secure. SSL was new. IPsec was still being standardized. The cryptographic community hadn't yet learned all the lessons about protocol design that seem obvious today.

PPTP made choices that were reasonable in context but catastrophic in hindsight:

  • Password-derived keys: Easier to implement, no need for certificate infrastructure, but trivially weak against offline attacks
  • RC4 for encryption: Fast, widely understood, available, but not an authenticated cipher
  • No perfect forward secrecy: Crack one session key, decrypt all past sessions with that key
  • Minimal protocol complexity: Easy to implement, easy to deploy, easy to break

The protocol couldn't be fixed because the flaws weren't bugs. They were the design.

Security Status: Do Not Use

PPTP is broken. This is not a matter of opinion or theoretical concern. It is empirically demonstrable that PPTP traffic can be decrypted.

Modern attacks include:

  • Credential theft: MS-CHAP v2 handshakes can be cracked in hours, giving attackers VPN credentials
  • Traffic decryption: Once credentials are known, all captured traffic can be decrypted retroactively
  • Session hijacking: Control channel weaknesses allow active attacks against live sessions
  • Bit-flipping: Encrypted packets can be modified without detection

Security researchers and standards bodies universally recommend against PPTP:

"Group-IB strongly recommends immediately disabling PPTP in all corporate environments and replacing it with modern, secure VPN protocols."11

If you see traffic on port 1723, something is wrong. Either legacy systems haven't been updated, or someone is maintaining PPTP for compatibility reasons that should be reconsidered.

PortProtocolRelationship
47 (GRE)Generic Routing EncapsulationData channel for PPTP tunnels
500IKE/IPsecSecure VPN alternative
1701L2TPLayer 2 Tunneling Protocol, often paired with IPsec
4500IPsec NAT-TIPsec through NAT
1194OpenVPNModern open-source VPN
51820WireGuardNext-generation VPN protocol

What Flows Through Port 1723

Every packet through port 1723 carries the echo of 1996. The year when remote work became possible for millions. The year when a team of engineers looked at the Internet and saw a tunnel waiting to be built.

PPTP was a bridge. It connected the dial-up era to the broadband era. It connected home offices to corporate networks. It connected the idea of security to the reality of shipping software.

The protocol failed, but the dream it represented succeeded. Today's VPNs exist because PPTP proved the concept worked. IPsec, OpenVPN, and WireGuard are all descendants of the questions PPTP tried to answer: How do you create privacy on a public network? How do you make the Internet feel like a private wire?

Gurdeep Singh Pall went on to lead Skype, Bing, and Microsoft Teams. The same engineer who built the first mass-market VPN later built the tools that made remote work feel human. The tunnel evolved into the meeting room.

Port 1723 should be quiet now. If it isn't, listen closely. That's the sound of technical debt compounding.

Frequently Asked Questions

Was this page helpful?

😔
🤨
😃