From 0bc543f1dc0f13b5061a6a354f09daae7e21eb4c Mon Sep 17 00:00:00 2001 From: Andreas Steffen Date: Fri, 25 May 2007 09:23:24 +0000 Subject: multi-level-ca-strict scenario added --- testing/tests/ikev2/multi-level-ca-strict/description.txt | 7 +++++++ 1 file changed, 7 insertions(+) create mode 100644 testing/tests/ikev2/multi-level-ca-strict/description.txt (limited to 'testing/tests/ikev2/multi-level-ca-strict/description.txt') diff --git a/testing/tests/ikev2/multi-level-ca-strict/description.txt b/testing/tests/ikev2/multi-level-ca-strict/description.txt new file mode 100644 index 000000000..86cbbc58b --- /dev/null +++ b/testing/tests/ikev2/multi-level-ca-strict/description.txt @@ -0,0 +1,7 @@ +By setting strictcrlpolicy=yes, a strict CRL policy is enforced +on all peers. +The VPN gateway moon grants access to the hosts alice and +venus to anyone presenting a certificate belonging to a trust +chain anchored in strongSwan Root CA. Therefore both road warriors +carol and dave, holding certificates from the Research CA +and Sales CA, respectively, can reach both alice and venus. -- cgit v1.2.3