The current implementation of FRP does not properly enforce Certificate Revocation List (CRL) checks during the TLS handshake, allowing connections from clients with revoked certificates to succeed. Despite the certificate being properly revoked, the CRL being correctly generated and configured, and OpenSSL verifying the certificate as revoked, the FRP server still accepts connections from clients presenting revoked certificates. This issue occurs due to the missing incorporation of CRL checks in the FRP server. It is essential to update the FRP implementation to properly check the CRL during the TLS handshake to ensure the security and integrity of the system. This requires enhancing the FRP server to verify the client's certificate against the CRL before allowing the connection to proceed.