Package: snort
Version: N/A
Severity: normal
Tags: patch

Dear Debian maintainer,

On Thursday, February 14, 2008, I notified you of the beginning of a review 
process
concerning debconf templates for snort.

The debian-l10n-english contributors have now reviewed these templates,
and the proposed changes are attached to this bug report.

Please review the suggested changes are suggested, and if you have any
objections, let me know in the next 3 days.

Please try to avoid uploading snort with these changes right now.

The second phase of this process will begin on Monday, March 10, 2008, when I 
will
coordinate updates to translations of debconf templates.

The existing translators will be notified of the changes: they will
receive an updated PO file for their language.

Simultaneously, a general call for new translations will be sent to
the debian-i18n mailing list.

Both these calls for translations will request updates to be sent as
individual bug reports. That will probably trigger a lot of bug
reports against your package, but these should be easier to deal with.

The call for translation updates and new translations will run until
about Monday, March 31, 2008. Please avoid uploading a package with fixed or 
changed
debconf templates and/or translation updates in the meantime. Of
course, other changes are safe.

Please note that this is an approximative delay, which depends on my
own availability to process this work and is influenced by the fact
that I simultaneously work on many packages.

Around Tuesday, April 01, 2008, I will contact you again and will send a final 
patch
summarizing all the updates (changes to debconf templates,
updates to debconf translations and new debconf translations).

Again, thanks for your attention and cooperation.


-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash
--- snort.old/debian/snort.templates    2008-01-25 06:17:03.829193343 +0100
+++ snort/debian/snort.templates        2008-03-07 07:36:30.896056315 +0100
@@ -1,130 +1,132 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# [EMAIL PROTECTED] for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: snort/startup
 Type: select
-_Choices: boot, dialup, manual
+__Choices: boot, dialup, manual
 Default: boot
-_Description: When should Snort be started?
+_Description: Snort start method:
  Snort can be started during boot, when connecting to the net with pppd or
- only when you manually start it via /usr/sbin/snort.
+ only manually with the /usr/sbin/snort command.
 
 Template: snort/interface
 Type: string
 Default: eth0
 _Description: Interface(s) which Snort should listen on:
- This value usually is 'eth0', but you might want to vary this depending
- on your environment, if you are using a dialup connection 'ppp0' might
- be more appropiate (Hint: use 'ip link show' of 'ifconfig').
- .
- Typically this is the same interface than the 'default route' is on.  You can
- determine which interface is used for this running either '/sbin/ip ro sh' or
- '/sbin/route -n' (look for 'default' or '0.0.0.0').
+ This value is usually 'eth0', but this may be inappropriate in some
+ network environments; for a dialup connection 'ppp0' might be more
+ appropriate (see the output of '/sbin/ifconfig').
+ .
+ Typically, this is the same interface as the 'default route' is on. You can
+ determine which interface is used for this by running '/sbin/route -n'
+ (look for '0.0.0.0').
  .
- It is also not uncommon to use an interface with no IP
- and configured in promiscuous mode, if this is your case, select the
+ It is also not uncommon to use an interface with no IP address
+ configured in promiscuous mode. For such cases, select the
  interface in this system that is physically connected to the network
- you want to inspect, enable promiscuous mode later on and make sure
+ that should be inspected, enable promiscuous mode later on and make sure
  that the network traffic is sent to this interface (either connected
- to a 'port mirroring/spanning' port in a switch, to a hub or to a tap)
+ to a 'port mirroring/spanning' port in a switch, to a hub or to a tap).
  .
- You can configure multiple interfaces here, just by adding more than
+ You can configure multiple interfaces, just by adding more than
  one interface name separated by spaces. Each interface can have its
- specific configuration.
+ own specific configuration.
 
 Template: snort/address_range
 Type: string
 Default: 192.168.0.0/16
 _Description: Address range that Snort will listen on:
- You have to use CIDR form, i.e. 192.168.1.0/24 for a block of 256 IPs or
- 192.168.1.42/32 for just one. Specify multiple addresses on a single line
- separated by ',' (comma characters), no spaces allowed!
+ Please use the CIDR form - for example, 192.168.1.0/24 for a block of
+ 256 addresses or 192.168.1.42/32 for just one. Multiple values should
+ be comma-separated (without spaces).
  .
- If you want you can specify 'any', to not trust any side of the network.
+ If you specify 'any', Snort will listen on all available networks.
  .
- Notice that if you are using multiple interfaces this definition will
- be used as the HOME_NET definition of all of them.
+ Please note that if Snort is configured to use multiple interfaces,
+ it will use this value as the HOME_NET definition for all of them.
 
 Template: snort/disable_promiscuous
 Type: boolean
 Default: false
 _Description: Should Snort disable promiscuous mode on the interface?
  Disabling promiscuous mode means that Snort will only see packets
- addressed to it's own interface. Enabling it allows Snort to check 
- every packet that passes ethernet segment even if it's a connection
- between two other computers.
+ addressed to the interface it is monitoring. Enabling it allows Snort to
+ check every packet that passes the Ethernet segment even if it's a
+ connection between two other computers.
 
 Template: snort/invalid_interface
-Type: note
+Type: error
 _Description: Invalid interface
- One of the interfaces you specified is not valid (it might not exist on the
- system or be down). Please introduce a valid interface when answering the
- question of which interface(s) should Snort listen on.
- .
- If you did not configure an interface then the package is trying to use the
- default ('eth0') which does not seem to be valid in your system.
+ Snort is trying to use an interface which does not exist or is down.
+ Either it is defaulting inappropriately to 'eth0', or you specified
+ one which is invalid.
 
 Template: snort/reverse_order
 Type: boolean
 Default: false
-_Description: Should Snort's rules testing order be changed to Pass|Alert|Log?
- If you change Snort's rules testing order to Pass|Alert|Log, they will be
- applied in Pass->Alert->Log order, instead of standard Alert->Pass->Log.
- This will prevent people from having to make huge Berky Packet Filter
- command line arguments to filter their alert rules.
+_Description: Should Snort's testing order be changed to Pass|Alert|Log?
+ Snort's default testing order is Alert|Pass|Log; if you accept this
+ option, the order will be changed to Pass|Alert|Log, which can make it
+ simpler to use Snort with some packet-filtering tools.
 
 Template: snort/send_stats
 Type: boolean
 Default: true
 _Description: Should daily summaries be sent by e-mail?
- This Snort installation provides a cron job that runs daily and
- summarises the information of Snort logs to a selected email address.
- If you want to disable this feature say 'no' here.
+ A cron job can be set up to send daily summaries of Snort logs to a
+ selected e-mail address.
+ .
+ Please choose whether you want to activate this feature.
 
 Template: snort/stats_rcpt
 Type: string
 Default: root
 _Description: Recipient of daily statistics mails:
- A cron job running daily will summarise the information of the logs
- generated by Snort using a script called 'snort-stat'. Introduce
- here the recipient of these mails. The default value is the system
- administrator. If you keep this value, make sure that the mail of
- the administrator is redirected to a user that actually reads those
- mails.
+ Please specify the e-mail address that should receive daily summaries
+ of Snort logs.
 
 Template: snort/options
 Type: string
 _Description: Additional custom options:
- If you want to specify custom options to Snort, please specify them here.
+ Please specify any additional options Snort should use.
 
 Template: snort/stats_treshold
 Type: string
 Default: 1
-_Description: Minimum occurence to report alerts:
- An alert needs to appear more times than this number to be included in the
- daily statistics.
+_Description: Minimum occurrences before alerts are reported:
+ Please enter the minimum number of alert occurrences before a given alert is
+ included in the daily statistics.
 
 Template: snort/please_restart_manually
 Type: note
-_Description: You are running Snort manually
- Please restart Snort using:
-  /etc/init.d/snort start
- to let the settings take effect.
+_Description: Snort restart required
+ As Snort is manually launched, you need to run '/etc/init.d/snort' for
+ the changes to take place.
 
 Template: snort/config_error
-Type: note
-_Description: There is an error in your configuration
- Your Snort configuration is not correct and Snort will not be able to start
- up normally. Please review your configuration and fix it. If you do not
- do this, Snort package upgrades will probably break. To check which error
- is being generated run '/usr/sbin/snort -T -c /etc/snort/snort.conf'
- (or point to an alternate configuration file if you are using different
- files for different interfaces)
+Type: error
+_Description: Configuration error
+ The current Snort configuration is invalid and will prevent Snort
+ starting up normally. Please review and correct it.
+ .
+ To diagnose an error in a Snort configuration file, use
+ '/usr/sbin/snort -T -c <file>'.
 
 Template: snort/config_parameters
-Type: note
-_Description: This system uses an obsolete configuration file
- Your system has an obsolete configuration file
+Type: error
+_Description: Obsolete configuration file
+ This system uses an obsolete configuration file
  (/etc/snort/snort.common.parameters)
  which has been automatically converted into the new configuration
- file format (at /etc/default/snort). Please review the new configuration
- and remove the obsolete one. Until you do this, the init.d script
- will not use the new configuration and you will not take advantage
- of the benefits introduced in newer releases.
+ file format (at /etc/default/snort).
+ .
+ Please review the new configuration and remove the obsolete
+ one. Until you do this, the initialization script will not use the new
+ configuration and you will not take advantage of the benefits
+ introduced in newer releases.
--- snort.old/debian/snort-mysql.templates      2008-01-25 06:17:03.837193938 
+0100
+++ snort/debian/snort-mysql.templates  2008-03-07 07:36:31.400056463 +0100
@@ -1,181 +1,189 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# [EMAIL PROTECTED] for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: snort-mysql/startup
 Type: select
-_Choices: boot, dialup, manual
+__Choices: boot, dialup, manual
 Default: boot
-_Description: When should Snort be started?
+_Description: Snort start method:
  Snort can be started during boot, when connecting to the net with pppd or
- only when you manually start it via /usr/sbin/snort.
+ only manually with the /usr/sbin/snort command.
 
 Template: snort-mysql/interface
 Type: string
 Default: eth0
 _Description: Interface(s) which Snort should listen on:
- This value usually is 'eth0', but you might want to vary this depending
- on your environment, if you are using a dialup connection 'ppp0' might
- be more appropiate (Hint: use 'ip link show' of 'ifconfig').
- .
- Typically this is the same interface than the 'default route' is on.  You can
- determine which interface is used for this running either '/sbin/ip ro sh' or
- '/sbin/route -n' (look for 'default' or '0.0.0.0').
+ This value is usually 'eth0', but this may be inappropriate in some
+ network environments; for a dialup connection 'ppp0' might be more
+ appropriate (see the output of '/sbin/ifconfig').
+ .
+ Typically, this is the same interface as the 'default route' is on. You can
+ determine which interface is used for this by running '/sbin/route -n'
+ (look for '0.0.0.0').
  .
- It is also not uncommon to use an interface with no IP
- and configured in promiscuous mode, if this is your case, select the
+ It is also not uncommon to use an interface with no IP address
+ configured in promiscuous mode. For such cases, select the
  interface in this system that is physically connected to the network
- you want to inspect, enable promiscuous mode later on and make sure
+ that should be inspected, enable promiscuous mode later on and make sure
  that the network traffic is sent to this interface (either connected
- to a 'port mirroring/spanning' port in a switch, to a hub or to a tap)
+ to a 'port mirroring/spanning' port in a switch, to a hub or to a tap).
  .
- You can configure multiple interfaces here, just by adding more than
+ You can configure multiple interfaces, just by adding more than
  one interface name separated by spaces. Each interface can have its
- specific configuration.
+ own specific configuration.
 
 Template: snort-mysql/address_range
 Type: string
 Default: 192.168.0.0/16
 _Description: Address range that Snort will listen on:
- You have to use CIDR form, i.e. 192.168.1.0/24 for a block of 256 IPs or
- 192.168.1.42/32 for just one. Specify multiple addresses on a single line
- separated by ',' (comma characters), no spaces allowed!
+ Please use the CIDR form - for example, 192.168.1.0/24 for a block of
+ 256 addresses or 192.168.1.42/32 for just one. Multiple values should
+ be comma-separated (without spaces).
  .
- If you want you can specify 'any', to not trust any side of the network.
+ If you specify 'any', Snort will listen on all available networks.
  .
- Notice that if you are using multiple interfaces this definition will
- be used as the HOME_NET definition of all of them.
+ Please note that if Snort is configured to use multiple interfaces,
+ it will use this value as the HOME_NET definition for all of them.
 
 Template: snort-mysql/disable_promiscuous
 Type: boolean
 Default: false
 _Description: Should Snort disable promiscuous mode on the interface?
  Disabling promiscuous mode means that Snort will only see packets
- addressed to it's own interface. Enabling it allows Snort to check 
- every packet that passes ethernet segment even if it's a connection
- between two other computers.
+ addressed to the interface it is monitoring. Enabling it allows Snort to
+ check every packet that passes the Ethernet segment even if it's a
+ connection between two other computers.
 
 Template: snort-mysql/invalid_interface
-Type: note
+Type: error
 _Description: Invalid interface
- One of the interfaces you specified is not valid (it might not exist on the
- system or be down). Please introduce a valid interface when answering the
- question of which interface(s) should Snort listen on.
- .
- If you did not configure an interface then the package is trying to use the
- default ('eth0') which does not seem to be valid in your system.
+ Snort is trying to use an interface which does not exist or is down.
+ Either it is defaulting inappropriately to 'eth0', or you specified
+ one which is invalid.
 
 Template: snort-mysql/reverse_order
 Type: boolean
 Default: false
-_Description: Should Snort's rules testing order be changed to Pass|Alert|Log?
- If you change Snort's rules testing order to Pass|Alert|Log, they will be
- applied in Pass->Alert->Log order, instead of standard Alert->Pass->Log.
- This will prevent people from having to make huge Berky Packet Filter
- command line arguments to filter their alert rules.
+_Description: Should Snort's testing order be changed to Pass|Alert|Log?
+ Snort's default testing order is Alert|Pass|Log; if you accept this
+ option, the order will be changed to Pass|Alert|Log, which can make it
+ simpler to use Snort with some packet-filtering tools.
 
 Template: snort-mysql/send_stats
 Type: boolean
 Default: true
 _Description: Should daily summaries be sent by e-mail?
- This Snort installation provides a cron job that runs daily and
- summarises the information of Snort logs to a selected email address.
- If you want to disable this feature say 'no' here.
+ A cron job can be set up to send daily summaries of Snort logs to a
+ selected e-mail address.
+ .
+ Please choose whether you want to activate this feature.
 
 Template: snort-mysql/stats_rcpt
 Type: string
 Default: root
 _Description: Recipient of daily statistics mails:
- A cron job running daily will summarise the information of the logs
- generated by Snort using a script called 'snort-stat'. Introduce
- here the recipient of these mails. The default value is the system
- administrator. If you keep this value, make sure that the mail of
- the administrator is redirected to a user that actually reads those
- mails.
+ Please specify the e-mail address that should receive daily summaries
+ of Snort logs.
 
 Template: snort-mysql/options
 Type: string
 _Description: Additional custom options:
- If you want to specify custom options to Snort, please specify them here.
+ Please specify any additional options Snort should use.
 
 Template: snort-mysql/stats_treshold
 Type: string
 Default: 1
-_Description: Minimum occurence to report alerts:
- An alert needs to appear more times than this number to be included in the
- daily statistics.
+_Description: Minimum occurrences before alerts are reported:
+ Please enter the minimum number of alert occurrences before a given alert is
+ included in the daily statistics.
 
 Template: snort-mysql/please_restart_manually
 Type: note
-_Description: You are running Snort manually
- Please restart Snort using:
-  /etc/init.d/snort start
- to let the settings take effect.
+_Description: Snort restart required
+ As Snort is manually launched, you need to run '/etc/init.d/snort' for
+ the changes to take place.
 
 Template: snort-mysql/config_error
-Type: note
-_Description: There is an error in your configuration
- Your Snort configuration is not correct and Snort will not be able to start
- up normally. Please review your configuration and fix it. If you do not
- do this, Snort package upgrades will probably break. To check which error
- is being generated run '/usr/sbin/snort -T -c /etc/snort/snort.conf'
- (or point to an alternate configuration file if you are using different
- files for different interfaces)
+Type: error
+_Description: Configuration error
+ The current Snort configuration is invalid and will prevent Snort
+ starting up normally. Please review and correct it.
+ .
+ To diagnose an error in a Snort configuration file, use
+ '/usr/sbin/snort -T -c <file>'.
 
 Template: snort-mysql/config_parameters
-Type: note
-_Description: This system uses an obsolete configuration file
- Your system has an obsolete configuration file
+Type: error
+_Description: Obsolete configuration file
+ This system uses an obsolete configuration file
  (/etc/snort/snort.common.parameters)
  which has been automatically converted into the new configuration
- file format (at /etc/default/snort). Please review the new configuration
- and remove the obsolete one. Until you do this, the init.d script
- will not use the new configuration and you will not take advantage
- of the benefits introduced in newer releases.
+ file format (at /etc/default/snort).
+ .
+ Please review the new configuration and remove the obsolete
+ one. Until you do this, the initialization script will not use the new
+ configuration and you will not take advantage of the benefits
+ introduced in newer releases.
 
 Template: snort-mysql/configure_db
 Type: boolean
 Default: true
-_Description: Do you want to set up a database for snort-mysql to log to?
- You only need to do this the first time you install snort-mysql. Before
- you go on, make sure you have (1) the hostname of a machine running a
- mysql server set up to allow tcp connections from this host, (2) a
- database on that server, (3) a username and password to access the
- database. If you don't have _all_ of these, either select 'no' and run
- with regular file logging support, or fix this first. You can always
- configure database logging later, by reconfiguring the snort-mysql
- package with 'dpkg-reconfigure -plow snort-mysql'
+_Description: Set up a database for snort-mysql to log to?
+ No database has been set up for Snort to log to. Before continuing,
+ you should make sure you have:
+ .
+  - the server host name (that server must allow TCP connections
+    from this machine);
+  - a database on that server;
+  - a username and password to access the database.
+ .
+ If some of these requirements are missing, reject this option and
+ run with regular file logging support.
+ .
+ Database logging can be reconfigured later by running
+ 'dpkg-reconfigure -plow snort-mysql'.
 
 Template: snort-mysql/db_host
 Type: string
 _Description: Database server hostname:
- Make sure it has been set up correctly to allow incoming connections from
- this host!
+ Please specify the host name of a database server that allows
+ incoming connections from this host.
 
 Template: snort-mysql/db_database
 Type: string
-_Description: Database to use:
- Make sure this database has been created and your database user has write
- access to this database.
+_Description: Database name:
+ Please specify the name of an existing database to which the
+ database user has write access.
 
 Template: snort-mysql/db_user
 Type: string
 _Description: Username for database access:
- Make sure this user has been created and has write access.
+ Please specify a database server username with write access to the database.
 
 Template: snort-mysql/db_pass
 Type: password
 _Description: Password for the database connection:
- Please enter a password to connect to the Snort Alert database.
-
+ Please enter the password to use to connect to the Snort Alert database.
 
 Template: snort-mysql/needs_db_config
 Type: note
-_Description: Snort needs a configured database to log to before it starts
+_Description: Configured database mandatory for Snort
  Snort needs a configured database before it can successfully start up.
  In order to create the structure you need to run the following commands
  AFTER the package is installed:
+ .
   cd /usr/share/doc/snort-mysql/
   zcat create_mysql.gz | mysql -u <user> -h <host> -p <databasename>
+ .
  Fill in the correct values for the user, host, and database names.
  MySQL will prompt you for the password.
  .
- After you created the database structure, you will need to start Snort
+ After you have created the database structure, you will need to start Snort
  manually.
 
--- snort.old/debian/snort-pgsql.templates      2008-01-25 06:17:03.897206503 
+0100
+++ snort/debian/snort-pgsql.templates  2008-03-07 07:36:31.484067313 +0100
@@ -1,181 +1,189 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# [EMAIL PROTECTED] for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: snort-pgsql/startup
 Type: select
-_Choices: boot, dialup, manual
+__Choices: boot, dialup, manual
 Default: boot
-_Description: When should Snort be started?
+_Description: Snort start method:
  Snort can be started during boot, when connecting to the net with pppd or
- only when you manually start it via /usr/sbin/snort.
+ only manually with the /usr/sbin/snort command.
 
 Template: snort-pgsql/interface
 Type: string
 Default: eth0
 _Description: Interface(s) which Snort should listen on:
- This value usually is 'eth0', but you might want to vary this depending
- on your environment, if you are using a dialup connection 'ppp0' might
- be more appropiate (Hint: use 'ip link show' of 'ifconfig').
- .
- Typically this is the same interface than the 'default route' is on.  You can
- determine which interface is used for this running either '/sbin/ip ro sh' or
- '/sbin/route -n' (look for 'default' or '0.0.0.0').
+ This value is usually 'eth0', but this may be inappropriate in some
+ network environments; for a dialup connection 'ppp0' might be more
+ appropriate (see the output of '/sbin/ifconfig').
+ .
+ Typically, this is the same interface as the 'default route' is on. You can
+ determine which interface is used for this by running '/sbin/route -n'
+ (look for '0.0.0.0').
  .
- It is also not uncommon to use an interface with no IP
- and configured in promiscuous mode, if this is your case, select the
+ It is also not uncommon to use an interface with no IP address
+ configured in promiscuous mode. For such cases, select the
  interface in this system that is physically connected to the network
- you want to inspect, enable promiscuous mode later on and make sure
+ that should be inspected, enable promiscuous mode later on and make sure
  that the network traffic is sent to this interface (either connected
- to a 'port mirroring/spanning' port in a switch, to a hub or to a tap)
+ to a 'port mirroring/spanning' port in a switch, to a hub or to a tap).
  .
- You can configure multiple interfaces here, just by adding more than
+ You can configure multiple interfaces, just by adding more than
  one interface name separated by spaces. Each interface can have its
- specific configuration.
+ own specific configuration.
 
 Template: snort-pgsql/address_range
 Type: string
 Default: 192.168.0.0/16
 _Description: Address range that Snort will listen on:
- You have to use CIDR form, i.e. 192.168.1.0/24 for a block of 256 IPs or
- 192.168.1.42/32 for just one. Specify multiple addresses on a single line
- separated by ',' (comma characters), no spaces allowed!
+ Please use the CIDR form - for example, 192.168.1.0/24 for a block of
+ 256 addresses or 192.168.1.42/32 for just one. Multiple values should
+ be comma-separated (without spaces).
  .
- If you want you can specify 'any', to not trust any side of the network.
+ If you specify 'any', Snort will listen on all available networks.
  .
- Notice that if you are using multiple interfaces this definition will
- be used as the HOME_NET definition of all of them.
+ Please note that if Snort is configured to use multiple interfaces,
+ it will use this value as the HOME_NET definition for all of them.
 
 Template: snort-pgsql/disable_promiscuous
 Type: boolean
 Default: false
 _Description: Should Snort disable promiscuous mode on the interface?
  Disabling promiscuous mode means that Snort will only see packets
- addressed to it's own interface. Enabling it allows Snort to check 
- every packet that passes ethernet segment even if it's a connection
- between two other computers.
+ addressed to the interface it is monitoring. Enabling it allows Snort to
+ check every packet that passes the Ethernet segment even if it's a
+ connection between two other computers.
 
 Template: snort-pgsql/invalid_interface
-Type: note
+Type: error
 _Description: Invalid interface
- One of the interfaces you specified is not valid (it might not exist on the
- system or be down). Please introduce a valid interface when answering the
- question of which interface(s) should Snort listen on.
- .
- If you did not configure an interface then the package is trying to use the
- default ('eth0') which does not seem to be valid in your system.
+ Snort is trying to use an interface which does not exist or is down.
+ Either it is defaulting inappropriately to 'eth0', or you specified
+ one which is invalid.
 
 Template: snort-pgsql/reverse_order
 Type: boolean
 Default: false
-_Description: Should Snort's rules testing order be changed to Pass|Alert|Log?
- If you change Snort's rules testing order to Pass|Alert|Log, they will be
- applied in Pass->Alert->Log order, instead of standard Alert->Pass->Log.
- This will prevent people from having to make huge Berky Packet Filter
- command line arguments to filter their alert rules.
+_Description: Should Snort's testing order be changed to Pass|Alert|Log?
+ Snort's default testing order is Alert|Pass|Log; if you accept this
+ option, the order will be changed to Pass|Alert|Log, which can make it
+ simpler to use Snort with some packet-filtering tools.
 
 Template: snort-pgsql/send_stats
 Type: boolean
 Default: true
 _Description: Should daily summaries be sent by e-mail?
- This Snort installation provides a cron job that runs daily and
- summarises the information of Snort logs to a selected email address.
- If you want to disable this feature say 'no' here.
+ A cron job can be set up to send daily summaries of Snort logs to a
+ selected e-mail address.
+ .
+ Please choose whether you want to activate this feature.
 
 Template: snort-pgsql/stats_rcpt
 Type: string
 Default: root
 _Description: Recipient of daily statistics mails:
- A cron job running daily will summarise the information of the logs
- generated by Snort using a script called 'snort-stat'. Introduce
- here the recipient of these mails. The default value is the system
- administrator. If you keep this value, make sure that the mail of
- the administrator is redirected to a user that actually reads those
- mails.
+ Please specify the e-mail address that should receive daily summaries
+ of Snort logs.
 
 Template: snort-pgsql/options
 Type: string
 _Description: Additional custom options:
- If you want to specify custom options to Snort, please specify them here.
+ Please specify any additional options Snort should use.
 
 Template: snort-pgsql/stats_treshold
 Type: string
 Default: 1
-_Description: Minimum occurence to report alerts:
- An alert needs to appear more times than this number to be included in the
- daily statistics.
+_Description: Minimum occurrences before alerts are reported:
+ Please enter the minimum number of alert occurrences before a given alert is
+ included in the daily statistics.
 
 Template: snort-pgsql/please_restart_manually
 Type: note
-_Description: You are running Snort manually
- Please restart Snort using:
-  /etc/init.d/snort start
- to let the settings take effect.
+_Description: Snort restart required
+ As Snort is manually launched, you need to run '/etc/init.d/snort' for
+ the changes to take place.
 
 Template: snort-pgsql/config_error
-Type: note
-_Description: There is an error in your configuration
- Your Snort configuration is not correct and Snort will not be able to start
- up normally. Please review your configuration and fix it. If you do not
- do this, Snort package upgrades will probably break. To check which error
- is being generated run '/usr/sbin/snort -T -c /etc/snort/snort.conf'
- (or point to an alternate configuration file if you are using different
- files for different interfaces)
+Type: error
+_Description: Configuration error
+ The current Snort configuration is invalid and will prevent Snort
+ starting up normally. Please review and correct it.
+ .
+ To diagnose an error in a Snort configuration file, use
+ '/usr/sbin/snort -T -c <file>'.
 
 Template: snort-pgsql/config_parameters
-Type: note
-_Description: This system uses an obsolete configuration file
- Your system has an obsolete configuration file
+Type: error
+_Description: Obsolete configuration file
+ This system uses an obsolete configuration file
  (/etc/snort/snort.common.parameters)
  which has been automatically converted into the new configuration
- file format (at /etc/default/snort). Please review the new configuration
- and remove the obsolete one. Until you do this, the init.d script
- will not use the new configuration and you will not take advantage
- of the benefits introduced in newer releases.
+ file format (at /etc/default/snort).
+ .
+ Please review the new configuration and remove the obsolete
+ one. Until you do this, the initialization script will not use the new
+ configuration and you will not take advantage of the benefits
+ introduced in newer releases.
 
 Template: snort-pgsql/configure_db
 Type: boolean
 Default: true
-_Description: Do you want to set up a database for snort-pgsql to log to?
- You only need to do this the first time you install snort-pgsql. Before
- you go on, make sure you have (1) the hostname of a machine running a
- pgsql server set up to allow tcp connections from this host, (2) a
- database on that server, (3) a username and password to access the
- database. If you don't have _all_ of these, either select 'no' and run
- with regular file logging support, or fix this first. You can always
- configure database logging later, by reconfiguring the snort-pgsql
- package with 'dpkg-reconfigure -plow snort-pgsql'
+_Description: Set up a database for snort-pgsql to log to?
+ No database has been set up for Snort to log to. Before continuing,
+ you should make sure you have:
+ .
+  - the server host name (that server must allow TCP connections
+    from this machine);
+  - a database on that server;
+  - a username and password to access the database.
+ .
+ If some of these requirements are missing, reject this option and
+ run with regular file logging support.
+ .
+ Database logging can be reconfigured later by running
+ 'dpkg-reconfigure -plow snort-pgsql'.
 
 Template: snort-pgsql/db_host
 Type: string
 _Description: Database server hostname:
- Make sure it has been set up correctly to allow incoming connections from
- this host!
+ Please specify the host name of a database server that allows
+ incoming connections from this host.
 
 Template: snort-pgsql/db_database
 Type: string
-_Description: Database to use:
- Make sure this database has been created and your database user has write
- access to this database.
+_Description: Database name:
+ Please specify the name of an existing database to which the
+ database user has write access.
 
 Template: snort-pgsql/db_user
 Type: string
 _Description: Username for database access:
- Make sure this user has been created and has write access.
+ Please specify a database server username with write access to the database.
 
 Template: snort-pgsql/db_pass
 Type: password
 _Description: Password for the database connection:
- Please enter a password to connect to the Snort Alert database.
-
+ Please enter the password to use to connect to the Snort Alert database.
 
 Template: snort-pgsql/needs_db_config
 Type: note
-_Description: Snort needs a configured database to log to before it starts
+_Description: Configured database mandatory for Snort
  Snort needs a configured database before it can successfully start up.
  In order to create the structure you need to run the following commands
  AFTER the package is installed:
+ .
   cd /usr/share/doc/snort-pgsql/
   zcat create_postgresql.gz | psql -U <user> -h <host> -W <databasename>
+ .
  Fill in the correct values for the user, host, and database names.
  PostgreSQL will prompt you for the password.
  .
- After you created the database structure, you will need to start Snort
+ After you have created the database structure, you will need to start Snort
  manually.
 
--- snort.old/debian/snort-common.templates     2008-01-25 06:17:03.897206503 
+0100
+++ snort/debian/snort-common.templates 2008-03-07 07:36:31.588056013 +0100
@@ -1,11 +1,20 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# [EMAIL PROTECTED] for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: snort/deprecated_config
 Type: note
-_Description: Your configuration file is deprecated
- Your Snort configuration file (/etc/snort/snort.conf) uses deprecated
- options no longer available for this Snort release. 
+_Description: Deprecated configuration file
+ The Snort configuration file (/etc/snort/snort.conf) uses deprecated
+ options no longer available for this Snort release.
  Snort will not be able to start unless you provide a correct configuration
- file. You can substitute your configuration file with the one provided
- in this package or fix it manually by removing deprecated options.
+ file. Either allow the configuration file to be replaced with the one
+ provided in this package or fix it manually by removing deprecated options.
  .
- The following deprecated options were found in your configuration file:
- ${DEP_CONFIG}
+ The following deprecated options were found in the configuration file:
+ ${DEP_CONFIG}.
--- snort.old/debian/control    2008-01-25 06:17:03.913192050 +0100
+++ snort/debian/control        2008-03-04 17:53:51.499669843 +0100
@@ -6,6 +6,7 @@
 Build-Depends: libnet1-dev, libpcap0.8-dev, libpcre3-dev, debhelper (>= 
4.1.13), libmysqlclient15-dev | libmysqlclient-dev, libpq-dev, po-debconf (>= 
0.5.0), libprelude-dev, iptables-dev
 Build-Depends-Indep: texlive, texlive-latex-base, gs-common
 Standards-Version: 3.5.6
+Homepage: http://www.snort.org/
 
 Package: snort
 Architecture: any
@@ -14,8 +15,7 @@
 Conflicts: snort-mysql, snort-pgsql
 Replaces: snort-common (<< 2.0.2-3)
 Recommends: snort-doc
-Homepage: http://www.snort.org/
-Description: Flexible Network Intrusion Detection System
+Description: flexible Network Intrusion Detection System
  Snort is a libpcap-based packet sniffer/logger which can be used as a
  lightweight network intrusion detection system. It features rules
  based logging and can perform content searching/matching in addition
@@ -25,7 +25,7 @@
  sent to syslog, a separate "alert" file, or even to a Windows computer
  via Samba.
  .
- This package provides the plain-vanilla snort distribution and does not
+ This package provides the plain-vanilla version of Snort and does not
  provide database (available in snort-pgsql and snort-mysql) support.
 
 Package: snort-common
@@ -36,7 +36,7 @@
 Replaces: snort (<< 1.8.4beta1-1)
 Suggests: snort-doc
 Homepage: http://www.snort.org/
-Description: Flexible Network Intrusion Detection System [common files]
+Description: flexible Network Intrusion Detection System [common files]
  Snort is a libpcap-based packet sniffer/logger which can be used as a
  lightweight network intrusion detection system. It features rules
  based logging and can perform content searching/matching in addition
@@ -72,7 +72,7 @@
 Depends: snort-common-libraries (>=${binary:Version}), snort-rules-default (>= 
${binary:Version}), debconf (>= 0.2.80) | debconf-2.0, syslogd | 
system-log-daemon, ${shlibs:Depends}, snort-common (>= ${binary:Version}), 
logrotate
 Conflicts: snort, snort-pgsql
 Homepage: http://www.snort.org/
-Description: Flexible Network Intrusion Detection System [MySQL]
+Description: flexible Network Intrusion Detection System [MySQL]
  Distribution of Snort with support for logging to a MySQL database.
  .
  Snort is a libpcap-based packet sniffer/logger which can be used as a
@@ -91,7 +91,7 @@
 Depends: snort-common-libraries (>=${binary:Version}), snort-rules-default (>= 
${binary:Version}), debconf (>= 0.2.80) | debconf-2.0, adduser (>= 3.11), 
syslogd | system-log-daemon, ${shlibs:Depends}, snort-common (>= 
${binary:Version}), logrotate
 Conflicts: snort, snort-mysql
 Homepage: http://www.snort.org/
-Description: Flexible Network Intrusion Detection System [PostgreSQL]
+Description: flexible Network Intrusion Detection System [PostgreSQL]
  Distribution of Snort with support for logging to a PostgreSQL dbase.
  .
  Snort is a libpcap-based packet sniffer/logger which can be used as a
@@ -110,7 +110,7 @@
 Suggests: snort (>= 2.2.0) | snort-pgsql (>= 2.2.0) | snort-mysql (>= 2.2.0)
 Recommends: oinkmaster
 Homepage: http://www.snort.org/rules/
-Description: Flexible Network Intrusion Detection System ruleset
+Description: flexible Network Intrusion Detection System ruleset
  Snort default ruleset which provides a common set of accepted and test
  network intrusion detection rules developed by the Snort community.
  .
@@ -122,7 +122,7 @@
 Suggests: snort (>= 2.7.0) | snort-pgsql (>= 2.7.0) | snort-mysql (>= 2.7.0)
 Conflicts: snort-common (<< 2.7.0-6)
 Homepage: http://www.snort.org/
-Description: Flexible Network Intrusion Detection System ruleset
+Description: flexible Network Intrusion Detection System ruleset
  Snort is a libpcap-based packet sniffer/logger which can be used as a
  lightweight network intrusion detection system. It features rules
  based logging and can perform content searching/matching in addition

Reply via email to