Annotation of embedaddon/strongswan/testing/tests/ikev2/ocsp-strict-ifuri/description.txt, revision 1.1

1.1     ! misho       1: This scenario tests the <b>strictcrlpolicy=ifuri</b> option which enforces a
        !             2: strict CRL policy for a given CA if at least one OCSP or CRL URI is known
        !             3: for this CA at the time of the certificate trust path verification.
        !             4: On the gateway <b>moon</b> two different Intermediate CAs control the access
        !             5: to the hosts <b>alice</b> and <b>venus</b>. Access to <b>alice</b> is granted
        !             6: to users presenting a certificate issued by the Research CA whereas <b>venus</b>
        !             7: can only be reached with a certificate issued by the Sales CA. 
        !             8: <p>
        !             9: The roadwarrior <b>carol</b> has a certificate from the Research CA which does not
        !            10: contain any URIs. Therefore a strict CRL policy is <b>not</b> enforced and the
        !            11: connection setup succeeds, although the certificate status is unknown.
        !            12: </p>
        !            13: <p>
        !            14: The roadwarrior <b>dave</b> has a certificate from the Sales CA which contains
        !            15: a single OCSP URI but which is not resolvable. Thus because of  the known URI
        !            16: a strict CRL policy is enforced and the unknown certificate status causes the
        !            17: connection setup to fail.
        !            18: </p>

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>