Certificate Lifecycle Management
The Hidden Risks of Expired Certificate Revocation Lists (CRL)

Certificate Lifecycle Management
Digital certificates play a crucial role in web security and public key infrastructure, ensuring secure internet communication. These certificates act like digital identifications that verify a website’s legitimacy. Now, consider a scenario where you try to access a website, but unknown to you, the certificate validating this site has been compromised. This oversight opens a back door for hackers to intercept your sensitive information.
To address such risks, every certificate has a finite validity period during which it is considered as trusted. However, during this time, situations may arise where the owner or the Certification authority that issued the certificate may declare it as untrusted. For example, if the private key of the certificate is compromised or if the owner of the certificate no longer controls the domain for which the certificate was issued, then the certificate becomes a liability.
In such case the untrusted certificate is revoked and the certificate users are informed about the revocation. This is done by adding the given certificate to a Certificate Revocation List. A CRL is simply a blacklist managed by the CA that lists the certificates which should not be trusted and are no longer valid. Although these CRLs maintain trust in the PKI infrastructure, an expired CRL can present us with hidden risks and challenges that can undermine this trust.
CRL is the only way for the PKI to know whether a certificate has been revoked before its expiry. While PKI provides a list of trusted users through issued certificates, it is also very important to know the ones who are no longer trustworthy. CRL serves this very purpose by listing the certificates revoked before expiry.
The entity that has been issued the certificate, detects that the certificate needs to be revoked that could be due to compromise, misuse, etc. sends a revocation request to the issuing CA. This request typically includes the certificate serial number and the reason for revocation.
Then, the CA verifies the authenticity of that revocation request and once the request is validated, it marks the certificate as revoked in its internal records.
After that, the CA adds the revoked certificates to the list and updates the CRL. The integrity of the revised CRL is then verified by having the CA’s private key sign it.
The signed CRL is published and made available to the public and other entities that rely on the certificates issued by the CA. This is done through various methods, like publishing on a web server, distributing via LDAP.
Browsers, servers verify the status of certificates by periodically downloading the CRL from the specified location.
Now when any browser or server encounters a certificate it checks its serial number against the downloaded CRL. In case the certificate is found in the CRL it is considered as revoked.
The Certificate revocation list is made available by the Certification Authority at a specific distribution point, also available with the certificates.
If you have the digital certificate downloaded then you can open it or if it’s the certificate with a website then click on the PADLOCK icon next to the URL and follow the given steps:
If a CRL is outdated or expired, systems that are relying on it may not be aware about the recent revocation updates. This would mean that a compromised or an invalid certificate could be accepted by the systems trusting it and would lead to a vulnerability waiting to be exploited by hackers.
Many of the applications and servers are hardened to always check for the CRL before accepting the certificate. Now if the CRL is expired, these machines, might just reject the certificates automatically, leading to outages and interruptions. Regulatory standard often mandate to use an up-to-date CRL. Non-compliance to the standards might lead to financial losses to the organization.
If a server is unable to reliably verify the status of a digital certificate, it risks the trust in digital communication and leads to revenue losses for the organization as users and systems can no longer be completely sure about the integrity of certificates.
To mitigate and monitor these risks, CertSecure Manger offers PKI health view to pre detect and monitor such failures. Following is the detailed explanation on how CertSecure Manager helps in resolving these complications:
CertSecure performs a detailed check of all the Certification authority components and showcases all the CDP, AIA along with the remaining days for the Certificate revocation list. If a failure is detected, the solution automatically alerts the admins about the issue.
In Conclusion, a Certificate Revocation List maintains the digital communication secure by promptly revoking compromised / invalid certificates. It is an effective solution to ensure the trust and integrity of the overall web communication. But an expired, offline or incorrectly configured CRL can result into service interruptions and outages.
Thus, using a CLM solution like CertSecure helps in centrally monitoring the digital certificates and CRLs across the organization. This would further help in preventing outages, decreasing downtime and saving the potentially costly remediation.
February 11, 2025
February 6, 2025
December 24, 2024