Annotation of embedaddon/strongswan/testing/tests/ikev2/ocsp-strict-ifuri/description.txt, revision 1.1
1.1 ! misho 1: This scenario tests the <b>strictcrlpolicy=ifuri</b> option which enforces a
! 2: strict CRL policy for a given CA if at least one OCSP or CRL URI is known
! 3: for this CA at the time of the certificate trust path verification.
! 4: On the gateway <b>moon</b> two different Intermediate CAs control the access
! 5: to the hosts <b>alice</b> and <b>venus</b>. Access to <b>alice</b> is granted
! 6: to users presenting a certificate issued by the Research CA whereas <b>venus</b>
! 7: can only be reached with a certificate issued by the Sales CA.
! 8: <p>
! 9: The roadwarrior <b>carol</b> has a certificate from the Research CA which does not
! 10: contain any URIs. Therefore a strict CRL policy is <b>not</b> enforced and the
! 11: connection setup succeeds, although the certificate status is unknown.
! 12: </p>
! 13: <p>
! 14: The roadwarrior <b>dave</b> has a certificate from the Sales CA which contains
! 15: a single OCSP URI but which is not resolvable. Thus because of the known URI
! 16: a strict CRL policy is enforced and the unknown certificate status causes the
! 17: connection setup to fail.
! 18: </p>
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>