Feature Request
Is your feature request related to a problem? Please describe.
When running applications inside Kubernetes clusters, the Kubernetes API server's TLS certificates often cannot have their revocation status checked because Certificate Revocation List (CRL) and OCSP endpoints are not accessible from within the cluster network. This causes certificate validation to fail even though the certificates are valid.
Currently, the only workaround is to completely disable TLS verification using SkipTlsVerify = true, which is a security risk as it disables all certificate validation including chain verification, expiration checks, and signature validation.
var config = KubernetesClientConfiguration.InClusterConfig();
// Bad: Disables ALL certificate validation
config.SkipTlsVerify = true;