Skip to content

OCSP revocation check does not block connections to sites with revoked certificates #2069

@man-pro

Description

@man-pro

Please answer the following questions for yourself before submitting an issue

  • Filters were updated before reproducing an issue
  • I checked the knowledge base and found no answer
  • I checked to make sure that this issue has not already been filed

AdGuard version

2.18.0.2089

Browser version

n/a

OS version

macOS Tahoe 26.3.1

Ad Blocking

No response

Privacy

No response

Social

No response

Annoyances

No response

Security

No response

Other

No response

Language-specific

No response

Which DNS server do you use?

DNS protection disabled

DNS protocol

None

Custom DNS

No response

What Stealth Mode options do you have enabled?

No response

Support ticket ID

No response

Issue Details

With network.https.ocsp.check set to true, AdGuard for Mac still establishes connections to servers whose TLS certificates have been revoked. The revocation status is confirmed by the server itself via OCSP Stapling, by an independent OCSP query, and by asset management tools.

Steps to reproduce:

  1. Set network.https.ocsp.check to true in Advanced Settings.
  2. Visit https://www.reiner-sct.com (certificate is currently revoked).
  3. AdGuard establishes the connection without warning or blocking.

Expected behavior:

AdGuard should detect the revoked certificate and block the connection, as documented: "If the certificate is revoked, current and future connections to the domain will be blocked."

Actual behavior:

The connection is established normally. No warning, no blocking.

Evidence:

The server delivers an OCSP Stapled Response with status revoked during the TLS handshake:

OCSP Response Status: successful (0x0)
Responder Id: C = DE, O = D-Trust GmbH, CN = D-TRUST OCSP 23 SSL Class 3 CA 1 EV 2009
Produced At: Apr 7 11:48:42 2026 GMT
Serial Number: 48B1F99AFF3C9ECFC336FAB2566B4D20
Cert Status: revoked

Verified independently via:

  • openssl s_client -status (stapled response shows revoked)
  • Direct OCSP query to the CA responder (returns revoked)
  • Asset management tooling (reports revoked)

Impact:

This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.

Expected Behavior

No response

Actual Behavior

This undermines the purpose of the revocation check feature entirely. Since AdGuard terminates the original TLS connection and presents its own certificate to the browser, the browser cannot perform its own revocation check on the original certificate. Users relying on AdGuard's OCSP check are left unprotected.

Screenshots

Screenshot 1

Additional Information

No response

Metadata

Metadata

Assignees

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions