What is CMPv2

Certificate enrolment over Certificate Management Protocol (CMPv2) is a standardized protocol defined in RFC 4210 for managing X.509 certificates. CMPv2 is widely used for automating certificate lifecycle operations such as enrolment, renewal, and revocation. Note that RFC 9480 and RFC9481 provide updates to RFC 4210.

What is 3GPP

3GPP (3rd Generation Partnership Project) is a collaboration between telecommunications standards bodies that develops protocols for mobile telephony. This includes:

  • GSM (2G)
  • UMTS (3G)
  • LTE (4G)
  • 5G NR (New Radio)

3GPP defines standards for:

  • Radio access networks (RAN)
  • Core Networks (e.g. EPC for LTE, 5GC for 5G)
  • Service capabilities
  • Security frameworks (including authentication, encryption and identity management)

3GPP and CMP

In 3GPP standards, especially in 5G and LTE network security, CMP plays a role in certificate lifecycle management for:

Network Functions (NFs) Authentication:

  • 3GPP introduces Service-Based Architecture (SBA) in 5G, where network functions communicate using HTTPS and mutual TLS. CMP is used to provision and manage 509 certificates for these NFs.

gNB (Radio Access Network) and Core Network Communication:

  • The gNB (5G base station) requires certificates to securely communicate with the 5G core network. CMP is used during bootstrap or rekeying to:
    • Request new certificates
    • Update expiring certificates

UICC and eSIM profiles:

  • For remotely provisioned UICC (SIM card) or eSIMs, CMP may be used to securely provision device certificates to enable mutual authentication with the network, especially for IoT devices.

CMP References within 3GPP

  • CMP is referenced in:
    • 3GPP TS 33.310 (Security aspects of the 3GPP access network).
    • 3GPP TS 33.210 (Security architecture and procedures for access network entities)
    • 3GPP TS 33.501 (Security architecture and procedures for 5G system)

3GPP TS 33.310 – Security for Network Elements Using PKI

TS 33.310 defines the use of Public Key Infrastructure (PKI) for authenticating network elements in 3G and 4G (LTE) networks. It outlines how X.509 certificates are issued, managed, and validated using CMPv2 (RFC 4210).

CMP is used with TS 33.310 for:

Certificate Enrolment and Management:

  • CMP is used by network elements (e.g. eNodeB, MME, HSS) to:
    • request initial certificates
    • Update or revoke certificates
    • Retrieve CA certificates and CRLs

Entities involved:

  • End Entity (EE): The network node (e.g., base station) requesting a certificate.
  • RA (Registration Authority): Optional intermediary for policy enforcement.
  • CA (Certification Authority): Issues and manages certificates.
  • CMP Server: Interfaces with the CA/RA to handle CMP messages.

Transport Mechanism

  • CMP messages are typically sent over HTTP or HTTPS, as specified in RFC 6712.

Security of CMP Messages

  • CMP messages are protected using password-based MAC (for bootstrapping) or certificate-based protection (for renewal and revocation).

Bootstrap and Renewal Process

  • Bootstrap: The EE authenticates using a shared secret to get its first certificate.
  • Renewal: The EE uses its current certificate to request a new one.

3GPP TS 33.501

TS 33.501 defines the comprehensive security architecture for the 5G System (5GS), including authentication, integrity, encryption, and secure service communication.

CMP is used with TS 33.501 for:

Used for SBA (Service-Based Architecture)

  • CMP is used for provisioning and managing certificates for Network Functions (NFs) in the 5GC.
  • Each NF (like AMF, SMF, PCF) must have an X.509 certificate for establishing mutual TLS (mTLS) connections.

CMP-Based Certificate Operations

  • Similar to TS 33.310, the same CMP operations are followed: enrolment, update, revocation.
  • Certificates can also be pre-provisioned or dynamically obtained using CMP

Support for multiple PKI Domains

  • The architecture allows multiple CAs and PKI domains (e.g., per operator, per trust domain).
  • CMP ensures that each domain can manage its certificates securely and independently

Enhanced CMP Usage for IoT and Edge:

  • In edge deployments or with constrained devices (like UE or IoT), CMP is simplified or optimized using gateway-based solutions (e.g., proxy RA).
AspectTS 33.310TS 33.501
Scope3G/4G network element PKI5G Network Function (NF) security
CMP UseCertificate issuance, update, revocationSame, plus dynamic NF certificate management
TransportCMP over HTTP/HTTPS (RFC6712)Same
AuthenticationMAC (bootstrap) and certificate basedSame, with optional pre-provisioning
Key EntitiesEE, RA, CA, CMP ServerNF, SEPP, NRF, UDM, CA

Role of CMP in 3GPP Environments

CMP is the standard protocol used to securely manage certificates across network entities. It is referenced in multiple 3GPP specifications, notably:

  • TS 33.310 – for LTE/4G and general PKI-based security
  • TS 33.501 – for 5G networks, particularly Service-Based Architecture (SBA)

Key Components involved

ComponentDescription
End Entity (EE)The node requesting a certificate (e.g. eNodeB, gNB, AMF, UDM)
Registration Authority (RA)Optional intermediary to validate and forward requests
Certification Authority (CA)Issues and revokes certificates
CMP ServerImplements CMP Endpoints for handling protocol messages

CMP Message Exchange Use Cases

Initial Enrolment (Bootstrap)

  • A network element (e.g., a gNB) generates a key pair and sends a CMP Initialization Request (IR) to the CA or via an RA.
  • Authentication can be:
    • Shared secret (MAC-based) for first-time setup; or
    • existing certificate for renewal scenarios
  • CA returns a certificate via an Initialisation Response (IP)

Certificate Renewal

  • An entity with a valid certificate signs a CMP Key Update Request (KUR).
  • CA verifies and returns the new certificate, replacing the old one.

Certificate Revocation

  • The entity (or RA) sends a Revocation Request (RR) when a key is compromised or no longer needed.
  • CA responds with a Revocation Response (RP) and updates the CRL.

CA Certificate and CRL Retrieval

  • Entities can request CA certificates or CRLs using CMP messages to keep trust anchors and revocation lists up to date.

CMP in Specific 3GPP Use Cases

In LTE / TS 33.310

  • eNodeBs use CMP to get certificates used for IPSec tunnels to the EPC.
  • Certificates authenticate:
    • Certificates authenticate
    • MME to HSS, etc.

In 5G / TS 33.501

  • Used for mTLS setup in SBA.
  • All network functions (e.g., AMF, SMF, PCF, AUSF) require valid certificates for service discovery and secure communication.
  • CMP enables:
    • Dynamic certificate provisioning
    • Rotation without downtime
    • Integration into operator PKI or third-party trust models

CMP Message flow in 3GPP

[EE (e.g., gNB)] —> IR —> [RA/CMP Server] —> [CA]

[CA] —> IP —> [RA/CMP Server] —> [EE]

  • Messages can be transported over HTTP(S) as per [RFC 6712]
  • TLS protection is used for CMP over HTTPS, and the messages themselves can be signed/encrypted using CMS

Benefits of CMP in 3GPP

  • Automated certificate management.
  • Secure and scalable in distributed network environments
  • Compliant with Zero Trust principles
  • Supports network slicing and multi-domain PKI

TLS bootstrapping and Mutual Authentication

The processes described here enable secure mutual TLS (mTLS) between two NFs (e.g., AMF and SMF), where both use X.509 certificates provisioned via the Certificate Management Protocol (CMP

Key Components Involved

ComponentRole
NF (e.g. AMF)A network function that must authenticate and communicate securely
NF (e.g. SMF)The peer network function
PKI SystemIncludes CA and optionally an RA
CMP ServerEndpoints (CA.RA) supporting CMP over HTTP(S)
Network Repository Function (NRF)Registers in the NF and shares end point / service information
Service-Based Interfaces (SBI)Use HTTPS with mTLS for communication

Step by Step Walkthrough:

  1. Key Generation:
    1. Each NF (e.g. AMF) generates:
      1. A key pair (public and private)
      2. A Certificate Signing Request (CSR) wrapped in a CMP Initialization Request (IR) message.

NF Generates: Public key + Private key -> wraps in CMP IR Message

  1. Initialization Request via CMP:
    1. The CMP IR includes:
      1. Subject name (NF ID, domain etc.)
      2. Public key info
  • Proof of Possession of private key
  1. Optional authentication data (e.g. shared secret or certificate-based)
  1. The IR is sent to the CMP Server over the HTTP(S).

NF -> CMP -> RA/CMP Server -> CA

  1. Certificate Issuance:
    1. The CA:
      1. validates the request (via RA if applicable)
      2. Verifies proof of possession.
  • Issues the certificate.
  1. The CA replies with a CMP Initialization Response (IP) containing:
    1. X.509 Certificate
    2. Optionally, a CA chain and CRL pointers

CA -> CMP IP -> RA/CMP Server -> NF

  1. Certificate Installation:
    1. The NF(e.g. AMF):
      1. Stores the certificate
      2. Stores the private key securely
  • Associates it with the CA trust anchor.
  1. Optionally fetches CRLs or OCSP stapling information
  1. The NF is ready to authenticate using its identity certificate.
  1. NF Registration with NRF
    1. The NF uses the certificate to register itself with the Network Registry Function (NRF) over mTLS

AMF -> HTTPS (mTLS) -> NRF

  1. The NRF stores the identity and the TLS endpoint of the AMF
  1. Mutual TLS with Peer NF
    1. Another NF (e.g. SMF) also having completed CMP provisioning, queries the NRF and discovers the AMF’s endpoint.
    2. The SMF initiates an HTTPS connection with the AMF using mutual TLS:
      1. Both ends present their certificates
      2. The TLS handshakes verify both identities using the certificates and trust anchors.

SMF > HTTPS (mutual TLS) > AMF

Certificate Renewal via CMP

Before expiration:

  • The NF sends a CMP Key Update Request (KUR)
  • Receives a new certificate in the Key Update Response (KUP).

Having this process automated avoids downtime due to certificate expiration.

Security Notes

  • CMP messages are signed or MAC-protected to prevent tampering
  • CA certificates and revocation data (CRL/OCSP) must be verified regularly.
  • Certificates used must comply with TS 33.310 format including proper Subject fields and extensions.

Summary of Certificate Format

3GPP mandates the use of X.509 v3 certificates as per [ITU-T X.509 (2016)] and [RFC 5280].

Key fields and structure

FieldDescription
VersionMust be v3 (value = 2)
Serial NumberUnique identifier assigned by the CA
Signature AlgorithmE.g. sha256WithRSAEncryption, ecdsa-with-SHA256
IssuerDistinguished Name (DN) of the issuing CA
ValidityNot before / Not after timestamps
SubjectDN of the entity (e.g. CN=AMF1.Ops.5G.example.com)
Subject Public Key infoPublic key algorithm and value (e.g., RSA 2048-bit or EC P-256)
ExtensionsV3-specific info (see below)
SignatureSignature over the tbsCertificate using CA’s private key

Mandatory v3 Extensions in TS 33.310

TS 33.310 mandates specific extensions to support interoperability and security within telecom networks:

ExtensionRequiredCriticalNotes
BasicConstraintsYesYesCA:FALSE for end-entity certs
KeyUsageYesYesdigitalSignature, keyEncipherment (or keyAgreement)
ExtendedKeyUsage (EKU)YesNoE.g., id-kp-serverAuth, id-kp-clientAuth
SubjectAltNameYesNoFully Qualified Domain Name (FQDN) or IP Address of the NF
AuthorityKeyIdentifierYesNoKey ID of the Issuing CA
Subject Key IdentifierYesNoUnique hash of subject public key
CRLDistributionPointsYesNoURI of CRL
Autthroity Information AccessOptionalNoOCSP URI or CA issuer URL