Subversion Repositories svn LFS-FR

Rev

Rev 7264 | Rev 7304 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
7156 jlepiller 1
# SOME DESCRIPTIVE TITLE
2
# Copyright (C) YEAR Free Software Foundation, Inc.
3
# This file is distributed under the same license as the PACKAGE package.
4
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
5
#
6
msgid ""
7
msgstr ""
8
"Project-Id-Version: PACKAGE VERSION\n"
7280 jlepiller 9
"POT-Creation-Date: 2017-05-20 04:05+0000\n"
10
"PO-Revision-Date: 2017-05-20 08:27+0000\n"
7156 jlepiller 11
"Last-Translator: roptat <roptat@lepiller.eu>\n"
12
"Language-Team: LANGUAGE <LL@li.org>\n"
7257 jlepiller 13
"Language: fr\n"
7156 jlepiller 14
"MIME-Version: 1.0\n"
15
"Content-Type: text/plain; charset=UTF-8\n"
16
"Content-Transfer-Encoding: 8bit\n"
17
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
7258 jlepiller 18
"X-Generator: Pootle 2.8\n"
7280 jlepiller 19
"X-POOTLE-MTIME: 1495268829.421106\n"
7156 jlepiller 20
 
7202 jlepiller 21
#. type: Content of the certhost entity
7156 jlepiller 22
#: blfs-en/postlfs/security/cacerts.xml:7
7202 jlepiller 23
msgid "https://hg.mozilla.org/"
24
msgstr "https://hg.mozilla.org/"
7156 jlepiller 25
 
7202 jlepiller 26
#. type: Content of the certpath entity
7156 jlepiller 27
#: blfs-en/postlfs/security/cacerts.xml:8
7202 jlepiller 28
msgid "/lib/ckfw/builtins/certdata.txt"
29
msgstr "/lib/ckfw/builtins/certdata.txt"
7156 jlepiller 30
 
7202 jlepiller 31
#. type: Content of the ca-bundle-download entity
7156 jlepiller 32
#: blfs-en/postlfs/security/cacerts.xml:9
7202 jlepiller 33
msgid "&sources-anduin-http;/other/certdata.txt"
34
msgstr "&sources-anduin-http;/other/certdata.txt"
7156 jlepiller 35
 
7202 jlepiller 36
#. type: Content of the ca-bundle-size entity
7156 jlepiller 37
#: blfs-en/postlfs/security/cacerts.xml:10
7202 jlepiller 38
msgid "1.6 MB"
7233 jlepiller 39
msgstr "1.6 Mo"
7156 jlepiller 40
 
7202 jlepiller 41
#. type: Content of the cacerts-buildsize entity
7156 jlepiller 42
#: blfs-en/postlfs/security/cacerts.xml:11
7258 jlepiller 43
msgid "6.5 MB (with all runtime deps)"
44
msgstr "6.5 Mo (avec toutes les dépendances à l'exécution)"
7156 jlepiller 45
 
7202 jlepiller 46
#. type: Content of the cacerts-time entity
47
#: blfs-en/postlfs/security/cacerts.xml:12
48
msgid "0.2 SBU (with all runtime deps)"
49
msgstr "0.2 SBU (avec toutes les dépendances à l'exécution)"
50
 
51
#. type: Content of the make-ca-download entity
52
#: blfs-en/postlfs/security/cacerts.xml:14
7203 jlepiller 53
msgid "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
54
msgstr "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
7202 jlepiller 55
 
56
#. type: Content of the make-ca-size entity
57
#: blfs-en/postlfs/security/cacerts.xml:15
7258 jlepiller 58
msgid "24 KB"
59
msgstr "24 Ko"
7202 jlepiller 60
 
61
#. type: Content of the make-ca-md5sum entity
62
#: blfs-en/postlfs/security/cacerts.xml:16
7264 jlepiller 63
msgid "a21a04d6ff5c4645c748220dbaa9f221"
64
msgstr "a21a04d6ff5c4645c748220dbaa9f221"
7202 jlepiller 65
 
7156 jlepiller 66
#. type: Content of: <sect1><sect1info>
7202 jlepiller 67
#: blfs-en/postlfs/security/cacerts.xml:23
7257 jlepiller 68
#| msgid ""
7280 jlepiller 69
#| "<othername>$LastChangedBy: dj $</othername> <date>$Date: 2017-05-14 07:09:26"
70
#| " +0000 (Sun, 14 May 2017) $</date>"
7156 jlepiller 71
msgid ""
7280 jlepiller 72
"<othername>$LastChangedBy: dj $</othername> <date>$Date: 2017-05-19 06:02:20"
73
" +0000 (Fri, 19 May 2017) $</date>"
7156 jlepiller 74
msgstr ""
7280 jlepiller 75
"<othername>$LastChangedBy: dj $</othername> <date>$Date: 2017-05-19 06:02:20"
76
" +0000 (Fri, 19 May 2017) $</date>"
7156 jlepiller 77
 
78
#. type: Content of: <sect1><indexterm><primary>
7202 jlepiller 79
#: blfs-en/postlfs/security/cacerts.xml:27
80
#: blfs-en/postlfs/security/cacerts.xml:50
7156 jlepiller 81
msgid "Certificate Authority Certificates"
7159 jlepiller 82
msgstr "Certificats d'autorité de certification"
7156 jlepiller 83
 
84
#. type: Content of: <sect1><para>
7202 jlepiller 85
#: blfs-en/postlfs/security/cacerts.xml:29
7156 jlepiller 86
msgid ""
7202 jlepiller 87
"Public Key Infrastructure (PKI) is a method to validate the authenticity of "
88
"an otherwise unknown entity across untrusted networks. PKI works by "
89
"establishing a chain of trust, rather than trusting each individual host or "
90
"entity explicitly. In order for a certificate presented by a remote entity "
91
"to be trusted, that certificate must present a complete chain of "
92
"certificates that can be validated using the root certificate of a "
93
"Certificate Authority (CA) that is trusted by the local machine."
7156 jlepiller 94
msgstr ""
7202 jlepiller 95
"Une Infrastructure à Clés Publiques (PKI) est une méthode pour valider "
96
"l'authenticité d'une entité autrement inconnue au travers de réseaux qui ne "
97
"sont pas de confiance. La PKI fonctionne en établissant une chaîne de "
98
"confiance, plutôt que de faire confiance individuellement à chaque hôte ou "
99
"entité de manière explicite. Pour qu'un certificat présenté par une entité "
100
"distante soit reconnu, le certificat doit présenter une chaîne complète de "
101
"certificats qui peuvent être validé en utilisant le certificat racine d'une "
102
"autorité de certification (CA) en laquelle la machine locale a confiance."
7156 jlepiller 103
 
7202 jlepiller 104
#. type: Content of: <sect1><para>
105
#: blfs-en/postlfs/security/cacerts.xml:37
106
msgid ""
107
"Establishing trust with a CA involves validating things like company "
108
"address, ownership, contact information, etc., and ensuring that the CA has "
109
"followed best practices, such as undergoing periodic security audits by "
110
"independent investigators and maintaining an always available certificate "
111
"revocation list. This is well outside the scope of BLFS (as it is for most "
112
"Linux distributions). The certificate store provided here is taken from the "
113
"Mozilla Foundation, who have established very strict inclusion policies "
114
"described <ulink url=\"https://www.mozilla.org/en-"
115
"US/about/governance/policies/security-group/certs/\">here</ulink>."
116
msgstr ""
117
"L'établissement de la confiance avec une CA nécessite de valider des choses "
118
"comme l'adresse de la compagnie, la propriété, les informations de contact, "
119
"etc, et de s'assurer que la CA a suivi les bonnes pratiques, comme des "
120
"audits de sécurité périodiques par des enquêteurs indépendants et le "
7216 jlepiller 121
"maintient d'une liste de révocation de certificats toujours disponible. Ceci"
122
" est bien au delà de la portée de BLFS (comme pour la plupart des "
123
"distributions Linux). Le magasin de certificats fournit ici est emprunté à "
124
"la fondation Mozilla, qui ont établit une politique d'inclusion très stricte"
125
" décrite <ulink url=\"https://www.mozilla.org/en-"
126
"US/about/governance/policies/security-group/certs/\">ici</ulink>."
7202 jlepiller 127
 
7156 jlepiller 128
#. type: Content of: <sect1><sect2><title>
7202 jlepiller 129
#: blfs-en/postlfs/security/cacerts.xml:54
7156 jlepiller 130
msgid "Introduction to Certificate Authorities"
131
msgstr "Introduction à Certificate Authorities"
132
 
133
#. type: Content of: <sect1><sect2><bridgehead>
7202 jlepiller 134
#: blfs-en/postlfs/security/cacerts.xml:56
7156 jlepiller 135
msgid "Package Information"
136
msgstr "Informations sur le paquet"
137
 
138
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7202 jlepiller 139
#: blfs-en/postlfs/security/cacerts.xml:59
7193 jlepiller 140
msgid "Download (HTTP): <ulink url=\"&make-ca-download;\"/>"
141
msgstr "Téléchargement (HTTP)&nbsp;: <ulink url=\"&make-ca-download;\"/>"
7156 jlepiller 142
 
143
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7202 jlepiller 144
#: blfs-en/postlfs/security/cacerts.xml:62
7193 jlepiller 145
msgid "Download size: &make-ca-size;"
146
msgstr "Taille du téléchargement&nbsp;: &make-ca-size;"
7156 jlepiller 147
 
148
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7202 jlepiller 149
#: blfs-en/postlfs/security/cacerts.xml:65
7193 jlepiller 150
msgid "Download MD5 Sum: &make-ca-md5sum;"
7196 jlepiller 151
msgstr "Somme MD5 du téléchargement&nbsp;: &make-ca-md5sum;"
7193 jlepiller 152
 
153
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7202 jlepiller 154
#: blfs-en/postlfs/security/cacerts.xml:68
7156 jlepiller 155
msgid "Estimated disk space required: &cacerts-buildsize;"
156
msgstr "Estimation de l'espace disque requis&nbsp;: &cacerts-buildsize;"
157
 
158
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7202 jlepiller 159
#: blfs-en/postlfs/security/cacerts.xml:71
7156 jlepiller 160
msgid "Estimated build time: &cacerts-time;"
161
msgstr "Estimation du temps de construction&nbsp;: &cacerts-time;"
162
 
163
#. type: Content of: <sect1><sect2><bridgehead>
7202 jlepiller 164
#: blfs-en/postlfs/security/cacerts.xml:76
165
msgid "Additional Downloads"
166
msgstr "Téléchargements supplémentaires"
167
 
168
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
169
#: blfs-en/postlfs/security/cacerts.xml:80
170
msgid "CA Certificates <ulink url=\"&ca-bundle-download;\"/>"
171
msgstr "Certificats de CA <ulink url=\"&ca-bundle-download;\"/>"
172
 
173
#. type: Content of: <sect1><sect2><bridgehead>
174
#: blfs-en/postlfs/security/cacerts.xml:86
7156 jlepiller 175
msgid "Certificate Authority Certificates Dependencies"
176
msgstr "Dépendances de Certificate Authority Certificates"
177
 
178
#. type: Content of: <sect1><sect2><bridgehead>
7202 jlepiller 179
#: blfs-en/postlfs/security/cacerts.xml:88
7156 jlepiller 180
msgid "Required"
181
msgstr "Requises"
182
 
183
#. type: Content of: <sect1><sect2><para>
7202 jlepiller 184
#: blfs-en/postlfs/security/cacerts.xml:89
185
msgid "<xref linkend=\"openssl\"/>"
186
msgstr "<xref linkend=\"openssl\"/>"
7156 jlepiller 187
 
7202 jlepiller 188
#. type: Content of: <sect1><sect2><bridgehead>
189
#: blfs-en/postlfs/security/cacerts.xml:91
190
msgid "Optional (runtime)"
191
msgstr "Facultatives (exécution)"
192
 
7156 jlepiller 193
#. type: Content of: <sect1><sect2><para>
7202 jlepiller 194
#: blfs-en/postlfs/security/cacerts.xml:93
195
msgid ""
7258 jlepiller 196
"<xref linkend=\"java\"/> or <xref linkend=\"openjdk\"/>, <xref "
197
"linkend=\"nss\"/>, and <xref linkend=\"p11-kit\"/>"
7202 jlepiller 198
msgstr ""
7258 jlepiller 199
"<xref linkend=\"java\"/> ou <xref linkend=\"openjdk\"/>, <xref "
200
"linkend=\"nss\"/> et <xref linkend=\"p11-kit\"/>"
7202 jlepiller 201
 
202
#. type: Content of: <sect1><sect2><para>
7258 jlepiller 203
#: blfs-en/postlfs/security/cacerts.xml:97
7156 jlepiller 204
msgid "User Notes: <ulink url='&blfs-wiki;/cacerts'/>"
205
msgstr "Notes utilisateur&nbsp;: <ulink url='&blfs-wiki;/cacerts'/>"
206
 
207
#. type: Content of: <sect1><sect2><title>
7258 jlepiller 208
#: blfs-en/postlfs/security/cacerts.xml:102
7156 jlepiller 209
msgid "Installation of Certificate Authority Certificates"
210
msgstr "Installation de Certificate Authority Certificates"
211
 
212
#. type: Content of: <sect1><sect2><para>
7258 jlepiller 213
#: blfs-en/postlfs/security/cacerts.xml:104
7156 jlepiller 214
msgid ""
7203 jlepiller 215
"The <application>make-ca.sh</application> script will process the "
216
"certificates included in the <filename>certdata.txt</filename> file for use "
217
"in multiple certificate stores (if the associated applications are present "
218
"on the system). Additionally, any local certificates stored in "
7202 jlepiller 219
"<filename>/etc/ssl/local</filename> will be imported to the certificate "
220
"stores. Certificates in this directory should be stored as PEM encoded "
221
"<application>OpenSSL</application> trusted certificates."
7156 jlepiller 222
msgstr ""
7202 jlepiller 223
"Le script <application>make-ca.sh</application> adaptera les certificats "
224
"inclus dans le fichier <filename>certdata.txt</filename> pour l'utiliser "
225
"dans de multiples magasins de certificats (si les applications associées "
226
"sont présentes sur le système). De plus, tout certificat local stocké dans "
227
"<filename>/etc/ssl/local</filename> sera importé dans les magasins de "
228
"certificats. Les certificats de ce répertoire devraient être stockés sous "
229
"forme de certificats de confiance <application>OpenSSL</application> encodé "
230
"en PEM."
7156 jlepiller 231
 
7193 jlepiller 232
#. type: Content of: <sect1><sect2><para>
7258 jlepiller 233
#: blfs-en/postlfs/security/cacerts.xml:112
7280 jlepiller 234
#| msgid ""
235
#| "To create an <application>OpenSSL</application> trusted certificate from a "
236
#| "regular PEM encoded file, provided by a CA not included in Mozilla's "
237
#| "certificate distribution, you need to add trust arguments to the "
238
#| "<command>openssl</command> command, and create a new certificate. There are "
239
#| "three trust types that are recognised by the <application>make-"
240
#| "ca.sh</application> script, SSL/TLS, S/Mime, and code signing. For example, "
241
#| "to allow a certificate to be trusted for both SSL/TLS and S/Mime, but "
242
#| "explicitly rejected for code signing, you could use the following commands "
243
#| "to create a new trusted certificate that has those trust attributes:"
7156 jlepiller 244
msgid ""
7202 jlepiller 245
"To create an <application>OpenSSL</application> trusted certificate from a "
246
"regular PEM encoded file, provided by a CA not included in Mozilla's "
247
"certificate distribution, you need to add trust arguments to the "
248
"<command>openssl</command> command, and create a new certificate. There are "
7280 jlepiller 249
"three trust types that are recognized by the <application>make-"
7202 jlepiller 250
"ca.sh</application> script, SSL/TLS, S/Mime, and code signing. For example, "
7280 jlepiller 251
"using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> root, if you "
252
"want it to be trusted for all three roles, the following commands will "
253
"create an appropriate OpenSSL trusted certificate:"
7156 jlepiller 254
msgstr ""
7202 jlepiller 255
"Pour créer un certificat de confiance <application>OpenSSL</application> "
256
"depuis un fichier normal encodé en PEM fournit par une CA qui n'est pas "
257
"incluse dans la distribution de certificats de Mozilla, vous devrez ajouter "
7280 jlepiller 258
"des arguments «&nbsp;trust&nbsp;» à la commande <command>openssl</command> "
259
"et créer un nouveau certificat. Il y a trois types de confiances qui sont "
260
"reconnues par le script <application>make-ca.sh</application>&nbsp;: "
261
"SSL/TLS, S/Mime et la signature de code. Par exemple, si vous souhaitez "
262
"utiliser la racine de <ulink url=\"http://www.cacert.org/\">CAcert</ulink> "
263
"pour qu'elle soit de confiance pour ces trois rôles, les commandes suivantes"
264
" créent un nouveau certificat de confiance OpenSSL approprié&nbsp;:"
7156 jlepiller 265
 
7202 jlepiller 266
#. type: Content of: <sect1><sect2><screen>
7258 jlepiller 267
#: blfs-en/postlfs/security/cacerts.xml:123
7202 jlepiller 268
#, no-wrap
7280 jlepiller 269
#| msgid ""
270
#| "<literal>openssl x509 -in MyRootCA.pem -text -fingerprint -setalias \"My Root CA 1\"     \\\n"
271
#| "        -addtrust serverAuth -addtrust emailProtection -addreject codeSigning \\\n"
272
#| "        > MyRootCA-trusted.pem</literal>"
7202 jlepiller 273
msgid ""
7280 jlepiller 274
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
275
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
276
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
277
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
278
"        > /etc/ssl/local/CAcert_Class_1_root.pem</userinput>"
7202 jlepiller 279
msgstr ""
7280 jlepiller 280
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
281
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
282
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
283
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
284
"        > /etc/ssl/local/CAcert_Class_1_root.pem</userinput>"
7202 jlepiller 285
 
7156 jlepiller 286
#. type: Content of: <sect1><sect2><para>
7280 jlepiller 287
#: blfs-en/postlfs/security/cacerts.xml:129
288
#| msgid ""
289
#| "If a trust argument is omitted, the certificate is neither trusted, nor "
290
#| "rejected. Clients that use <application>OpenSSL</application> or "
291
#| "<application>NSS</application> encountering this certificate will present a "
292
#| "warning to the user. Clients using <application>GnuTLS</application> without"
293
#| " <application>p11-kit</application> support are not aware of trusted "
294
#| "certificates. To include this CA into the ca-bundle.crt (used for "
295
#| "<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
296
#| "trust."
7156 jlepiller 297
msgid ""
7280 jlepiller 298
"If one of the three trust arguments is omitted, the certificate is neither "
299
"trusted, nor rejected for that role. Clients that use "
300
"<application>OpenSSL</application> or <application>NSS</application> "
301
"encountering this certificate will present a warning to the user. Clients "
302
"using <application>GnuTLS</application> without "
303
"<application>p11-kit</application> support are not aware of trusted "
7202 jlepiller 304
"certificates. To include this CA into the ca-bundle.crt (used for "
305
"<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
7280 jlepiller 306
"trust. Additionally, to explicitly disallow a certificate for a particular "
307
"use, replace the <parameter>-addtrust</parameter> flag with the "
308
"<parameter>-addreject</parameter> flag."
7156 jlepiller 309
msgstr ""
7280 jlepiller 310
"Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour "
311
"ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou "
7202 jlepiller 312
"<application>NSS</application> rencontrant ce certificat renverront un "
313
"avertissement à l'utilisateur . Les clients qui utilisent "
314
"<application>GnuTLS</application> sans le support de "
315
"<application>p11-kit</application> ne sont pas conscient des certificats de "
316
"confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par "
7280 jlepiller 317
"<application>GnuTLS</application>), il doit avoir la confiance "
318
"<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une "
319
"utilisation particulière, remplacez le paramètre "
320
"<parameter>-addtrust</parameter> par le paramètre "
321
"<parameter>-addreject</parameter>."
7156 jlepiller 322
 
323
#. type: Content of: <sect1><sect2><para>
7280 jlepiller 324
#: blfs-en/postlfs/security/cacerts.xml:141
7156 jlepiller 325
msgid ""
7202 jlepiller 326
"To install the various certificate stores, first install the <application"
327
">make-ca.sh</application> script into the correct location.  As the "
328
"<systemitem class=\"username\">root</systemitem> user:"
7156 jlepiller 329
msgstr ""
7202 jlepiller 330
"Pour installer les divers magasins de certificats, installez le script "
331
"<application>make-ca.sh</application> au bon endroit. En tant qu'utilisateur"
7197 jlepiller 332
" <systemitem class=\"username\">root</systemitem>&nbsp;:"
7156 jlepiller 333
 
334
#. type: Content of: <sect1><sect2><screen>
7280 jlepiller 335
#: blfs-en/postlfs/security/cacerts.xml:145
7156 jlepiller 336
#, no-wrap
7203 jlepiller 337
msgid ""
338
"<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
339
"ca.sh</userinput>"
340
msgstr ""
341
"<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
342
"ca.sh</userinput>"
7156 jlepiller 343
 
344
#. type: Content of: <sect1><sect2><para>
7280 jlepiller 345
#: blfs-en/postlfs/security/cacerts.xml:147
7156 jlepiller 346
msgid ""
7202 jlepiller 347
"As the <systemitem class=\"username\">root</systemitem> user, make sure that"
348
" certdata.txt is in the current directory, and update the certificate stores"
349
" with the following command:"
7156 jlepiller 350
msgstr ""
7196 jlepiller 351
"En tant qu'utilisateur <systemitem class=\"username\">root</systemitem>, "
7202 jlepiller 352
"assurez-vous que certdata.txt est dans le répertoire courant, et mettez à "
353
"jour le magasin de certificats avec la commande suivante&nbsp;:"
7156 jlepiller 354
 
355
#. type: Content of: <sect1><sect2><screen>
7280 jlepiller 356
#: blfs-en/postlfs/security/cacerts.xml:151
7156 jlepiller 357
#, no-wrap
7202 jlepiller 358
msgid "<userinput>/usr/sbin/make-ca.sh</userinput>"
359
msgstr "<userinput>/usr/sbin/make-ca.sh</userinput>"
7156 jlepiller 360
 
361
#. type: Content of: <sect1><sect2><para>
7280 jlepiller 362
#: blfs-en/postlfs/security/cacerts.xml:153
7156 jlepiller 363
msgid ""
7202 jlepiller 364
"You should periodically download a copy of <filename>certdata.txt</filename>"
365
" and run the <application>make-ca.sh</application> script (as the "
366
"<systemitem class=\"username\">root</systemitem> user), or as part of a "
367
"monthly <application>cron</application> job to ensure that you have the "
368
"latest available version of the certificates."
7156 jlepiller 369
msgstr ""
7202 jlepiller 370
"Vous devriez télécharger régulièrement une copie de "
371
"<filename>certdata.txt</filename> et lancer le script <application>make-"
7197 jlepiller 372
"ca.sh</application> (en tant qu'utilisateur <systemitem "
373
"class=\"username\">root</systemitem>), ou en tant que tâche "
7202 jlepiller 374
"<application>cron</application> mensuelle pour vous assurer d'avoir la "
7197 jlepiller 375
"dernière version disponible des certificats."
7156 jlepiller 376
 
7203 jlepiller 377
#. type: Content of: <sect1><sect2><note><para>
7280 jlepiller 378
#: blfs-en/postlfs/security/cacerts.xml:161
7203 jlepiller 379
msgid ""
380
"If running the script a second time with the same version of "
381
"<filename>certdata.txt</filename>, for instance, to add additional stores as"
382
" the requisite software is installed, add the <parameter>-f</parameter> "
383
"switch to the command line. If packaging, run <command>make-ca.sh "
384
"--help</command> to see all available command line options."
385
msgstr ""
386
"Si vous lancez le script une deuxième fois avec la même version de "
387
"<filename>certdata.txt</filename>, par exemple pour ajouter des magasins "
388
"supplémentaires parce que le logiciel requis est installé, ajoutez l'option "
389
"<parameter>-f</parameter> à la ligne  de commande. Si vous créez un paquet, "
390
"lancez <command>make-ca.sh --help</command> pour voir toutes les options de "
391
"la ligne de commande disponibles."
392
 
7202 jlepiller 393
#. type: Content of: <sect1><sect2><para>
7280 jlepiller 394
#: blfs-en/postlfs/security/cacerts.xml:168
7202 jlepiller 395
msgid ""
396
"The <filename>certdata.txt</filename> file provided by BLFS is obtained from"
397
" the mozilla-release branch, and is modified to provide a simple dated "
398
"revision. This will be the correct version for most systems. There are, "
399
"however, several other variants of the file available for use that might be "
7203 jlepiller 400
"preferred for one reason or another, including the files shipped with "
401
"Mozilla products in this book. RedHat and OpenSUSE, for instance, use the "
402
"version included in <xref linkend=\"nss\"/>. Additional upstream downloads "
403
"are available at the links below."
7202 jlepiller 404
msgstr ""
405
"Le fichier <filename>certdata.txt</filename> fournit par BLFS est obtenu à "
406
"partir de la branche mozilla-release, et est modifié pour fournir une simple"
407
" révision horodatée. Ce sera la bonne version pour la plupart des systèmes. "
408
"Il y a cependant plusieurs variantes du fichier disponibles à l'utilisation "
409
"qui peuvent être préférés pour une raison ou une autre, incluses dans les "
410
"produits Mozilla dans ce livre. RedHat et OpenSUSE par exemple utilisent la "
411
"version incluse dans <xref linkend=\"nss\"/>. Des emplacements de "
412
"téléchargement supplémentaires sont disponibles&nbsp;:"
413
 
414
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7280 jlepiller 415
#: blfs-en/postlfs/security/cacerts.xml:179
7202 jlepiller 416
msgid ""
417
"Mozilla Release (the version provided by BLFS): <ulink "
418
"url=\"&certhost;releases/mozilla-release/raw-"
419
"file/default/security/nss&certpath;\"/>"
420
msgstr ""
421
"Mozilla Release (la version fournie par BLFS)&nbsp;: <ulink "
422
"url=\"&certhost;releases/mozilla-release/raw-"
423
"file/default/security/nss&certpath;\"/>"
424
 
425
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7280 jlepiller 426
#: blfs-en/postlfs/security/cacerts.xml:184
7202 jlepiller 427
msgid ""
428
"NSS (this is the latest available version): <ulink "
7220 jlepiller 429
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 430
msgstr ""
431
"NSS (c'est la dernière version disponible)&nbsp;: <ulink "
7220 jlepiller 432
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 433
 
434
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7280 jlepiller 435
#: blfs-en/postlfs/security/cacerts.xml:189
7202 jlepiller 436
msgid ""
437
"Mozilla Central: <ulink url=\"&certhost;mozilla-central/raw-"
438
"file/default/security/nss&certpath;\"/>"
439
msgstr ""
440
"Mozilla Central&nbsp;: <ulink url=\"&certhost;mozilla-central/raw-"
441
"file/default/security/nss&certpath;\"/>"
442
 
443
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7280 jlepiller 444
#: blfs-en/postlfs/security/cacerts.xml:194
7202 jlepiller 445
msgid ""
446
"Mozilla Beta: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
447
"file/default/security/nss&certpath;\"/>"
448
msgstr ""
449
"Mozilla Beta&nbsp;: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
450
"file/default/security/nss&certpath;\"/>"
451
 
452
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7280 jlepiller 453
#: blfs-en/postlfs/security/cacerts.xml:199
7202 jlepiller 454
msgid ""
455
"Mozilla Aurora: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
456
"file/default/security/nss&certpath;\"/>"
457
msgstr ""
458
"Mozilla Aurora&nbsp;: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
459
"file/default/security/nss&certpath;\"/>"
460
 
7156 jlepiller 461
#. type: Content of: <sect1><sect2><title>
7280 jlepiller 462
#: blfs-en/postlfs/security/cacerts.xml:208
7156 jlepiller 463
msgid "Contents"
464
msgstr "Contenu"
465
 
466
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7280 jlepiller 467
#: blfs-en/postlfs/security/cacerts.xml:211
7156 jlepiller 468
msgid "Installed Programs"
469
msgstr "Programmes installés"
470
 
471
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7280 jlepiller 472
#: blfs-en/postlfs/security/cacerts.xml:212
7156 jlepiller 473
msgid "Installed Libraries"
474
msgstr "Bibliothèques installées"
475
 
476
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7280 jlepiller 477
#: blfs-en/postlfs/security/cacerts.xml:213
7156 jlepiller 478
msgid "Installed Directories"
479
msgstr "Répertoires installés"
480
 
481
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7280 jlepiller 482
#: blfs-en/postlfs/security/cacerts.xml:216
7193 jlepiller 483
msgid "make-ca.sh"
484
msgstr "make-ca.sh"
7156 jlepiller 485
 
486
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7280 jlepiller 487
#: blfs-en/postlfs/security/cacerts.xml:217
7156 jlepiller 488
msgid "None"
489
msgstr "Aucune"
490
 
491
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7280 jlepiller 492
#: blfs-en/postlfs/security/cacerts.xml:218
7202 jlepiller 493
msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}"
494
msgstr "/etc/ssl/{certs,java,local} et /etc/pki/{nssdb,anchors}"
7156 jlepiller 495
 
496
#. type: Content of: <sect1><sect2><variablelist><bridgehead>
7280 jlepiller 497
#: blfs-en/postlfs/security/cacerts.xml:223
7156 jlepiller 498
msgid "Short Descriptions"
499
msgstr "Descriptions courtes"
500
 
501
#. type: Content of: <sect1><sect2><variablelist><varlistentry><term>
7280 jlepiller 502
#: blfs-en/postlfs/security/cacerts.xml:228
7156 jlepiller 503
msgid "<command>make-ca.sh</command>"
504
msgstr "<command>make-ca.sh</command>"
505
 
7165 jlepiller 506
#. type: Content of:
507
#. <sect1><sect2><variablelist><varlistentry><listitem><para>
7280 jlepiller 508
#: blfs-en/postlfs/security/cacerts.xml:230
7156 jlepiller 509
msgid ""
7202 jlepiller 510
"is a shell script that adapts a current version of "
7193 jlepiller 511
"<filename>certdata.txt</filename>, and prepares it for use as the system "
512
"certificate store."
7156 jlepiller 513
msgstr ""
7202 jlepiller 514
"est un script shell qui adapte une version actuelle de "
7197 jlepiller 515
"<filename>certdata.txt</filename> et le prépare pour l'utiliser comme "
7196 jlepiller 516
"magasin de certificat du système."
7156 jlepiller 517
 
7165 jlepiller 518
#. type: Content of:
519
#. <sect1><sect2><variablelist><varlistentry><listitem><indexterm><primary>
7280 jlepiller 520
#: blfs-en/postlfs/security/cacerts.xml:234
7156 jlepiller 521
msgid "make-ca"
522
msgstr "make-ca"
523
 
7264 jlepiller 524
#~ msgid "b42fd97c173ef67a37fb05ed7587e0a8"
525
#~ msgstr "b42fd97c173ef67a37fb05ed7587e0a8"
526
 
7258 jlepiller 527
#~ msgid "11 KB"
528
#~ msgstr "11 Ko"
529
 
530
#~ msgid "cce9fa4713c4611d9e61f99de612a1e9"
531
#~ msgstr "cce9fa4713c4611d9e61f99de612a1e9"
532
 
7224 jlepiller 533
#~ msgid "5e41c17a3dd6b8195c55092e87e92ef0"
534
#~ msgstr "5e41c17a3dd6b8195c55092e87e92ef0"
535
 
7214 jlepiller 536
#~ msgid "fca9ae62242800a9dcaee5d400ee5c41"
537
#~ msgstr "fca9ae62242800a9dcaee5d400ee5c41"
538
 
7203 jlepiller 539
#~ msgid "9e416981cd153d8923e06dc8e39ac534"
540
#~ msgstr "9e416981cd153d8923e06dc8e39ac534"
541
 
7202 jlepiller 542
#~ msgid "65c6cbbb11e6d124b047f4aa0dcb2808"
543
#~ msgstr "65c6cbbb11e6d124b047f4aa0dcb2808"
7156 jlepiller 544
 
7202 jlepiller 545
#~ msgid "fbc5687ce7fd5533edbb4e616a1080de"
546
#~ msgstr "fbc5687ce7fd5533edbb4e616a1080de"
547
 
548
#~ msgid "487ca7ce6f7b81b3e46362138f93310c"
549
#~ msgstr "487ca7ce6f7b81b3e46362138f93310c"
550
 
551
#~ msgid "1.4 MB"
552
#~ msgstr "1.4 Mo"
553
 
554
#~ msgid "0.1 SBU"
555
#~ msgstr "0.1 SBU"
556
 
557
#~ msgid ""
558
#~ "The Public Key Infrastructure is used for many security features in a Linux "
559
#~ "system.  In order for a certificate to be trusted, it must be signed by a "
560
#~ "trusted agent called a Certificate Authority (CA). The certificates "
561
#~ "installed in this section are obtained from the Mozilla version control "
562
#~ "system, and reformatted for use by <xref linkend='openssl'/> and <xref "
563
#~ "linkend='gnutls'/>. The certificates can also be used by other applications,"
564
#~ " either directly or indirectly by linking to one of these packages."
565
#~ msgstr ""
566
#~ "La <foreignphrase>Public Key Infrastructure</foreignphrase> (infrastructure "
567
#~ "de clés publiques) est utilisée dans de nombreux cas de sécurité sur un "
568
#~ "système Linux. Pour qu'un certificat soit fiable, il doit être signé par un "
569
#~ "agent de confiance, qu'on appelle l'autorité de certification "
570
#~ "(<foreignphrase>Certificate Authority</foreignphrase>) (CA).  Les "
571
#~ "certificats chargés dans cette section sont issus de la liste du système de "
572
#~ "contrôle de Mozilla et elle est formatée dans une forme utilisée par <xref "
573
#~ "linkend=\"openssl\"/> et <xref linkend='gnutls'/>.  Les certificats peuvent "
574
#~ "également être utilisés par d'autres applications, directement ou "
575
#~ "indirectement via <application>openssl</application>."
576
 
577
#~ msgid ""
578
#~ "The <application>make-ca.sh</application> script will download a set of "
579
#~ "certificates from one of five projects (aurora, beta, central, nss, or "
580
#~ "release) in the Mozialla version control system. It defaults to the release "
581
#~ "branch, which is identical to the version that ships with the Mozilla "
582
#~ "products in this book. If you'd like to change the branch that is retrieved,"
583
#~ " edit the file and set <envar>CERTSOURCE</envar> to one of the five values "
584
#~ "above."
585
#~ msgstr ""
586
#~ "Le script <application>make-ca.sh</application> téléchargement un ensemble "
587
#~ "de certificats depuis l'un des cinq projets (aurora, beta, central, nss ou "
588
#~ "release) du système de contrôle de version de Mozilla. Il est réglé par "
589
#~ "défaut sur la branche release, qui est identique à la version qui vient avec"
590
#~ " les produits Mozilla de ce livre. Si vous préférez changer la branche qui "
591
#~ "est récupérée, modifiez le fichier et mettez <envar>CERTSOURCE</envar> à "
592
#~ "l'une des cinq valeurs ci-dessus."
593
 
594
#~ msgid ""
595
#~ "Additionally, any local certificates stored in "
596
#~ "<filename>/etc/ssl/local</filename> will be copied into both the single-file"
597
#~ " <filename>/etc/ssl/ca-bundle.crt</filename> (used by programs that link to "
598
#~ "<application>gnutls</application>), and into the certificate store directory"
599
#~ " <filename>/etc/ssl/certs</filename> (used by programs that link to "
600
#~ "<application>OpenSSL</application>). All certificates will pass a date and "
601
#~ "trust validation, and any existing certificates in <filename>/etc/ssl/ca-"
602
#~ "bundle.crt</filename> or <filename>/etc/ssl/certs</filename> will be removed"
603
#~ " upon successful completion of this script."
604
#~ msgstr ""
605
#~ "De plus, tout certificat local stocké dans "
606
#~ "<filename>/etc/ssl/local</filename> sera copié dans le fichier "
607
#~ "<filename>/etc/ssl/ca-bundle.crt</filename> (utilisé par les programmes qui "
608
#~ "se lient à <application>gnutls</application>) et dans le répertoire du "
609
#~ "magasin de certificats <filename>/etc/ssl/certs</filename> (utilisé par les "
610
#~ "programmes qui se lient à <application>OpenSSL</application>). Tous les "
611
#~ "certificats passeront un test de validation de leur date et de leur "
612
#~ "confiance, et tout certificat existant dans <filename>/etc/ssl/ca-"
613
#~ "bundle.crt</filename> ou <filename>/etc/ssl-certs</filename> sera supprimé à"
614
#~ " la fin de ce script si tout va bien."
615
 
616
#~ msgid ""
617
#~ "Finally, if you've installed <xref linkend=\"java\"/> or <xref "
618
#~ "linkend=\"openjdk\"/>, then it will also update the java cacerts file at "
619
#~ "<filename>/etc/ssl/java/cacerts</filename>."
620
#~ msgstr ""
621
#~ "Enfin, si vous avez installé <xref linkend=\"java\"/> ou <xref "
622
#~ "linkend=\"openjdk\"/>, il mettra aussi à jour le fichier cacerts de java "
623
#~ "dans <filename>/etc/ssl/java/cacerts</filename>."
624
 
625
#~ msgid ""
626
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
627
#~ "/usr/sbin/make-ca.sh\n"
628
#~ "</userinput>"
629
#~ msgstr ""
630
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
631
#~ "/usr/sbin/make-ca.sh\n"
632
#~ "</userinput>"
633
 
7193 jlepiller 634
#~ msgid "/mozilla/source/security/nss/lib/ckfw/builtins"
635
#~ msgstr "/mozilla/source/security/nss/lib/ckfw/builtins"
7156 jlepiller 636
 
7193 jlepiller 637
#~ msgid "6 MB"
7233 jlepiller 638
#~ msgstr "6 Mo"
7156 jlepiller 639
 
7193 jlepiller 640
#~ msgid ""
641
#~ "The certfile.txt file above is actually retrieved from <ulink "
642
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
643
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  It is"
644
#~ " really an HTML file, but the text file can be retrieved indirectly from the"
645
#~ " HTML file.  The Download URL above automates that process and also adds a "
646
#~ "line where the date can be extracted as a revision number by the scripts "
647
#~ "below."
648
#~ msgstr ""
649
#~ "Le fichier certfile.txt dessous est en fait récupéré depuis <ulink "
650
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
651
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  C'est"
652
#~ " en fait un fichier HTML, mais le fichier texte peut être pris indirectement"
653
#~ " depuis le fichier HTML. L'URL dessous automatise ce processus et ajoute "
654
#~ "aussi une ligne où la date peut être extraite en tant que numéro de révision"
655
#~ " par le script."
656
 
657
#~ msgid "Recommended"
658
#~ msgstr "Recommandées"
659
 
660
#~ msgid ""
661
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
662
#~ "<literal>#!/usr/bin/perl -w\n"
663
#~ "\n"
664
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
665
#~ "# Run as ./make-cert.pl > certificate.crt\n"
666
#~ "#\n"
667
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
668
#~ "#\n"
669
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
670
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
671
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
672
#~ "#\n"
673
#~ "# Authors: DJ Lucas\n"
674
#~ "#          Bruce Dubbs\n"
675
#~ "#\n"
676
#~ "# Version 20120211\n"
677
#~ "\n"
678
#~ "my $certdata = './tempfile.cer';\n"
679
#~ "\n"
680
#~ "open( IN, \"cat $certdata|\" )\n"
681
#~ "    || die \"could not open $certdata\";\n"
682
#~ "\n"
683
#~ "my $incert = 0;\n"
684
#~ "\n"
685
#~ "while ( &lt;IN&gt; )\n"
686
#~ "{\n"
687
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
688
#~ "    {\n"
689
#~ "        $incert = 1;\n"
690
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
691
#~ "            || die \"could not pipe to openssl x509\";\n"
692
#~ "    }\n"
693
#~ "\n"
694
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
695
#~ "    {\n"
696
#~ "        close( OUT );\n"
697
#~ "        $incert = 0;\n"
698
#~ "        print \"\\n\\n\";\n"
699
#~ "    }\n"
700
#~ "\n"
701
#~ "    elsif ($incert)\n"
702
#~ "    {\n"
703
#~ "        my @bs = split( /\\\\/ );\n"
704
#~ "        foreach my $b (@bs)\n"
705
#~ "        {\n"
706
#~ "            chomp $b;\n"
707
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
708
#~ "        }\n"
709
#~ "    }\n"
710
#~ "}</literal>\n"
711
#~ "EOF\n"
712
#~ "\n"
713
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
714
#~ msgstr ""
715
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
716
#~ "<literal>#!/usr/bin/perl -w\n"
717
#~ "\n"
718
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
719
#~ "# Run as ./make-cert.pl > certificate.crt\n"
720
#~ "#\n"
721
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
722
#~ "#\n"
723
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
724
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
725
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
726
#~ "#\n"
727
#~ "# Authors: DJ Lucas\n"
728
#~ "#          Bruce Dubbs\n"
729
#~ "#\n"
730
#~ "# Version 20120211\n"
731
#~ "\n"
732
#~ "my $certdata = './tempfile.cer';\n"
733
#~ "\n"
734
#~ "open( IN, \"cat $certdata|\" )\n"
735
#~ "    || die \"could not open $certdata\";\n"
736
#~ "\n"
737
#~ "my $incert = 0;\n"
738
#~ "\n"
739
#~ "while ( &lt;IN&gt; )\n"
740
#~ "{\n"
741
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
742
#~ "    {\n"
743
#~ "        $incert = 1;\n"
744
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
745
#~ "            || die \"could not pipe to openssl x509\";\n"
746
#~ "    }\n"
747
#~ "\n"
748
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
749
#~ "    {\n"
750
#~ "        close( OUT );\n"
751
#~ "        $incert = 0;\n"
752
#~ "        print \"\\n\\n\";\n"
753
#~ "    }\n"
754
#~ "\n"
755
#~ "    elsif ($incert)\n"
756
#~ "    {\n"
757
#~ "        my @bs = split( /\\\\/ );\n"
758
#~ "        foreach my $b (@bs)\n"
759
#~ "        {\n"
760
#~ "            chomp $b;\n"
761
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
762
#~ "        }\n"
763
#~ "    }\n"
764
#~ "}</literal>\n"
765
#~ "EOF\n"
766
#~ "\n"
767
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
768
 
769
#~ msgid ""
770
#~ "The following script creates the certificates and a bundle of all the "
771
#~ "certificates.  It creates a <filename class='directory'>./certs</filename> "
772
#~ "directory and <filename>./BLFS-ca-bundle-${VERSION}.crt</filename>.  Again "
773
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
774
#~ "user:"
775
#~ msgstr ""
776
#~ "Le script suivant crée les certificats et un bouquet de tous les "
777
#~ "certificats. Il crée un répertoire <filename "
778
#~ "class='directory'>./certs</filename> et <filename>./BLFS-ca-"
779
#~ "bundle-${VERSION}.crt</filename>.  Créez de nouveau ce script en tant "
780
#~ "qu'utilisateur <systemitem class=\"username\">root</systemitem>&nbsp;:"
781
 
782
#~ msgid ""
783
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
784
#~ "<literal>#!/bin/sh\n"
785
#~ "# Begin make-ca.sh\n"
786
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
787
#~ "#\n"
788
#~ "# The file certdata.txt must exist in the local directory\n"
789
#~ "# Version number is obtained from the version of the data.\n"
790
#~ "#\n"
791
#~ "# Authors: DJ Lucas\n"
792
#~ "#          Bruce Dubbs\n"
793
#~ "#\n"
794
#~ "# Version 20120211\n"
795
#~ "\n"
796
#~ "# Some data in the certs have UTF-8 characters\n"
797
#~ "export LANG=en_US.utf8\n"
798
#~ "\n"
799
#~ "certdata=\"certdata.txt\"\n"
800
#~ "\n"
801
#~ "if [ ! -r $certdata ]; then\n"
802
#~ "  echo \"$certdata must be in the local directory\"\n"
803
#~ "  exit 1\n"
804
#~ "fi\n"
805
#~ "\n"
806
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
807
#~ "\n"
808
#~ "if [ -z \"${REVISION}\" ]; then\n"
809
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
810
#~ "  exit 1\n"
811
#~ "fi\n"
812
#~ "\n"
813
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
814
#~ "\n"
815
#~ "TEMPDIR=$(mktemp -d)\n"
816
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
817
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
818
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
819
#~ "SSLDIR=\"/etc/ssl\"\n"
820
#~ "\n"
821
#~ "mkdir \"${TEMPDIR}/certs\"\n"
822
#~ "\n"
823
#~ "# Get a list of starting lines for each cert\n"
824
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
825
#~ "\n"
826
#~ "# Get a list of ending lines for each cert\n"
827
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
828
#~ "\n"
829
#~ "# Start a loop\n"
830
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
831
#~ "  for certend in ${CERTENDLIST}; do\n"
832
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
833
#~ "      break\n"
834
#~ "    fi\n"
835
#~ "  done\n"
836
#~ "\n"
837
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
838
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
839
#~ "done\n"
840
#~ "\n"
841
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
842
#~ "\n"
843
#~ "mkdir -p certs\n"
844
#~ "rm -f certs/*      # Make sure the directory is clean\n"
845
#~ "\n"
846
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
847
#~ "  # Make sure that the cert is trusted...\n"
848
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
849
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
850
#~ "\n"
851
#~ "  if test \"${?}\" = \"0\"; then\n"
852
#~ "    # Throw a meaningful error and remove the file\n"
853
#~ "    cp \"${tempfile}\" tempfile.cer\n"
854
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
855
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
856
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
857
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
858
#~ "    continue\n"
859
#~ "  fi\n"
860
#~ "\n"
861
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
862
#~ "  # Find the cert data and generate a cert file for it\n"
863
#~ "\n"
864
#~ "  cp \"${tempfile}\" tempfile.cer\n"
865
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
866
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
867
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
868
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
869
#~ "  echo \"Created ${keyhash}.pem\"\n"
870
#~ "done\n"
871
#~ "\n"
872
#~ "# Remove blacklisted files\n"
873
#~ "# MD5 Collision Proof of Concept CA\n"
874
#~ "if test -f certs/8f111d69.pem; then\n"
875
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
876
#~ "  rm -f certs/8f111d69.pem\n"
877
#~ "fi\n"
878
#~ "\n"
879
#~ "# Finally, generate the bundle and clean up.\n"
880
#~ "cat certs/*.pem >  ${BUNDLE}\n"
881
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
882
#~ "EOF\n"
883
#~ "\n"
884
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
885
#~ msgstr ""
886
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
887
#~ "<literal>#!/bin/sh\n"
888
#~ "# Begin make-ca.sh\n"
889
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
890
#~ "#\n"
891
#~ "# The file certdata.txt must exist in the local directory\n"
892
#~ "# Version number is obtained from the version of the data.\n"
893
#~ "#\n"
894
#~ "# Authors: DJ Lucas\n"
895
#~ "#          Bruce Dubbs\n"
896
#~ "#\n"
897
#~ "# Version 20120211\n"
898
#~ "\n"
899
#~ "# Some data in the certs have UTF-8 characters\n"
900
#~ "export LANG=en_US.utf8\n"
901
#~ "\n"
902
#~ "certdata=\"certdata.txt\"\n"
903
#~ "\n"
904
#~ "if [ ! -r $certdata ]; then\n"
905
#~ "  echo \"$certdata must be in the local directory\"\n"
906
#~ "  exit 1\n"
907
#~ "fi\n"
908
#~ "\n"
909
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
910
#~ "\n"
911
#~ "if [ -z \"${REVISION}\" ]; then\n"
912
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
913
#~ "  exit 1\n"
914
#~ "fi\n"
915
#~ "\n"
916
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
917
#~ "\n"
918
#~ "TEMPDIR=$(mktemp -d)\n"
919
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
920
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
921
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
922
#~ "SSLDIR=\"/etc/ssl\"\n"
923
#~ "\n"
924
#~ "mkdir \"${TEMPDIR}/certs\"\n"
925
#~ "\n"
926
#~ "# Get a list of starting lines for each cert\n"
927
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
928
#~ "\n"
929
#~ "# Get a list of ending lines for each cert\n"
930
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
931
#~ "\n"
932
#~ "# Start a loop\n"
933
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
934
#~ "  for certend in ${CERTENDLIST}; do\n"
935
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
936
#~ "      break\n"
937
#~ "    fi\n"
938
#~ "  done\n"
939
#~ "\n"
940
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
941
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
942
#~ "done\n"
943
#~ "\n"
944
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
945
#~ "\n"
946
#~ "mkdir -p certs\n"
947
#~ "rm -f certs/*      # Make sure the directory is clean\n"
948
#~ "\n"
949
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
950
#~ "  # Make sure that the cert is trusted...\n"
951
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
952
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
953
#~ "\n"
954
#~ "  if test \"${?}\" = \"0\"; then\n"
955
#~ "    # Throw a meaningful error and remove the file\n"
956
#~ "    cp \"${tempfile}\" tempfile.cer\n"
957
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
958
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
959
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
960
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
961
#~ "    continue\n"
962
#~ "  fi\n"
963
#~ "\n"
964
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
965
#~ "  # Find the cert data and generate a cert file for it\n"
966
#~ "\n"
967
#~ "  cp \"${tempfile}\" tempfile.cer\n"
968
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
969
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
970
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
971
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
972
#~ "  echo \"Created ${keyhash}.pem\"\n"
973
#~ "done\n"
974
#~ "\n"
975
#~ "# Remove blacklisted files\n"
976
#~ "# MD5 Collision Proof of Concept CA\n"
977
#~ "if test -f certs/8f111d69.pem; then\n"
978
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
979
#~ "  rm -f certs/8f111d69.pem\n"
980
#~ "fi\n"
981
#~ "\n"
982
#~ "# Finally, generate the bundle and clean up.\n"
983
#~ "cat certs/*.pem >  ${BUNDLE}\n"
984
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
985
#~ "EOF\n"
986
#~ "\n"
987
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
988
 
989
#~ msgid ""
990
#~ "Add a short script to remove expired certificates from a directory.  Again "
991
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
992
#~ "user:"
993
#~ msgstr ""
994
#~ "Ajoutez un script bref pour supprimer les certificats expirés d'un "
995
#~ "répertoire. Créez de nouveau ce script en tant qu'utilisateur <systemitem "
996
#~ "class=\"username\">root</systemitem>&nbsp;:"
997
 
998
#~ msgid ""
999
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1000
#~ "<literal>#!/bin/sh\n"
1001
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1002
#~ "#\n"
1003
#~ "# Version 20120211\n"
1004
#~ "\n"
1005
#~ "# Make sure the date is parsed correctly on all systems\n"
1006
#~ "mydate()\n"
1007
#~ "{\n"
1008
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1009
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1010
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1011
#~ "  local m\n"
1012
#~ "\n"
1013
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1014
#~ "\n"
1015
#~ "  case $M in\n"
1016
#~ "    Jan) m=\"01\";;\n"
1017
#~ "    Feb) m=\"02\";;\n"
1018
#~ "    Mar) m=\"03\";;\n"
1019
#~ "    Apr) m=\"04\";;\n"
1020
#~ "    May) m=\"05\";;\n"
1021
#~ "    Jun) m=\"06\";;\n"
1022
#~ "    Jul) m=\"07\";;\n"
1023
#~ "    Aug) m=\"08\";;\n"
1024
#~ "    Sep) m=\"09\";;\n"
1025
#~ "    Oct) m=\"10\";;\n"
1026
#~ "    Nov) m=\"11\";;\n"
1027
#~ "    Dec) m=\"12\";;\n"
1028
#~ "  esac\n"
1029
#~ "\n"
1030
#~ "  certdate=\"${y}${m}${d}\"\n"
1031
#~ "}\n"
1032
#~ "\n"
1033
#~ "OPENSSL=/usr/bin/openssl\n"
1034
#~ "DIR=/etc/ssl/certs\n"
1035
#~ "\n"
1036
#~ "if [ $# -gt 0 ]; then\n"
1037
#~ "  DIR=\"$1\"\n"
1038
#~ "fi\n"
1039
#~ "\n"
1040
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1041
#~ "today=$( date +%Y%m%d )\n"
1042
#~ "\n"
1043
#~ "for cert in $certs; do\n"
1044
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1045
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1046
#~ "  mydate \"$date\"\n"
1047
#~ "\n"
1048
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1049
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1050
#~ "     rm -f \"${cert}\"\n"
1051
#~ "  fi\n"
1052
#~ "done</literal>\n"
1053
#~ "EOF\n"
1054
#~ "\n"
1055
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1056
#~ msgstr ""
1057
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1058
#~ "<literal>#!/bin/sh\n"
1059
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1060
#~ "#\n"
1061
#~ "# Version 20120211\n"
1062
#~ "\n"
1063
#~ "# Make sure the date is parsed correctly on all systems\n"
1064
#~ "mydate()\n"
1065
#~ "{\n"
1066
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1067
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1068
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1069
#~ "  local m\n"
1070
#~ "\n"
1071
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1072
#~ "\n"
1073
#~ "  case $M in\n"
1074
#~ "    Jan) m=\"01\";;\n"
1075
#~ "    Feb) m=\"02\";;\n"
1076
#~ "    Mar) m=\"03\";;\n"
1077
#~ "    Apr) m=\"04\";;\n"
1078
#~ "    May) m=\"05\";;\n"
1079
#~ "    Jun) m=\"06\";;\n"
1080
#~ "    Jul) m=\"07\";;\n"
1081
#~ "    Aug) m=\"08\";;\n"
1082
#~ "    Sep) m=\"09\";;\n"
1083
#~ "    Oct) m=\"10\";;\n"
1084
#~ "    Nov) m=\"11\";;\n"
1085
#~ "    Dec) m=\"12\";;\n"
1086
#~ "  esac\n"
1087
#~ "\n"
1088
#~ "  certdate=\"${y}${m}${d}\"\n"
1089
#~ "}\n"
1090
#~ "\n"
1091
#~ "OPENSSL=/usr/bin/openssl\n"
1092
#~ "DIR=/etc/ssl/certs\n"
1093
#~ "\n"
1094
#~ "if [ $# -gt 0 ]; then\n"
1095
#~ "  DIR=\"$1\"\n"
1096
#~ "fi\n"
1097
#~ "\n"
1098
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1099
#~ "today=$( date +%Y%m%d )\n"
1100
#~ "\n"
1101
#~ "for cert in $certs; do\n"
1102
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1103
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1104
#~ "  mydate \"$date\"\n"
1105
#~ "\n"
1106
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1107
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1108
#~ "     rm -f \"${cert}\"\n"
1109
#~ "  fi\n"
1110
#~ "done</literal>\n"
1111
#~ "EOF\n"
1112
#~ "\n"
1113
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1114
 
1115
#~ msgid ""
1116
#~ "The following commands will fetch the certificates and convert them to the "
1117
#~ "correct format.  If desired, a web browser may be used instead of "
1118
#~ "<application>wget</application> but the file will need to be saved with the "
1119
#~ "name <filename>certdata.txt</filename>.  These commands can be repeated as "
1120
#~ "necessary to update the CA Certificates."
1121
#~ msgstr ""
1122
#~ "Les commandes suivantes récupéreront les certificats et les convertiront "
1123
#~ "dans le bon format.  Si vous le désirez, vous pouvez utiliser un navigateur "
1124
#~ "Internet plutôt que <application>wget</application> mais le fichier devra "
1125
#~ "être enregistré sous le nom <filename>certdata.txt</filename>.  Ces "
1126
#~ "commandes peuvent être répétées autant de fois que nécessaire pour mettre à "
1127
#~ "jour les Certificats CA."
1128
 
1129
#~ msgid ""
1130
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1131
#~ "rm -f certdata.txt &amp;&amp;\n"
1132
#~ "wget $URL          &amp;&amp;\n"
1133
#~ "make-ca.sh         &amp;&amp;\n"
1134
#~ "unset URL</userinput>"
1135
#~ msgstr ""
1136
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1137
#~ "rm -f certdata.txt &amp;&amp;\n"
1138
#~ "wget $URL          &amp;&amp;\n"
1139
#~ "make-ca.sh         &amp;&amp;\n"
1140
#~ "unset URL</userinput>"
1141
 
1142
#~ msgid ""
1143
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1144
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1145
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1146
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1147
#~ "c_rehash                                                     &amp;&amp;\n"
1148
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1149
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1150
#~ "unset SSLDIR</userinput>"
1151
#~ msgstr ""
1152
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1153
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1154
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1155
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1156
#~ "c_rehash                                                     &amp;&amp;\n"
1157
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1158
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1159
#~ "unset SSLDIR</userinput>"
1160
 
1161
#~ msgid "Finally, clean up the current directory:"
1162
#~ msgstr "Enfin, nettoyez le répertoire courant&nbsp;:"
1163
 
1164
#~ msgid "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1165
#~ msgstr "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1166
 
1167
#~ msgid ""
1168
#~ "After installing or updating certificates, if OpenJDK is installed, update "
1169
#~ "the certificates for Java using the procedures at <xref linkend='ojdk-"
1170
#~ "certs'/>."
1171
#~ msgstr ""
1172
#~ "Après l'installation ou la mise à jour des certificats, si OpenJDK est "
1173
#~ "installé, mettez à jour les certificats pour Java en utilisant la procédure "
1174
#~ "dans <xref linkend=\"ojdk-certs\"/>."
1175
 
1176
#~ msgid "make-ca.sh, make-cert.pl and remove-expired-certs.sh"
1177
#~ msgstr "make-ca.sh, make-cert.pl et remove-expired-certs.sh"
1178
 
1179
#~ msgid "<command>make-cert.pl</command>"
1180
#~ msgstr "<command>make-cert.pl</command>"
1181
 
1182
#~ msgid ""
1183
#~ "is a utility <application>perl</application> script that converts a single "
1184
#~ "binary certificate (.der format) into .pem format."
1185
#~ msgstr ""
1186
#~ "est un script <application>perl</application> qui convertit un certificat "
1187
#~ "binaire unique (format .der) au format .pem."
1188
 
1189
#~ msgid "make-cert"
1190
#~ msgstr "make-cert"
1191
 
1192
#~ msgid "<command>remove-expired-certs.sh</command>"
1193
#~ msgstr "<command>remove-expired-certs.sh</command>"
1194
 
1195
#~ msgid ""
1196
#~ "is a utility shell script that removes expired certificates from a "
1197
#~ "directory.  The default directory is <filename "
1198
#~ "class='directory'>/etc/ssl/certs</filename>."
1199
#~ msgstr ""
1200
#~ "est un script shell qui supprime les certificats expirés d'un répertoire. Le"
1201
#~ " répertoire par défaut est <filename "
1202
#~ "class='directory'>/etc/ssl/certs</filename>."
1203
 
1204
#~ msgid "remove-expired-certs"
1205
#~ msgstr "remove-expired-certs"