From 08ee5250bd9c43fda5f24d10b791ca2c4c17fcee Mon Sep 17 00:00:00 2001 From: Rene Mayrhofer Date: Sun, 3 Jun 2007 17:36:35 +0000 Subject: [svn-upgrade] Integrating new upstream version, strongswan (4.1.3) --- testing/tests/ikev2/crl-ldap/description.txt | 2 +- testing/tests/ikev2/crl-ldap/hosts/moon/etc/ipsec.conf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'testing/tests/ikev2/crl-ldap') diff --git a/testing/tests/ikev2/crl-ldap/description.txt b/testing/tests/ikev2/crl-ldap/description.txt index d7ed591cc..46e7a6961 100644 --- a/testing/tests/ikev2/crl-ldap/description.txt +++ b/testing/tests/ikev2/crl-ldap/description.txt @@ -1,6 +1,6 @@ By setting strictcrlpolicy=yes a strict CRL policy is enforced on both roadwarrior carol and gateway moon. Thus when carol initiates the connection and only an expired CRL cache file in /etc/ipsec.d/crls is -availabl, an ldap fetch to get the CRL from the LDAP server winnetou is +available, an ldap fetch to get the CRL from the LDAP server winnetou is successfully started and the IKE authentication completes. The new CRL is again cached locally as a file in /etc/ipsec.d/crls due to the cachecrls=yes option. diff --git a/testing/tests/ikev2/crl-ldap/hosts/moon/etc/ipsec.conf b/testing/tests/ikev2/crl-ldap/hosts/moon/etc/ipsec.conf index 3b1fbabb8..47a52b60b 100755 --- a/testing/tests/ikev2/crl-ldap/hosts/moon/etc/ipsec.conf +++ b/testing/tests/ikev2/crl-ldap/hosts/moon/etc/ipsec.conf @@ -8,7 +8,7 @@ config setup ca strongswan cacert=strongswanCert.pem - crluri="ldap://ldap1.strongswan.org/cn=strongSwan Root CA, o=Linux strongSwan, c=CH?certificateRevocationList" + crluri="ldap://ldap.strongswan.org/cn=strongSwan Root CA, o=Linux strongSwan, c=CH?certificateRevocationList" auto=add conn %default -- cgit v1.2.3