Rev 7344 | Rev 7351 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
7156 | jlepiller | 1 | # SOME DESCRIPTIVE TITLE |
2 | # Copyright (C) YEAR Free Software Foundation, Inc. |
||
3 | # This file is distributed under the same license as the PACKAGE package. |
||
4 | # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. |
||
7313 | jlepiller | 5 | # |
7156 | jlepiller | 6 | msgid "" |
7 | msgstr "" |
||
8 | "Project-Id-Version: PACKAGE VERSION\n" |
||
7348 | jlepiller | 9 | "POT-Creation-Date: 2018-02-12 04:06+0000\n" |
7344 | jlepiller | 10 | "PO-Revision-Date: 2018-02-01 11:12+0000\n" |
7156 | jlepiller | 11 | "Last-Translator: roptat <roptat@lepiller.eu>\n" |
12 | "Language-Team: LANGUAGE <LL@li.org>\n" |
||
7313 | jlepiller | 13 | "Language: fr\n" |
7156 | jlepiller | 14 | "MIME-Version: 1.0\n" |
15 | "Content-Type: text/plain; charset=UTF-8\n" |
||
16 | "Content-Transfer-Encoding: 8bit\n" |
||
17 | "Plural-Forms: nplurals=2; plural=(n > 1);\n" |
||
7258 | jlepiller | 18 | "X-Generator: Pootle 2.8\n" |
7344 | jlepiller | 19 | "X-POOTLE-MTIME: 1517483554.797188\n" |
7156 | jlepiller | 20 | |
7202 | jlepiller | 21 | #. type: Content of the certhost entity |
7156 | jlepiller | 22 | #: blfs-en/postlfs/security/cacerts.xml:7 |
7202 | jlepiller | 23 | msgid "https://hg.mozilla.org/" |
24 | msgstr "https://hg.mozilla.org/" |
||
7156 | jlepiller | 25 | |
7202 | jlepiller | 26 | #. type: Content of the certpath entity |
7156 | jlepiller | 27 | #: blfs-en/postlfs/security/cacerts.xml:8 |
7202 | jlepiller | 28 | msgid "/lib/ckfw/builtins/certdata.txt" |
29 | msgstr "/lib/ckfw/builtins/certdata.txt" |
||
7156 | jlepiller | 30 | |
7318 | jlepiller | 31 | #. type: Content of the cacerts-buildsize entity |
7156 | jlepiller | 32 | #: blfs-en/postlfs/security/cacerts.xml:9 |
7258 | jlepiller | 33 | msgid "6.5 MB (with all runtime deps)" |
34 | msgstr "6.5 Mo (avec toutes les dépendances à l'exécution)" |
||
7156 | jlepiller | 35 | |
7202 | jlepiller | 36 | #. type: Content of the cacerts-time entity |
7318 | jlepiller | 37 | #: blfs-en/postlfs/security/cacerts.xml:10 |
7202 | jlepiller | 38 | msgid "0.2 SBU (with all runtime deps)" |
39 | msgstr "0.2 SBU (avec toutes les dépendances à l'exécution)" |
||
40 | |||
41 | #. type: Content of the make-ca-download entity |
||
7318 | jlepiller | 42 | #: blfs-en/postlfs/security/cacerts.xml:12 |
43 | msgid "" |
||
44 | "https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-" |
||
45 | "ca-version;.tar.gz" |
||
46 | msgstr "" |
||
47 | "https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-" |
||
48 | "ca-version;.tar.gz" |
||
7202 | jlepiller | 49 | |
50 | #. type: Content of the make-ca-size entity |
||
7318 | jlepiller | 51 | #: blfs-en/postlfs/security/cacerts.xml:13 |
52 | msgid "36 KB" |
||
53 | msgstr "36 Ko" |
||
7202 | jlepiller | 54 | |
55 | #. type: Content of the make-ca-md5sum entity |
||
7318 | jlepiller | 56 | #: blfs-en/postlfs/security/cacerts.xml:14 |
57 | msgid "851f9e267f343c54db8caa87ec5b3d75" |
||
58 | msgstr "851f9e267f343c54db8caa87ec5b3d75" |
||
7202 | jlepiller | 59 | |
7156 | jlepiller | 60 | #. type: Content of: <sect1><sect1info> |
7318 | jlepiller | 61 | #: blfs-en/postlfs/security/cacerts.xml:21 |
7344 | jlepiller | 62 | #| msgid "" |
7348 | jlepiller | 63 | #| "<othername>$LastChangedBy: pierre $</othername> <date>$Date: 2018-01-29 " |
64 | #| "21:12:53 +0000 (Mon, 29 Jan 2018) $</date>" |
||
7156 | jlepiller | 65 | msgid "" |
7348 | jlepiller | 66 | "<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2018-02-11 " |
67 | "17:41:19 +0000 (Sun, 11 Feb 2018) $</date>" |
||
7156 | jlepiller | 68 | msgstr "" |
7348 | jlepiller | 69 | "<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2018-02-11 " |
70 | "17:41:19 +0000 (Sun, 11 Feb 2018) $</date>" |
||
7156 | jlepiller | 71 | |
72 | #. type: Content of: <sect1><indexterm><primary> |
||
7318 | jlepiller | 73 | #: blfs-en/postlfs/security/cacerts.xml:25 |
74 | #: blfs-en/postlfs/security/cacerts.xml:48 |
||
7156 | jlepiller | 75 | msgid "Certificate Authority Certificates" |
7159 | jlepiller | 76 | msgstr "Certificats d'autorité de certification" |
7156 | jlepiller | 77 | |
78 | #. type: Content of: <sect1><para> |
||
7318 | jlepiller | 79 | #: blfs-en/postlfs/security/cacerts.xml:27 |
7156 | jlepiller | 80 | msgid "" |
7202 | jlepiller | 81 | "Public Key Infrastructure (PKI) is a method to validate the authenticity of " |
82 | "an otherwise unknown entity across untrusted networks. PKI works by " |
||
83 | "establishing a chain of trust, rather than trusting each individual host or " |
||
84 | "entity explicitly. In order for a certificate presented by a remote entity " |
||
85 | "to be trusted, that certificate must present a complete chain of " |
||
86 | "certificates that can be validated using the root certificate of a " |
||
87 | "Certificate Authority (CA) that is trusted by the local machine." |
||
7156 | jlepiller | 88 | msgstr "" |
7202 | jlepiller | 89 | "Une Infrastructure à Clés Publiques (PKI) est une méthode pour valider " |
90 | "l'authenticité d'une entité autrement inconnue au travers de réseaux qui ne " |
||
91 | "sont pas de confiance. La PKI fonctionne en établissant une chaîne de " |
||
92 | "confiance, plutôt que de faire confiance individuellement à chaque hôte ou " |
||
93 | "entité de manière explicite. Pour qu'un certificat présenté par une entité " |
||
94 | "distante soit reconnu, le certificat doit présenter une chaîne complète de " |
||
95 | "certificats qui peuvent être validé en utilisant le certificat racine d'une " |
||
96 | "autorité de certification (CA) en laquelle la machine locale a confiance." |
||
7156 | jlepiller | 97 | |
7202 | jlepiller | 98 | #. type: Content of: <sect1><para> |
7318 | jlepiller | 99 | #: blfs-en/postlfs/security/cacerts.xml:35 |
7202 | jlepiller | 100 | msgid "" |
101 | "Establishing trust with a CA involves validating things like company " |
||
102 | "address, ownership, contact information, etc., and ensuring that the CA has " |
||
103 | "followed best practices, such as undergoing periodic security audits by " |
||
104 | "independent investigators and maintaining an always available certificate " |
||
105 | "revocation list. This is well outside the scope of BLFS (as it is for most " |
||
106 | "Linux distributions). The certificate store provided here is taken from the " |
||
107 | "Mozilla Foundation, who have established very strict inclusion policies " |
||
108 | "described <ulink url=\"https://www.mozilla.org/en-" |
||
109 | "US/about/governance/policies/security-group/certs/\">here</ulink>." |
||
110 | msgstr "" |
||
111 | "L'établissement de la confiance avec une CA nécessite de valider des choses " |
||
112 | "comme l'adresse de la compagnie, la propriété, les informations de contact, " |
||
113 | "etc, et de s'assurer que la CA a suivi les bonnes pratiques, comme des " |
||
114 | "audits de sécurité périodiques par des enquêteurs indépendants et le " |
||
7216 | jlepiller | 115 | "maintient d'une liste de révocation de certificats toujours disponible. Ceci" |
116 | " est bien au delà de la portée de BLFS (comme pour la plupart des " |
||
117 | "distributions Linux). Le magasin de certificats fournit ici est emprunté à " |
||
118 | "la fondation Mozilla, qui ont établit une politique d'inclusion très stricte" |
||
119 | " décrite <ulink url=\"https://www.mozilla.org/en-" |
||
120 | "US/about/governance/policies/security-group/certs/\">ici</ulink>." |
||
7202 | jlepiller | 121 | |
7156 | jlepiller | 122 | #. type: Content of: <sect1><sect2><title> |
7318 | jlepiller | 123 | #: blfs-en/postlfs/security/cacerts.xml:52 |
7156 | jlepiller | 124 | msgid "Introduction to Certificate Authorities" |
125 | msgstr "Introduction à Certificate Authorities" |
||
126 | |||
127 | #. type: Content of: <sect1><sect2><bridgehead> |
||
7318 | jlepiller | 128 | #: blfs-en/postlfs/security/cacerts.xml:54 |
7156 | jlepiller | 129 | msgid "Package Information" |
130 | msgstr "Informations sur le paquet" |
||
131 | |||
132 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7318 | jlepiller | 133 | #: blfs-en/postlfs/security/cacerts.xml:57 |
7193 | jlepiller | 134 | msgid "Download (HTTP): <ulink url=\"&make-ca-download;\"/>" |
135 | msgstr "Téléchargement (HTTP) : <ulink url=\"&make-ca-download;\"/>" |
||
7156 | jlepiller | 136 | |
137 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7318 | jlepiller | 138 | #: blfs-en/postlfs/security/cacerts.xml:60 |
7193 | jlepiller | 139 | msgid "Download size: &make-ca-size;" |
140 | msgstr "Taille du téléchargement : &make-ca-size;" |
||
7156 | jlepiller | 141 | |
142 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7318 | jlepiller | 143 | #: blfs-en/postlfs/security/cacerts.xml:63 |
7193 | jlepiller | 144 | msgid "Download MD5 Sum: &make-ca-md5sum;" |
7196 | jlepiller | 145 | msgstr "Somme MD5 du téléchargement : &make-ca-md5sum;" |
7193 | jlepiller | 146 | |
147 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7318 | jlepiller | 148 | #: blfs-en/postlfs/security/cacerts.xml:66 |
7156 | jlepiller | 149 | msgid "Estimated disk space required: &cacerts-buildsize;" |
150 | msgstr "Estimation de l'espace disque requis : &cacerts-buildsize;" |
||
151 | |||
152 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7318 | jlepiller | 153 | #: blfs-en/postlfs/security/cacerts.xml:69 |
7156 | jlepiller | 154 | msgid "Estimated build time: &cacerts-time;" |
155 | msgstr "Estimation du temps de construction : &cacerts-time;" |
||
156 | |||
157 | #. type: Content of: <sect1><sect2><bridgehead> |
||
7318 | jlepiller | 158 | #: blfs-en/postlfs/security/cacerts.xml:73 |
7156 | jlepiller | 159 | msgid "Certificate Authority Certificates Dependencies" |
160 | msgstr "Dépendances de Certificate Authority Certificates" |
||
161 | |||
162 | #. type: Content of: <sect1><sect2><bridgehead> |
||
7318 | jlepiller | 163 | #: blfs-en/postlfs/security/cacerts.xml:78 |
7202 | jlepiller | 164 | msgid "Optional (runtime)" |
165 | msgstr "Facultatives (exécution)" |
||
166 | |||
7156 | jlepiller | 167 | #. type: Content of: <sect1><sect2><para> |
7318 | jlepiller | 168 | #: blfs-en/postlfs/security/cacerts.xml:80 |
7202 | jlepiller | 169 | msgid "" |
7313 | jlepiller | 170 | "<xref role=\"runtime\" linkend=\"java\"/> or <xref role=\"runtime\" " |
171 | "linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/>, and <xref " |
||
172 | "role=\"runtime\" linkend=\"p11-kit\"/>" |
||
7202 | jlepiller | 173 | msgstr "" |
7313 | jlepiller | 174 | "<xref role=\"runtime\" linkend=\"java\"/> ou <xref role=\"runtime\" " |
175 | "linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/> et <xref " |
||
176 | "role=\"runtime\" linkend=\"p11-kit\"/>" |
||
7202 | jlepiller | 177 | |
178 | #. type: Content of: <sect1><sect2><para> |
||
7318 | jlepiller | 179 | #: blfs-en/postlfs/security/cacerts.xml:86 |
7156 | jlepiller | 180 | msgid "User Notes: <ulink url='&blfs-wiki;/cacerts'/>" |
181 | msgstr "Notes utilisateur : <ulink url='&blfs-wiki;/cacerts'/>" |
||
182 | |||
183 | #. type: Content of: <sect1><sect2><title> |
||
7318 | jlepiller | 184 | #: blfs-en/postlfs/security/cacerts.xml:91 |
7156 | jlepiller | 185 | msgid "Installation of Certificate Authority Certificates" |
186 | msgstr "Installation de Certificate Authority Certificates" |
||
187 | |||
188 | #. type: Content of: <sect1><sect2><para> |
||
7318 | jlepiller | 189 | #: blfs-en/postlfs/security/cacerts.xml:93 |
7156 | jlepiller | 190 | msgid "" |
7318 | jlepiller | 191 | "The <application>make-ca</application> script will download and process the " |
7203 | jlepiller | 192 | "certificates included in the <filename>certdata.txt</filename> file for use " |
193 | "in multiple certificate stores (if the associated applications are present " |
||
194 | "on the system). Additionally, any local certificates stored in " |
||
7202 | jlepiller | 195 | "<filename>/etc/ssl/local</filename> will be imported to the certificate " |
196 | "stores. Certificates in this directory should be stored as PEM encoded " |
||
197 | "<application>OpenSSL</application> trusted certificates." |
||
7156 | jlepiller | 198 | msgstr "" |
7318 | jlepiller | 199 | "Le script <application>make-ca</application> adaptera les certificats inclus" |
200 | " dans le fichier <filename>certdata.txt</filename> pour l'utiliser dans de " |
||
201 | "multiples magasins de certificats (si les applications associées sont " |
||
202 | "présentes sur le système). De plus, tout certificat local stocké dans " |
||
7202 | jlepiller | 203 | "<filename>/etc/ssl/local</filename> sera importé dans les magasins de " |
204 | "certificats. Les certificats de ce répertoire devraient être stockés sous " |
||
205 | "forme de certificats de confiance <application>OpenSSL</application> encodé " |
||
206 | "en PEM." |
||
7156 | jlepiller | 207 | |
7193 | jlepiller | 208 | #. type: Content of: <sect1><sect2><para> |
7318 | jlepiller | 209 | #: blfs-en/postlfs/security/cacerts.xml:101 |
7156 | jlepiller | 210 | msgid "" |
7202 | jlepiller | 211 | "To create an <application>OpenSSL</application> trusted certificate from a " |
7318 | jlepiller | 212 | "regular PEM encoded file, you need to add trust arguments to the " |
7202 | jlepiller | 213 | "<command>openssl</command> command, and create a new certificate. There are " |
7280 | jlepiller | 214 | "three trust types that are recognized by the <application>make-" |
7318 | jlepiller | 215 | "ca</application> script, SSL/TLS, S/Mime, and code signing. For example, " |
216 | "using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you" |
||
217 | " want to trust both for all three roles, the following commands will create " |
||
7344 | jlepiller | 218 | "appropriate OpenSSL trusted certificates (run as the <systemitem " |
219 | "class=\"username\">root</systemitem> user):" |
||
7156 | jlepiller | 220 | msgstr "" |
7202 | jlepiller | 221 | "Pour créer un certificat de confiance <application>OpenSSL</application> " |
7344 | jlepiller | 222 | "depuis un fichier normal encodé en PEM, vous devrez ajouter des arguments " |
223 | "« trust » à la commande <command>openssl</command> et créer un " |
||
224 | "nouveau certificat. Il y a trois types de confiances reconnues par le script" |
||
225 | " <application>make-ca</application> : SSL/TLS, S/Mime et la signature " |
||
226 | "de code. Par exemple, si vous souhaitez utiliser les racines <ulink " |
||
227 | "url=\"http://www.cacert.org/\">CAcert</ulink> pour que les deux soient de " |
||
228 | "confiance pour ces trois rôles, les commandes suivantes créeront des " |
||
229 | "certificats de confiance OpenSSL approprié (à lancer en tant qu'utilisateur " |
||
230 | "<systemitem class=\"username\">root</systemitem>) :" |
||
7156 | jlepiller | 231 | |
7202 | jlepiller | 232 | #. type: Content of: <sect1><sect2><screen> |
7344 | jlepiller | 233 | #: blfs-en/postlfs/security/cacerts.xml:112 |
7202 | jlepiller | 234 | #, no-wrap |
235 | msgid "" |
||
7280 | jlepiller | 236 | "<userinput>install -vdm755 /etc/ssl/local &&\n" |
237 | "wget http://www.cacert.org/certs/root.crt &&\n" |
||
7318 | jlepiller | 238 | "wget http://www.cacert.org/certs/class3.crt &&\n" |
7280 | jlepiller | 239 | "openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n" |
240 | " -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n" |
||
7318 | jlepiller | 241 | " > /etc/ssl/local/CAcert_Class_1_root.pem &&\n" |
242 | "openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n" |
||
243 | " -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n" |
||
244 | " > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>" |
||
7202 | jlepiller | 245 | msgstr "" |
7280 | jlepiller | 246 | "<userinput>install -vdm755 /etc/ssl/local &&\n" |
247 | "wget http://www.cacert.org/certs/root.crt &&\n" |
||
7318 | jlepiller | 248 | "wget http://www.cacert.org/certs/class3.crt &&\n" |
7280 | jlepiller | 249 | "openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n" |
250 | " -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n" |
||
7318 | jlepiller | 251 | " > /etc/ssl/local/CAcert_Class_1_root.pem &&\n" |
252 | "openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n" |
||
253 | " -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n" |
||
254 | " > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>" |
||
7202 | jlepiller | 255 | |
7156 | jlepiller | 256 | #. type: Content of: <sect1><sect2><para> |
7344 | jlepiller | 257 | #: blfs-en/postlfs/security/cacerts.xml:122 |
7156 | jlepiller | 258 | msgid "" |
7280 | jlepiller | 259 | "If one of the three trust arguments is omitted, the certificate is neither " |
260 | "trusted, nor rejected for that role. Clients that use " |
||
261 | "<application>OpenSSL</application> or <application>NSS</application> " |
||
262 | "encountering this certificate will present a warning to the user. Clients " |
||
263 | "using <application>GnuTLS</application> without " |
||
264 | "<application>p11-kit</application> support are not aware of trusted " |
||
7202 | jlepiller | 265 | "certificates. To include this CA into the ca-bundle.crt (used for " |
266 | "<application>GnuTLS</application>), it must have <envar>serverAuth</envar> " |
||
7280 | jlepiller | 267 | "trust. Additionally, to explicitly disallow a certificate for a particular " |
268 | "use, replace the <parameter>-addtrust</parameter> flag with the " |
||
269 | "<parameter>-addreject</parameter> flag." |
||
7156 | jlepiller | 270 | msgstr "" |
7280 | jlepiller | 271 | "Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour " |
272 | "ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou " |
||
7202 | jlepiller | 273 | "<application>NSS</application> rencontrant ce certificat renverront un " |
274 | "avertissement à l'utilisateur . Les clients qui utilisent " |
||
275 | "<application>GnuTLS</application> sans le support de " |
||
276 | "<application>p11-kit</application> ne sont pas conscient des certificats de " |
||
277 | "confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par " |
||
7280 | jlepiller | 278 | "<application>GnuTLS</application>), il doit avoir la confiance " |
279 | "<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une " |
||
280 | "utilisation particulière, remplacez le paramètre " |
||
281 | "<parameter>-addtrust</parameter> par le paramètre " |
||
282 | "<parameter>-addreject</parameter>." |
||
7156 | jlepiller | 283 | |
284 | #. type: Content of: <sect1><sect2><para> |
||
7344 | jlepiller | 285 | #: blfs-en/postlfs/security/cacerts.xml:134 |
7156 | jlepiller | 286 | msgid "" |
7334 | jlepiller | 287 | "To install the various certificate stores, first install the " |
288 | "<application>make-ca</application> script into the correct location. As the" |
||
289 | " <systemitem class=\"username\">root</systemitem> user:" |
||
7156 | jlepiller | 290 | msgstr "" |
7202 | jlepiller | 291 | "Pour installer les divers magasins de certificats, installez le script " |
7318 | jlepiller | 292 | "<application>make-ca</application> au bon endroit. En tant qu'utilisateur " |
293 | "<systemitem class=\"username\">root</systemitem> :" |
||
7156 | jlepiller | 294 | |
295 | #. type: Content of: <sect1><sect2><screen> |
||
7344 | jlepiller | 296 | #: blfs-en/postlfs/security/cacerts.xml:138 |
7156 | jlepiller | 297 | #, no-wrap |
7318 | jlepiller | 298 | msgid "<userinput>make install</userinput>" |
299 | msgstr "<userinput>make install</userinput>" |
||
7156 | jlepiller | 300 | |
301 | #. type: Content of: <sect1><sect2><para> |
||
7344 | jlepiller | 302 | #: blfs-en/postlfs/security/cacerts.xml:140 |
7156 | jlepiller | 303 | msgid "" |
7318 | jlepiller | 304 | "As the <systemitem class=\"username\">root</systemitem> user, download and " |
305 | "update the certificate stores with the following command:" |
||
7156 | jlepiller | 306 | msgstr "" |
7196 | jlepiller | 307 | "En tant qu'utilisateur <systemitem class=\"username\">root</systemitem>, " |
7318 | jlepiller | 308 | "téléchargez et mettez à jour le magasin de certificats avec la commande " |
309 | "suivante :" |
||
7156 | jlepiller | 310 | |
7308 | jlepiller | 311 | #. type: Content of: <sect1><sect2><note><para> |
7344 | jlepiller | 312 | #: blfs-en/postlfs/security/cacerts.xml:144 |
7308 | jlepiller | 313 | msgid "" |
314 | "If running the script a second time with the same version of " |
||
315 | "<filename>certdata.txt</filename>, for instance, to add additional stores as" |
||
316 | " the requisite software is installed, add the <parameter>-f</parameter> " |
||
7318 | jlepiller | 317 | "switch to the command line. If packaging, run <command>make-ca " |
7308 | jlepiller | 318 | "--help</command> to see all available command line options." |
319 | msgstr "" |
||
320 | "Si vous lancez le script une deuxième fois avec la même version de " |
||
321 | "<filename>certdata.txt</filename>, par exemple pour ajouter des magasins " |
||
322 | "supplémentaires parce que le logiciel requis est installé, ajoutez l'option " |
||
323 | "<parameter>-f</parameter> à la ligne de commande. Si vous créez un paquet, " |
||
7318 | jlepiller | 324 | "lancez <command>make-ca --help</command> pour voir toutes les options de la " |
325 | "ligne de commande disponibles." |
||
7308 | jlepiller | 326 | |
7156 | jlepiller | 327 | #. type: Content of: <sect1><sect2><screen> |
7344 | jlepiller | 328 | #: blfs-en/postlfs/security/cacerts.xml:151 |
7156 | jlepiller | 329 | #, no-wrap |
7318 | jlepiller | 330 | msgid "<userinput>/usr/sbin/make-ca -g</userinput>" |
331 | msgstr "<userinput>/usr/sbin/make-ca -g</userinput>" |
||
7156 | jlepiller | 332 | |
333 | #. type: Content of: <sect1><sect2><para> |
||
7344 | jlepiller | 334 | #: blfs-en/postlfs/security/cacerts.xml:153 |
7156 | jlepiller | 335 | msgid "" |
7318 | jlepiller | 336 | "You should periodically update the store with the above command either " |
337 | "manually, or via a <phrase revision=\"sysv\">cron job.</phrase> <phrase " |
||
338 | "revision=\"systemd\">systemd timer. A timer is installed at " |
||
339 | "<filename>/etc/systemd/system/update-pki.timer</filename> that, if enabled, " |
||
340 | "will check for updates weekly.</phrase>" |
||
7156 | jlepiller | 341 | msgstr "" |
7318 | jlepiller | 342 | "Vous devriez mettre à jour régulièrement le magasin avec la commande ci-" |
343 | "dessus soit manuellement, soit via <phrase revision=\"sysv\">une tâche " |
||
344 | "cron.</phrase><phrase revision=\"systemd\">un timer systemd. Un timer est " |
||
345 | "installé dans <filename>/etc/systemd/system/update-pki.timer</filename> et " |
||
346 | "s'il est activé, il vérifiera les mises à jour une fois par " |
||
347 | "semaine.</phrase>" |
||
7156 | jlepiller | 348 | |
7202 | jlepiller | 349 | #. type: Content of: <sect1><sect2><para> |
7344 | jlepiller | 350 | #: blfs-en/postlfs/security/cacerts.xml:159 |
7202 | jlepiller | 351 | msgid "" |
7318 | jlepiller | 352 | "The default <filename>certdata.txt</filename> file provided by make-ca is " |
353 | "obtained from the mozilla-release branch, and is modified to provide a " |
||
354 | "Mercurial revision. This will be the correct version for most systems. There" |
||
355 | " are, however, several other variants of the file available for use that " |
||
356 | "might be preferred for one reason or another, including the files shipped " |
||
357 | "with Mozilla products in this book. RedHat and OpenSUSE, for instance, use " |
||
358 | "the version included in <xref linkend=\"nss\"/>. Additional upstream " |
||
359 | "downloads are available at the links below." |
||
7202 | jlepiller | 360 | msgstr "" |
7318 | jlepiller | 361 | "Le fichier <filename>certdata.txt</filename> fournit par make-ca est obtenu " |
362 | "à partir de la branche mozilla-release, et est modifié pour fournir une " |
||
363 | "simple révision horodatée. Ce sera la bonne version pour la plupart des " |
||
364 | "systèmes. Il y a cependant plusieurs variantes du fichier disponibles à " |
||
365 | "l'utilisation qui peuvent être préférés pour une raison ou une autre, " |
||
366 | "incluses dans les produits Mozilla dans ce livre. RedHat et OpenSUSE par " |
||
367 | "exemple utilisent la version incluse dans <xref linkend=\"nss\"/>. Des " |
||
368 | "emplacements de téléchargement supplémentaires sont disponibles :" |
||
7202 | jlepiller | 369 | |
370 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7344 | jlepiller | 371 | #: blfs-en/postlfs/security/cacerts.xml:170 |
7202 | jlepiller | 372 | msgid "" |
373 | "Mozilla Release (the version provided by BLFS): <ulink " |
||
374 | "url=\"&certhost;releases/mozilla-release/raw-" |
||
375 | "file/default/security/nss&certpath;\"/>" |
||
376 | msgstr "" |
||
377 | "Mozilla Release (la version fournie par BLFS) : <ulink " |
||
378 | "url=\"&certhost;releases/mozilla-release/raw-" |
||
379 | "file/default/security/nss&certpath;\"/>" |
||
380 | |||
381 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7344 | jlepiller | 382 | #: blfs-en/postlfs/security/cacerts.xml:175 |
7202 | jlepiller | 383 | msgid "" |
384 | "NSS (this is the latest available version): <ulink " |
||
7220 | jlepiller | 385 | "url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>" |
7202 | jlepiller | 386 | msgstr "" |
387 | "NSS (c'est la dernière version disponible) : <ulink " |
||
7220 | jlepiller | 388 | "url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>" |
7202 | jlepiller | 389 | |
390 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7344 | jlepiller | 391 | #: blfs-en/postlfs/security/cacerts.xml:180 |
7202 | jlepiller | 392 | msgid "" |
393 | "Mozilla Central: <ulink url=\"&certhost;mozilla-central/raw-" |
||
394 | "file/default/security/nss&certpath;\"/>" |
||
395 | msgstr "" |
||
396 | "Mozilla Central : <ulink url=\"&certhost;mozilla-central/raw-" |
||
397 | "file/default/security/nss&certpath;\"/>" |
||
398 | |||
399 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7344 | jlepiller | 400 | #: blfs-en/postlfs/security/cacerts.xml:185 |
7202 | jlepiller | 401 | msgid "" |
402 | "Mozilla Beta: <ulink url=\"&certhost;releases/mozilla-beta/raw-" |
||
403 | "file/default/security/nss&certpath;\"/>" |
||
404 | msgstr "" |
||
405 | "Mozilla Beta : <ulink url=\"&certhost;releases/mozilla-beta/raw-" |
||
406 | "file/default/security/nss&certpath;\"/>" |
||
407 | |||
408 | #. type: Content of: <sect1><sect2><itemizedlist><listitem><para> |
||
7344 | jlepiller | 409 | #: blfs-en/postlfs/security/cacerts.xml:190 |
7202 | jlepiller | 410 | msgid "" |
411 | "Mozilla Aurora: <ulink url=\"&certhost;releases/mozilla-aurora/raw-" |
||
412 | "file/default/security/nss&certpath;\"/>" |
||
413 | msgstr "" |
||
414 | "Mozilla Aurora : <ulink url=\"&certhost;releases/mozilla-aurora/raw-" |
||
415 | "file/default/security/nss&certpath;\"/>" |
||
416 | |||
7156 | jlepiller | 417 | #. type: Content of: <sect1><sect2><title> |
7344 | jlepiller | 418 | #: blfs-en/postlfs/security/cacerts.xml:199 |
7156 | jlepiller | 419 | msgid "Contents" |
420 | msgstr "Contenu" |
||
421 | |||
422 | #. type: Content of: <sect1><sect2><segmentedlist><segtitle> |
||
7344 | jlepiller | 423 | #: blfs-en/postlfs/security/cacerts.xml:202 |
7156 | jlepiller | 424 | msgid "Installed Programs" |
425 | msgstr "Programmes installés" |
||
426 | |||
427 | #. type: Content of: <sect1><sect2><segmentedlist><segtitle> |
||
7344 | jlepiller | 428 | #: blfs-en/postlfs/security/cacerts.xml:203 |
7156 | jlepiller | 429 | msgid "Installed Libraries" |
430 | msgstr "Bibliothèques installées" |
||
431 | |||
432 | #. type: Content of: <sect1><sect2><segmentedlist><segtitle> |
||
7344 | jlepiller | 433 | #: blfs-en/postlfs/security/cacerts.xml:204 |
7156 | jlepiller | 434 | msgid "Installed Directories" |
435 | msgstr "Répertoires installés" |
||
436 | |||
7318 | jlepiller | 437 | #. type: Content of: |
438 | #. <sect1><sect2><variablelist><varlistentry><listitem><indexterm><primary> |
||
7344 | jlepiller | 439 | #: blfs-en/postlfs/security/cacerts.xml:207 |
440 | #: blfs-en/postlfs/security/cacerts.xml:225 |
||
7318 | jlepiller | 441 | msgid "make-ca" |
442 | msgstr "make-ca" |
||
7156 | jlepiller | 443 | |
444 | #. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg> |
||
7344 | jlepiller | 445 | #: blfs-en/postlfs/security/cacerts.xml:208 |
7156 | jlepiller | 446 | msgid "None" |
447 | msgstr "Aucune" |
||
448 | |||
449 | #. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg> |
||
7344 | jlepiller | 450 | #: blfs-en/postlfs/security/cacerts.xml:209 |
7202 | jlepiller | 451 | msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}" |
452 | msgstr "/etc/ssl/{certs,java,local} et /etc/pki/{nssdb,anchors}" |
||
7156 | jlepiller | 453 | |
454 | #. type: Content of: <sect1><sect2><variablelist><bridgehead> |
||
7344 | jlepiller | 455 | #: blfs-en/postlfs/security/cacerts.xml:214 |
7156 | jlepiller | 456 | msgid "Short Descriptions" |
457 | msgstr "Descriptions courtes" |
||
458 | |||
459 | #. type: Content of: <sect1><sect2><variablelist><varlistentry><term> |
||
7344 | jlepiller | 460 | #: blfs-en/postlfs/security/cacerts.xml:219 |
7318 | jlepiller | 461 | msgid "<command>make-ca</command>" |
462 | msgstr "<command>make-ca</command>" |
||
7156 | jlepiller | 463 | |
7165 | jlepiller | 464 | #. type: Content of: |
465 | #. <sect1><sect2><variablelist><varlistentry><listitem><para> |
||
7344 | jlepiller | 466 | #: blfs-en/postlfs/security/cacerts.xml:221 |
7156 | jlepiller | 467 | msgid "" |
7202 | jlepiller | 468 | "is a shell script that adapts a current version of " |
7193 | jlepiller | 469 | "<filename>certdata.txt</filename>, and prepares it for use as the system " |
470 | "certificate store." |
||
7156 | jlepiller | 471 | msgstr "" |
7202 | jlepiller | 472 | "est un script shell qui adapte une version actuelle de " |
7197 | jlepiller | 473 | "<filename>certdata.txt</filename> et le prépare pour l'utiliser comme " |
7196 | jlepiller | 474 | "magasin de certificat du système." |
7156 | jlepiller | 475 | |
7348 | jlepiller | 476 | #~ msgid "Required" |
477 | #~ msgstr "Requises" |
||
478 | |||
479 | #~ msgid "<xref linkend=\"openssl\"/>" |
||
480 | #~ msgstr "<xref linkend=\"openssl\"/>" |
||
481 | |||
7318 | jlepiller | 482 | #~ msgid "32 KB" |
483 | #~ msgstr "32 Ko" |
||
7156 | jlepiller | 484 | |
7318 | jlepiller | 485 | #~ msgid "25033ded9dd0979226b8f3fd2792bd3a" |
486 | #~ msgstr "25033ded9dd0979226b8f3fd2792bd3a" |
||
487 | |||
488 | #~ msgid "&sources-anduin-http;/other/certdata.txt" |
||
489 | #~ msgstr "&sources-anduin-http;/other/certdata.txt" |
||
490 | |||
491 | #~ msgid "1.6 MB" |
||
492 | #~ msgstr "1.6 Mo" |
||
493 | |||
494 | #~ msgid "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;" |
||
495 | #~ msgstr "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;" |
||
496 | |||
497 | #~ msgid "24 KB" |
||
498 | #~ msgstr "24 Ko" |
||
499 | |||
500 | #~ msgid "a21a04d6ff5c4645c748220dbaa9f221" |
||
501 | #~ msgstr "a21a04d6ff5c4645c748220dbaa9f221" |
||
502 | |||
503 | #~ msgid "Additional Downloads" |
||
504 | #~ msgstr "Téléchargements supplémentaires" |
||
505 | |||
506 | #~ msgid "CA Certificates <ulink url=\"&ca-bundle-download;\"/>" |
||
507 | #~ msgstr "Certificats de CA <ulink url=\"&ca-bundle-download;\"/>" |
||
508 | |||
509 | #~ msgid "" |
||
510 | #~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-" |
||
511 | #~ "ca.sh</userinput>" |
||
512 | #~ msgstr "" |
||
513 | #~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-" |
||
514 | #~ "ca.sh</userinput>" |
||
515 | |||
516 | #~ msgid "" |
||
517 | #~ "You should periodically download a copy of <filename>certdata.txt</filename>" |
||
518 | #~ " and run the <application>make-ca.sh</application> script (as the " |
||
519 | #~ "<systemitem class=\"username\">root</systemitem> user), or as part of a " |
||
520 | #~ "monthly <application>cron</application> job to ensure that you have the " |
||
521 | #~ "latest available version of the certificates." |
||
522 | #~ msgstr "" |
||
523 | #~ "Vous devriez télécharger régulièrement une copie de " |
||
524 | #~ "<filename>certdata.txt</filename> et lancer le script <application>make-" |
||
525 | #~ "ca.sh</application> (en tant qu'utilisateur <systemitem " |
||
526 | #~ "class=\"username\">root</systemitem>), ou en tant que tâche " |
||
527 | #~ "<application>cron</application> mensuelle pour vous assurer d'avoir la " |
||
528 | #~ "dernière version disponible des certificats." |
||
529 | |||
530 | #~ msgid "make-ca.sh" |
||
531 | #~ msgstr "make-ca.sh" |
||
532 | |||
7264 | jlepiller | 533 | #~ msgid "b42fd97c173ef67a37fb05ed7587e0a8" |
534 | #~ msgstr "b42fd97c173ef67a37fb05ed7587e0a8" |
||
535 | |||
7258 | jlepiller | 536 | #~ msgid "11 KB" |
537 | #~ msgstr "11 Ko" |
||
538 | |||
539 | #~ msgid "cce9fa4713c4611d9e61f99de612a1e9" |
||
540 | #~ msgstr "cce9fa4713c4611d9e61f99de612a1e9" |
||
541 | |||
7224 | jlepiller | 542 | #~ msgid "5e41c17a3dd6b8195c55092e87e92ef0" |
543 | #~ msgstr "5e41c17a3dd6b8195c55092e87e92ef0" |
||
544 | |||
7214 | jlepiller | 545 | #~ msgid "fca9ae62242800a9dcaee5d400ee5c41" |
546 | #~ msgstr "fca9ae62242800a9dcaee5d400ee5c41" |
||
547 | |||
7203 | jlepiller | 548 | #~ msgid "9e416981cd153d8923e06dc8e39ac534" |
549 | #~ msgstr "9e416981cd153d8923e06dc8e39ac534" |
||
550 | |||
7202 | jlepiller | 551 | #~ msgid "65c6cbbb11e6d124b047f4aa0dcb2808" |
552 | #~ msgstr "65c6cbbb11e6d124b047f4aa0dcb2808" |
||
7156 | jlepiller | 553 | |
7202 | jlepiller | 554 | #~ msgid "fbc5687ce7fd5533edbb4e616a1080de" |
555 | #~ msgstr "fbc5687ce7fd5533edbb4e616a1080de" |
||
556 | |||
557 | #~ msgid "487ca7ce6f7b81b3e46362138f93310c" |
||
558 | #~ msgstr "487ca7ce6f7b81b3e46362138f93310c" |
||
559 | |||
560 | #~ msgid "1.4 MB" |
||
561 | #~ msgstr "1.4 Mo" |
||
562 | |||
563 | #~ msgid "0.1 SBU" |
||
564 | #~ msgstr "0.1 SBU" |
||
565 | |||
566 | #~ msgid "" |
||
567 | #~ "The Public Key Infrastructure is used for many security features in a Linux " |
||
568 | #~ "system. In order for a certificate to be trusted, it must be signed by a " |
||
569 | #~ "trusted agent called a Certificate Authority (CA). The certificates " |
||
570 | #~ "installed in this section are obtained from the Mozilla version control " |
||
571 | #~ "system, and reformatted for use by <xref linkend='openssl'/> and <xref " |
||
572 | #~ "linkend='gnutls'/>. The certificates can also be used by other applications," |
||
573 | #~ " either directly or indirectly by linking to one of these packages." |
||
574 | #~ msgstr "" |
||
575 | #~ "La <foreignphrase>Public Key Infrastructure</foreignphrase> (infrastructure " |
||
576 | #~ "de clés publiques) est utilisée dans de nombreux cas de sécurité sur un " |
||
577 | #~ "système Linux. Pour qu'un certificat soit fiable, il doit être signé par un " |
||
578 | #~ "agent de confiance, qu'on appelle l'autorité de certification " |
||
579 | #~ "(<foreignphrase>Certificate Authority</foreignphrase>) (CA). Les " |
||
580 | #~ "certificats chargés dans cette section sont issus de la liste du système de " |
||
581 | #~ "contrôle de Mozilla et elle est formatée dans une forme utilisée par <xref " |
||
582 | #~ "linkend=\"openssl\"/> et <xref linkend='gnutls'/>. Les certificats peuvent " |
||
583 | #~ "également être utilisés par d'autres applications, directement ou " |
||
584 | #~ "indirectement via <application>openssl</application>." |
||
585 | |||
586 | #~ msgid "" |
||
587 | #~ "The <application>make-ca.sh</application> script will download a set of " |
||
588 | #~ "certificates from one of five projects (aurora, beta, central, nss, or " |
||
589 | #~ "release) in the Mozialla version control system. It defaults to the release " |
||
590 | #~ "branch, which is identical to the version that ships with the Mozilla " |
||
591 | #~ "products in this book. If you'd like to change the branch that is retrieved," |
||
592 | #~ " edit the file and set <envar>CERTSOURCE</envar> to one of the five values " |
||
593 | #~ "above." |
||
594 | #~ msgstr "" |
||
595 | #~ "Le script <application>make-ca.sh</application> téléchargement un ensemble " |
||
596 | #~ "de certificats depuis l'un des cinq projets (aurora, beta, central, nss ou " |
||
597 | #~ "release) du système de contrôle de version de Mozilla. Il est réglé par " |
||
598 | #~ "défaut sur la branche release, qui est identique à la version qui vient avec" |
||
599 | #~ " les produits Mozilla de ce livre. Si vous préférez changer la branche qui " |
||
600 | #~ "est récupérée, modifiez le fichier et mettez <envar>CERTSOURCE</envar> à " |
||
601 | #~ "l'une des cinq valeurs ci-dessus." |
||
602 | |||
603 | #~ msgid "" |
||
604 | #~ "Additionally, any local certificates stored in " |
||
605 | #~ "<filename>/etc/ssl/local</filename> will be copied into both the single-file" |
||
606 | #~ " <filename>/etc/ssl/ca-bundle.crt</filename> (used by programs that link to " |
||
607 | #~ "<application>gnutls</application>), and into the certificate store directory" |
||
608 | #~ " <filename>/etc/ssl/certs</filename> (used by programs that link to " |
||
609 | #~ "<application>OpenSSL</application>). All certificates will pass a date and " |
||
610 | #~ "trust validation, and any existing certificates in <filename>/etc/ssl/ca-" |
||
611 | #~ "bundle.crt</filename> or <filename>/etc/ssl/certs</filename> will be removed" |
||
612 | #~ " upon successful completion of this script." |
||
613 | #~ msgstr "" |
||
614 | #~ "De plus, tout certificat local stocké dans " |
||
615 | #~ "<filename>/etc/ssl/local</filename> sera copié dans le fichier " |
||
616 | #~ "<filename>/etc/ssl/ca-bundle.crt</filename> (utilisé par les programmes qui " |
||
617 | #~ "se lient à <application>gnutls</application>) et dans le répertoire du " |
||
618 | #~ "magasin de certificats <filename>/etc/ssl/certs</filename> (utilisé par les " |
||
619 | #~ "programmes qui se lient à <application>OpenSSL</application>). Tous les " |
||
620 | #~ "certificats passeront un test de validation de leur date et de leur " |
||
621 | #~ "confiance, et tout certificat existant dans <filename>/etc/ssl/ca-" |
||
622 | #~ "bundle.crt</filename> ou <filename>/etc/ssl-certs</filename> sera supprimé à" |
||
623 | #~ " la fin de ce script si tout va bien." |
||
624 | |||
625 | #~ msgid "" |
||
626 | #~ "Finally, if you've installed <xref linkend=\"java\"/> or <xref " |
||
627 | #~ "linkend=\"openjdk\"/>, then it will also update the java cacerts file at " |
||
628 | #~ "<filename>/etc/ssl/java/cacerts</filename>." |
||
629 | #~ msgstr "" |
||
630 | #~ "Enfin, si vous avez installé <xref linkend=\"java\"/> ou <xref " |
||
631 | #~ "linkend=\"openjdk\"/>, il mettra aussi à jour le fichier cacerts de java " |
||
632 | #~ "dans <filename>/etc/ssl/java/cacerts</filename>." |
||
633 | |||
634 | #~ msgid "" |
||
635 | #~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &&\n" |
||
636 | #~ "/usr/sbin/make-ca.sh\n" |
||
637 | #~ "</userinput>" |
||
638 | #~ msgstr "" |
||
639 | #~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &&\n" |
||
640 | #~ "/usr/sbin/make-ca.sh\n" |
||
641 | #~ "</userinput>" |
||
642 | |||
7193 | jlepiller | 643 | #~ msgid "/mozilla/source/security/nss/lib/ckfw/builtins" |
644 | #~ msgstr "/mozilla/source/security/nss/lib/ckfw/builtins" |
||
7156 | jlepiller | 645 | |
7193 | jlepiller | 646 | #~ msgid "6 MB" |
7233 | jlepiller | 647 | #~ msgstr "6 Mo" |
7156 | jlepiller | 648 | |
7193 | jlepiller | 649 | #~ msgid "" |
650 | #~ "The certfile.txt file above is actually retrieved from <ulink " |
||
651 | #~ "url=\"https://hg.mozilla.org/releases/mozilla-" |
||
652 | #~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>. It is" |
||
653 | #~ " really an HTML file, but the text file can be retrieved indirectly from the" |
||
654 | #~ " HTML file. The Download URL above automates that process and also adds a " |
||
655 | #~ "line where the date can be extracted as a revision number by the scripts " |
||
656 | #~ "below." |
||
657 | #~ msgstr "" |
||
658 | #~ "Le fichier certfile.txt dessous est en fait récupéré depuis <ulink " |
||
659 | #~ "url=\"https://hg.mozilla.org/releases/mozilla-" |
||
660 | #~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>. C'est" |
||
661 | #~ " en fait un fichier HTML, mais le fichier texte peut être pris indirectement" |
||
662 | #~ " depuis le fichier HTML. L'URL dessous automatise ce processus et ajoute " |
||
663 | #~ "aussi une ligne où la date peut être extraite en tant que numéro de révision" |
||
664 | #~ " par le script." |
||
665 | |||
666 | #~ msgid "Recommended" |
||
667 | #~ msgstr "Recommandées" |
||
668 | |||
669 | #~ msgid "" |
||
670 | #~ "<userinput>cat > /usr/bin/make-cert.pl << \"EOF\"\n" |
||
671 | #~ "<literal>#!/usr/bin/perl -w\n" |
||
672 | #~ "\n" |
||
673 | #~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n" |
||
674 | #~ "# Run as ./make-cert.pl > certificate.crt\n" |
||
675 | #~ "#\n" |
||
676 | #~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n" |
||
677 | #~ "#\n" |
||
678 | #~ "# This script modified for use with single file data (tempfile.cer) extracted\n" |
||
679 | #~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n" |
||
680 | #~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n" |
||
681 | #~ "#\n" |
||
682 | #~ "# Authors: DJ Lucas\n" |
||
683 | #~ "# Bruce Dubbs\n" |
||
684 | #~ "#\n" |
||
685 | #~ "# Version 20120211\n" |
||
686 | #~ "\n" |
||
687 | #~ "my $certdata = './tempfile.cer';\n" |
||
688 | #~ "\n" |
||
689 | #~ "open( IN, \"cat $certdata|\" )\n" |
||
690 | #~ " || die \"could not open $certdata\";\n" |
||
691 | #~ "\n" |
||
692 | #~ "my $incert = 0;\n" |
||
693 | #~ "\n" |
||
694 | #~ "while ( <IN> )\n" |
||
695 | #~ "{\n" |
||
696 | #~ " if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n" |
||
697 | #~ " {\n" |
||
698 | #~ " $incert = 1;\n" |
||
699 | #~ " open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n" |
||
700 | #~ " || die \"could not pipe to openssl x509\";\n" |
||
701 | #~ " }\n" |
||
702 | #~ "\n" |
||
703 | #~ " elsif ( /^END/ && $incert )\n" |
||
704 | #~ " {\n" |
||
705 | #~ " close( OUT );\n" |
||
706 | #~ " $incert = 0;\n" |
||
707 | #~ " print \"\\n\\n\";\n" |
||
708 | #~ " }\n" |
||
709 | #~ "\n" |
||
710 | #~ " elsif ($incert)\n" |
||
711 | #~ " {\n" |
||
712 | #~ " my @bs = split( /\\\\/ );\n" |
||
713 | #~ " foreach my $b (@bs)\n" |
||
714 | #~ " {\n" |
||
715 | #~ " chomp $b;\n" |
||
716 | #~ " printf( OUT \"%c\", oct($b) ) unless $b eq '';\n" |
||
717 | #~ " }\n" |
||
718 | #~ " }\n" |
||
719 | #~ "}</literal>\n" |
||
720 | #~ "EOF\n" |
||
721 | #~ "\n" |
||
722 | #~ "chmod +x /usr/bin/make-cert.pl</userinput>" |
||
723 | #~ msgstr "" |
||
724 | #~ "<userinput>cat > /usr/bin/make-cert.pl << \"EOF\"\n" |
||
725 | #~ "<literal>#!/usr/bin/perl -w\n" |
||
726 | #~ "\n" |
||
727 | #~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n" |
||
728 | #~ "# Run as ./make-cert.pl > certificate.crt\n" |
||
729 | #~ "#\n" |
||
730 | #~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n" |
||
731 | #~ "#\n" |
||
732 | #~ "# This script modified for use with single file data (tempfile.cer) extracted\n" |
||
733 | #~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n" |
||
734 | #~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n" |
||
735 | #~ "#\n" |
||
736 | #~ "# Authors: DJ Lucas\n" |
||
737 | #~ "# Bruce Dubbs\n" |
||
738 | #~ "#\n" |
||
739 | #~ "# Version 20120211\n" |
||
740 | #~ "\n" |
||
741 | #~ "my $certdata = './tempfile.cer';\n" |
||
742 | #~ "\n" |
||
743 | #~ "open( IN, \"cat $certdata|\" )\n" |
||
744 | #~ " || die \"could not open $certdata\";\n" |
||
745 | #~ "\n" |
||
746 | #~ "my $incert = 0;\n" |
||
747 | #~ "\n" |
||
748 | #~ "while ( <IN> )\n" |
||
749 | #~ "{\n" |
||
750 | #~ " if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n" |
||
751 | #~ " {\n" |
||
752 | #~ " $incert = 1;\n" |
||
753 | #~ " open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n" |
||
754 | #~ " || die \"could not pipe to openssl x509\";\n" |
||
755 | #~ " }\n" |
||
756 | #~ "\n" |
||
757 | #~ " elsif ( /^END/ && $incert )\n" |
||
758 | #~ " {\n" |
||
759 | #~ " close( OUT );\n" |
||
760 | #~ " $incert = 0;\n" |
||
761 | #~ " print \"\\n\\n\";\n" |
||
762 | #~ " }\n" |
||
763 | #~ "\n" |
||
764 | #~ " elsif ($incert)\n" |
||
765 | #~ " {\n" |
||
766 | #~ " my @bs = split( /\\\\/ );\n" |
||
767 | #~ " foreach my $b (@bs)\n" |
||
768 | #~ " {\n" |
||
769 | #~ " chomp $b;\n" |
||
770 | #~ " printf( OUT \"%c\", oct($b) ) unless $b eq '';\n" |
||
771 | #~ " }\n" |
||
772 | #~ " }\n" |
||
773 | #~ "}</literal>\n" |
||
774 | #~ "EOF\n" |
||
775 | #~ "\n" |
||
776 | #~ "chmod +x /usr/bin/make-cert.pl</userinput>" |
||
777 | |||
778 | #~ msgid "" |
||
779 | #~ "The following script creates the certificates and a bundle of all the " |
||
780 | #~ "certificates. It creates a <filename class='directory'>./certs</filename> " |
||
781 | #~ "directory and <filename>./BLFS-ca-bundle-${VERSION}.crt</filename>. Again " |
||
782 | #~ "create this script as the <systemitem class=\"username\">root</systemitem> " |
||
783 | #~ "user:" |
||
784 | #~ msgstr "" |
||
785 | #~ "Le script suivant crée les certificats et un bouquet de tous les " |
||
786 | #~ "certificats. Il crée un répertoire <filename " |
||
787 | #~ "class='directory'>./certs</filename> et <filename>./BLFS-ca-" |
||
788 | #~ "bundle-${VERSION}.crt</filename>. Créez de nouveau ce script en tant " |
||
789 | #~ "qu'utilisateur <systemitem class=\"username\">root</systemitem> :" |
||
790 | |||
791 | #~ msgid "" |
||
792 | #~ "<userinput>cat > /usr/bin/make-ca.sh << \"EOF\"\n" |
||
793 | #~ "<literal>#!/bin/sh\n" |
||
794 | #~ "# Begin make-ca.sh\n" |
||
795 | #~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n" |
||
796 | #~ "#\n" |
||
797 | #~ "# The file certdata.txt must exist in the local directory\n" |
||
798 | #~ "# Version number is obtained from the version of the data.\n" |
||
799 | #~ "#\n" |
||
800 | #~ "# Authors: DJ Lucas\n" |
||
801 | #~ "# Bruce Dubbs\n" |
||
802 | #~ "#\n" |
||
803 | #~ "# Version 20120211\n" |
||
804 | #~ "\n" |
||
805 | #~ "# Some data in the certs have UTF-8 characters\n" |
||
806 | #~ "export LANG=en_US.utf8\n" |
||
807 | #~ "\n" |
||
808 | #~ "certdata=\"certdata.txt\"\n" |
||
809 | #~ "\n" |
||
810 | #~ "if [ ! -r $certdata ]; then\n" |
||
811 | #~ " echo \"$certdata must be in the local directory\"\n" |
||
812 | #~ " exit 1\n" |
||
813 | #~ "fi\n" |
||
814 | #~ "\n" |
||
815 | #~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n" |
||
816 | #~ "\n" |
||
817 | #~ "if [ -z \"${REVISION}\" ]; then\n" |
||
818 | #~ " echo \"$certfile has no 'Revision' in CVS_ID\"\n" |
||
819 | #~ " exit 1\n" |
||
820 | #~ "fi\n" |
||
821 | #~ "\n" |
||
822 | #~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n" |
||
823 | #~ "\n" |
||
824 | #~ "TEMPDIR=$(mktemp -d)\n" |
||
825 | #~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n" |
||
826 | #~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n" |
||
827 | #~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n" |
||
828 | #~ "SSLDIR=\"/etc/ssl\"\n" |
||
829 | #~ "\n" |
||
830 | #~ "mkdir \"${TEMPDIR}/certs\"\n" |
||
831 | #~ "\n" |
||
832 | #~ "# Get a list of starting lines for each cert\n" |
||
833 | #~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n" |
||
834 | #~ "\n" |
||
835 | #~ "# Get a list of ending lines for each cert\n" |
||
836 | #~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n" |
||
837 | #~ "\n" |
||
838 | #~ "# Start a loop\n" |
||
839 | #~ "for certbegin in ${CERTBEGINLIST}; do\n" |
||
840 | #~ " for certend in ${CERTENDLIST}; do\n" |
||
841 | #~ " if test \"${certend}\" -gt \"${certbegin}\"; then\n" |
||
842 | #~ " break\n" |
||
843 | #~ " fi\n" |
||
844 | #~ " done\n" |
||
845 | #~ "\n" |
||
846 | #~ " # Dump to a temp file with the name of the file as the beginning line number\n" |
||
847 | #~ " sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n" |
||
848 | #~ "done\n" |
||
849 | #~ "\n" |
||
850 | #~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n" |
||
851 | #~ "\n" |
||
852 | #~ "mkdir -p certs\n" |
||
853 | #~ "rm -f certs/* # Make sure the directory is clean\n" |
||
854 | #~ "\n" |
||
855 | #~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n" |
||
856 | #~ " # Make sure that the cert is trusted...\n" |
||
857 | #~ " grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n" |
||
858 | #~ " egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n" |
||
859 | #~ "\n" |
||
860 | #~ " if test \"${?}\" = \"0\"; then\n" |
||
861 | #~ " # Throw a meaningful error and remove the file\n" |
||
862 | #~ " cp \"${tempfile}\" tempfile.cer\n" |
||
863 | #~ " perl ${CONVERTSCRIPT} > tempfile.crt\n" |
||
864 | #~ " keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n" |
||
865 | #~ " echo \"Certificate ${keyhash} is not trusted! Removing...\"\n" |
||
866 | #~ " rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n" |
||
867 | #~ " continue\n" |
||
868 | #~ " fi\n" |
||
869 | #~ "\n" |
||
870 | #~ " # If execution made it to here in the loop, the temp cert is trusted\n" |
||
871 | #~ " # Find the cert data and generate a cert file for it\n" |
||
872 | #~ "\n" |
||
873 | #~ " cp \"${tempfile}\" tempfile.cer\n" |
||
874 | #~ " perl ${CONVERTSCRIPT} > tempfile.crt\n" |
||
875 | #~ " keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n" |
||
876 | #~ " mv tempfile.crt \"certs/${keyhash}.pem\"\n" |
||
877 | #~ " rm -f tempfile.cer \"${tempfile}\"\n" |
||
878 | #~ " echo \"Created ${keyhash}.pem\"\n" |
||
879 | #~ "done\n" |
||
880 | #~ "\n" |
||
881 | #~ "# Remove blacklisted files\n" |
||
882 | #~ "# MD5 Collision Proof of Concept CA\n" |
||
883 | #~ "if test -f certs/8f111d69.pem; then\n" |
||
884 | #~ " echo \"Certificate 8f111d69 is not trusted! Removing...\"\n" |
||
885 | #~ " rm -f certs/8f111d69.pem\n" |
||
886 | #~ "fi\n" |
||
887 | #~ "\n" |
||
888 | #~ "# Finally, generate the bundle and clean up.\n" |
||
889 | #~ "cat certs/*.pem > ${BUNDLE}\n" |
||
890 | #~ "rm -r \"${TEMPDIR}\"</literal>\n" |
||
891 | #~ "EOF\n" |
||
892 | #~ "\n" |
||
893 | #~ "chmod +x /usr/bin/make-ca.sh</userinput>" |
||
894 | #~ msgstr "" |
||
895 | #~ "<userinput>cat > /usr/bin/make-ca.sh << \"EOF\"\n" |
||
896 | #~ "<literal>#!/bin/sh\n" |
||
897 | #~ "# Begin make-ca.sh\n" |
||
898 | #~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n" |
||
899 | #~ "#\n" |
||
900 | #~ "# The file certdata.txt must exist in the local directory\n" |
||
901 | #~ "# Version number is obtained from the version of the data.\n" |
||
902 | #~ "#\n" |
||
903 | #~ "# Authors: DJ Lucas\n" |
||
904 | #~ "# Bruce Dubbs\n" |
||
905 | #~ "#\n" |
||
906 | #~ "# Version 20120211\n" |
||
907 | #~ "\n" |
||
908 | #~ "# Some data in the certs have UTF-8 characters\n" |
||
909 | #~ "export LANG=en_US.utf8\n" |
||
910 | #~ "\n" |
||
911 | #~ "certdata=\"certdata.txt\"\n" |
||
912 | #~ "\n" |
||
913 | #~ "if [ ! -r $certdata ]; then\n" |
||
914 | #~ " echo \"$certdata must be in the local directory\"\n" |
||
915 | #~ " exit 1\n" |
||
916 | #~ "fi\n" |
||
917 | #~ "\n" |
||
918 | #~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n" |
||
919 | #~ "\n" |
||
920 | #~ "if [ -z \"${REVISION}\" ]; then\n" |
||
921 | #~ " echo \"$certfile has no 'Revision' in CVS_ID\"\n" |
||
922 | #~ " exit 1\n" |
||
923 | #~ "fi\n" |
||
924 | #~ "\n" |
||
925 | #~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n" |
||
926 | #~ "\n" |
||
927 | #~ "TEMPDIR=$(mktemp -d)\n" |
||
928 | #~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n" |
||
929 | #~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n" |
||
930 | #~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n" |
||
931 | #~ "SSLDIR=\"/etc/ssl\"\n" |
||
932 | #~ "\n" |
||
933 | #~ "mkdir \"${TEMPDIR}/certs\"\n" |
||
934 | #~ "\n" |
||
935 | #~ "# Get a list of starting lines for each cert\n" |
||
936 | #~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n" |
||
937 | #~ "\n" |
||
938 | #~ "# Get a list of ending lines for each cert\n" |
||
939 | #~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n" |
||
940 | #~ "\n" |
||
941 | #~ "# Start a loop\n" |
||
942 | #~ "for certbegin in ${CERTBEGINLIST}; do\n" |
||
943 | #~ " for certend in ${CERTENDLIST}; do\n" |
||
944 | #~ " if test \"${certend}\" -gt \"${certbegin}\"; then\n" |
||
945 | #~ " break\n" |
||
946 | #~ " fi\n" |
||
947 | #~ " done\n" |
||
948 | #~ "\n" |
||
949 | #~ " # Dump to a temp file with the name of the file as the beginning line number\n" |
||
950 | #~ " sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n" |
||
951 | #~ "done\n" |
||
952 | #~ "\n" |
||
953 | #~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n" |
||
954 | #~ "\n" |
||
955 | #~ "mkdir -p certs\n" |
||
956 | #~ "rm -f certs/* # Make sure the directory is clean\n" |
||
957 | #~ "\n" |
||
958 | #~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n" |
||
959 | #~ " # Make sure that the cert is trusted...\n" |
||
960 | #~ " grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n" |
||
961 | #~ " egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n" |
||
962 | #~ "\n" |
||
963 | #~ " if test \"${?}\" = \"0\"; then\n" |
||
964 | #~ " # Throw a meaningful error and remove the file\n" |
||
965 | #~ " cp \"${tempfile}\" tempfile.cer\n" |
||
966 | #~ " perl ${CONVERTSCRIPT} > tempfile.crt\n" |
||
967 | #~ " keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n" |
||
968 | #~ " echo \"Certificate ${keyhash} is not trusted! Removing...\"\n" |
||
969 | #~ " rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n" |
||
970 | #~ " continue\n" |
||
971 | #~ " fi\n" |
||
972 | #~ "\n" |
||
973 | #~ " # If execution made it to here in the loop, the temp cert is trusted\n" |
||
974 | #~ " # Find the cert data and generate a cert file for it\n" |
||
975 | #~ "\n" |
||
976 | #~ " cp \"${tempfile}\" tempfile.cer\n" |
||
977 | #~ " perl ${CONVERTSCRIPT} > tempfile.crt\n" |
||
978 | #~ " keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n" |
||
979 | #~ " mv tempfile.crt \"certs/${keyhash}.pem\"\n" |
||
980 | #~ " rm -f tempfile.cer \"${tempfile}\"\n" |
||
981 | #~ " echo \"Created ${keyhash}.pem\"\n" |
||
982 | #~ "done\n" |
||
983 | #~ "\n" |
||
984 | #~ "# Remove blacklisted files\n" |
||
985 | #~ "# MD5 Collision Proof of Concept CA\n" |
||
986 | #~ "if test -f certs/8f111d69.pem; then\n" |
||
987 | #~ " echo \"Certificate 8f111d69 is not trusted! Removing...\"\n" |
||
988 | #~ " rm -f certs/8f111d69.pem\n" |
||
989 | #~ "fi\n" |
||
990 | #~ "\n" |
||
991 | #~ "# Finally, generate the bundle and clean up.\n" |
||
992 | #~ "cat certs/*.pem > ${BUNDLE}\n" |
||
993 | #~ "rm -r \"${TEMPDIR}\"</literal>\n" |
||
994 | #~ "EOF\n" |
||
995 | #~ "\n" |
||
996 | #~ "chmod +x /usr/bin/make-ca.sh</userinput>" |
||
997 | |||
998 | #~ msgid "" |
||
999 | #~ "Add a short script to remove expired certificates from a directory. Again " |
||
1000 | #~ "create this script as the <systemitem class=\"username\">root</systemitem> " |
||
1001 | #~ "user:" |
||
1002 | #~ msgstr "" |
||
1003 | #~ "Ajoutez un script bref pour supprimer les certificats expirés d'un " |
||
1004 | #~ "répertoire. Créez de nouveau ce script en tant qu'utilisateur <systemitem " |
||
1005 | #~ "class=\"username\">root</systemitem> :" |
||
1006 | |||
1007 | #~ msgid "" |
||
1008 | #~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh << \"EOF\"\n" |
||
1009 | #~ "<literal>#!/bin/sh\n" |
||
1010 | #~ "# Begin /usr/sbin/remove-expired-certs.sh\n" |
||
1011 | #~ "#\n" |
||
1012 | #~ "# Version 20120211\n" |
||
1013 | #~ "\n" |
||
1014 | #~ "# Make sure the date is parsed correctly on all systems\n" |
||
1015 | #~ "mydate()\n" |
||
1016 | #~ "{\n" |
||
1017 | #~ " local y=$( echo $1 | cut -d\" \" -f4 )\n" |
||
1018 | #~ " local M=$( echo $1 | cut -d\" \" -f1 )\n" |
||
1019 | #~ " local d=$( echo $1 | cut -d\" \" -f2 )\n" |
||
1020 | #~ " local m\n" |
||
1021 | #~ "\n" |
||
1022 | #~ " if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n" |
||
1023 | #~ "\n" |
||
1024 | #~ " case $M in\n" |
||
1025 | #~ " Jan) m=\"01\";;\n" |
||
1026 | #~ " Feb) m=\"02\";;\n" |
||
1027 | #~ " Mar) m=\"03\";;\n" |
||
1028 | #~ " Apr) m=\"04\";;\n" |
||
1029 | #~ " May) m=\"05\";;\n" |
||
1030 | #~ " Jun) m=\"06\";;\n" |
||
1031 | #~ " Jul) m=\"07\";;\n" |
||
1032 | #~ " Aug) m=\"08\";;\n" |
||
1033 | #~ " Sep) m=\"09\";;\n" |
||
1034 | #~ " Oct) m=\"10\";;\n" |
||
1035 | #~ " Nov) m=\"11\";;\n" |
||
1036 | #~ " Dec) m=\"12\";;\n" |
||
1037 | #~ " esac\n" |
||
1038 | #~ "\n" |
||
1039 | #~ " certdate=\"${y}${m}${d}\"\n" |
||
1040 | #~ "}\n" |
||
1041 | #~ "\n" |
||
1042 | #~ "OPENSSL=/usr/bin/openssl\n" |
||
1043 | #~ "DIR=/etc/ssl/certs\n" |
||
1044 | #~ "\n" |
||
1045 | #~ "if [ $# -gt 0 ]; then\n" |
||
1046 | #~ " DIR=\"$1\"\n" |
||
1047 | #~ "fi\n" |
||
1048 | #~ "\n" |
||
1049 | #~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n" |
||
1050 | #~ "today=$( date +%Y%m%d )\n" |
||
1051 | #~ "\n" |
||
1052 | #~ "for cert in $certs; do\n" |
||
1053 | #~ " notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n" |
||
1054 | #~ " date=$( echo ${notafter} | sed 's/^notAfter=//' )\n" |
||
1055 | #~ " mydate \"$date\"\n" |
||
1056 | #~ "\n" |
||
1057 | #~ " if [ ${certdate} -lt ${today} ]; then\n" |
||
1058 | #~ " echo \"${cert} expired on ${certdate}! Removing...\"\n" |
||
1059 | #~ " rm -f \"${cert}\"\n" |
||
1060 | #~ " fi\n" |
||
1061 | #~ "done</literal>\n" |
||
1062 | #~ "EOF\n" |
||
1063 | #~ "\n" |
||
1064 | #~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>" |
||
1065 | #~ msgstr "" |
||
1066 | #~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh << \"EOF\"\n" |
||
1067 | #~ "<literal>#!/bin/sh\n" |
||
1068 | #~ "# Begin /usr/sbin/remove-expired-certs.sh\n" |
||
1069 | #~ "#\n" |
||
1070 | #~ "# Version 20120211\n" |
||
1071 | #~ "\n" |
||
1072 | #~ "# Make sure the date is parsed correctly on all systems\n" |
||
1073 | #~ "mydate()\n" |
||
1074 | #~ "{\n" |
||
1075 | #~ " local y=$( echo $1 | cut -d\" \" -f4 )\n" |
||
1076 | #~ " local M=$( echo $1 | cut -d\" \" -f1 )\n" |
||
1077 | #~ " local d=$( echo $1 | cut -d\" \" -f2 )\n" |
||
1078 | #~ " local m\n" |
||
1079 | #~ "\n" |
||
1080 | #~ " if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n" |
||
1081 | #~ "\n" |
||
1082 | #~ " case $M in\n" |
||
1083 | #~ " Jan) m=\"01\";;\n" |
||
1084 | #~ " Feb) m=\"02\";;\n" |
||
1085 | #~ " Mar) m=\"03\";;\n" |
||
1086 | #~ " Apr) m=\"04\";;\n" |
||
1087 | #~ " May) m=\"05\";;\n" |
||
1088 | #~ " Jun) m=\"06\";;\n" |
||
1089 | #~ " Jul) m=\"07\";;\n" |
||
1090 | #~ " Aug) m=\"08\";;\n" |
||
1091 | #~ " Sep) m=\"09\";;\n" |
||
1092 | #~ " Oct) m=\"10\";;\n" |
||
1093 | #~ " Nov) m=\"11\";;\n" |
||
1094 | #~ " Dec) m=\"12\";;\n" |
||
1095 | #~ " esac\n" |
||
1096 | #~ "\n" |
||
1097 | #~ " certdate=\"${y}${m}${d}\"\n" |
||
1098 | #~ "}\n" |
||
1099 | #~ "\n" |
||
1100 | #~ "OPENSSL=/usr/bin/openssl\n" |
||
1101 | #~ "DIR=/etc/ssl/certs\n" |
||
1102 | #~ "\n" |
||
1103 | #~ "if [ $# -gt 0 ]; then\n" |
||
1104 | #~ " DIR=\"$1\"\n" |
||
1105 | #~ "fi\n" |
||
1106 | #~ "\n" |
||
1107 | #~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n" |
||
1108 | #~ "today=$( date +%Y%m%d )\n" |
||
1109 | #~ "\n" |
||
1110 | #~ "for cert in $certs; do\n" |
||
1111 | #~ " notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n" |
||
1112 | #~ " date=$( echo ${notafter} | sed 's/^notAfter=//' )\n" |
||
1113 | #~ " mydate \"$date\"\n" |
||
1114 | #~ "\n" |
||
1115 | #~ " if [ ${certdate} -lt ${today} ]; then\n" |
||
1116 | #~ " echo \"${cert} expired on ${certdate}! Removing...\"\n" |
||
1117 | #~ " rm -f \"${cert}\"\n" |
||
1118 | #~ " fi\n" |
||
1119 | #~ "done</literal>\n" |
||
1120 | #~ "EOF\n" |
||
1121 | #~ "\n" |
||
1122 | #~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>" |
||
1123 | |||
1124 | #~ msgid "" |
||
1125 | #~ "The following commands will fetch the certificates and convert them to the " |
||
1126 | #~ "correct format. If desired, a web browser may be used instead of " |
||
1127 | #~ "<application>wget</application> but the file will need to be saved with the " |
||
1128 | #~ "name <filename>certdata.txt</filename>. These commands can be repeated as " |
||
1129 | #~ "necessary to update the CA Certificates." |
||
1130 | #~ msgstr "" |
||
1131 | #~ "Les commandes suivantes récupéreront les certificats et les convertiront " |
||
1132 | #~ "dans le bon format. Si vous le désirez, vous pouvez utiliser un navigateur " |
||
1133 | #~ "Internet plutôt que <application>wget</application> mais le fichier devra " |
||
1134 | #~ "être enregistré sous le nom <filename>certdata.txt</filename>. Ces " |
||
1135 | #~ "commandes peuvent être répétées autant de fois que nécessaire pour mettre à " |
||
1136 | #~ "jour les Certificats CA." |
||
1137 | |||
1138 | #~ msgid "" |
||
1139 | #~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &&\n" |
||
1140 | #~ "rm -f certdata.txt &&\n" |
||
1141 | #~ "wget $URL &&\n" |
||
1142 | #~ "make-ca.sh &&\n" |
||
1143 | #~ "unset URL</userinput>" |
||
1144 | #~ msgstr "" |
||
1145 | #~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &&\n" |
||
1146 | #~ "rm -f certdata.txt &&\n" |
||
1147 | #~ "wget $URL &&\n" |
||
1148 | #~ "make-ca.sh &&\n" |
||
1149 | #~ "unset URL</userinput>" |
||
1150 | |||
1151 | #~ msgid "" |
||
1152 | #~ "<userinput>SSLDIR=/etc/ssl &&\n" |
||
1153 | #~ "remove-expired-certs.sh certs &&\n" |
||
1154 | #~ "install -d ${SSLDIR}/certs &&\n" |
||
1155 | #~ "cp -v certs/*.pem ${SSLDIR}/certs &&\n" |
||
1156 | #~ "c_rehash &&\n" |
||
1157 | #~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt &&\n" |
||
1158 | #~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &&\n" |
||
1159 | #~ "unset SSLDIR</userinput>" |
||
1160 | #~ msgstr "" |
||
1161 | #~ "<userinput>SSLDIR=/etc/ssl &&\n" |
||
1162 | #~ "remove-expired-certs.sh certs &&\n" |
||
1163 | #~ "install -d ${SSLDIR}/certs &&\n" |
||
1164 | #~ "cp -v certs/*.pem ${SSLDIR}/certs &&\n" |
||
1165 | #~ "c_rehash &&\n" |
||
1166 | #~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt &&\n" |
||
1167 | #~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &&\n" |
||
1168 | #~ "unset SSLDIR</userinput>" |
||
1169 | |||
1170 | #~ msgid "Finally, clean up the current directory:" |
||
1171 | #~ msgstr "Enfin, nettoyez le répertoire courant :" |
||
1172 | |||
1173 | #~ msgid "<userinput>rm -r certs BLFS-ca-bundle*</userinput>" |
||
1174 | #~ msgstr "<userinput>rm -r certs BLFS-ca-bundle*</userinput>" |
||
1175 | |||
1176 | #~ msgid "" |
||
1177 | #~ "After installing or updating certificates, if OpenJDK is installed, update " |
||
1178 | #~ "the certificates for Java using the procedures at <xref linkend='ojdk-" |
||
1179 | #~ "certs'/>." |
||
1180 | #~ msgstr "" |
||
1181 | #~ "Après l'installation ou la mise à jour des certificats, si OpenJDK est " |
||
1182 | #~ "installé, mettez à jour les certificats pour Java en utilisant la procédure " |
||
1183 | #~ "dans <xref linkend=\"ojdk-certs\"/>." |
||
1184 | |||
1185 | #~ msgid "make-ca.sh, make-cert.pl and remove-expired-certs.sh" |
||
1186 | #~ msgstr "make-ca.sh, make-cert.pl et remove-expired-certs.sh" |
||
1187 | |||
1188 | #~ msgid "<command>make-cert.pl</command>" |
||
1189 | #~ msgstr "<command>make-cert.pl</command>" |
||
1190 | |||
1191 | #~ msgid "" |
||
1192 | #~ "is a utility <application>perl</application> script that converts a single " |
||
1193 | #~ "binary certificate (.der format) into .pem format." |
||
1194 | #~ msgstr "" |
||
1195 | #~ "est un script <application>perl</application> qui convertit un certificat " |
||
1196 | #~ "binaire unique (format .der) au format .pem." |
||
1197 | |||
1198 | #~ msgid "make-cert" |
||
1199 | #~ msgstr "make-cert" |
||
1200 | |||
1201 | #~ msgid "<command>remove-expired-certs.sh</command>" |
||
1202 | #~ msgstr "<command>remove-expired-certs.sh</command>" |
||
1203 | |||
1204 | #~ msgid "" |
||
1205 | #~ "is a utility shell script that removes expired certificates from a " |
||
1206 | #~ "directory. The default directory is <filename " |
||
1207 | #~ "class='directory'>/etc/ssl/certs</filename>." |
||
1208 | #~ msgstr "" |
||
1209 | #~ "est un script shell qui supprime les certificats expirés d'un répertoire. Le" |
||
1210 | #~ " répertoire par défaut est <filename " |
||
1211 | #~ "class='directory'>/etc/ssl/certs</filename>." |
||
1212 | |||
1213 | #~ msgid "remove-expired-certs" |
||
1214 | #~ msgstr "remove-expired-certs" |