[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#313949: marked as done (openssh: [INTL:de] German PO file corrections)



Your message dated Fri, 17 Jun 2005 10:17:28 -0400
with message-id <E1DjHey-0005Pd-00@newraff.debian.org>
and subject line Bug#313949: fixed in openssh 1:4.1p1-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at maintonly) by bugs.debian.org; 14 Jun 2005 21:32:24 +0000
>From tux-master@web.de Tue Jun 14 14:32:23 2005
Return-path: <tux-master@web.de>
Received: from smtp07.web.de [217.72.192.225] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DiJ1D-0005qb-00; Tue, 14 Jun 2005 14:32:23 -0700
Received: from [84.180.153.47] (helo=pluto.sol)
	by smtp07.web.de with asmtp (TLSv1:DES-CBC3-SHA:168)
	(WEB.DE 4.105 #291)
	id 1DiJ0i-0002D1-00
	for maintonly@bugs.debian.org; Tue, 14 Jun 2005 23:31:52 +0200
Received: from jens by pluto.sol with local (Exim 4.50)
	id 1DiIyB-00083h-SB; Tue, 14 Jun 2005 23:29:15 +0200
Date: Tue, 14 Jun 2005 23:29:15 +0200
From: Jens Seidel <jensseidel@users.sf.net>
To: maintonly@bugs.debian.org
Subject: openssh: [INTL:de] German PO file corrections
Message-ID: <[🔎] 20050614212915.GA30976@pluto>
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="VS++wcV0S1rZb1Fb"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
User-Agent: Mutt/1.5.9i
Sender: tux-master@web.de
X-Sender: tux-master@web.de
Delivered-To: maintonly@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--VS++wcV0S1rZb1Fb
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Package: openssh
Version: 1:4.1p1-3
Severity: minor
Tags: patch l10n

Hi,

attached you will find an update of the German PO file de.po.

Note that this is a semi automatic created mail which contains all issues I
found during checking most of Debians German PO files. This includes also
encoding but mostly typo fixes.  Please contact upstream for non-native
Debian packages to incorporate the changes (even if Debians version is old)
since I noticed that the same errors are made again and again over all
packages.

Jens




--VS++wcV0S1rZb1Fb
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: attachment; filename="de.po.diff"
Content-Transfer-Encoding: 8bit

--- de.po.gz.orig/openssh_1:4.1p1-3_de.po	2005-06-11 16:42:51.000000000 +0200
+++ de.po.gz/openssh_1:4.1p1-3_de.po	2005-06-13 16:04:01.000000000 +0200
@@ -136,7 +136,7 @@
 msgstr ""
 "Wir empfehlen das telnetd Paket zu entfernen (falls Sie keinen telnet Zugang "
 "anbieten) oder telnetd-ssl zu installieren, so daß Sie verhindern können, "
-"daß Login und Password unverschlüsselt durch das Netz gesendet werden."
+"daß Login und Passwort unverschlüsselt durch das Netz gesendet werden."
 
 #. Type: note
 #. Description
@@ -277,7 +277,7 @@
 #~ "longer needed. They will still be read in order to maintain backwards "
 #~ "compatibility"
 #~ msgstr ""
-#~ "Mit Version 3 verwendet OpenSSH nicht mehr seperate Dateien für ssh1 und "
+#~ "Mit Version 3 verwendet OpenSSH nicht mehr separate Dateien für ssh1 und "
 #~ "ssh2 Schlüssel. Dies bedeutet, daß authorized_keys2 und known_hosts2 "
 #~ "nicht mehr benötigt werden. Sie werden noch eingelesen, um "
 #~ "Abwärtskompatibilität zu gewähren."

--VS++wcV0S1rZb1Fb--

---------------------------------------
Received: (at 313949-close) by bugs.debian.org; 17 Jun 2005 14:22:35 +0000
>From katie@ftp-master.debian.org Fri Jun 17 07:22:35 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DjHjv-0005zl-00; Fri, 17 Jun 2005 07:22:35 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DjHey-0005Pd-00; Fri, 17 Jun 2005 10:17:28 -0400
From: Colin Watson <cjwatson@debian.org>
To: 313949-close@bugs.debian.org
X-Katie: $Revision: 1.56 $
Subject: Bug#313949: fixed in openssh 1:4.1p1-4
Message-Id: <E1DjHey-0005Pd-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Fri, 17 Jun 2005 10:17:28 -0400
Delivered-To: 313949-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 4

Source: openssh
Source-Version: 1:4.1p1-4

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.1p1-4_powerpc.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.1p1-4_powerpc.udeb
openssh-client_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/openssh-client_4.1p1-4_powerpc.deb
openssh-server-udeb_4.1p1-4_powerpc.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.1p1-4_powerpc.udeb
openssh-server_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/openssh-server_4.1p1-4_powerpc.deb
openssh_4.1p1-4.diff.gz
  to pool/main/o/openssh/openssh_4.1p1-4.diff.gz
openssh_4.1p1-4.dsc
  to pool/main/o/openssh/openssh_4.1p1-4.dsc
ssh-askpass-gnome_4.1p1-4_powerpc.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.1p1-4_powerpc.deb
ssh_4.1p1-4_all.deb
  to pool/main/o/openssh/ssh_4.1p1-4_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 313949@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 17 Jun 2005 14:20:20 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.1p1-4
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - Secure shell client for the Debian installer (udeb)
 openssh-server - Secure shell server, an rshd replacement
 openssh-server-udeb - Secure shell server for the Debian installer (udeb)
 ssh        - Secure shell client and server (transitional package)
 ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 308555 312475 312891 313949
Changes: 
 openssh (1:4.1p1-4) unstable; urgency=low
 .
   * openssh-client and openssh-server conflict with ssh-krb5, as ssh-krb5
     only conflicts with ssh (closes: #312475).
   * SELinux support (thanks, Manoj Srivastava; closes: #308555):
     - Added SELinux capability, and turned it on be default. Added
       restorecon calls in preinst and postinst (should not matter if the
       machine is not SELinux aware). By and large, the changes made should
       have no effect unless the rules file calls --with-selinux; and even
       then there should be no performance hit for machines not actively
       running SELinux.
     - Modified the preinst and postinst to call restorecon to set the
       security context for the generated public key files.
     - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system
       may want to also include pam_selinux.so.
   * Re-enable ssh-askpass-gnome on the Hurd, now that its build-dependencies
     are available.
   * Restore /usr/lib/sftp-server temporarily, as a symlink to
     /usr/lib/openssh/sftp-server (closes: #312891).
   * Switch to debhelper compatibility level 3, since 2 is deprecated.
   * debconf template translations:
     - Update German (thanks, Jens Seidel; closes: #313949).
Files: 
 a369e52cf5460a9db06cc484c3a16da8 947 net standard openssh_4.1p1-4.dsc
 b3a51a2b2452d609adaf568b1875ff08 147352 net standard openssh_4.1p1-4.diff.gz
 9e6e023d08181749ea9aab19812c05dd 32322 net optional ssh_4.1p1-4_all.deb
 bd9b85cb03e9a0e48673e8cc358367a4 571380 net standard openssh-client_4.1p1-4_powerpc.deb
 0cc097ab22172793a09d9b6663167fab 286010 net optional openssh-server_4.1p1-4_powerpc.deb
 dee6d2fac6ae3ec3f4e6350a106fec57 77362 gnome optional ssh-askpass-gnome_4.1p1-4_powerpc.deb
 66f4c6cf187b758dd8ebbbb9027a4bae 163158 debian-installer optional openssh-client-udeb_4.1p1-4_powerpc.udeb
 694aaf52fd413cb5f484b8dd959e66c5 171998 debian-installer optional openssh-server-udeb_4.1p1-4_powerpc.udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFCstFL9t0zAhD6TNERAgXsAJ4kfqn0HIqWWffgFUaMLSeV1ZjmFQCcDkN5
6QiwfWkbF0me6rFSYNYv3ak=
=N1rn
-----END PGP SIGNATURE-----




Reply to: