Your message dated Wed, 18 Mar 2015 16:19:52 +0000 with message-id <E1YYGhE-0005bN-IT@franck.debian.org> and subject line Bug#771859: fixed in openssh 1:6.7p1-4 has caused the Debian Bug report #771859, regarding openssh: [INTL:pt_BR] Brazilian Portuguese debconf templates translatio to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 771859: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771859 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian l10 <debian-l10n-portuguese@lists.debian.org>, submit@bugs.debian.org
- Subject: openssh: [INTL:pt_BR] Brazilian Portuguese debconf templates translatio
- From: José de Figueiredo <deb.gnulinux@gmail.com>
- Date: Tue, 02 Dec 2014 20:33:36 -0200
- Message-id: <547E3E40.7050909@gmail.com>
- Reply-to: deb.gnulinux@gmail.com
- In-reply-to: <20141202112658.GE8983@pingo.casa.arg.eti.br>
- References: <54641E9A.90008@gmail.com> <5464F938.1050308@gmail.com> <20141119001527.GB7623@cusco.casa.arg.eti.br> <54728EBC.2040609@gmail.com> <20141126182834.GH16801@pingo.casa.arg.eti.br> <54766C81.1090105@gmail.com> <20141201154702.GA8983@pingo.casa.arg.eti.br> <547D95A2.20609@gmail.com> <20141202112658.GE8983@pingo.casa.arg.eti.br>
Package: openssh Tags: l10n patch Severity: wishlist Hello, Please, Could you update the Brazilian Portuguese Translation? Attached you will find the file pt_BR.po. It is UTF-8 encoded and it is tested with msgfmt and podebconf-display-po. Kind regards. -- José de Figueiredo Seja Livre, use GNU/Linux. Use Debian !!! ---------------------------------------------------------------- Antes de autorizar um aborto, pense que poderia ser vc lá dentro, esperando alguém decidir se vc morre ou não... http://www.brasilsemaborto.com.br/ ---------------------------------------------------------------- Venha estudar no IFSul - é público, federal e de qualidade.# Debconf translations for openssh. # Copyright (C) 2014 THE openssh'S COPYRIGHT HOLDER # This file is distributed under the same license as the openssh package. # José de Figueiredo <deb.gnulinux@gmail.com>, 2014. # # msgid "" msgstr "" "Project-Id-Version: openssh\n" "Report-Msgid-Bugs-To: openssh@packages.debian.org\n" "POT-Creation-Date: 2014-03-20 02:06+0000\n" "PO-Revision-Date: 2014-11-23 23:49-0200\n" "Last-Translator: José de Figueiredo <deb.gnulinux@gmail.com>\n" "Language-Team: Brazilian Portuguese <debian-l10n-portuguese@lists.debian." "org>\n" "Language: pt_BR\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" #. Type: boolean #. Description #: ../openssh-server.templates:1001 msgid "Disable SSH password authentication for root?" msgstr "Desabilitar autenticação por senha do SSH para root?" #. Type: boolean #. Description #: ../openssh-server.templates:1001 msgid "" "Previous versions of openssh-server permitted logging in as root over SSH " "using password authentication. The default for new installations is now " "\"PermitRootLogin without-password\", which disables password authentication " "for root without breaking systems that have explicitly configured SSH public " "key authentication for root." msgstr "" "Versões anteriores do openssh-server permitiam login como root sobre SSH " "usando autenticação por senha. O padrão para as novas instalações agora é " "\"PermitRootLogin without-password\", que desabilita a autenticação por " "senha para root sem quebrar sistemas que tenham configurado explicitamente o " "SSH para autenticação por chave pública para root." #. Type: boolean #. Description #: ../openssh-server.templates:1001 msgid "" "This change makes systems more secure against brute-force password " "dictionary attacks on the root user (a very common target for such attacks). " "However, it may break systems that are set up with the expectation of being " "able to SSH as root using password authentication. You should only make this " "change if you do not need to do that." msgstr "" "Esta alteração torna sistemas mais seguros contra ataques de força bruta por " "dicionário de senhas no usuário root (um alvo muito comum destes ataques). " "Entretanto, ela pode quebrar sistemas que foram configurados com a " "expectativa de acesso SSH com root usando autenticação por senha. Você deve " "fazer esta mudança somente se você não precisa fazer isso."Attachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 771859-close@bugs.debian.org
- Subject: Bug#771859: fixed in openssh 1:6.7p1-4
- From: Colin Watson <cjwatson@debian.org>
- Date: Wed, 18 Mar 2015 16:19:52 +0000
- Message-id: <E1YYGhE-0005bN-IT@franck.debian.org>
Source: openssh Source-Version: 1:6.7p1-4 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 771859@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 18 Mar 2015 15:34:13 +0000 Source: openssh Binary: openssh-client openssh-server openssh-sftp-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source amd64 all Version: 1:6.7p1-4 Distribution: unstable Urgency: medium Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) openssh-sftp-server - secure shell (SSH) sftp server module, for SFTP access from remot ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 764842 765633 771859 Changes: openssh (1:6.7p1-4) unstable; urgency=medium . * Send/accept only specific known LC_* variables, rather than using a wildcard (closes: #765633). * Document interactions between ListenAddress/Port and ssh.socket in README.Debian (closes: #764842). * Debconf translations: - Brazilian Portuguese (thanks, José de Figueiredo; closes: #771859). Checksums-Sha1: d287edd94fce43e09c794e8c7a0c8bcf1d512764 2737 openssh_6.7p1-4.dsc 0708d3f7612151055db3958f95f7df7a109a7ff9 147564 openssh_6.7p1-4.debian.tar.xz af62c4921f0550900ae7782031e9eeed04602f9c 690904 openssh-client_6.7p1-4_amd64.deb 1d967e3534abb1478257a0d14b938831c07a70c1 330882 openssh-server_6.7p1-4_amd64.deb 30fe96494f3fdc609a1d613691d7d7d4b214a040 37926 openssh-sftp-server_6.7p1-4_amd64.deb 33c4af28c38b8d8f0e1d7cab60888b67eeae2d71 119252 ssh_6.7p1-4_all.deb 9662bed6b213c86904e02be9b75a1cfa0ce2d5e8 119066 ssh-krb5_6.7p1-4_all.deb 69485cff313c0941be8d0b16805e16651defea38 126870 ssh-askpass-gnome_6.7p1-4_amd64.deb e8b13cdbb1be21554288fd08a7957e2c0fc03ece 258286 openssh-client-udeb_6.7p1-4_amd64.udeb 19810fc0129eb9ae0d1ffd0b857544b984a42a84 284718 openssh-server-udeb_6.7p1-4_amd64.udeb Checksums-Sha256: f4162bd59db604006cd7848b98926e3630eb427aa2f9581cf83268d2c8622245 2737 openssh_6.7p1-4.dsc 9183cbb30a06bcd61d2d0af0e1347616825cff9d46599602ed20a5a1eb9c4b39 147564 openssh_6.7p1-4.debian.tar.xz 2d5947280d0a66d5081059165cdb71ec145f62042bcd6e6b67f67d4ef0293634 690904 openssh-client_6.7p1-4_amd64.deb 296a061e40074287068f38e2e79564fe258176f7d50aee3d4e22547e7fb50991 330882 openssh-server_6.7p1-4_amd64.deb d2f883d0e42fd4f29b8ac13aaa99c9d4d400b0bcb93d5c62b8f633c0be925ca1 37926 openssh-sftp-server_6.7p1-4_amd64.deb 4eedb8077f8fb889fdd301fbda3b6c3d37946f1f8c63925c4720ed3e5f5b9835 119252 ssh_6.7p1-4_all.deb 9b27cc59661694f3e942221a285675af7355342f6481464b1c4406481c3596d3 119066 ssh-krb5_6.7p1-4_all.deb f67f1de67f67e7c1567e6c2470799b9b2994ae002e7e38bcfb68e1ebe566bcb6 126870 ssh-askpass-gnome_6.7p1-4_amd64.deb c59bcf1cbccec304aa08efda80cb063330fca1803ea6a2da8ed234c40f2f4ddb 258286 openssh-client-udeb_6.7p1-4_amd64.udeb 63d5571dbcf15e8f0980cd053763dd7810e9ed08b63513e30f359103b5436e90 284718 openssh-server-udeb_6.7p1-4_amd64.udeb Files: 7ed93eab5c747b08f15624ebeceec70e 2737 net standard openssh_6.7p1-4.dsc 4ec2b6f3d79b6ae98c95ca8dd070a429 147564 net standard openssh_6.7p1-4.debian.tar.xz 7956cb300d4eb69bd31423358e3c0c11 690904 net standard openssh-client_6.7p1-4_amd64.deb f9d5745a524b25d8fd2ba2755f615d5b 330882 net optional openssh-server_6.7p1-4_amd64.deb c9aaecb9a016d665171d801525722441 37926 net optional openssh-sftp-server_6.7p1-4_amd64.deb 3985754b4b4d39018be5a0fbc4a2a205 119252 net extra ssh_6.7p1-4_all.deb a48a0595c6905a714f7ec89865f61018 119066 oldlibs extra ssh-krb5_6.7p1-4_all.deb 31baf74948c2255c0c2a5344a6ddbaa1 126870 gnome optional ssh-askpass-gnome_6.7p1-4_amd64.deb 9dd3013c46055df9c519850430253847 258286 debian-installer optional openssh-client-udeb_6.7p1-4_amd64.udeb 88d7e2fa64996a5b1bd648a2a5c6741d 284718 debian-installer optional openssh-server-udeb_6.7p1-4_amd64.udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iQIVAwUBVQmiNTk1h9l9hlALAQiivw/+OOxaxR2sn9IfxcRf+2IgrgtnPEZnbYxF gxSeuDH6ydzDOT/zkCBcrtpoNfQEgoHUc/0Un9PznBxqXoBkYREMe+c+taf59Xc0 gh/9F25bxkVyp7agg7j/U26fRkoHIrE6gDKLgYdz9yMLCWfI0SrjUdVsUruPVsU5 ANLumTrhR4kp4hIk29z4plsxEWOCgL7xfz07jojQB2s7d+kGJZqbObIHfjUIXlVV /ltImn94PranpyFD6GXgQxVATNNDwyVApxtMoZ4cS3ZyvqxJeddtDUIrBxydN4h0 byL9rX/sJzMZ/HFuA93KzAnBXhOR2JNMSeJ/lzNAvCUEijIHzysYlCKbvWYPMrVm kbeH6dGWxwPbfteJEp/NfP/5cWFzB7hTitygnG19FvX3e7kiE+heOY6wrr//zFfT YZm6Z+/ol45mpYzysoMpU9MI1H2sBF5V+LQIhFBaSn6ZYbPMHrifCS3U1vlUnQqh boBcXuWEAqUUcv6gjpmkH8errtDcyILlkkYQvrZPzus4DdFfyaiAPOtg3UZMM6Ae HURxtqE+HBP2tGua8Bvif5NrJXQ79h0BxWY1CJ/tulO6H5bS21W45hO1YVtkQh9c roMSGXImTuZ3zE518sKsgrX5vspl3UproX6WY+CMw2brpkOfSDGfPSc64DlFtuUo F/Cvi+YlFoE= =9lLE -----END PGP SIGNATURE-----
--- End Message ---