We’re monitoring several websites for http and https response-times - and also wether the certificate is valid. All those service checks are executed via the “check_http” plugin from the monitoring-plugins collection.
We ran into an issue, where a certificate was technically still valid - but got accidentally revoked by the issuing CA. Browsers seem to periodically fetch the certificate revocation lists (CRL), some still showed the website - others started to complain about the revoked certificate.
Our https-checks via Icinga2 did not detect this problem at all and that’s what bugs me about this case.
I’m afraid that revocation isn’t checked by the usual service check scripts or even the X509 certificate module for Icingaweb2.
Revocation checking can be done on serveral ways, i.e by downloading the certificate revocation list (CRL) from a server provided by the issueing CA or by using OCSP (also done by browsers).
You should find the URL for CRL/OCSP within the certificate, this can be a http, https or ldap link.
The checking scripts need access to this URL and the access protocol must be implemented.
OCSP checks can be done by openssl or other tools, ask the search engine of your choice