[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#485415: marked as done ([openssh] Updated Romanian translation for openssh package)



Your message dated Mon, 21 Jul 2008 11:32:05 +0000
with message-id <E1KKtcb-0004nf-Gu@ries.debian.org>
and subject line Bug#485415: fixed in openssh 1:4.7p1-13
has caused the Debian Bug report #485415,
regarding [openssh] Updated Romanian translation for openssh package
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
485415: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485415
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh
Severity: wishlist
Tags: l10n patch

--- Please enter the report below this line. ---

This is a updated Romanian translation for openssh package.

Thanks 

Catalin Festila

--- System information. ---
Architecture: i386
Kernel:       Linux 2.6.24-1-686

Debian Release: lenny/sid
  500 testing         security.debian.org 
  500 testing         ftp.debian.org 
  500 testing         debian-multimedia.org 

--- Package information. ---
Depends       (Version) | Installed
=======================-+-===========
                        | 

# Romanian translation of openssh.
# Copyright (C) 2006 THE openssh'S COPYRIGHT HOLDER
# This file is distributed under the same license as the openssh package.
#
# Stan Ioan-Eugen <stan.ieugen@gmail.com>, 2006.
# Igor Stirbu <igor.stirbu@gmail.com>, 2007.
# Cătălin Feștilă <catalinfest@gmail.com>,2008
msgid ""
msgstr ""
"Project-Id-Version: openssh 1.4\n"
"Report-Msgid-Bugs-To: openssh@packages.debian.org\n"
"POT-Creation-Date: 2008-05-17 09:39+0200\n"
"PO-Revision-Date: 2008-05-28 17:54+0200\n"
"Last-Translator: Cătălin Feștilă <catalinfest@gmail.com>\n"
"Language-Team: Romanian <debian-l10n-romanian@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Generator: KBabel 1.11.4\n"
"Plural-Forms: nplurals=3; plural=n==1 ? 0 : (n==0 || (n%100 > 0 && n%100 < 20)) ? 1 : 2;\n"

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid "Generate a new configuration file for OpenSSH?"
msgstr "Să se genereze un fișier nou de configurare pentru OpenSSH?"

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid "This version of OpenSSH has a considerably changed configuration file from the version shipped in Debian 'Potato', which you appear to be upgrading from. This package can now generate a new configuration file (/etc/ssh/sshd.config), which will work with the new server version, but will not contain any customizations you made with the old version."
msgstr "Această versiune de OpenSSH are un fișier de configurare considerabil modificat față de versiunea care vine cu Debian 'Potato', pe care se pare că o actualizați. Acest pachet poate genera acum un nou fișier de configurare (/etc/ssh/sshd.config), care va funcționa cu noua versiune de server, dar nu va conține nici o personalizare făcută pentru versiunea anterioară."

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid "Please note that this new configuration file will set the value of 'PermitRootLogin' to 'yes' (meaning that anyone knowing the root password can ssh directly in as root). Please read the README.Debian file for more details about this design choice."
msgstr "A se reține că acest fișier nou de configurare va stabili valoarea opțiunii 'PermitRootLogin' la „yes” (ceea ce înseamnă că cine știe parola de root se poate autentifica prin ssh direct ca root). Părerea responsabilului de pachet este că aceasta trebuie să fie valoarea implicită (a se vedea fișierul README.Debian pentru detalii suplimentare), dar, dacă doriți, puteți edita oricând fișierul sshd_config pentru a stabili valoarea opțiunii la „no”."

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid "It is strongly recommended that you choose to generate a new configuration file now."
msgstr "Este indicat să alegeți acum generarea un nou fișier de configurare."

#. Type: boolean
#. Description
#: ../openssh-server.templates:2001
msgid "Do you want to risk killing active SSH sessions?"
msgstr "Doriți să riscați întreruperea sesiunilor ssh active?"

#. Type: boolean
#. Description
#: ../openssh-server.templates:2001
msgid "The currently installed version of /etc/init.d/ssh is likely to kill all running sshd instances. If you are doing this upgrade via an SSH session, you're likely to be disconnected and leave the upgrade procedure unfinished."
msgstr "Este foarte probabil ca această versiune de /etc/init.d/ssh pe care o aveți instalată să omoare toate instanțele sshd care rulează. Dacă faceți această actualizare printr-o sesiune ssh, atunci este posibil să fiți deconectați și actualizarea să rămână neterminată."

#. Type: boolean
#. Description
#: ../openssh-server.templates:2001
msgid "This can be fixed by manually adding \"--pidfile /var/run/sshd.pid\" to the start-stop-daemon line in the stop section of the file."
msgstr "Puteți repară manual acest lucru adăugând „--pidfile /var/run/sshd.pid” la linia start-stop-daemon în secțiunea stop a fișierului."

#. Type: note
#. Description
#: ../openssh-server.templates:3001
msgid "New host key mandatory"
msgstr "O cheie nouă este obligatorie"

#. Type: note
#. Description
#: ../openssh-server.templates:3001
msgid "The current host key, in /etc/ssh/ssh_host_key, is encrypted with the IDEA algorithm. OpenSSH can not handle this host key file, and the ssh-keygen utility from the old (non-free) SSH installation does not appear to be available."
msgstr "Cheia curentă în /etc/ssh/ssh_host_key este criptată cu algoritmul IDEA. OpenSSH nu suportă acest tip de cheie, iar utilitarul ssh-keygen din versiunea SSH (non-liberă) anterior instalată nu pare să fie disponibil."

#. Type: note
#. Description
#: ../openssh-server.templates:3001
msgid "You need to manually generate a new host key."
msgstr "Va trebui să generați manual o nouă cheie pentru sistem."

#. Type: boolean
#. Description
#: ../openssh-server.templates:4001
msgid "Disable challenge-response authentication?"
msgstr "Dezactivează modul de autentificare provocare-răspuns?"

#. Type: boolean
#. Description
#: ../openssh-server.templates:4001
msgid "Password authentication appears to be disabled in the current OpenSSH server configuration. In order to prevent users from logging in using passwords (perhaps using only public key authentication instead) with recent versions of OpenSSH, you must disable challenge-response authentication, or else ensure that your PAM configuration does not allow Unix password file authentication."
msgstr "Autentificarea pe bază de parole pare dezactivată în configurația curentă a serverului OpenSSH. Pentru a împiedica utilizatorii să se autentifice folosind parole (probabil folosind doar autentificarea cu chei publice) în versiunile recente OpenSSH trebuie să dezactivați autentificarea tip provocare-răspuns, sau asigurați-vă că configurația PAM nu permite autentificarea cu fișierul de parole Unix."

#. Type: boolean
#. Description
#: ../openssh-server.templates:4001
msgid "If you disable challenge-response authentication, then users will not be able to log in using passwords. If you leave it enabled (the default answer), then the 'PasswordAuthentication no' option will have no useful effect unless you also adjust your PAM configuration in /etc/pam.d/ssh."
msgstr "Dacă dezactivați autentificarea pe bază de provocare-răspuns, utilizatorii nu vor mai putea să se autentifice folosind parolele. Dacă nu o dezactivați (răspunsul implicit), atunci opțiunea 'PasswordAuthentification no' va fi utilizabilă doar dacă modificați și configurația PAM din /etc/pam.d/ssh."

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "Vulnerable host keys will be regenerated"
msgstr "Cheile vulnerabile vor fi regenerate"

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "Some of the OpenSSH server host keys on this system were generated with a version of OpenSSL that had a broken random number generator. As a result, these host keys are from a well-known set, are subject to brute-force attacks, and must be regenerated."
msgstr "Unele dintre cheile serverului OpenSSH gazdă de pe acest sistem au fost generate cu o versiune de OpenSSL, care a avut un generator de numere aleatorii stricat. Ca rezultat, aceste chei gazda sunt un set binecunoscut, sunt supuse la atacuri brute-force și trebuie să fie regenerate."

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "Users of this system should be informed of this change, as they will be prompted about the host key change the next time they log in. Use 'ssh-keygen -l -f HOST_KEY_FILE' after the upgrade to print the fingerprints of the new host keys."
msgstr "Utilizatorii acestui sistem ar trebui să fie informați ce se schimbă, deoarece se va solicita cheia gazdă ce se schimba data viitoare când se autentifică. Folosiți 'ssh-keygen -l -f HOST_KEY_FILE' după ce faceți actualizare pentru a imprima amprentele digitale ale noilor chei gazdă."

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "The affected host keys are:"
msgstr "Cheile gazdă afectate sunt:"

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "${HOST_KEYS}"
msgstr "${HOST_KEYS}"

#. Type: note
#. Description
#. flags:translate!:5
#: ../openssh-server.templates:5001
msgid "User keys may also be affected by this problem. The 'ssh-vulnkey' command may be used as a partial test for this. See /usr/share/doc/openssh-server/README.compromised-keys.gz for more details."
msgstr "Cheile utilizatorului de asemenea, pot fi afectate de această problemă. Comanda 'ssh-vulnkey' poate fi folosită ca un test parțial pentru acestea. A se vedea /usr/share/doc/openssh-server/README.compromised-keys.gz pentru mai multe detalii."

#~ msgid "Warning: you must create a new host key"
#~ msgstr "Avertizare: trebuie să creați o nouă cheie pentru sistem"
#~ msgid "Warning: telnetd is installed --- probably not a good idea"
#~ msgstr ""
#~ "Avertizare: telnetd este instalat --- probabil că nu este o idee bună"
#~ msgid ""
#~ "I'd advise you to either remove the telnetd package (if you don't "
#~ "actually need to offer telnet access) or install telnetd-ssl so that "
#~ "there is at least some chance that telnet sessions will not be sending "
#~ "unencrypted login/password and session information over the network."
#~ msgstr ""
#~ "Un sfat bun este fie să ștergeți pachetul telnetd (dacă întradevăr nu-l "
#~ "utilizați) fie să instalați telnetd-ssl astfel încât să existe "
#~ "posibilitatea ca sesiunile telnet să nu trimită informații necriptate de "
#~ "autentificare/parole prin rețea."


--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:4.7p1-13

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.7p1-13_i386.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.7p1-13_i386.udeb
openssh-client_4.7p1-13_i386.deb
  to pool/main/o/openssh/openssh-client_4.7p1-13_i386.deb
openssh-server-udeb_4.7p1-13_i386.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.7p1-13_i386.udeb
openssh-server_4.7p1-13_i386.deb
  to pool/main/o/openssh/openssh-server_4.7p1-13_i386.deb
openssh_4.7p1-13.diff.gz
  to pool/main/o/openssh/openssh_4.7p1-13.diff.gz
openssh_4.7p1-13.dsc
  to pool/main/o/openssh/openssh_4.7p1-13.dsc
ssh-askpass-gnome_4.7p1-13_i386.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.7p1-13_i386.deb
ssh-krb5_4.7p1-13_all.deb
  to pool/main/o/openssh/ssh-krb5_4.7p1-13_all.deb
ssh_4.7p1-13_all.deb
  to pool/main/o/openssh/ssh_4.7p1-13_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 485415@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 21 Jul 2008 12:18:28 +0100
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source all i386
Version: 1:4.7p1-13
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell server, an rshd replacement
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 483756 484404 484451 485415 487325
Changes: 
 openssh (1:4.7p1-13) unstable; urgency=low
 .
   * Add some helpful advice to the end of ssh-vulnkey's output if there are
     unknown or compromised keys (thanks, Dan Jacobson; closes: #483756).
   * Check compromised key blacklist in ssh or ssh-add, as well as in the
     server (LP: #232391). To override the blacklist check in ssh
     temporarily, use 'ssh -o UseBlacklistedKeys=yes'; there is no override
     for the blacklist check in ssh-add.
   * Add cross-references to ssh-vulnkey(1) to ssh(1), ssh-add(1),
     ssh-keygen(1), and sshd(8) (closes: #484451).
   * Change openssh-client-udeb's Installer-Menu-Item from 99900 to 99999
     (thanks, Frans Pop).
   * Drop openssh-client-udeb isinstallable hack, as main-menu (>= 1.26) now
     takes care of that (thanks, Frans Pop; closes: #484404).
   * Update DEB_BUILD_OPTIONS parsing code from policy 3.8.0.
   * Add documentation on removing openssh-blacklist locally (see #484269).
   * Clarify documentation of SSHD_OOM_ADJUST, and make setting it to the
     empty string actually skip adjustment as intended (closes: #487325).
   * Remove empty /usr/share/applications directory in ssh-askpass-gnome.
   * debconf template translations:
     - Update Romanian (thanks, Cătălin Feștilă; closes: #485415).
Checksums-Sha1: 
 0c795ce18a6e7485b4c3bce9d05e3c761ffddcda 1504 openssh_4.7p1-13.dsc
 2e1b90897edb478a562160d4bba0e2c0343dfacf 215208 openssh_4.7p1-13.diff.gz
 4969f71b147b63543c3f9963528001f5b048e4ca 1042 ssh_4.7p1-13_all.deb
 6480c85a547528d8da02b2325e8235e874ab80e2 89998 ssh-krb5_4.7p1-13_all.deb
 286a819a08cd55a9617ad0b4ad92d2f967c6f058 721498 openssh-client_4.7p1-13_i386.deb
 2a3a28a13763aeaede074e25c7a62c564d1dc27d 261480 openssh-server_4.7p1-13_i386.deb
 810635455a7d6710c1d158caa41ae9fdd43070c3 97482 ssh-askpass-gnome_4.7p1-13_i386.deb
 ae49e22cc231d445835b709e7910fb6ffabfc099 159502 openssh-client-udeb_4.7p1-13_i386.udeb
 24e4e6ac0400c4d785397730ce9e86d7ddf4ea44 173024 openssh-server-udeb_4.7p1-13_i386.udeb
Checksums-Sha256: 
 3570d43e2bce08bc98493f07f0954c2f9b2d04ce16d5042074fc71a63e71e8d3 1504 openssh_4.7p1-13.dsc
 5c6e8695e2af17b7744479dcf1912a89e392e984c57bbd10196b8f389cc22d43 215208 openssh_4.7p1-13.diff.gz
 5b4af0b0ffd314c97a35409205e9b48d97832964c2f079cedfa1c8ae93a2ffde 1042 ssh_4.7p1-13_all.deb
 2565b6846d0cc9058d4088b44d0293bfd31b5eef06fdbad2e13fecefa0fed076 89998 ssh-krb5_4.7p1-13_all.deb
 10e035282b8626fb11bf102ca2ddac3ec1e831f974f1e494216ce0cff2d7e6b2 721498 openssh-client_4.7p1-13_i386.deb
 1669deb01ab10b3871e596c875441d6cc8da7245327250a117b5e1082b6e3366 261480 openssh-server_4.7p1-13_i386.deb
 60fa7516aa2699ae2671d1c416e73c4b80410081c07157edf1621fa14112635a 97482 ssh-askpass-gnome_4.7p1-13_i386.deb
 3277f7781f5a90d3603ca28cc80e7df2ff9390ff91ec39e67667b2644d486f45 159502 openssh-client-udeb_4.7p1-13_i386.udeb
 1407c0b0da7e91245e3c890a4f529cb4e29f4b064ac7789c95fd87dd3311ed76 173024 openssh-server-udeb_4.7p1-13_i386.udeb
Files: 
 77e96fe444882281deeb3f3c829602bf 1504 net standard openssh_4.7p1-13.dsc
 5c1b6759596d3f583d58424e7cdf178b 215208 net standard openssh_4.7p1-13.diff.gz
 345d10be6218747e5bf4108d49ce0a22 1042 net extra ssh_4.7p1-13_all.deb
 eb019d3eaf93276882cff336f7ae8650 89998 net extra ssh-krb5_4.7p1-13_all.deb
 97801920d8ebdffbd4732a8da91eba10 721498 net standard openssh-client_4.7p1-13_i386.deb
 285dcbcd52248d92af7463c715975729 261480 net optional openssh-server_4.7p1-13_i386.deb
 1a36e66cdeb3d00415b756f74111646d 97482 gnome optional ssh-askpass-gnome_4.7p1-13_i386.deb
 c00ca8e31a567888f69a21422d2ea3bd 159502 debian-installer optional openssh-client-udeb_4.7p1-13_i386.udeb
 7284a936bdf9f474aacefb4a81464d19 173024 debian-installer optional openssh-server-udeb_4.7p1-13_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQFIhHEh9t0zAhD6TNERArXUAJ98Zh9ZHab1faqWfw+P3cNbVfaQCwCfYz7J
SdXDBTGU6nuHgvwWqPKG3q0=
=z89n
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: