Please answer the following questions for yourself before submitting an issue
AdGuard version
2.18.0.2089
Browser version
n/a
OS version
macOS Tahoe 26.3.1
Ad Blocking
No response
Privacy
No response
Social
No response
Annoyances
No response
Security
No response
Other
No response
Language-specific
No response
Which DNS server do you use?
DNS protection disabled
DNS protocol
None
Custom DNS
No response
What Stealth Mode options do you have enabled?
No response
Support ticket ID
No response
Issue Details
With network.https.ocsp.check set to true, AdGuard for Mac still establishes connections to servers whose TLS certificates have been revoked. The revocation status is confirmed by the server itself via OCSP Stapling, by an independent OCSP query, and by asset management tools.
Steps to reproduce:
- Set
network.https.ocsp.check to true in Advanced Settings.
- Visit
https://www.reiner-sct.com (certificate is currently revoked).
- AdGuard establishes the connection without warning or blocking.
Expected behavior:
AdGuard should detect the revoked certificate and block the connection, as documented: "If the certificate is revoked, current and future connections to the domain will be blocked."
Actual behavior:
The connection is established normally. No warning, no blocking.
Evidence:
The server delivers an OCSP Stapled Response with status revoked during the TLS handshake:
OCSP Response Status: successful (0x0)
Responder Id: C = DE, O = D-Trust GmbH, CN = D-TRUST OCSP 23 SSL Class 3 CA 1 EV 2009
Produced At: Apr 7 11:48:42 2026 GMT
Serial Number: 48B1F99AFF3C9ECFC336FAB2566B4D20
Cert Status: revoked
Verified independently via:
openssl s_client -status (stapled response shows revoked)
- Direct OCSP query to the CA responder (returns revoked)
- Asset management tooling (reports revoked)
Impact:
This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.
Expected Behavior
No response
Actual Behavior
This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.
Screenshots
Screenshot 1
Additional Information
No response
Please answer the following questions for yourself before submitting an issue
AdGuard version
2.18.0.2089
Browser version
n/a
OS version
macOS Tahoe 26.3.1
Ad Blocking
No response
Privacy
No response
Social
No response
Annoyances
No response
Security
No response
Other
No response
Language-specific
No response
Which DNS server do you use?
DNS protection disabled
DNS protocol
None
Custom DNS
No response
What Stealth Mode options do you have enabled?
No response
Support ticket ID
No response
Issue Details
With
network.https.ocsp.checkset totrue, AdGuard for Mac still establishes connections to servers whose TLS certificates have been revoked. The revocation status is confirmed by the server itself via OCSP Stapling, by an independent OCSP query, and by asset management tools.Steps to reproduce:
network.https.ocsp.checktotruein Advanced Settings.https://www.reiner-sct.com(certificate is currently revoked).Expected behavior:
AdGuard should detect the revoked certificate and block the connection, as documented: "If the certificate is revoked, current and future connections to the domain will be blocked."
Actual behavior:
The connection is established normally. No warning, no blocking.
Evidence:
The server delivers an OCSP Stapled Response with status
revokedduring the TLS handshake:Verified independently via:
openssl s_client -status(stapled response shows revoked)Impact:
This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.
Expected Behavior
No response
Actual Behavior
This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.
Screenshots
Screenshot 1
Additional Information
No response