This wiki has been migrated to https://gitlab.com/wireshark/wireshark/-/wikis/home and is now deprecated. Please use that site instead.
Differences between revisions 11 and 21 (spanning 10 versions)
Revision 11 as of 2008-04-12 17:50:13
Size: 2598
Editor: localhost
Comment: converted to 1.6 markup
Revision 21 as of 2013-02-16 10:47:51
Size: 5183
Editor: LTejas
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
CMP is a protocol for managing Public Key Infrastructures (PKI) based on X.509v3 certificates. Protocol messages are defined for certificate creation and management. It is used by commercial PKI products as ''Entrust Security Manager'', ''Unicert'', ''Insta Certifier'' and ''Cryptlib''. An OpenSSL client side implementation is work in progess.

== History ==
TODO:
CMP is a protocol for managing Public Key Infrastructures (PKI) based on X.509v3 certificates. Protocol messages are defined for certificate creation and management. CMP is used by commercial PKI products as ''Nexus Certificate Manager'', ''Entrust Security Manager'', ''Unicert'', ''Insta Certifier'' and ''Cryptlib''. An OpenSSL client side implementation is work in progress.
Line 9: Line 6:
 * [[TCP]]: CMP can use [[TCP]] or [[HTTP]] as its transport protocol. The well known TCP port for CMP traffic is 829.
 * While there is no implementation known supporting it, transporting CMP over email ([[SMTP]], [[POP]] etc.) or file transfer (["FTP") is also mentioned in CMPtrans (see below).
 * CMP used its own "TCP-Messaging" protocol on top of [[TCP]] in the RFC 2510 version and also in some implementations of RFC 4210. The well known TCP port for CMP traffic is 829.
 * [[HTTP]] is nowadays commonly used for for RFC 4210 implementations as the transport protocol. The Content-Type set in the HTTP header is "application/pkixcmp"
 * Some implementations might use the above mentioned transport protocols in combination, i.e. TCP-Messaging-over-HTTP. In that case, the Content-Type set in the HTTP header should be the unofficial "application/pkixcmp-poll".
 * While there is no implementation known supporting it, transporting CMP over email ([[SMTP]], [[POP]] etc.) or file transfer ([[FTP]]) is also mentioned in CMPtrans (see below).
Line 12: Line 12:
TODO: Add example traffic here (as plain text or Wireshark screenshot). {{attachment:Wireshark_1.2.9-OpenSSL_Cryptlib-CMP-Initial_Registration.png}}
Line 14: Line 14:
== Wireshark ==
TODO:
The depicted trace is available here: [[attachment:cmp_IR_sequence_OpenSSL-Cryptlib.pcap]]
Line 18: Line 17:
TODO:. {{attachment:Wireshark_1.2.9_Windows-CMP_Preferences.png}}


=== Reassemble CMP-over-TCP message spanning multiple TCP segments: ===
When this preference is enabled and when using TCP-Messaging protocol for transport, the CMP dissector will reassemble a CMP message transmitted over more than one TCP segment.

=== Alternate TCP port: ===
This preference can be used to set the TCP port for TCP-Messaging when it is different than the well-known TCP port (829) for transporting CMP, which is used by default. This default is used when the preference is set to 0.

=== Alternate HTTP port: ===
This preference can be used to set an alternate TCP port in case of HTTP transport. This option should be set either when a TCP port is used which is not configured to be HTTP or when the Content-Type of the transmitted HTTP header is wrongfully not set to "application/pkixcmp". This preverence is disabled when the value is set to 0.

=== Alternate TCP-style-HTTP port: ===
This preference can be used to set an alternate TCP port in case of TCP-messaging over HTTP transport. This option should be set either when a TCP port is used which is not configured to be HTTP or when the Content-Type of the transmitted HTTP header is wrongfully not set to (the unofficial) "application/pkixcmp-poll". This preference is disabled when the value is set to 0.
Line 21: Line 33:
 * [[attachment:SampleCaptures/cmp_IR_sequence_OpenSSL-Cryptlib.pcap]] CMP version 2 encapsulated in HTTP on port 8080. Full "Initialization Request".
 * [[attachment:SampleCaptures/cmp_IR_sequence_ OpenSSL-EJBCA.pcap]] CMP version 2 encapsulated in HTTP on port 880. Full IR, authentication with CRMF regToken.
Line 23: Line 37:
 * [[attachment:SampleCaptures/cmp_in_http_with_pkixcmp-poll_content_type.pcap.gz]] CMP version 2 encapsulated in HTTP. The CMP messages are of the deprecated but used content-type "pkixcmp-poll", so they are using the TCP transport style. In two of the four CMP messages, the content type is not explicitly set, thus they cannot be dissected correctly.
Line 29: Line 45:
Line 32: Line 49:
 . Capture only the CMP traffic over the default port (829):  . Capture only the TCP-Messaging CMP traffic over the default port (829):
Line 35: Line 52:
Line 37: Line 55:
 * [[http://tools.ietf.org/html/draft-ietf-pkix-cmp-transport-protocols-05|Last IETF CMPtrans draft]] This draft for ''CMPtrans'' is expired, hence there is '''no obligatory transport protocols spec available'''. There are obvious mistakes in it which may cause confusion. Implementations more or less adhere to it.
Line 39: Line 56:
 * [[http://tools.ietf.org/html/draft-ietf-pkix-cmp-transport-protocols|Last IETF CMPtrans draft]] This draft for ''CMPtrans'' is expired, hence there is '''no obligatory transport protocols spec available'''. There are obvious mistakes in it which may cause confusion. Implementations more or less adhere to it.

Certificate Management Protocol (CMP)

CMP is a protocol for managing Public Key Infrastructures (PKI) based on X.509v3 certificates. Protocol messages are defined for certificate creation and management. CMP is used by commercial PKI products as Nexus Certificate Manager, Entrust Security Manager, Unicert, Insta Certifier and Cryptlib. An OpenSSL client side implementation is work in progress.

Protocol dependencies

  • CMP used its own "TCP-Messaging" protocol on top of TCP in the RFC 2510 version and also in some implementations of RFC 4210. The well known TCP port for CMP traffic is 829.

  • HTTP is nowadays commonly used for for RFC 4210 implementations as the transport protocol. The Content-Type set in the HTTP header is "application/pkixcmp"

  • Some implementations might use the above mentioned transport protocols in combination, i.e. TCP-Messaging-over-HTTP. In that case, the Content-Type set in the HTTP header should be the unofficial "application/pkixcmp-poll".
  • While there is no implementation known supporting it, transporting CMP over email (SMTP, POP etc.) or file transfer (FTP) is also mentioned in CMPtrans (see below).

Example traffic

Wireshark_1.2.9-OpenSSL_Cryptlib-CMP-Initial_Registration.png

The depicted trace is available here: cmp_IR_sequence_OpenSSL-Cryptlib.pcap

Preference Settings

Wireshark_1.2.9_Windows-CMP_Preferences.png

Reassemble CMP-over-TCP message spanning multiple TCP segments:

When this preference is enabled and when using TCP-Messaging protocol for transport, the CMP dissector will reassemble a CMP message transmitted over more than one TCP segment.

Alternate TCP port:

This preference can be used to set the TCP port for TCP-Messaging when it is different than the well-known TCP port (829) for transporting CMP, which is used by default. This default is used when the preference is set to 0.

Alternate HTTP port:

This preference can be used to set an alternate TCP port in case of HTTP transport. This option should be set either when a TCP port is used which is not configured to be HTTP or when the Content-Type of the transmitted HTTP header is wrongfully not set to "application/pkixcmp". This preverence is disabled when the value is set to 0.

Alternate TCP-style-HTTP port:

This preference can be used to set an alternate TCP port in case of TCP-messaging over HTTP transport. This option should be set either when a TCP port is used which is not configured to be HTTP or when the Content-Type of the transmitted HTTP header is wrongfully not set to (the unofficial) "application/pkixcmp-poll". This preference is disabled when the value is set to 0.

Example capture file

Display Filter

A complete list of CMP display filter fields can be found in the display filter reference

  • Show only the CMP based traffic:
     cmp 

Capture Filter

You cannot directly filter CMP while capturing. However, if you know the TCP port used (see above), you can filter on that one.

  • Capture only the TCP-Messaging CMP traffic over the default port (829):
     tcp port 829 

  • RFC 4210 Internet X.509 Public Key Infrastructure Certificate Management Protocols. This version obsoletes RFC 2510. According to the new RFC, the CMP transport protocol issues are handled in the separate CMPtrans document.

  • RFC 4211 Certificate Request Message Format is more or less bound to CMP. This Version obsoletes RFC 2511 and is used by RFC 4210

  • Last IETF CMPtrans draft This draft for CMPtrans is expired, hence there is no obligatory transport protocols spec available. There are obvious mistakes in it which may cause confusion. Implementations more or less adhere to it.

CMP (last edited 2013-02-16 10:47:51 by LTejas)