- What happens when a certificate is revoked?
- The CA adds the certificate's serial number to its CRL and OCSP responses. Properly checking clients (browsers, server TLS libraries) refuse connections presenting revoked certificates. However, many clients cache old CRLs or skip revocation checking for performance.
- Does every browser check CRLs?
- Modern browsers largely do not check individual CRLs for performance reasons. Chrome uses CRLSets (pre-downloaded revocation lists for high-value certificates). Firefox uses CRLite (a probabilistic filter). Safari and Edge use OS-level revocation checking.
- How long does certificate revocation take to propagate?
- CRL propagation depends on CRL TTL (typically 1-7 days). OCSP is near-real-time but subject to caching (15-60 minutes). For immediate effect after a private key compromise, contact your CA for emergency revocation and notify affected clients directly.