Filename extension | .crl |
---|---|
Internet media type |
application/pkix-crl |
Initial release | May 1999 |
Container for | X.509 CRLs |
Standard | RFC 2585 |
Website | https://www.iana.org/assignments/media-types/application/pkix-crl |
In cryptography, a certificate revocation list (CRL) is "a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their scheduled expiration date and should no longer be trusted".[1]
Publicly trusted CAs in the Web PKI are required (including by the CA/Browser forum[2]) to issue CRLs for their certificates, and they widely do.[3]
Browsers and other relying parties might use CRLs, or might use alternate certificate revocation technologies (such as OCSP)[4][5] or CRLSets (a dataset derived from CRLs[6]) to check certificate revocation status. Note that OCSP is falling out of favor due to privacy and performance concerns[7][8][9].
Subscribers and other parties can also use ARI.[10]
:0
was invoked but never defined (see the help page).In lieu of, or as a supplement to, checking against a periodic CRL, it may be necessary to obtain timely information regarding the revocation status of certificates. ... OCSP may be used to satisfy some of the operational requirements of providing more timely revocation information than is possible with CRLs and may also be used to obtain additional status information.