summaryrefslogtreecommitdiff
path: root/testing/tests/ikev2/ocsp-signer-cert/description.txt
blob: 492a9882b0116e0ba92f0f1995599623af8ab642 (plain)
1
2
3
4
5
6
7
8
9
10
By setting <b>strictcrlpolicy=yes</b>, a <b>strict</b> CRL policy is enforced on
both roadwarrior <b>carol</b> and gateway <b>moon</b>. The online certificate status
is checked via the OCSP server <b>winnetou</b> which possesses an OCSP signer certificate
issued by the strongSwan CA. This certificate contains an <b>OCSPSigning</b>
extended key usage flag. <b>carol</b>'s certificate includes an <b>OCSP URI</b>
in an authority information access extension pointing to <b>winnetou</b>. 
Therefore no special ca section information is needed in ipsec.conf.
<p>
<b>carol</b> can successfully initiate an IPsec connection to <b>moon</b> since
the status of both certificates is <b>good</b>.