strongSwan VPN Client Apk
Show qr code
Follow UpdatesRequest UpdatesstrongSwan VPN Client 2.3.2 APK
0 votes, 0/ 5- Apps, Communication
- December 3, 2020
Google Play
- 2.3.2
- Android 4.0.x - Ice Cream Sandwich
- strongSwan Project
- 0
The description strongSwan VPN Client Apk
Official Android 4+ port of the popular strongSwan VPN solution.
# FEATURES AND LIMITATIONS #
* Uses the VpnService API featured by Android 4+. Devices by some manufacturers seem to lack support for this - strongSwan VPN Client won't work on these devices!
* Uses the IKEv2 key exchange protocol (IKEv1 is not supported)
* Uses IPsec for data traffic (L2TP is not supported)
* Full support for changed connectivity and mobility through MOBIKE (or reauthentication)
* Supports username/password EAP authentication (namely EAP-MSCHAPv2, EAP-MD5 and EAP-GTC) as well as RSA/ECDSA private key/certificate authentication to authenticate users, EAP-TLS with client certificates is also supported
* Combined RSA/ECDSA and EAP authentication is supported by using two authentication rounds as defined in RFC 4739
* VPN server certificates are verified against the CA certificates pre-installed or installed by the user on the system. The CA or server certificates used to authenticate the server can also be imported directly into the app.
* IKEv2 fragmentation is supported if the VPN server supports it (strongSwan does so since 5.2.1)
* Split-tunneling allows sending only certain traffic through the VPN and/or excluding specific traffic from it
* Per-app VPN allows limiting the VPN connection to specific apps, or exclude them from using it
* The IPsec implementation currently supports the AES-CBC, AES-GCM, ChaCha20/Poly1305 and SHA1/SHA2 algorithms
* Passwords are currently stored as cleartext in the database (only if stored with a profile)
* VPN profiles may be imported from files (this is the only reason why the app requests android.permission.READ_EXTERNAL_STORAGE)
Details and a changelog can be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient
# EXAMPLE SERVER CONFIGURATION #
Example server configurations may be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient#Server-Configuration
Please note that the host name (or IP address) configured with a VPN profile in the app *must be* contained in the server certificate as subjectAltName extension.
# FEEDBACK #
Please post bug reports and feature requests on our wiki: https://wiki.strongswan.org/projects/strongswan/issues
If you do so, please include information about your device (manufacturer, model, OS version etc.).
The log file written by the key exchange service can be sent directly from within the application.
# FEATURES AND LIMITATIONS #
* Uses the VpnService API featured by Android 4+. Devices by some manufacturers seem to lack support for this - strongSwan VPN Client won't work on these devices!
* Uses the IKEv2 key exchange protocol (IKEv1 is not supported)
* Uses IPsec for data traffic (L2TP is not supported)
* Full support for changed connectivity and mobility through MOBIKE (or reauthentication)
* Supports username/password EAP authentication (namely EAP-MSCHAPv2, EAP-MD5 and EAP-GTC) as well as RSA/ECDSA private key/certificate authentication to authenticate users, EAP-TLS with client certificates is also supported
* Combined RSA/ECDSA and EAP authentication is supported by using two authentication rounds as defined in RFC 4739
* VPN server certificates are verified against the CA certificates pre-installed or installed by the user on the system. The CA or server certificates used to authenticate the server can also be imported directly into the app.
* IKEv2 fragmentation is supported if the VPN server supports it (strongSwan does so since 5.2.1)
* Split-tunneling allows sending only certain traffic through the VPN and/or excluding specific traffic from it
* Per-app VPN allows limiting the VPN connection to specific apps, or exclude them from using it
* The IPsec implementation currently supports the AES-CBC, AES-GCM, ChaCha20/Poly1305 and SHA1/SHA2 algorithms
* Passwords are currently stored as cleartext in the database (only if stored with a profile)
* VPN profiles may be imported from files (this is the only reason why the app requests android.permission.READ_EXTERNAL_STORAGE)
Details and a changelog can be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient
# EXAMPLE SERVER CONFIGURATION #
Example server configurations may be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient#Server-Configuration
Please note that the host name (or IP address) configured with a VPN profile in the app *must be* contained in the server certificate as subjectAltName extension.
# FEEDBACK #
Please post bug reports and feature requests on our wiki: https://wiki.strongswan.org/projects/strongswan/issues
If you do so, please include information about your device (manufacturer, model, OS version etc.).
The log file written by the key exchange service can be sent directly from within the application.
strongSwan VPN Client 2.3.2 APK Download BoxBack top
- 2.3.2
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- December 3, 2020
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 817976aaad49b55d86972d370575184b
- # 2.3.2 #
- Don't mark VPN connections as metered (the default changed when targeting Android 10 with the last release)
# 2.3.1 #
- Optionally use IPv6 transport addresses for IKE and ESP. Can only be enabled if the server supports UDP encapsulation for IPv6 (the Linux kernel only supports this since 5.8, so many servers will not support it yet)
- Shows an error message if the UUID in a profile is invalid (e.g. contains no dashes) - View Permissions
- 2.3.1
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- November 1, 2020
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 699c6cc923f145383941500cf53260ce
- # 2.3.1 #
- Optionally use IPv6 transport addresses for IKE and ESP. Can only be enabled if the server supports UDP encapsulation for IPv6 (the Linux kernel only supports this since 5.8, so many servers will not support it yet)
- Shows an error message if the UUID in a profile is invalid (e.g. contains no dashes)
- Fixes a potential crash with the power whitelist dialog and handles screen rotation and other Activity restarts better if the corresponding information dialog is shown - View Permissions
- 2.3.0
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- June 5, 2020
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 128748df06fc066a6487cf96fea0918c
- # 2.3.0 #
- Reachabililty in Android's deep sleep phases is improved (requires disabling battery optimizations)
- Restores the app icon on Android < 5
# 2.2.1 #
- Fixes loading CRL/OCSP via HTTP on Android 9
# 2.2.0 #
- Makes the client's IKE identity configurable also when using EAP authentication
- The certificate identity is now configured via text field with auto-completion instead of a drop-down field - View Permissions
- 2.2.1
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- November 20, 2019
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- eb1dfc68190f9203024c11e4dabc0d0b
- View Permissions
- 2.2.0
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- October 27, 2019
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 7b723ead21cb0746b6d88931b32df8a6
- View Permissions
- 2.1.1
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- April 25, 2019
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- a521c928de50763297284e50a0f864d6
- View Permissions
- 2.1.0
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- March 15, 2019
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 61ddde603cb639462ae37277a9e2085b
- View Permissions
- 1.9.6
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- February 9, 2018
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 4e0d047614981ce922ca2ad4d0c20741
- # 1.9.6 #
- Always sends the user certificate (if applicable)
# 1.9.5 #
- IKE/ESP algorithms configurable
- Removes MODP-1024 from the default IKEv2 proposal. If the server only allows this DH group, a custom IKE proposal has to be configured in the VPN profile
# 1.9.4 #
- Supports delta CRLs
# 1.9.3 #
- Verifies server certificates via OCSP
- Caches CRLs in the app directory (can be cleared via main menu)
- Adds a 'reconnect' button in the 'currently connected' dialog - View Permissions
- 1.9.5
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- November 18, 2017
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- deef040cb12d3c184c806a6431051ea4
- # 1.9.5 #
- IKE/ESP algorithms configurable
- Removes MODP-1024 from the default IKEv2 proposal. If the server only allows this DH group, a custom IKE proposal has to be configured in the VPN profile
# 1.9.4 #
- Supports delta CRLs
- Bug fixes (see website for details)
# 1.9.3 #
- Verifies server certificates via OCSP
- Caches CRLs in the app directory (can be cleared via main menu)
- Adds a 'reconnect' button in the 'currently connected' dialog - View Permissions
- 1.9.4
- Android 4.0.x - Ice Cream Sandwich (SDK: 15)
- September 18, 2017
- 4AFC1331F9086D0C0BFBE188A6AD940BCC4FA86F
- 99bcbde09c5eeb52b61f25b0f52fb8e4
- # 1.9.4 #
- Supports delta CRLs
- Bug fixes (see website for details)
# 1.9.3 #
- Verifies server certificates via OCSP
- Caches CRLs in the app directory (can be cleared via main menu)
- Adds a 'reconnect' button in the 'currently connected' dialog
# 1.9.2 #
- Split-tunneling on client (specify/exclude traffic to route via VPN)
- Per-app VPN (specify/exclude apps that use the VPN)
- Imports profiles via SAF
- Fetches CRLs via simple HTTP/S fetcher - View Permissions
10 recent comments of strongSwan VPN Client APK
More From DeveloperShow All
Copyright © 2017 APKTools. All rights reserved. Android is a trademark of Google Inc
Page generated in 0.1615 seconds
Authentication failure despite correct username and password entered carefully multiple times manually and by copying from password manager. Uninstalled. Back to Open VN for me.
Sometimes internet connection is lost in the background and you have to reconnect. Any suggestions? Otherwise, it's a solid VPN client.
On Android >= 5.0.1 there is a problem when moving between wifi and mobile networks, forcing you to restart the connection manually. I see there is an issue #865 registered in their bug tracker so guess it will be fixed soon.
Easy client side config and works great, but occasionally it'll lock up without warning, effectively killing your network connection. Opening the app to turn off the tunnel in those cases results in the phone freezing, requiring a reboot.
This supports IKEv2 key exchange allowing MOBIKE (reacquiring VPN in the background when lost) which simplifies mobile VPN life. Simple enough to use and the log file reader helps tons for troubleshooting initial setup.
Update: Fixed this by deleting the cert from the phone and re-adding it. After updating my nexus 6 to android 6.0 the VPN can no longer can load the private key.
The app works great. Just 2 questions: 1. Is the app 64 bit optimised? 2. AES-GCM is not working when I have a forced proposal in esp. There is no way to enter proposal manually in the app.
Very stable. Thanks.
Worked flawlessly with strongswan 5.x on Linux. Android built-in IPsec Xauth PSK had some weird issues on my CM 12.1 1. I lost network connectivity after a while (ping sendmsg no buffer available - I've done all TCP tuning on both Android and Linux VPN Server to no avail) 2. idle connection got closed after a while, strongSwan VPN client keeps it alive, love it! Awesome! Thanks to the developers, you guys rock.
StrongSwan does not automatically boost when my phone restarts.