Skip to main content

Questions tagged [certificate-revocation]

Certificate Revocation is a process for reporting that a certificate should no longer be trusted to the cert's issuing CA. The CA then places the cert on its CRL, and responds "REVOKED" to any OCSP requests for that cert. Normally only the owner of the cert (holder of the private key) can revoke a cert, though in special circumstances a CA can revoke a cert directly.

2 votes
0 answers
212 views

This webpage by Apple appears to list the certificates that their products automatically treat as untrusted by default. Are there similar resources for other platforms and/or browsers? On this site, ...
Daniel S's user avatar
  • 121
5 votes
2 answers
1k views

I understand that each certificate can have a CRL distribution point (extension 2.5.29.31) – or even multiple ones, but let's not consider that for the moment. Let's assume we have a root CA > ...
not2savvy's user avatar
  • 824
2 votes
1 answer
251 views

My mind has been blown by my learning the last few days...it seems that browser handling of CA CRLs and OCSP checking has so much variation present. I'm experimenting with my own root CA, with ...
Brian's user avatar
  • 121
2 votes
1 answer
312 views

Systems like Certificate Transparency and Key transparency store trees of keys/certificates. How would a user be able to remove a fraudulent/expired key or certificate? Do the trees stay the same and ...
somehybrid's user avatar
1 vote
2 answers
283 views

I am reading about how certificates work in the context of X.509, SSL/TLS/HTTPS. According to Wikipedia, the client (e.g. a browser) is supposed to check the revocation status for each non-root ...
paperskilltrees's user avatar
1 vote
0 answers
104 views

When I first generated my GPG key I created a revocation certificate for it as well. Now I've edited my key and its subkeys and updated their expiration. Do I need to generate a new revocation ...
Rob's user avatar
  • 78
0 votes
1 answer
2k views

I'm new and I'm trying to understand default_crl_days. The default is 30 days thus does it mean after 30 days, the CRL list can no longer be trusted? If so, do we need to generate a new list before 30 ...
ratib90486's user avatar
0 votes
1 answer
147 views

For example, consider https://www.cloudflare.com/ssl/ where I can get a free SSL cert. If I create a cloudflare account and get an cert but delete my cloudflare account, is the cert auto-revoked? What ...
bli00's user avatar
  • 115
27 votes
4 answers
6k views

A valid certificate cannot guarantee that I'm not being MITM'd right now, as either the private key or CA may have been compromised. For this reason, I have to contact a CA through CRL/OCSP to check ...
David Davidson's user avatar
0 votes
1 answer
622 views

I'm learning for the first time the concept of revoking certificates. I created a certificate with openssl then I tried to revoke it. But my revoke command causes an error. Here's what I did # ...
learningtech's user avatar
4 votes
2 answers
398 views

CRL lists the revoked certificates of a CA by sending back to the user the Serial Number of each certificate, nothing related to the public key. I don't know how it works for OCSP. Is there a ...
Antonin M.'s user avatar
5 votes
1 answer
2k views

I know that modern web browsers don't check CRLs for certificates from CAs in the default trust store anymore. I also know that there are some exceptions for certificate validation when it comes to ...
Ludwig Behm's user avatar
0 votes
2 answers
604 views

This question is specifically about certificates that should have had a long lifetime, but were revoked quickly. Is every CRL issued by this CA guaranteed to include its revocation, as long as the ...
Towdo's user avatar
  • 3
1 vote
0 answers
374 views

I have an assignment in which I have to implement OCSP and do a proof of concept of a vulnerability. My idea was to implement OCSP without using a nonce (this is done) and then perform a replay attack....
Pedro's user avatar
  • 11
1 vote
5 answers
932 views

Imagine the following scenario: We have Bob that wants to send a message to Alice. Both have a public/private key. Bob uses his private key to sign the digest (hash of the message) with it's private ...
muyat's user avatar
  • 13

15 30 50 per page
1
2 3 4 5
13