summaryrefslogtreecommitdiff
path: root/debian/po/templates.pot
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2013-05-22 01:55:10 +0100
committerColin Watson <cjwatson@debian.org>2013-05-22 01:55:10 +0100
commit21a53192fe3500604a06dc01afa26eaaa34e73cf (patch)
tree233609e6dc30e27d0a46f4659a05b1b24cf15d36 /debian/po/templates.pot
parentedcebe7e07b1d2626cceb312fb2cc2391679a78a (diff)
* Remove the check for vulnerable host keys; this was first added five
years ago, and everyone should have upgraded through a version that applied these checks by now. The ssh-vulnkey tool and the blacklisting support in sshd are still here, at least for the moment. * This removes the last of our uses of debconf (closes: #221531).
Diffstat (limited to 'debian/po/templates.pot')
-rw-r--r--debian/po/templates.pot59
1 files changed, 0 insertions, 59 deletions
diff --git a/debian/po/templates.pot b/debian/po/templates.pot
deleted file mode 100644
index 3c408d9eb..000000000
--- a/debian/po/templates.pot
+++ /dev/null
@@ -1,59 +0,0 @@
1# SOME DESCRIPTIVE TITLE.
2# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
3# This file is distributed under the same license as the PACKAGE package.
4# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
5#
6#, fuzzy
7msgid ""
8msgstr ""
9"Project-Id-Version: openssh\n"
10"Report-Msgid-Bugs-To: openssh@packages.debian.org\n"
11"POT-Creation-Date: 2013-05-22 00:05+0100\n"
12"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
13"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
14"Language-Team: LANGUAGE <LL@li.org>\n"
15"Language: \n"
16"MIME-Version: 1.0\n"
17"Content-Type: text/plain; charset=CHARSET\n"
18"Content-Transfer-Encoding: 8bit\n"
19
20#. Type: note
21#. Description
22#: ../openssh-server.templates:1001
23msgid "Vulnerable host keys will be regenerated"
24msgstr ""
25
26#. Type: note
27#. Description
28#: ../openssh-server.templates:1001
29msgid ""
30"Some of the OpenSSH server host keys on this system were generated with a "
31"version of OpenSSL that had a broken random number generator. As a result, "
32"these host keys are from a well-known set, are subject to brute-force "
33"attacks, and must be regenerated."
34msgstr ""
35
36#. Type: note
37#. Description
38#: ../openssh-server.templates:1001
39msgid ""
40"Users of this system should be informed of this change, as they will be "
41"prompted about the host key change the next time they log in. Use 'ssh-"
42"keygen -l -f HOST_KEY_FILE' after the upgrade to print the fingerprints of "
43"the new host keys."
44msgstr ""
45
46#. Type: note
47#. Description
48#: ../openssh-server.templates:1001
49msgid "The affected host keys are:"
50msgstr ""
51
52#. Type: note
53#. Description
54#: ../openssh-server.templates:1001
55msgid ""
56"User keys may also be affected by this problem. The 'ssh-vulnkey' command "
57"may be used as a partial test for this. See /usr/share/doc/openssh-server/"
58"README.compromised-keys.gz for more details."
59msgstr ""