On Thu, Jun 04, 2009 at 10:00:47AM -0500, Jamie Strandboge wrote: > I like this wording better, but when coupled with the following phrase, > there is an ambiguity on when the host will be protected. What if it was > something like (I'm not super pleased with the wording, but it at least > conveys that the host is not protected unless started manually, or if > enabled via debconf, until reboot):
It looks fine to me - updated patch attached. If you're happy with it, I'll go ahead with a round of translations. -- Jonathan Wiltshire PGP/GPG: 0xDB800B52 / 4216 F01F DCA9 21AC F3D3 A903 CA6B EA3E DB80 0B52
--- /home/jona/debian/rewrite/ufw/ufw.old/debian/templates 2009-05-19 17:57:28.000000000 +0100 +++ /home/jona/debian/rewrite/ufw/ufw/debian/templates 2009-06-04 23:31:07.000000000 +0100 @@ -1,28 +1,44 @@ +# These templates have been reviewed by the debian-l10n-english +# team +# +# If modifications/additions/rewording are needed, please ask +# debian-l10n-engl...@lists.debian.org for advice. +# +# Even minor modifications require translation updates and such +# changes should be coordinated with translators and reviewers. + Template: ufw/existing_configuration Type: error -_Description: Found existing configuration - An existing configuration was found. Please use the ufw command to manage your - firewall rules. See 'man ufw' for details. +_Description: Existing configuration found + An existing configuration file for ufw has been found. + Existing rules must by adapted manually. + . + You should read the ufw(1) manpage for details about ufw configuration. Template: ufw/enable Type: boolean Default: false -_Description: Enable ufw - If you enable ufw now, it will block incoming connections and will be started - the next time you reboot. If it is disabled, ufw will not be started on boot. - To start or stop ufw without rebooting, please use '/etc/init.d/ufw start' or - '/etc/init.d/ufw stop'. +_Description: Start ufw automatically? + If you choose this option, the rules you are about to set + will be enabled during system startup so that this host is protected + as early as possible. + . + To protect this host immediately, you must start ufw manually. Template: ufw/allow_known_ports Type: multiselect -_Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW (Secure) -_Description: Allow the following services: - Selecting an item from this list allows all traffic to the specified service. +__Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW (Secure) +_Description: Authorized services: + Please choose the services that should be available for incoming connections. + . + Other services may be specified in the next configuration step. Template: ufw/allow_custom_ports Type: string -_Description: Allow additional ports: +_Description: Additional authorized services: Please enter a space separated list of any additional ports you would like to - have open. These may either be a service name as found in /etc/services, a - port number, or a port number/protocol combination. Eg, to allow http, port 53 - and tcp port 22, use 'http 53 22/tcp'. + open. You may use a service name (as found in /etc/services), a + port number, or a port number with protocol. + . + Example: to allow a web server, port 53 + and tcp port 22, you should enter "www 53 22/tcp". --- /home/jona/debian/rewrite/ufw/ufw.old/debian/control 2009-05-19 17:57:28.000000000 +0100 +++ /home/jona/debian/rewrite/ufw/ufw/debian/control 2009-05-27 20:17:18.000000000 +0100 @@ -13,7 +13,8 @@ Architecture: all Depends: debconf, ${python:Depends}, ${misc:Depends}, iptables (>= 1.4.0), ucf XB-Python-Version: ${python:Versions} -Description: program for managing a netfilter firewall - Ufw is a tool to manage a netfilter firewall. It provides a command line - interface with PF-style syntax and aims to be uncomplicated and easy to use. - It is particularly well-suited for use as a host-based firewall. +Description: program for managing a Netfilter firewall + The Uncomplicated FireWall is a front-end for iptables, to make managing a + Netfilter firewall easier. It provides a command line interface with syntax + similar to OpenBSD's Packet Filter. It is particularly well-suited as a + host-based firewall.
signature.asc
Description: Digital signature