How does the ROS IPSec stack handle a revoked client certificate that is used during a IKEv2 handshake?
I assume that new sessions that use a revoked cert are rejected but what about sessions that were established before the cert was revoked?
How does the ROS IPSec stack handle a revoked client certificate that is used during a IKEv2 handshake?
I assume that new sessions that use a revoked cert are rejected but what about sessions that were established before the cert was revoked?