I think this more of an issuance policy question. Let me know if the "Help" category is more appropriate.
In the post here on ending OCSP support Ending OCSP Support in 2025 - Let's Encrypt it says:
May 7, 2025
- Prior to this date we will have added CRL URLs to certificates
;tldr my questions
- Is the format of the CRL URL that will be added to certificates already known? Will it be
http://<intermediate>.c.lencr.org
likehttp://r11.c.lencr.org
? If not do we know when this will be decided? - Any update on the timeline at which CRLs will be added to certificates. It has to be pretty soon to be before the May 7 deadline. Ideally OCSP isn't dropped at the same time as CRL is added.
Background
We have consumers of our certificates that make server to server calls (not browsers) that have very locked down infrastructure. So much so that when making external calls to our website they have to allowlist the OCSP end points today so their infrastructure can check the OCSP end points. This has been difficult for us to manage as the OCSP end points are different for each intermediate. Some of these consumers refuse to allow list a wildcard domain in the form of r*.o.lencr.org
or *.o.lencr.org
and instead we have to carefully monitor for when new intermediates are added by Let's Encrypt to let these consumers know ahead of time what the new hosts will be.
- To that end. Is the format of the CRL URL that will be added to certificates already known? Will it be
http://<intermediate>.c.lencr.org
likehttp://r11.c.lencr.org
? If not, do we know when this will be decided?
Related to these consumers. Something we are still trying piece together is how different server infrastructure handles certificates that have both OCSP and CRL on the cert. It seems like most of the communication out of LE is focused on browser consumers which is fair but server infrastructure handling is much more varied between code languages and server implementations. I'm not asking for help on specifics around OCSP vs CRL handling but asking:
- Any update on the timeline at which CRLs will be added to certificates. It has to be pretty soon to be before the May 7 deadline. Ideally OCSP isn't dropped at the same time as CRL is added.
In an ideal world I would have loved to have the ability to send something with my certificate request to have the CRL end point added to the cert in addition to OCSP end point before it was the only way it would be. That way we could test handling by different client and server libraries to how having both extensions in place working.