- Adds a button to install user certificates
# 2.3.2 #
- Don't mark VPN connections as metered (the default changed when targeting Android 10 with the last release)
# 2.3.1 #
- Optionally use IPv6 transport addresses for IKE and ESP. Can only be enabled if the server supports UDP encapsulation for IPv6 (the Linux kernel only supports this since 5.8, so many servers will not support it yet)
# FEATURES AND LIMITATIONS #
- Uses the VpnService API featured by Android 4+. Devices by some manufacturers seem to lack support for this - strongSwan VPN Client won't work on these devices!
- Uses the IKEv2 key exchange protocol (IKEv1 is not supported)
- Uses IPsec for data traffic (L2TP is not supported)
- Full support for changed connectivity and mobility through MOBIKE (or reauthentication)
- Supports username/password EAP authentication (namely EAP-MSCHAPv2, EAP-MD5 and EAP-GTC) as well as RSA/ECDSA private key/certificate authentication to authenticate users, EAP-TLS with client certificates is also supported
- Combined RSA/ECDSA and EAP authentication is supported by using two authentication rounds as defined in RFC 4739
- VPN server certificates are verified against the CA certificates pre-installed or installed by the user on the system. The CA or server certificates used to authenticate the server can also be imported directly into the app.
- IKEv2 fragmentation is supported if the VPN server supports it (strongSwan does so since 5.2.1)
- Split-tunneling allows sending only certain traffic through the VPN and/or excluding specific traffic from it
- Per-app VPN allows limiting the VPN connection to specific apps, or exclude them from using it
- The IPsec implementation currently supports the AES-CBC, AES-GCM, ChaCha20/Poly1305 and SHA1/SHA2 algorithms
- Passwords are currently stored as cleartext in the database (only if stored with a profile)
- VPN profiles may be imported from files
Details and a changelog can be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient
# PERMISSIONS #
- READ_EXTERNAL_STORAGE: Allows importing VPN profiles and CA certificates from external storage on some Android versions
- QUERY_ALL_PACKAGES: Required on Android 11+ to select apps to ex-/include in VPN profiles and the optional EAP-TNC use case
# EXAMPLE SERVER CONFIGURATION #
Example server configurations may be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient#Server-Configuration
Please note that the host name (or IP address) configured with a VPN profile in the app *must be* contained in the server certificate as subjectAltName extension.
# FEEDBACK #
Please post bug reports and feature requests via GitHub: https://github.com/strongswan/strongswan/issues/new/choose
If you do so, please include information about your device (manufacturer, model, OS version etc.).
The log file written by the key exchange service can be sent directly from within the application.
Although APK downloads are available below to give you the choice, you should be aware that by installing that way you will not receive update notifications and it's a less secure way to download. We recommend that you install the F-Droid client and use that.Download F-Droid
This version requires Android 4.0.3 or newer.
It is built and signed by F-Droid, and guaranteed to correspond to this source tarball.
have full network accessAllows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
view network connectionsAllows the app to view information about network connections such as which networks exist and are connected.
run foreground serviceAllows the app to make use of foreground services.
read the contents of your shared storageAllows the app to read the contents of your shared storage.
ask to ignore battery optimizationsAllows an app to ask for permission to ignore battery optimizations for that app.