Patch attached for your review. If you're happy, please ACK it and I
will start a translation round.

Cheers,

Jonathan


-- 
Jonathan Wiltshire

PGP/GPG: 0xDB800B52 / 4216 F01F DCA9 21AC F3D3  A903 CA6B EA3E DB80 0B52
--- /home/jona/debian/rewrite/ufw/ufw.old/debian/templates      2009-05-19 
17:57:28.000000000 +0100
+++ /home/jona/debian/rewrite/ufw/ufw/debian/templates  2009-06-16 
15:58:01.000000000 +0100
@@ -1,28 +1,44 @@
+# These templates have been reviewed by the debian-l10n-english
+# team
+#
+# If modifications/additions/rewording are needed, please ask
+# debian-l10n-engl...@lists.debian.org for advice.
+#
+# Even minor modifications require translation updates and such
+# changes should be coordinated with translators and reviewers.
+
 Template: ufw/existing_configuration
 Type: error
-_Description: Found existing configuration
- An existing configuration was found. Please use the ufw command to manage your
- firewall rules. See 'man ufw' for details.
+_Description: Existing configuration found
+ An existing configuration for ufw has been found.
+ Existing rules must by managed manually.
+ .
+ You should read the ufw(8) manpage for details about ufw configuration.
 
 Template: ufw/enable
 Type: boolean
 Default: false
-_Description: Enable ufw
- If you enable ufw now, it will block incoming connections and will be started
- the next time you reboot. If it is disabled, ufw will not be started on boot.
- To start or stop ufw without rebooting, please use '/etc/init.d/ufw start' or
- '/etc/init.d/ufw stop'.
+_Description: Start ufw automatically?
+ If you choose this option, the rules you are about to set
+ will be enabled during system startup so that this host is protected
+ as early as possible.
+ .
+ To protect this host immediately, you must start ufw manually.
 
 Template: ufw/allow_known_ports
 Type: multiselect
-_Choices: Cups, DNS, Imap (Secure), Pop3 (Secure), SSH, Samba, Smtp, WWW, WWW 
(Secure)
-_Description: Allow the following services:
- Selecting an item from this list allows all traffic to the specified service.
+Choices: CUPS, DNS, IMAPS, POP3S, SSH, CIFS (Samba), SMTP, HTTP, HTTPS
+_Description: Authorized services:
+ Please choose the services that should be available for incoming connections.
+ .
+ Other services may be specified in the next configuration step.
 
 Template: ufw/allow_custom_ports
 Type: string
-_Description: Allow additional ports:
+_Description: Additional authorized services:
  Please enter a space separated list of any additional ports you would like to
- have open. These may either be a service name as found in /etc/services, a
- port number, or a port number/protocol combination. Eg, to allow http, port 53
- and tcp port 22, use 'http 53 22/tcp'.
+ open. You may use a service name (as found in /etc/services), a
+ port number, or a port number with protocol.
+ .
+ Example: to allow a web server, port 53
+ and tcp port 22, you should enter "www 53 22/tcp".
--- /home/jona/debian/rewrite/ufw/ufw.old/debian/control        2009-05-19 
17:57:28.000000000 +0100
+++ /home/jona/debian/rewrite/ufw/ufw/debian/control    2009-05-27 
20:17:18.000000000 +0100
@@ -13,7 +13,8 @@
 Architecture: all
 Depends: debconf, ${python:Depends}, ${misc:Depends}, iptables (>= 1.4.0), ucf
 XB-Python-Version: ${python:Versions}
-Description: program for managing a netfilter firewall
- Ufw is a tool to manage a netfilter firewall. It provides a command line
- interface with PF-style syntax and aims to be uncomplicated and easy to use.
- It is particularly well-suited for use as a host-based firewall.
+Description: program for managing a Netfilter firewall
+ The Uncomplicated FireWall is a front-end for iptables, to make managing a
+ Netfilter firewall easier. It provides a command line interface with syntax
+ similar to OpenBSD's Packet Filter. It is particularly well-suited as a
+ host-based firewall.

Attachment: signature.asc
Description: Digital signature

Reply via email to