On Thu, Jun 04, 2009 at 10:00:47AM -0500, Jamie Strandboge wrote:
> I like this wording better, but when coupled with the following phrase,
> there is an ambiguity on when the host will be protected. What if it was
> something like (I'm not super pleased with the wording, but it at least
> conveys that the host is not protected unless started manually, or if
> enabled via debconf, until reboot):

It looks fine to me - updated patch attached. If you're happy with it,
I'll go ahead with a round of translations.


-- 
Jonathan Wiltshire

PGP/GPG: 0xDB800B52 / 4216 F01F DCA9 21AC F3D3  A903 CA6B EA3E DB80 0B52
--- /home/jona/debian/rewrite/ufw/ufw.old/debian/templates      2009-05-19 
17:57:28.000000000 +0100
+++ /home/jona/debian/rewrite/ufw/ufw/debian/templates  2009-06-04 
23:31:07.000000000 +0100
@@ -1,28 +1,44 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# debian-l10n-engl...@lists.debian.org for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: ufw/existing_configuration
 Type: error
-_Description: Found existing configuration
- An existing configuration was found. Please use the ufw command to manage your
- firewall rules. See 'man ufw' for details.
+_Description: Existing configuration found
+ An existing configuration file for ufw has been found.
+ Existing rules must by adapted manually.
+ .
+ You should read the ufw(1) manpage for details about ufw configuration.
 
 Template: ufw/enable
 Type: boolean
 Default: false
-_Description: Enable ufw
- If you enable ufw now, it will block incoming connections and will be started
- the next time you reboot. If it is disabled, ufw will not be started on boot.
- To start or stop ufw without rebooting, please use '/etc/init.d/ufw start' or
- '/etc/init.d/ufw stop'.
+_Description: Start ufw automatically?
+ If you choose this option, the rules you are about to set
+ will be enabled during system startup so that this host is protected
+ as early as possible.
+ .
+ To protect this host immediately, you must start ufw manually.
 
 Template: ufw/allow_known_ports
 Type: multiselect
-_Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW 
(Secure)
-_Description: Allow the following services:
- Selecting an item from this list allows all traffic to the specified service.
+__Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW 
(Secure)
+_Description: Authorized services:
+ Please choose the services that should be available for incoming connections.
+ .
+ Other services may be specified in the next configuration step.
 
 Template: ufw/allow_custom_ports
 Type: string
-_Description: Allow additional ports:
+_Description: Additional authorized services:
  Please enter a space separated list of any additional ports you would like to
- have open. These may either be a service name as found in /etc/services, a
- port number, or a port number/protocol combination. Eg, to allow http, port 53
- and tcp port 22, use 'http 53 22/tcp'.
+ open. You may use a service name (as found in /etc/services), a
+ port number, or a port number with protocol.
+ .
+ Example: to allow a web server, port 53
+ and tcp port 22, you should enter "www 53 22/tcp".
--- /home/jona/debian/rewrite/ufw/ufw.old/debian/control        2009-05-19 
17:57:28.000000000 +0100
+++ /home/jona/debian/rewrite/ufw/ufw/debian/control    2009-05-27 
20:17:18.000000000 +0100
@@ -13,7 +13,8 @@
 Architecture: all
 Depends: debconf, ${python:Depends}, ${misc:Depends}, iptables (>= 1.4.0), ucf
 XB-Python-Version: ${python:Versions}
-Description: program for managing a netfilter firewall
- Ufw is a tool to manage a netfilter firewall. It provides a command line
- interface with PF-style syntax and aims to be uncomplicated and easy to use.
- It is particularly well-suited for use as a host-based firewall.
+Description: program for managing a Netfilter firewall
+ The Uncomplicated FireWall is a front-end for iptables, to make managing a
+ Netfilter firewall easier. It provides a command line interface with syntax
+ similar to OpenBSD's Packet Filter. It is particularly well-suited as a
+ host-based firewall.

Attachment: signature.asc
Description: Digital signature

Reply via email to