openssl has a command to verify the signature of the downloaded crl against the issuing certificate authority.
openssl crl -verify -in <crl file> -CAfile < issue certificate or cert chain>
Here is a hello-world example of verifying GOOGLE CRL against the Google issuer CA certificate
Download the google crl using wget
wget http://crl.pki.goog/GTS1O1core.crl
Downloaded CRL is DER format , convert it to PEM format
openssl crl -inform DER -in GTS1O1core.crl -outform PEM -out google_crl.pem
Download google certificate chain
OLDIFS=$IFS; IFS=':' certificates=$(openssl s_client -connect google.com:443 -showcerts -tlsextdebug -tls1 2>&1 </dev/null | sed -n '/-----BEGIN/,/-----END/ {/-----BEGIN/ s/^/:/; p}'); for certificate in ${certificates#:}; do echo $certificate | tee -a google-cert-chain.pem ; done; IFS=$OLDIFS
Verify the downloaded CRL against issue certificate ( available in the downloaded cert chain in 3)
openssl crl -verify -in google_crl.pem -CAfile google-cert-chain.pem
与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…