summaryrefslogtreecommitdiff
path: root/debian/po
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2008-05-17 10:09:58 +0000
committerColin Watson <cjwatson@debian.org>2008-05-17 10:09:58 +0000
commitf3eee984dbda4953de0e7b1b8018900805173eda (patch)
tree5f7547ceba44e2b6bb70e2ecb40419847a356444 /debian/po
parentba7f7f495b4d2ba573716bc841e86eb9aec9d66d (diff)
Update Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #481591).
Diffstat (limited to 'debian/po')
-rw-r--r--debian/po/nb.po20
1 files changed, 16 insertions, 4 deletions
diff --git a/debian/po/nb.po b/debian/po/nb.po
index 0eb74786a..99fcefbb7 100644
--- a/debian/po/nb.po
+++ b/debian/po/nb.po
@@ -3,13 +3,14 @@
3# This file is distributed under the same license as the PACKAGE package. 3# This file is distributed under the same license as the PACKAGE package.
4# 4#
5# Bjørn Steensrud <bjornst@powertech.no>, 2007. 5# Bjørn Steensrud <bjornst@powertech.no>, 2007.
6# Bjørn Steensrud <bjornst@skogkatt.homelinux.org>, 2008.
6msgid "" 7msgid ""
7msgstr "" 8msgstr ""
8"Project-Id-Version: nb\n" 9"Project-Id-Version: nb\n"
9"Report-Msgid-Bugs-To: openssh@packages.debian.org\n" 10"Report-Msgid-Bugs-To: openssh@packages.debian.org\n"
10"POT-Creation-Date: 2008-05-17 08:51+0200\n" 11"POT-Creation-Date: 2008-05-17 08:51+0200\n"
11"PO-Revision-Date: 2007-04-24 19:14+0200\n" 12"PO-Revision-Date: 2008-05-17 11:04+0200\n"
12"Last-Translator: Bjørn Steensrud <bjornst@powertech.no>\n" 13"Last-Translator: Bjørn Steensrud <bjornst@skogkatt.homelinux.org>\n"
13"Language-Team: Norwegian Bokmål <i18n-nb@lister.ping.uio.no>\n" 14"Language-Team: Norwegian Bokmål <i18n-nb@lister.ping.uio.no>\n"
14"MIME-Version: 1.0\n" 15"MIME-Version: 1.0\n"
15"Content-Type: text/plain; charset=UTF-8\n" 16"Content-Type: text/plain; charset=UTF-8\n"
@@ -156,7 +157,7 @@ msgstr ""
156#. Description 157#. Description
157#: ../openssh-server.templates:5001 158#: ../openssh-server.templates:5001
158msgid "Vulnerable host keys will be regenerated" 159msgid "Vulnerable host keys will be regenerated"
159msgstr "" 160msgstr "Sårbare vertsnøkler vil bli laget på nytt"
160 161
161#. Type: note 162#. Type: note
162#. Description 163#. Description
@@ -167,6 +168,10 @@ msgid ""
167"these host keys are from a well-known set, are subject to brute-force " 168"these host keys are from a well-known set, are subject to brute-force "
168"attacks, and must be regenerated." 169"attacks, and must be regenerated."
169msgstr "" 170msgstr ""
171"Noen av OpenSSHs vertsnøkler på dette systemet ble opprettet med versjon av "
172"OpenSSH som hadde en feil på slumptallsgeneratoren. Derfor tilhører disse "
173"nøklene et velkjent sett nøkler, kan knekkes med «rå kraft»-metoden og må "
174"lages på nytt."
170 175
171#. Type: note 176#. Type: note
172#. Description 177#. Description
@@ -177,12 +182,16 @@ msgid ""
177"keygen -l -f HOST_KEY_FILE' after the upgrade to print the fingerprints of " 182"keygen -l -f HOST_KEY_FILE' after the upgrade to print the fingerprints of "
178"the new host keys." 183"the new host keys."
179msgstr "" 184msgstr ""
185"De som bruker dette systemet bør få opplysning om denne endringen, siden de "
186"vkil få spørsmål om vertsnøkkelendringen neste gang de logger inn. Etter "
187"oppgraderingen kan fingeravtrykkene for de nye vertsnøklene skrives ut med "
188"kommandoen «keygen -l -f VERTSNØKKELFIL»."
180 189
181#. Type: note 190#. Type: note
182#. Description 191#. Description
183#: ../openssh-server.templates:5001 192#: ../openssh-server.templates:5001
184msgid "The affected host keys are:" 193msgid "The affected host keys are:"
185msgstr "" 194msgstr "De vertsnøklene dette gjelder er:"
186 195
187#. Type: note 196#. Type: note
188#. Description 197#. Description
@@ -192,3 +201,6 @@ msgid ""
192"may be used as a partial test for this. See /usr/share/doc/openssh-server/" 201"may be used as a partial test for this. See /usr/share/doc/openssh-server/"
193"README.compromised-keys.gz for more details." 202"README.compromised-keys.gz for more details."
194msgstr "" 203msgstr ""
204"Det kan være at brukernøkler også har dette problemet. En delvis test på "
205"dette kan gjøres med kommandoen «ssh-vulnkey». Mer detaljer finnes i /usr/"
206"share/doc/openssh-server/README.compromised-keys.gz."