[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1049995: marked as done (openssh: catalan translation [INTL:ca])



Your message dated Mon, 18 Dec 2023 23:12:02 +0000
with message-id <E1rFMmI-00A1rg-Jl@fasolo.debian.org>
and subject line Bug#1049995: fixed in openssh 1:9.6p1-1
has caused the Debian Bug report #1049995,
regarding openssh: catalan translation  [INTL:ca]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1049995: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1049995
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: openssh
Severity: wishlist
Tags: patch l10n
X-Debbugs-Cc: pablo@establetech.com.es


I did the catalan translation of it, and I will add the translation is included
thanks for reading!

-- System Information:
Debian Release: 11.6
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500,
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-21-amd64 (SMP w/1 CPU thread)
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8), LANGUAGE not
set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
# SOME DESCRIPTIVE TITLE.
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# Pablo Huguet, 2023.
# <https://linktr.ee/VoodooPablo>
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: openssh\n"
"Report-Msgid-Bugs-To: openssh@packages.debian.org\n"
"POT-Creation-Date: 2014-03-20 02:06+0000\n"
"PO-Revision-Date: 2023-08-18 03:20+0200\n"
"Last-Translator: Pablo Huguet <https://linktr.ee/VoodooPablo>\n"
"Language-Team: Catalan <debian-l10n-catalan@lists.debian.org>\n"
"Language: ca\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid "Disable SSH password authentication for root?"
msgstr "Desactivar l'autenticació de contrasenya SSH per a root?"

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid ""
"Previous versions of openssh-server permitted logging in as root over SSH "
"using password authentication. The default for new installations is now "
"\"PermitRootLogin prohibit-password\", which disables password "
"authentication for root without breaking systems that have explicitly "
"configured SSH public key authentication for root."
msgstr ""
"Les versions anteriors d'openssh-server permetien iniciar sessió com a root a través de SSH"
"utilitzant l'autenticació de contrasenya. El valor predeterminat per a instal·lacions noves és ara "
"\"PermitRootLogin prohibit-password\", que desactiva la contrasenya "
"autenticació per a root sense trencar sistemes que tenen explícitament"
"Autenticació de clau pública SSH configurada per a root".

#. Type: boolean
#. Description
#: ../openssh-server.templates:1001
msgid ""
"This change makes systems more secure against brute-force password "
"dictionary attacks on the root user (a very common target for such attacks). "
"However, it may break systems that are set up with the expectation of being "
"able to SSH as root using password authentication. You should only make this "
"change if you do not need to do that."
msgstr ""
"Aquest canvi fa que els sistemes siguin més segurs contra contrasenyes de força bruta"
"atacs de diccionari a l'usuari root (un objectiu molt comú per a aquests atacs)."
"No obstant això, pot trencar sistemes que es configuren amb l'expectativa de ser"
"Pot fer SSH com a root mitjançant l'autenticació de contrasenya. Només hauríeu de fer això"
"canvia si no cal fer-ho".

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:9.6p1-1
Done: Colin Watson <cjwatson@debian.org>

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1049995@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 18 Dec 2023 22:35:25 +0000
Source: openssh
Architecture: source
Version: 1:9.6p1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 1049995 1057835
Changes:
 openssh (1:9.6p1-1) unstable; urgency=medium
 .
   * Use single quotes in suggested ssh-keygen commands (closes: #1057835).
   * Debconf translations:
     - Catalan (thanks, Pablo Huguet; closes: #1049995).
   * New upstream release (https://www.openssh.com/releasenotes.html#9.6p1):
     - [CVE-2023-48795] ssh(1), sshd(8): implement protocol extensions to
       thwart the so-called "Terrapin attack" discovered by Fabian Bäumer,
       Marcus Brinkmann and Jörg Schwenk. This attack allows a MITM to effect
       a limited break of the integrity of the early encrypted SSH transport
       protocol by sending extra messages prior to the commencement of
       encryption, and deleting an equal number of consecutive messages
       immediately after encryption starts. A peer SSH client/server would
       not be able to detect that messages were deleted.
     - [SECURITY] ssh-agent(1): when adding PKCS#11-hosted private keys while
       specifying destination constraints, if the PKCS#11 token returned
       multiple keys then only the first key had the constraints applied. Use
       of regular private keys, FIDO tokens and unconstrained keys are
       unaffected.
     - [SECURITY] ssh(1): if an invalid user or hostname that contained shell
       metacharacters was passed to ssh(1), and a ProxyCommand, LocalCommand
       directive or "match exec" predicate referenced the user or hostname
       via %u, %h or similar expansion token, then an attacker who could
       supply arbitrary user/hostnames to ssh(1) could potentially perform
       command injection depending on what quoting was present in the
       user-supplied ssh_config(5) directive. OpenSSH 9.6 now bans most shell
       metacharacters from user and hostnames supplied via the command-line.
     - ssh(1), sshd(8): the RFC4254 connection/channels protocol provides a
       TCP-like window mechanism that limits the amount of data that can be
       sent without acceptance from the peer. In cases where this limit was
       exceeded by a non-conforming peer SSH implementation, ssh(1)/sshd(8)
       previously discarded the extra data. From OpenSSH 9.6, ssh(1)/sshd(8)
       will now terminate the connection if a peer exceeds the window limit
       by more than a small grace factor. This change should have no effect
       of SSH implementations that follow the specification.
     - ssh(1): add a %j token that expands to the configured ProxyJump
       hostname (or the empty string if this option is not being used) that
       can be used in a number of ssh_config(5) keywords.
     - ssh(1): add ChannelTimeout support to the client, mirroring the same
       option in the server and allowing ssh(1) to terminate quiescent
       channels.
     - ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): add support for reading
       ED25519 private keys in PEM PKCS8 format. Previously only the OpenSSH
       private key format was supported.
     - ssh(1), sshd(8): introduce a protocol extension to allow renegotiation
       of acceptable signature algorithms for public key authentication after
       the server has learned the username being used for authentication.
       This allows varying sshd_config(5) PubkeyAcceptedAlgorithms in a
       "Match user" block.
     - ssh-add(1), ssh-agent(1): add an agent protocol extension to allow
       specifying certificates when loading PKCS#11 keys. This allows the use
       of certificates backed by PKCS#11 private keys in all OpenSSH tools
       that support ssh-agent(1). Previously only ssh(1) supported this
       use-case.
     - ssh(1): when deciding whether to enable the keystroke timing
       obfuscation, enable it only if a channel with a TTY is active.
     - ssh(1): switch mainloop from poll(3) to ppoll(3) and mask signals
       before checking flags set in signal handler. Avoids potential race
       condition between signaling ssh to exit and polling.
     - ssh(1): when connecting to a destination with both the AddressFamily
       and CanonicalizeHostname directives in use, the AddressFamily
       directive could be ignored.
     - sftp(1): correct handling of the limits@openssh.com option when the
       server returned an unexpected message.
     - ssh(1): release GSS OIDs only at end of authentication, avoiding
       unnecessary init/cleanup cycles.
     - ssh_config(5): mention "none" is a valid argument to IdentityFile in
       the manual.
     - scp(1): improved debugging for paths from the server rejected for not
       matching the client's glob(3) pattern in old SCP/RCP protocol mode.
     - ssh-agent(1): refuse signing operations on destination-constrained
       keys if a previous session-bind operation has failed. This may prevent
       a fail-open situation in future if a user uses a mismatched ssh(1)
       client and ssh-agent(1) where the client supports a key type that the
       agent does not support.
   * debian/run-tests: Supply absolute paths to tools.
   * debian/run-tests: Enable interop tests for Dropbear.
Checksums-Sha1:
 d3eace8dce5cdf66c48c04524170261e07e1c363 3344 openssh_9.6p1-1.dsc
 de300d09ec79fdbf37de4e6672cce4161439f2c3 1857862 openssh_9.6p1.orig.tar.gz
 63c241035c665da9284965575cd96e0467bf09c1 833 openssh_9.6p1.orig.tar.gz.asc
 4e9091137627c3499d4752959c72151302c1edfd 187648 openssh_9.6p1-1.debian.tar.xz
Checksums-Sha256:
 a41c76ab7a4a9859911a9544649dbff4d2e2f488ebdda4d716e20b0fbd5f3208 3344 openssh_9.6p1-1.dsc
 910211c07255a8c5ad654391b40ee59800710dd8119dd5362de09385aa7a777c 1857862 openssh_9.6p1.orig.tar.gz
 9b1e931cbc811f02e91f7eacd55f8211cc45dade11975462f4b0dcdad29927aa 833 openssh_9.6p1.orig.tar.gz.asc
 4acec5879df194b4ff45d821a32a97a3bcfc1df70cb6bfa5cc82b41487d94dc9 187648 openssh_9.6p1-1.debian.tar.xz
Files:
 5437c48184621f81eb013447ea535a10 3344 net standard openssh_9.6p1-1.dsc
 5e90def5af3ffb27e149ca6fff12bef3 1857862 net standard openssh_9.6p1.orig.tar.gz
 a9aaf09b36b23327431072ed804d7094 833 net standard openssh_9.6p1.orig.tar.gz.asc
 a5b8ac5913fb44b1bbb64146e8d1e2f6 187648 net standard openssh_9.6p1-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmWAybkACgkQOTWH2X2G
UAvJoxAAm5xDxAmsWRPQP2tVdlLmk0uq9vqgsqQXmUnZb3qMNXVikkNMbilm/s6X
QicZSpZUq5ldOaKt1176NH0FbMbi+72TgM+d8xSaBbaU4U73gFHXIzb0qH+lI9vr
rv0kpM8lhyhmGa1vC39O1Hv1/BFQYENmf3rLpYwS/vkqR+kHyDiOORqMyYobBlXX
sq+bz1tWvgGzJjeEVoWzzov66WZ5MvbE/Se5jlem1+8zLcIfvtPTkcKEVHxpnsyV
Io0bnrAcoGfnpF389oxdgh6FZRYxZxV+rGme1OfbL16Dt4h4Z8p0PGEUI94Kzhxv
ou8fg2HgmHB2RbaaskdMlBRPZWQtE3Hv0/RXGFGzqh43tKiKUhg4kAIgrczuu4nE
u4J1UrmUbIOeyedss1SyxqAC87cyAOCjPXB3Nz8hASZG/9PL3ClFKLM6xYyyL7CT
p/ehPG/fxdYGJk2ySAJPqZeaueQpdeYTEtGu4pnCFXI9RvvEvpa4dTbHArSO1ajp
7QDbdadvP+KL42BGRyChBvKZem0Rpu3YDj6lmnuwEALSomZcbtnFc0PE0kYaibae
NYgXh9hJDTaU6qZlcuuHbpr4F8r7kW9+9fWF7fcWjstt87c281rD0kAwpTdTLnlS
Vyyj5OFB7AePLOUDUDj521Esmy/F4mc2mLvA4Eod3tkIad2yMwA=
=fI/z
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: