Taxonomy of Transport Layer Security (TLS) Revocation Failure Scenarios
Main Article Content
Abstract
Certificate revocation is one of the most operationally fragile components of the Transport Layer Security ecosystem. While TLS provides robust cryptographic guarantees for data in transit, those guarantees depend on the continued validity of the certificates underpinning them. When revocation mechanisms fail, trust decisions become unreliable, and the security posture of TLS-secured communications degrades in ways that are often invisible to the relying party. Existing discussions of revocation failure tend to conflate the underlying failure conditions with the validation responses they produce, obscuring the structural causes of trust breakdown and limiting the precision of incident analysis. This article addresses that gap by proposing a formal taxonomy of TLS revocation failure scenarios, classifying failures along four orthogonal and implementation-agnostic dimensions: failure origin, temporal validity of revocation signals, scope of impact, and trust determinism. Each dimension captures a distinct aspect of revocation failure behavior that cannot be derived from the others. The taxonomy is designed to remain applicable across the full diversity of TLS deployment environments, from constrained embedded systems and IoT infrastructure to large-scale public web deployments and intermediary-mediated architectures. If failure classification is separated from validation behavior, then the taxonomy can provide a neutral analytical foundation for reasoning about revocation reliability, which may support a deeper understanding of trust behavior under failure. It can further lay groundwork for future architectural and operational analysis.