Revocation of X.509 Certificates

· privacy · Source ↗

TLDR

  • X.509 certificate revocation is structurally broken: CRLs lag by days, OCSP has privacy and reliability problems, and no fix has full deployment.

Key Takeaways

  • CRLs list all unexpired revoked serial numbers; the example Let’s Encrypt CRL had a 9-day window where relying parties could remain unaware of a revocation.
  • OCSP stapling shifts status delivery to the server, but servers can omit it and clients must decide whether to hard-fail or soft-fail on missing responses.
  • Mozilla’s CRLite compresses a 6.7GB full CRL dataset into a 1.3MB Bloom filter; delta updates on a 6-hour interval run roughly 60kB each.
  • Let’s Encrypt is shortening cert lifetimes further in May 2026, which reduces revocation exposure windows but increases issuance and renewal churn.
  • DANE (RFC 6698) could replace CA-based revocation by anchoring cert identity in DNS, but requires DNSSEC, which remains sparsely deployed.

Hacker News Comment Review

  • Commenters pushed back on the claim that CRLs must grow large: Entrust’s original design used issuing distribution points so each CRL shard stayed small even at CA scale.
  • There is consensus that DANE is the cleanest architectural fix but DNSSEC adoption is the real blocker, not CA industry resistance alone.
  • One commenter flagged the article’s structure as circular and noted a conceptual confusion around why OCSP status decisions are deferred to clients rather than servers terminating bad sessions directly.

Notable Comments

  • @bblb: “DNS and PKI. Two of the most centralized services in the Internet. Take over both of them, and you have the whole net under your command.”
  • @Parodper: Points out the irony that X.509 revocation problems are being solved via DNS, a substitute for X.500 – the directory system X.509 was originally designed to work with.

Original | Discuss on HN