diff options
author | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2007-06-03 17:36:35 +0000 |
---|---|---|
committer | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2007-06-03 17:36:35 +0000 |
commit | 08ee5250bd9c43fda5f24d10b791ca2c4c17fcee (patch) | |
tree | d4e2fc7144e288d624555a38955593e1ee066531 /testing/tests/ikev2/ocsp-strict-ifuri/description.txt | |
parent | b0d8ed94fe9e74afb49fdf5f11e4add29879c65c (diff) | |
download | vyos-strongswan-08ee5250bd9c43fda5f24d10b791ca2c4c17fcee.tar.gz vyos-strongswan-08ee5250bd9c43fda5f24d10b791ca2c4c17fcee.zip |
[svn-upgrade] Integrating new upstream version, strongswan (4.1.3)
Diffstat (limited to 'testing/tests/ikev2/ocsp-strict-ifuri/description.txt')
-rw-r--r-- | testing/tests/ikev2/ocsp-strict-ifuri/description.txt | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/testing/tests/ikev2/ocsp-strict-ifuri/description.txt b/testing/tests/ikev2/ocsp-strict-ifuri/description.txt new file mode 100644 index 000000000..580684cf8 --- /dev/null +++ b/testing/tests/ikev2/ocsp-strict-ifuri/description.txt @@ -0,0 +1,18 @@ +This scenario tests the <b>strictcrlpolicy=ifuri</b> option which enforces a +strict CRL policy for a given CA if at least one OCSP or CRL URI is known +for this CA at the time of the certificate trust path verification. +On the gateway <b>moon</b> two different Intermediate CAs control the access +to the hosts <b>alice</b> and <b>venus</b>. Access to <b>alice</b> is granted +to users presenting a certificate issued by the Research CA whereas <b>venus</b> +can only be reached with a certificate issued by the Sales CA. +<p> +The roadwarrior <b>carol</b> has a certificate from the Research CA which does not +contain any URIs. Therefore a strict CRL policy is <b>not</b> enforced and the +connection setup succeeds, although the certificate status is unknown. +</p> +<p> +The roadwarrrior <b>dave</b> has a certificate from the Sales CA which contains +a single OCSP URI but which is not resolvable. Thus because of the known URI +a strict CRL policy is enforced and the unknown certificate status causes the +connection setup to fail. +</p> |