A Certificate Authority should revoke a Certificate, for example, if it has been compromised in some way—much the way a credit card company might revoke your credit card if you report that it's been stolen.
The browser uses the CRLs it has available to check the validity of certificates issued by the corresponding CAs. If a certificate is listed as revoked, the browser won't accept it as evidence of identity.
A Certificate Authority typically publishes an updated Certificate Revocation List at regular intervals. Every Certificate Revocation List includes a date, specified in the Next Update field, by which the Certificate Authority will publish the next update of that Certificate Revocation List. If the date in the Next Update field is earlier than the current date, you should obtain the most recent version of the Certificate Revocation List.
Although the absence of the most recent Certificate Revocation List does not by itself invalidate a Certificate, the browser may not handle such Certificates correctly.
In some situations, you may want to Server and client applications that use public-key certificates as tokens of identification need access to information about the validity of a certificate; because one of the factors that determines the validity of a certificate is its revocation status, these applications need to know whether the certificate being validated has been revoked. In that regard, the Certificate Authority has a responsibility to do the following:
One of the standard methods for conveying the revocation status of certificates is by publishing a list of revoked certificates. This list is known as the certificate revocation list (CRL). The CRL is a publicly available list of certificates that have been revoked.
A Certificate Revocation List is issued and digitally signed by the Certificate Authority that issued the certificates listed in the CRL. The Certificate Authority's function includes creating the CRLs periodically and distributing them to other applications. For example, the CA may publish the CRL to a global directory which other applications may use for checking the revocation status of a certificate or from which other applications can retrieve the CRL.
See also: CRL distribution points
The way of distributing a CRL (via HTTP or LDAP) imposes the problem of network traffic. CRLs of large Trust Centers can reach big size (around 0,5 MB). Every client trusting a server of one of this large Trust Centers should download the complete CRL. This is not only a significant delay in accessing these websites for the user but also generates a very high network traffic. The solution to this maybe to allow caching of these CRLs for a longer time, but as mentioned before this imposes a higher risk of using revoked certificates.
The paper Towards Short-Lived Certificates identifies following four drawbacks in CRL.[2]