My bet is that the program you used is extremely old that it stills requires CRL information. Let’s Encrypt certificate doesn’t use CRL, only OCSP is available.
I don’t think Let’s Encrypt is able to do anything about that, as they issue many certificates everyday and if they publish a CRL it would definitely be massive. You might be able to ask on Microsoft forums or find another we browser control solution…
I think I found that reason , China great firewall forbidden ocsp.int-x3.letsencrypt.org .
that’s very sad , I will pay on certificate by change let’s encrypt .
First ,that applications use windows browser control will visite ocsp.int-x3.letsencrypt.org:80 , but in china now , ocsp.int-x3.letsencrypt.org has been forbidden .
so the applications can not trust the certificate issed by letsencrypt.
I think I found that reason , China great firewall forbidden ocsp.int-x3.letsencrypt.org on April.
that’s very sad , I will pay on certificate by change let’s encrypt .
First ,that applications use windows browser control will visite ocsp.int-x3.letsencrypt.org:80 , but in china now , ocsp.int-x3.letsencrypt.org has been forbidden .
so the applications can not trust the certificate issed by letsencrypt.
I think I found that reason , China great firewall forbidden ocsp.int-x3.letsencrypt.org .
that’s very sad , I will pay on certificate by change let’s encrypt .
First ,that applications use windows browser control will visite ocsp.int-x3.letsencrypt.org:80 , but in china now , ocsp.int-x3.letsencrypt.org has been forbidden .
so the applications can not trust the certificate issed by letsencrypt.
Maybe letsencrypt can change OCSP domain name to pass china DNS pollution? Muti OCSP domains is better solution.
In china ,a large number sites use letsencrypt, pls give a help.
Maybe letsencrypt can change OCSP domain name to pass china DNS pollution? Muti OCSP domains is better solution.
In china ,a large number sites use letsencrypt, pls give a help.
First of all, it’s just like GitHub’s usercontent domain… (But it’s Akamai’s fault, isn’t it?)
I think this is something Akamai might already working on… As the article said, the issue is on A711, not on Let’s Encrypt.
@lestaff: Some users in China mainland are unable to use Let’s Encrypt’s OCSP endpoint (due to something? in Akamai’s end). Is there anyway to bypass it?
Thanks for your suggestion, I have set ssl stapling on to bypass the letsencrypt OCSP dns pollution in china .
I use nginx , I hope ssl stapling strong, not have DDOS bug , I don’t know the nginx whether cache or not cache the response from OCSP server.
OCSP stapling will indeed help, however there are also servers in China that uses Let’s Encrypt certificate. Those servers are certainly not able to access Let’s Encrypt OCSP endpoints, which means the stapling will only work for visitors, not website owners.
I honestly don't think this is easy (if possible) ... Imagine you are asking CloudFlare to switch their main website to Akamai because "Cloudflare has some bad IP ranges".