From f13db259b84398dee6b7b6026342a543991e4c8e Mon Sep 17 00:00:00 2001 From: Colin Watson Date: Sat, 17 May 2008 06:50:26 +0000 Subject: debconf-updatepo --- debian/po/nb.po | 43 ++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 42 insertions(+), 1 deletion(-) (limited to 'debian/po/nb.po') diff --git a/debian/po/nb.po b/debian/po/nb.po index fcd094002..0eb74786a 100644 --- a/debian/po/nb.po +++ b/debian/po/nb.po @@ -7,7 +7,7 @@ msgid "" msgstr "" "Project-Id-Version: nb\n" "Report-Msgid-Bugs-To: openssh@packages.debian.org\n" -"POT-Creation-Date: 2008-01-11 00:10+0000\n" +"POT-Creation-Date: 2008-05-17 08:51+0200\n" "PO-Revision-Date: 2007-04-24 19:14+0200\n" "Last-Translator: Bjørn Steensrud \n" "Language-Team: Norwegian Bokmål \n" @@ -151,3 +151,44 @@ msgstr "" "logge inn med passord. Hvis det står på (som er standard), så har det ingen " "virkning å sette «PasswordAuthentication no» med mindre PAM-oppsettet i /etc/" "pam.d/ssh også justeres." + +#. Type: note +#. Description +#: ../openssh-server.templates:5001 +msgid "Vulnerable host keys will be regenerated" +msgstr "" + +#. Type: note +#. Description +#: ../openssh-server.templates:5001 +msgid "" +"Some of the OpenSSH server host keys on this system were generated with a " +"version of OpenSSL that had a broken random number generator. As a result, " +"these host keys are from a well-known set, are subject to brute-force " +"attacks, and must be regenerated." +msgstr "" + +#. Type: note +#. Description +#: ../openssh-server.templates:5001 +msgid "" +"Users of this system should be informed of this change, as they will be " +"prompted about the host key change the next time they log in. Use 'ssh-" +"keygen -l -f HOST_KEY_FILE' after the upgrade to print the fingerprints of " +"the new host keys." +msgstr "" + +#. Type: note +#. Description +#: ../openssh-server.templates:5001 +msgid "The affected host keys are:" +msgstr "" + +#. Type: note +#. Description +#: ../openssh-server.templates:5001 +msgid "" +"User keys may also be affected by this problem. The 'ssh-vulnkey' command " +"may be used as a partial test for this. See /usr/share/doc/openssh-server/" +"README.compromised-keys.gz for more details." +msgstr "" -- cgit v1.2.3