How is issuing a certificate revocation response different from re-issuing the certificate itself?

I am reading about how certificates work in the context of X.509, SSL/TLS/HTTPS. According to Wikipedia, the client (e.g. a browser) is supposed to check the revocation status for each non-root certificate as a part of certification path v… Continue reading How is issuing a certificate revocation response different from re-issuing the certificate itself?

What is default_crl_days in OpenSSL and recommended days?

I’m new and I’m trying to understand default_crl_days. The default is 30 days thus does it mean after 30 days, the CRL list can no longer be trusted? If so, do we need to generate a new list before 30 days is up?
And what would be the reco… Continue reading What is default_crl_days in OpenSSL and recommended days?

Do current browsers still validate CRLs in enterprise PKI environments

I know that modern web browsers don’t check CRLs for certificates from CAs in the default trust store anymore.
I also know that there are some exceptions for certificate validation when it comes to corporation / enterprise PKIs. For exampl… Continue reading Do current browsers still validate CRLs in enterprise PKI environments

Does a certificate revocation list (CRL) keep it’s entries at least as long as the certificate would have been valid?

This question is specifically about certificates that should have had a long lifetime, but were revoked quickly.
Is every CRL issued by this CA guaranteed to include its revocation, as long as the original certificate would still be valid?… Continue reading Does a certificate revocation list (CRL) keep it’s entries at least as long as the certificate would have been valid?