Subversion Repositories svn LFS-FR

Rev

Rev 7344 | Rev 7351 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
7156 jlepiller 1
# SOME DESCRIPTIVE TITLE
2
# Copyright (C) YEAR Free Software Foundation, Inc.
3
# This file is distributed under the same license as the PACKAGE package.
4
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
7313 jlepiller 5
#
7156 jlepiller 6
msgid ""
7
msgstr ""
8
"Project-Id-Version: PACKAGE VERSION\n"
7348 jlepiller 9
"POT-Creation-Date: 2018-02-12 04:06+0000\n"
7344 jlepiller 10
"PO-Revision-Date: 2018-02-01 11:12+0000\n"
7156 jlepiller 11
"Last-Translator: roptat <roptat@lepiller.eu>\n"
12
"Language-Team: LANGUAGE <LL@li.org>\n"
7313 jlepiller 13
"Language: fr\n"
7156 jlepiller 14
"MIME-Version: 1.0\n"
15
"Content-Type: text/plain; charset=UTF-8\n"
16
"Content-Transfer-Encoding: 8bit\n"
17
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
7258 jlepiller 18
"X-Generator: Pootle 2.8\n"
7344 jlepiller 19
"X-POOTLE-MTIME: 1517483554.797188\n"
7156 jlepiller 20
 
7202 jlepiller 21
#. type: Content of the certhost entity
7156 jlepiller 22
#: blfs-en/postlfs/security/cacerts.xml:7
7202 jlepiller 23
msgid "https://hg.mozilla.org/"
24
msgstr "https://hg.mozilla.org/"
7156 jlepiller 25
 
7202 jlepiller 26
#. type: Content of the certpath entity
7156 jlepiller 27
#: blfs-en/postlfs/security/cacerts.xml:8
7202 jlepiller 28
msgid "/lib/ckfw/builtins/certdata.txt"
29
msgstr "/lib/ckfw/builtins/certdata.txt"
7156 jlepiller 30
 
7318 jlepiller 31
#. type: Content of the cacerts-buildsize entity
7156 jlepiller 32
#: blfs-en/postlfs/security/cacerts.xml:9
7258 jlepiller 33
msgid "6.5 MB (with all runtime deps)"
34
msgstr "6.5 Mo (avec toutes les dépendances à l'exécution)"
7156 jlepiller 35
 
7202 jlepiller 36
#. type: Content of the cacerts-time entity
7318 jlepiller 37
#: blfs-en/postlfs/security/cacerts.xml:10
7202 jlepiller 38
msgid "0.2 SBU (with all runtime deps)"
39
msgstr "0.2 SBU (avec toutes les dépendances à l'exécution)"
40
 
41
#. type: Content of the make-ca-download entity
7318 jlepiller 42
#: blfs-en/postlfs/security/cacerts.xml:12
43
msgid ""
44
"https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-"
45
"ca-version;.tar.gz"
46
msgstr ""
47
"https://github.com/djlucas/make-ca/archive/v&make-ca-version;/make-ca-&make-"
48
"ca-version;.tar.gz"
7202 jlepiller 49
 
50
#. type: Content of the make-ca-size entity
7318 jlepiller 51
#: blfs-en/postlfs/security/cacerts.xml:13
52
msgid "36 KB"
53
msgstr "36 Ko"
7202 jlepiller 54
 
55
#. type: Content of the make-ca-md5sum entity
7318 jlepiller 56
#: blfs-en/postlfs/security/cacerts.xml:14
57
msgid "851f9e267f343c54db8caa87ec5b3d75"
58
msgstr "851f9e267f343c54db8caa87ec5b3d75"
7202 jlepiller 59
 
7156 jlepiller 60
#. type: Content of: <sect1><sect1info>
7318 jlepiller 61
#: blfs-en/postlfs/security/cacerts.xml:21
7344 jlepiller 62
#| msgid ""
7348 jlepiller 63
#| "<othername>$LastChangedBy: pierre $</othername> <date>$Date: 2018-01-29 "
64
#| "21:12:53 +0000 (Mon, 29 Jan 2018) $</date>"
7156 jlepiller 65
msgid ""
7348 jlepiller 66
"<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2018-02-11 "
67
"17:41:19 +0000 (Sun, 11 Feb 2018) $</date>"
7156 jlepiller 68
msgstr ""
7348 jlepiller 69
"<othername>$LastChangedBy: bdubbs $</othername> <date>$Date: 2018-02-11 "
70
"17:41:19 +0000 (Sun, 11 Feb 2018) $</date>"
7156 jlepiller 71
 
72
#. type: Content of: <sect1><indexterm><primary>
7318 jlepiller 73
#: blfs-en/postlfs/security/cacerts.xml:25
74
#: blfs-en/postlfs/security/cacerts.xml:48
7156 jlepiller 75
msgid "Certificate Authority Certificates"
7159 jlepiller 76
msgstr "Certificats d'autorité de certification"
7156 jlepiller 77
 
78
#. type: Content of: <sect1><para>
7318 jlepiller 79
#: blfs-en/postlfs/security/cacerts.xml:27
7156 jlepiller 80
msgid ""
7202 jlepiller 81
"Public Key Infrastructure (PKI) is a method to validate the authenticity of "
82
"an otherwise unknown entity across untrusted networks. PKI works by "
83
"establishing a chain of trust, rather than trusting each individual host or "
84
"entity explicitly. In order for a certificate presented by a remote entity "
85
"to be trusted, that certificate must present a complete chain of "
86
"certificates that can be validated using the root certificate of a "
87
"Certificate Authority (CA) that is trusted by the local machine."
7156 jlepiller 88
msgstr ""
7202 jlepiller 89
"Une Infrastructure à Clés Publiques (PKI) est une méthode pour valider "
90
"l'authenticité d'une entité autrement inconnue au travers de réseaux qui ne "
91
"sont pas de confiance. La PKI fonctionne en établissant une chaîne de "
92
"confiance, plutôt que de faire confiance individuellement à chaque hôte ou "
93
"entité de manière explicite. Pour qu'un certificat présenté par une entité "
94
"distante soit reconnu, le certificat doit présenter une chaîne complète de "
95
"certificats qui peuvent être validé en utilisant le certificat racine d'une "
96
"autorité de certification (CA) en laquelle la machine locale a confiance."
7156 jlepiller 97
 
7202 jlepiller 98
#. type: Content of: <sect1><para>
7318 jlepiller 99
#: blfs-en/postlfs/security/cacerts.xml:35
7202 jlepiller 100
msgid ""
101
"Establishing trust with a CA involves validating things like company "
102
"address, ownership, contact information, etc., and ensuring that the CA has "
103
"followed best practices, such as undergoing periodic security audits by "
104
"independent investigators and maintaining an always available certificate "
105
"revocation list. This is well outside the scope of BLFS (as it is for most "
106
"Linux distributions). The certificate store provided here is taken from the "
107
"Mozilla Foundation, who have established very strict inclusion policies "
108
"described <ulink url=\"https://www.mozilla.org/en-"
109
"US/about/governance/policies/security-group/certs/\">here</ulink>."
110
msgstr ""
111
"L'établissement de la confiance avec une CA nécessite de valider des choses "
112
"comme l'adresse de la compagnie, la propriété, les informations de contact, "
113
"etc, et de s'assurer que la CA a suivi les bonnes pratiques, comme des "
114
"audits de sécurité périodiques par des enquêteurs indépendants et le "
7216 jlepiller 115
"maintient d'une liste de révocation de certificats toujours disponible. Ceci"
116
" est bien au delà de la portée de BLFS (comme pour la plupart des "
117
"distributions Linux). Le magasin de certificats fournit ici est emprunté à "
118
"la fondation Mozilla, qui ont établit une politique d'inclusion très stricte"
119
" décrite <ulink url=\"https://www.mozilla.org/en-"
120
"US/about/governance/policies/security-group/certs/\">ici</ulink>."
7202 jlepiller 121
 
7156 jlepiller 122
#. type: Content of: <sect1><sect2><title>
7318 jlepiller 123
#: blfs-en/postlfs/security/cacerts.xml:52
7156 jlepiller 124
msgid "Introduction to Certificate Authorities"
125
msgstr "Introduction à Certificate Authorities"
126
 
127
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 128
#: blfs-en/postlfs/security/cacerts.xml:54
7156 jlepiller 129
msgid "Package Information"
130
msgstr "Informations sur le paquet"
131
 
132
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 133
#: blfs-en/postlfs/security/cacerts.xml:57
7193 jlepiller 134
msgid "Download (HTTP): <ulink url=\"&make-ca-download;\"/>"
135
msgstr "Téléchargement (HTTP)&nbsp;: <ulink url=\"&make-ca-download;\"/>"
7156 jlepiller 136
 
137
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 138
#: blfs-en/postlfs/security/cacerts.xml:60
7193 jlepiller 139
msgid "Download size: &make-ca-size;"
140
msgstr "Taille du téléchargement&nbsp;: &make-ca-size;"
7156 jlepiller 141
 
142
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 143
#: blfs-en/postlfs/security/cacerts.xml:63
7193 jlepiller 144
msgid "Download MD5 Sum: &make-ca-md5sum;"
7196 jlepiller 145
msgstr "Somme MD5 du téléchargement&nbsp;: &make-ca-md5sum;"
7193 jlepiller 146
 
147
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 148
#: blfs-en/postlfs/security/cacerts.xml:66
7156 jlepiller 149
msgid "Estimated disk space required: &cacerts-buildsize;"
150
msgstr "Estimation de l'espace disque requis&nbsp;: &cacerts-buildsize;"
151
 
152
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7318 jlepiller 153
#: blfs-en/postlfs/security/cacerts.xml:69
7156 jlepiller 154
msgid "Estimated build time: &cacerts-time;"
155
msgstr "Estimation du temps de construction&nbsp;: &cacerts-time;"
156
 
157
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 158
#: blfs-en/postlfs/security/cacerts.xml:73
7156 jlepiller 159
msgid "Certificate Authority Certificates Dependencies"
160
msgstr "Dépendances de Certificate Authority Certificates"
161
 
162
#. type: Content of: <sect1><sect2><bridgehead>
7318 jlepiller 163
#: blfs-en/postlfs/security/cacerts.xml:78
7202 jlepiller 164
msgid "Optional (runtime)"
165
msgstr "Facultatives (exécution)"
166
 
7156 jlepiller 167
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 168
#: blfs-en/postlfs/security/cacerts.xml:80
7202 jlepiller 169
msgid ""
7313 jlepiller 170
"<xref role=\"runtime\" linkend=\"java\"/> or <xref role=\"runtime\" "
171
"linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/>, and <xref "
172
"role=\"runtime\" linkend=\"p11-kit\"/>"
7202 jlepiller 173
msgstr ""
7313 jlepiller 174
"<xref role=\"runtime\" linkend=\"java\"/> ou <xref role=\"runtime\" "
175
"linkend=\"openjdk\"/>, <xref role=\"runtime\" linkend=\"nss\"/> et <xref "
176
"role=\"runtime\" linkend=\"p11-kit\"/>"
7202 jlepiller 177
 
178
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 179
#: blfs-en/postlfs/security/cacerts.xml:86
7156 jlepiller 180
msgid "User Notes: <ulink url='&blfs-wiki;/cacerts'/>"
181
msgstr "Notes utilisateur&nbsp;: <ulink url='&blfs-wiki;/cacerts'/>"
182
 
183
#. type: Content of: <sect1><sect2><title>
7318 jlepiller 184
#: blfs-en/postlfs/security/cacerts.xml:91
7156 jlepiller 185
msgid "Installation of Certificate Authority Certificates"
186
msgstr "Installation de Certificate Authority Certificates"
187
 
188
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 189
#: blfs-en/postlfs/security/cacerts.xml:93
7156 jlepiller 190
msgid ""
7318 jlepiller 191
"The <application>make-ca</application> script will download and process the "
7203 jlepiller 192
"certificates included in the <filename>certdata.txt</filename> file for use "
193
"in multiple certificate stores (if the associated applications are present "
194
"on the system). Additionally, any local certificates stored in "
7202 jlepiller 195
"<filename>/etc/ssl/local</filename> will be imported to the certificate "
196
"stores. Certificates in this directory should be stored as PEM encoded "
197
"<application>OpenSSL</application> trusted certificates."
7156 jlepiller 198
msgstr ""
7318 jlepiller 199
"Le script <application>make-ca</application> adaptera les certificats inclus"
200
" dans le fichier <filename>certdata.txt</filename> pour l'utiliser dans de "
201
"multiples magasins de certificats (si les applications associées sont "
202
"présentes sur le système). De plus, tout certificat local stocké dans "
7202 jlepiller 203
"<filename>/etc/ssl/local</filename> sera importé dans les magasins de "
204
"certificats. Les certificats de ce répertoire devraient être stockés sous "
205
"forme de certificats de confiance <application>OpenSSL</application> encodé "
206
"en PEM."
7156 jlepiller 207
 
7193 jlepiller 208
#. type: Content of: <sect1><sect2><para>
7318 jlepiller 209
#: blfs-en/postlfs/security/cacerts.xml:101
7156 jlepiller 210
msgid ""
7202 jlepiller 211
"To create an <application>OpenSSL</application> trusted certificate from a "
7318 jlepiller 212
"regular PEM encoded file, you need to add trust arguments to the "
7202 jlepiller 213
"<command>openssl</command> command, and create a new certificate. There are "
7280 jlepiller 214
"three trust types that are recognized by the <application>make-"
7318 jlepiller 215
"ca</application> script, SSL/TLS, S/Mime, and code signing. For example, "
216
"using the <ulink url=\"http://www.cacert.org/\">CAcert</ulink> roots, if you"
217
" want to trust both for all three roles, the following commands will create "
7344 jlepiller 218
"appropriate OpenSSL trusted certificates (run as the <systemitem "
219
"class=\"username\">root</systemitem> user):"
7156 jlepiller 220
msgstr ""
7202 jlepiller 221
"Pour créer un certificat de confiance <application>OpenSSL</application> "
7344 jlepiller 222
"depuis un fichier normal encodé en PEM, vous devrez ajouter des arguments "
223
"«&nbsp;trust&nbsp;» à la commande <command>openssl</command> et créer un "
224
"nouveau certificat. Il y a trois types de confiances reconnues par le script"
225
" <application>make-ca</application>&nbsp;: SSL/TLS, S/Mime et la signature "
226
"de code. Par exemple, si vous souhaitez utiliser les racines <ulink "
227
"url=\"http://www.cacert.org/\">CAcert</ulink> pour que les deux soient de "
228
"confiance pour ces trois rôles, les commandes suivantes créeront des "
229
"certificats de confiance OpenSSL approprié (à lancer en tant qu'utilisateur "
230
"<systemitem class=\"username\">root</systemitem>)&nbsp;:"
7156 jlepiller 231
 
7202 jlepiller 232
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 233
#: blfs-en/postlfs/security/cacerts.xml:112
7202 jlepiller 234
#, no-wrap
235
msgid ""
7280 jlepiller 236
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
237
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
7318 jlepiller 238
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
7280 jlepiller 239
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
240
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
7318 jlepiller 241
"        > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
242
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
243
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
244
"        > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
7202 jlepiller 245
msgstr ""
7280 jlepiller 246
"<userinput>install -vdm755 /etc/ssl/local &amp;&amp;\n"
247
"wget http://www.cacert.org/certs/root.crt &amp;&amp;\n"
7318 jlepiller 248
"wget http://www.cacert.org/certs/class3.crt &amp;&amp;\n"
7280 jlepiller 249
"openssl x509 -in root.crt -text -fingerprint -setalias \"CAcert Class 1 root\" \\\n"
250
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
7318 jlepiller 251
"        > /etc/ssl/local/CAcert_Class_1_root.pem &amp;&amp;\n"
252
"openssl x509 -in class3.crt -text -fingerprint -setalias \"CAcert Class 3 root\" \\\n"
253
"        -addtrust serverAuth -addtrust emailProtection -addtrust codeSigning \\\n"
254
"        > /etc/ssl/local/CAcert_Class_3_root.pem</userinput>"
7202 jlepiller 255
 
7156 jlepiller 256
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 257
#: blfs-en/postlfs/security/cacerts.xml:122
7156 jlepiller 258
msgid ""
7280 jlepiller 259
"If one of the three trust arguments is omitted, the certificate is neither "
260
"trusted, nor rejected for that role. Clients that use "
261
"<application>OpenSSL</application> or <application>NSS</application> "
262
"encountering this certificate will present a warning to the user. Clients "
263
"using <application>GnuTLS</application> without "
264
"<application>p11-kit</application> support are not aware of trusted "
7202 jlepiller 265
"certificates. To include this CA into the ca-bundle.crt (used for "
266
"<application>GnuTLS</application>), it must have <envar>serverAuth</envar> "
7280 jlepiller 267
"trust. Additionally, to explicitly disallow a certificate for a particular "
268
"use, replace the <parameter>-addtrust</parameter> flag with the "
269
"<parameter>-addreject</parameter> flag."
7156 jlepiller 270
msgstr ""
7280 jlepiller 271
"Si un argument trust en omis, le certificat n'est ni reconnu ni rejeté pour "
272
"ce rôle. Les clients qui utilisent <application>OpenSSL</application> ou "
7202 jlepiller 273
"<application>NSS</application> rencontrant ce certificat renverront un "
274
"avertissement à l'utilisateur . Les clients qui utilisent "
275
"<application>GnuTLS</application> sans le support de "
276
"<application>p11-kit</application> ne sont pas conscient des certificats de "
277
"confiance. Pour inclure cette CA dans le fichier ca-bundle.crt (utilisé par "
7280 jlepiller 278
"<application>GnuTLS</application>), il doit avoir la confiance "
279
"<envar>serverAuth</envar>. De plus, pour interdire un certificat pour une "
280
"utilisation particulière, remplacez le paramètre "
281
"<parameter>-addtrust</parameter> par le paramètre "
282
"<parameter>-addreject</parameter>."
7156 jlepiller 283
 
284
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 285
#: blfs-en/postlfs/security/cacerts.xml:134
7156 jlepiller 286
msgid ""
7334 jlepiller 287
"To install the various certificate stores, first install the "
288
"<application>make-ca</application> script into the correct location.  As the"
289
" <systemitem class=\"username\">root</systemitem> user:"
7156 jlepiller 290
msgstr ""
7202 jlepiller 291
"Pour installer les divers magasins de certificats, installez le script "
7318 jlepiller 292
"<application>make-ca</application> au bon endroit. En tant qu'utilisateur "
293
"<systemitem class=\"username\">root</systemitem>&nbsp;:"
7156 jlepiller 294
 
295
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 296
#: blfs-en/postlfs/security/cacerts.xml:138
7156 jlepiller 297
#, no-wrap
7318 jlepiller 298
msgid "<userinput>make install</userinput>"
299
msgstr "<userinput>make install</userinput>"
7156 jlepiller 300
 
301
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 302
#: blfs-en/postlfs/security/cacerts.xml:140
7156 jlepiller 303
msgid ""
7318 jlepiller 304
"As the <systemitem class=\"username\">root</systemitem> user, download and "
305
"update the certificate stores with the following command:"
7156 jlepiller 306
msgstr ""
7196 jlepiller 307
"En tant qu'utilisateur <systemitem class=\"username\">root</systemitem>, "
7318 jlepiller 308
"téléchargez et mettez à jour le magasin de certificats avec la commande "
309
"suivante&nbsp;:"
7156 jlepiller 310
 
7308 jlepiller 311
#. type: Content of: <sect1><sect2><note><para>
7344 jlepiller 312
#: blfs-en/postlfs/security/cacerts.xml:144
7308 jlepiller 313
msgid ""
314
"If running the script a second time with the same version of "
315
"<filename>certdata.txt</filename>, for instance, to add additional stores as"
316
" the requisite software is installed, add the <parameter>-f</parameter> "
7318 jlepiller 317
"switch to the command line. If packaging, run <command>make-ca "
7308 jlepiller 318
"--help</command> to see all available command line options."
319
msgstr ""
320
"Si vous lancez le script une deuxième fois avec la même version de "
321
"<filename>certdata.txt</filename>, par exemple pour ajouter des magasins "
322
"supplémentaires parce que le logiciel requis est installé, ajoutez l'option "
323
"<parameter>-f</parameter> à la ligne  de commande. Si vous créez un paquet, "
7318 jlepiller 324
"lancez <command>make-ca --help</command> pour voir toutes les options de la "
325
"ligne de commande disponibles."
7308 jlepiller 326
 
7156 jlepiller 327
#. type: Content of: <sect1><sect2><screen>
7344 jlepiller 328
#: blfs-en/postlfs/security/cacerts.xml:151
7156 jlepiller 329
#, no-wrap
7318 jlepiller 330
msgid "<userinput>/usr/sbin/make-ca -g</userinput>"
331
msgstr "<userinput>/usr/sbin/make-ca -g</userinput>"
7156 jlepiller 332
 
333
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 334
#: blfs-en/postlfs/security/cacerts.xml:153
7156 jlepiller 335
msgid ""
7318 jlepiller 336
"You should periodically update the store with the above command either "
337
"manually, or via a <phrase revision=\"sysv\">cron job.</phrase> <phrase "
338
"revision=\"systemd\">systemd timer. A timer is installed at "
339
"<filename>/etc/systemd/system/update-pki.timer</filename> that, if enabled, "
340
"will check for updates weekly.</phrase>"
7156 jlepiller 341
msgstr ""
7318 jlepiller 342
"Vous devriez mettre à jour régulièrement le magasin avec la commande ci-"
343
"dessus soit manuellement, soit via <phrase revision=\"sysv\">une tâche "
344
"cron.</phrase><phrase revision=\"systemd\">un timer systemd. Un timer est "
345
"installé dans <filename>/etc/systemd/system/update-pki.timer</filename> et "
346
"s'il est activé, il vérifiera les mises à jour une fois par "
347
"semaine.</phrase>"
7156 jlepiller 348
 
7202 jlepiller 349
#. type: Content of: <sect1><sect2><para>
7344 jlepiller 350
#: blfs-en/postlfs/security/cacerts.xml:159
7202 jlepiller 351
msgid ""
7318 jlepiller 352
"The default <filename>certdata.txt</filename> file provided by make-ca is "
353
"obtained from the mozilla-release branch, and is modified to provide a "
354
"Mercurial revision. This will be the correct version for most systems. There"
355
" are, however, several other variants of the file available for use that "
356
"might be preferred for one reason or another, including the files shipped "
357
"with Mozilla products in this book. RedHat and OpenSUSE, for instance, use "
358
"the version included in <xref linkend=\"nss\"/>. Additional upstream "
359
"downloads are available at the links below."
7202 jlepiller 360
msgstr ""
7318 jlepiller 361
"Le fichier <filename>certdata.txt</filename> fournit par make-ca est obtenu "
362
"à partir de la branche mozilla-release, et est modifié pour fournir une "
363
"simple révision horodatée. Ce sera la bonne version pour la plupart des "
364
"systèmes. Il y a cependant plusieurs variantes du fichier disponibles à "
365
"l'utilisation qui peuvent être préférés pour une raison ou une autre, "
366
"incluses dans les produits Mozilla dans ce livre. RedHat et OpenSUSE par "
367
"exemple utilisent la version incluse dans <xref linkend=\"nss\"/>. Des "
368
"emplacements de téléchargement supplémentaires sont disponibles&nbsp;:"
7202 jlepiller 369
 
370
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 371
#: blfs-en/postlfs/security/cacerts.xml:170
7202 jlepiller 372
msgid ""
373
"Mozilla Release (the version provided by BLFS): <ulink "
374
"url=\"&certhost;releases/mozilla-release/raw-"
375
"file/default/security/nss&certpath;\"/>"
376
msgstr ""
377
"Mozilla Release (la version fournie par BLFS)&nbsp;: <ulink "
378
"url=\"&certhost;releases/mozilla-release/raw-"
379
"file/default/security/nss&certpath;\"/>"
380
 
381
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 382
#: blfs-en/postlfs/security/cacerts.xml:175
7202 jlepiller 383
msgid ""
384
"NSS (this is the latest available version): <ulink "
7220 jlepiller 385
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 386
msgstr ""
387
"NSS (c'est la dernière version disponible)&nbsp;: <ulink "
7220 jlepiller 388
"url=\"&certhost;projects/nss/raw-file/tip&certpath;\"/>"
7202 jlepiller 389
 
390
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 391
#: blfs-en/postlfs/security/cacerts.xml:180
7202 jlepiller 392
msgid ""
393
"Mozilla Central: <ulink url=\"&certhost;mozilla-central/raw-"
394
"file/default/security/nss&certpath;\"/>"
395
msgstr ""
396
"Mozilla Central&nbsp;: <ulink url=\"&certhost;mozilla-central/raw-"
397
"file/default/security/nss&certpath;\"/>"
398
 
399
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 400
#: blfs-en/postlfs/security/cacerts.xml:185
7202 jlepiller 401
msgid ""
402
"Mozilla Beta: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
403
"file/default/security/nss&certpath;\"/>"
404
msgstr ""
405
"Mozilla Beta&nbsp;: <ulink url=\"&certhost;releases/mozilla-beta/raw-"
406
"file/default/security/nss&certpath;\"/>"
407
 
408
#. type: Content of: <sect1><sect2><itemizedlist><listitem><para>
7344 jlepiller 409
#: blfs-en/postlfs/security/cacerts.xml:190
7202 jlepiller 410
msgid ""
411
"Mozilla Aurora: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
412
"file/default/security/nss&certpath;\"/>"
413
msgstr ""
414
"Mozilla Aurora&nbsp;: <ulink url=\"&certhost;releases/mozilla-aurora/raw-"
415
"file/default/security/nss&certpath;\"/>"
416
 
7156 jlepiller 417
#. type: Content of: <sect1><sect2><title>
7344 jlepiller 418
#: blfs-en/postlfs/security/cacerts.xml:199
7156 jlepiller 419
msgid "Contents"
420
msgstr "Contenu"
421
 
422
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 423
#: blfs-en/postlfs/security/cacerts.xml:202
7156 jlepiller 424
msgid "Installed Programs"
425
msgstr "Programmes installés"
426
 
427
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 428
#: blfs-en/postlfs/security/cacerts.xml:203
7156 jlepiller 429
msgid "Installed Libraries"
430
msgstr "Bibliothèques installées"
431
 
432
#. type: Content of: <sect1><sect2><segmentedlist><segtitle>
7344 jlepiller 433
#: blfs-en/postlfs/security/cacerts.xml:204
7156 jlepiller 434
msgid "Installed Directories"
435
msgstr "Répertoires installés"
436
 
7318 jlepiller 437
#. type: Content of:
438
#. <sect1><sect2><variablelist><varlistentry><listitem><indexterm><primary>
7344 jlepiller 439
#: blfs-en/postlfs/security/cacerts.xml:207
440
#: blfs-en/postlfs/security/cacerts.xml:225
7318 jlepiller 441
msgid "make-ca"
442
msgstr "make-ca"
7156 jlepiller 443
 
444
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7344 jlepiller 445
#: blfs-en/postlfs/security/cacerts.xml:208
7156 jlepiller 446
msgid "None"
447
msgstr "Aucune"
448
 
449
#. type: Content of: <sect1><sect2><segmentedlist><seglistitem><seg>
7344 jlepiller 450
#: blfs-en/postlfs/security/cacerts.xml:209
7202 jlepiller 451
msgid "/etc/ssl/{certs,java,local} and /etc/pki/{nssdb,anchors}"
452
msgstr "/etc/ssl/{certs,java,local} et /etc/pki/{nssdb,anchors}"
7156 jlepiller 453
 
454
#. type: Content of: <sect1><sect2><variablelist><bridgehead>
7344 jlepiller 455
#: blfs-en/postlfs/security/cacerts.xml:214
7156 jlepiller 456
msgid "Short Descriptions"
457
msgstr "Descriptions courtes"
458
 
459
#. type: Content of: <sect1><sect2><variablelist><varlistentry><term>
7344 jlepiller 460
#: blfs-en/postlfs/security/cacerts.xml:219
7318 jlepiller 461
msgid "<command>make-ca</command>"
462
msgstr "<command>make-ca</command>"
7156 jlepiller 463
 
7165 jlepiller 464
#. type: Content of:
465
#. <sect1><sect2><variablelist><varlistentry><listitem><para>
7344 jlepiller 466
#: blfs-en/postlfs/security/cacerts.xml:221
7156 jlepiller 467
msgid ""
7202 jlepiller 468
"is a shell script that adapts a current version of "
7193 jlepiller 469
"<filename>certdata.txt</filename>, and prepares it for use as the system "
470
"certificate store."
7156 jlepiller 471
msgstr ""
7202 jlepiller 472
"est un script shell qui adapte une version actuelle de "
7197 jlepiller 473
"<filename>certdata.txt</filename> et le prépare pour l'utiliser comme "
7196 jlepiller 474
"magasin de certificat du système."
7156 jlepiller 475
 
7348 jlepiller 476
#~ msgid "Required"
477
#~ msgstr "Requises"
478
 
479
#~ msgid "<xref linkend=\"openssl\"/>"
480
#~ msgstr "<xref linkend=\"openssl\"/>"
481
 
7318 jlepiller 482
#~ msgid "32 KB"
483
#~ msgstr "32 Ko"
7156 jlepiller 484
 
7318 jlepiller 485
#~ msgid "25033ded9dd0979226b8f3fd2792bd3a"
486
#~ msgstr "25033ded9dd0979226b8f3fd2792bd3a"
487
 
488
#~ msgid "&sources-anduin-http;/other/certdata.txt"
489
#~ msgstr "&sources-anduin-http;/other/certdata.txt"
490
 
491
#~ msgid "1.6 MB"
492
#~ msgstr "1.6 Mo"
493
 
494
#~ msgid "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
495
#~ msgstr "&sources-anduin-http;/other/make-ca.sh-&make-ca-version;"
496
 
497
#~ msgid "24 KB"
498
#~ msgstr "24 Ko"
499
 
500
#~ msgid "a21a04d6ff5c4645c748220dbaa9f221"
501
#~ msgstr "a21a04d6ff5c4645c748220dbaa9f221"
502
 
503
#~ msgid "Additional Downloads"
504
#~ msgstr "Téléchargements supplémentaires"
505
 
506
#~ msgid "CA Certificates <ulink url=\"&ca-bundle-download;\"/>"
507
#~ msgstr "Certificats de CA <ulink url=\"&ca-bundle-download;\"/>"
508
 
509
#~ msgid ""
510
#~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
511
#~ "ca.sh</userinput>"
512
#~ msgstr ""
513
#~ "<userinput>install -vm755 make-ca.sh-&make-ca-version; /usr/sbin/make-"
514
#~ "ca.sh</userinput>"
515
 
516
#~ msgid ""
517
#~ "You should periodically download a copy of <filename>certdata.txt</filename>"
518
#~ " and run the <application>make-ca.sh</application> script (as the "
519
#~ "<systemitem class=\"username\">root</systemitem> user), or as part of a "
520
#~ "monthly <application>cron</application> job to ensure that you have the "
521
#~ "latest available version of the certificates."
522
#~ msgstr ""
523
#~ "Vous devriez télécharger régulièrement une copie de "
524
#~ "<filename>certdata.txt</filename> et lancer le script <application>make-"
525
#~ "ca.sh</application> (en tant qu'utilisateur <systemitem "
526
#~ "class=\"username\">root</systemitem>), ou en tant que tâche "
527
#~ "<application>cron</application> mensuelle pour vous assurer d'avoir la "
528
#~ "dernière version disponible des certificats."
529
 
530
#~ msgid "make-ca.sh"
531
#~ msgstr "make-ca.sh"
532
 
7264 jlepiller 533
#~ msgid "b42fd97c173ef67a37fb05ed7587e0a8"
534
#~ msgstr "b42fd97c173ef67a37fb05ed7587e0a8"
535
 
7258 jlepiller 536
#~ msgid "11 KB"
537
#~ msgstr "11 Ko"
538
 
539
#~ msgid "cce9fa4713c4611d9e61f99de612a1e9"
540
#~ msgstr "cce9fa4713c4611d9e61f99de612a1e9"
541
 
7224 jlepiller 542
#~ msgid "5e41c17a3dd6b8195c55092e87e92ef0"
543
#~ msgstr "5e41c17a3dd6b8195c55092e87e92ef0"
544
 
7214 jlepiller 545
#~ msgid "fca9ae62242800a9dcaee5d400ee5c41"
546
#~ msgstr "fca9ae62242800a9dcaee5d400ee5c41"
547
 
7203 jlepiller 548
#~ msgid "9e416981cd153d8923e06dc8e39ac534"
549
#~ msgstr "9e416981cd153d8923e06dc8e39ac534"
550
 
7202 jlepiller 551
#~ msgid "65c6cbbb11e6d124b047f4aa0dcb2808"
552
#~ msgstr "65c6cbbb11e6d124b047f4aa0dcb2808"
7156 jlepiller 553
 
7202 jlepiller 554
#~ msgid "fbc5687ce7fd5533edbb4e616a1080de"
555
#~ msgstr "fbc5687ce7fd5533edbb4e616a1080de"
556
 
557
#~ msgid "487ca7ce6f7b81b3e46362138f93310c"
558
#~ msgstr "487ca7ce6f7b81b3e46362138f93310c"
559
 
560
#~ msgid "1.4 MB"
561
#~ msgstr "1.4 Mo"
562
 
563
#~ msgid "0.1 SBU"
564
#~ msgstr "0.1 SBU"
565
 
566
#~ msgid ""
567
#~ "The Public Key Infrastructure is used for many security features in a Linux "
568
#~ "system.  In order for a certificate to be trusted, it must be signed by a "
569
#~ "trusted agent called a Certificate Authority (CA). The certificates "
570
#~ "installed in this section are obtained from the Mozilla version control "
571
#~ "system, and reformatted for use by <xref linkend='openssl'/> and <xref "
572
#~ "linkend='gnutls'/>. The certificates can also be used by other applications,"
573
#~ " either directly or indirectly by linking to one of these packages."
574
#~ msgstr ""
575
#~ "La <foreignphrase>Public Key Infrastructure</foreignphrase> (infrastructure "
576
#~ "de clés publiques) est utilisée dans de nombreux cas de sécurité sur un "
577
#~ "système Linux. Pour qu'un certificat soit fiable, il doit être signé par un "
578
#~ "agent de confiance, qu'on appelle l'autorité de certification "
579
#~ "(<foreignphrase>Certificate Authority</foreignphrase>) (CA).  Les "
580
#~ "certificats chargés dans cette section sont issus de la liste du système de "
581
#~ "contrôle de Mozilla et elle est formatée dans une forme utilisée par <xref "
582
#~ "linkend=\"openssl\"/> et <xref linkend='gnutls'/>.  Les certificats peuvent "
583
#~ "également être utilisés par d'autres applications, directement ou "
584
#~ "indirectement via <application>openssl</application>."
585
 
586
#~ msgid ""
587
#~ "The <application>make-ca.sh</application> script will download a set of "
588
#~ "certificates from one of five projects (aurora, beta, central, nss, or "
589
#~ "release) in the Mozialla version control system. It defaults to the release "
590
#~ "branch, which is identical to the version that ships with the Mozilla "
591
#~ "products in this book. If you'd like to change the branch that is retrieved,"
592
#~ " edit the file and set <envar>CERTSOURCE</envar> to one of the five values "
593
#~ "above."
594
#~ msgstr ""
595
#~ "Le script <application>make-ca.sh</application> téléchargement un ensemble "
596
#~ "de certificats depuis l'un des cinq projets (aurora, beta, central, nss ou "
597
#~ "release) du système de contrôle de version de Mozilla. Il est réglé par "
598
#~ "défaut sur la branche release, qui est identique à la version qui vient avec"
599
#~ " les produits Mozilla de ce livre. Si vous préférez changer la branche qui "
600
#~ "est récupérée, modifiez le fichier et mettez <envar>CERTSOURCE</envar> à "
601
#~ "l'une des cinq valeurs ci-dessus."
602
 
603
#~ msgid ""
604
#~ "Additionally, any local certificates stored in "
605
#~ "<filename>/etc/ssl/local</filename> will be copied into both the single-file"
606
#~ " <filename>/etc/ssl/ca-bundle.crt</filename> (used by programs that link to "
607
#~ "<application>gnutls</application>), and into the certificate store directory"
608
#~ " <filename>/etc/ssl/certs</filename> (used by programs that link to "
609
#~ "<application>OpenSSL</application>). All certificates will pass a date and "
610
#~ "trust validation, and any existing certificates in <filename>/etc/ssl/ca-"
611
#~ "bundle.crt</filename> or <filename>/etc/ssl/certs</filename> will be removed"
612
#~ " upon successful completion of this script."
613
#~ msgstr ""
614
#~ "De plus, tout certificat local stocké dans "
615
#~ "<filename>/etc/ssl/local</filename> sera copié dans le fichier "
616
#~ "<filename>/etc/ssl/ca-bundle.crt</filename> (utilisé par les programmes qui "
617
#~ "se lient à <application>gnutls</application>) et dans le répertoire du "
618
#~ "magasin de certificats <filename>/etc/ssl/certs</filename> (utilisé par les "
619
#~ "programmes qui se lient à <application>OpenSSL</application>). Tous les "
620
#~ "certificats passeront un test de validation de leur date et de leur "
621
#~ "confiance, et tout certificat existant dans <filename>/etc/ssl/ca-"
622
#~ "bundle.crt</filename> ou <filename>/etc/ssl-certs</filename> sera supprimé à"
623
#~ " la fin de ce script si tout va bien."
624
 
625
#~ msgid ""
626
#~ "Finally, if you've installed <xref linkend=\"java\"/> or <xref "
627
#~ "linkend=\"openjdk\"/>, then it will also update the java cacerts file at "
628
#~ "<filename>/etc/ssl/java/cacerts</filename>."
629
#~ msgstr ""
630
#~ "Enfin, si vous avez installé <xref linkend=\"java\"/> ou <xref "
631
#~ "linkend=\"openjdk\"/>, il mettra aussi à jour le fichier cacerts de java "
632
#~ "dans <filename>/etc/ssl/java/cacerts</filename>."
633
 
634
#~ msgid ""
635
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
636
#~ "/usr/sbin/make-ca.sh\n"
637
#~ "</userinput>"
638
#~ msgstr ""
639
#~ "<userinput>install -vdm755 /etc/ssl/{certs,java,local} &amp;&amp;\n"
640
#~ "/usr/sbin/make-ca.sh\n"
641
#~ "</userinput>"
642
 
7193 jlepiller 643
#~ msgid "/mozilla/source/security/nss/lib/ckfw/builtins"
644
#~ msgstr "/mozilla/source/security/nss/lib/ckfw/builtins"
7156 jlepiller 645
 
7193 jlepiller 646
#~ msgid "6 MB"
7233 jlepiller 647
#~ msgstr "6 Mo"
7156 jlepiller 648
 
7193 jlepiller 649
#~ msgid ""
650
#~ "The certfile.txt file above is actually retrieved from <ulink "
651
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
652
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  It is"
653
#~ " really an HTML file, but the text file can be retrieved indirectly from the"
654
#~ " HTML file.  The Download URL above automates that process and also adds a "
655
#~ "line where the date can be extracted as a revision number by the scripts "
656
#~ "below."
657
#~ msgstr ""
658
#~ "Le fichier certfile.txt dessous est en fait récupéré depuis <ulink "
659
#~ "url=\"https://hg.mozilla.org/releases/mozilla-"
660
#~ "release/file/default/security/nss/lib/ckfw/builtins/certdata.txt\"/>.  C'est"
661
#~ " en fait un fichier HTML, mais le fichier texte peut être pris indirectement"
662
#~ " depuis le fichier HTML. L'URL dessous automatise ce processus et ajoute "
663
#~ "aussi une ligne où la date peut être extraite en tant que numéro de révision"
664
#~ " par le script."
665
 
666
#~ msgid "Recommended"
667
#~ msgstr "Recommandées"
668
 
669
#~ msgid ""
670
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
671
#~ "<literal>#!/usr/bin/perl -w\n"
672
#~ "\n"
673
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
674
#~ "# Run as ./make-cert.pl > certificate.crt\n"
675
#~ "#\n"
676
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
677
#~ "#\n"
678
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
679
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
680
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
681
#~ "#\n"
682
#~ "# Authors: DJ Lucas\n"
683
#~ "#          Bruce Dubbs\n"
684
#~ "#\n"
685
#~ "# Version 20120211\n"
686
#~ "\n"
687
#~ "my $certdata = './tempfile.cer';\n"
688
#~ "\n"
689
#~ "open( IN, \"cat $certdata|\" )\n"
690
#~ "    || die \"could not open $certdata\";\n"
691
#~ "\n"
692
#~ "my $incert = 0;\n"
693
#~ "\n"
694
#~ "while ( &lt;IN&gt; )\n"
695
#~ "{\n"
696
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
697
#~ "    {\n"
698
#~ "        $incert = 1;\n"
699
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
700
#~ "            || die \"could not pipe to openssl x509\";\n"
701
#~ "    }\n"
702
#~ "\n"
703
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
704
#~ "    {\n"
705
#~ "        close( OUT );\n"
706
#~ "        $incert = 0;\n"
707
#~ "        print \"\\n\\n\";\n"
708
#~ "    }\n"
709
#~ "\n"
710
#~ "    elsif ($incert)\n"
711
#~ "    {\n"
712
#~ "        my @bs = split( /\\\\/ );\n"
713
#~ "        foreach my $b (@bs)\n"
714
#~ "        {\n"
715
#~ "            chomp $b;\n"
716
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
717
#~ "        }\n"
718
#~ "    }\n"
719
#~ "}</literal>\n"
720
#~ "EOF\n"
721
#~ "\n"
722
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
723
#~ msgstr ""
724
#~ "<userinput>cat > /usr/bin/make-cert.pl &lt;&lt; \"EOF\"\n"
725
#~ "<literal>#!/usr/bin/perl -w\n"
726
#~ "\n"
727
#~ "# Used to generate PEM encoded files from Mozilla certdata.txt.\n"
728
#~ "# Run as ./make-cert.pl > certificate.crt\n"
729
#~ "#\n"
730
#~ "# Parts of this script courtesy of RedHat (mkcabundle.pl)\n"
731
#~ "#\n"
732
#~ "# This script modified for use with single file data (tempfile.cer) extracted\n"
733
#~ "# from certdata.txt, taken from the latest version in the Mozilla NSS source.\n"
734
#~ "# mozilla/security/nss/lib/ckfw/builtins/certdata.txt\n"
735
#~ "#\n"
736
#~ "# Authors: DJ Lucas\n"
737
#~ "#          Bruce Dubbs\n"
738
#~ "#\n"
739
#~ "# Version 20120211\n"
740
#~ "\n"
741
#~ "my $certdata = './tempfile.cer';\n"
742
#~ "\n"
743
#~ "open( IN, \"cat $certdata|\" )\n"
744
#~ "    || die \"could not open $certdata\";\n"
745
#~ "\n"
746
#~ "my $incert = 0;\n"
747
#~ "\n"
748
#~ "while ( &lt;IN&gt; )\n"
749
#~ "{\n"
750
#~ "    if ( /^CKA_VALUE MULTILINE_OCTAL/ )\n"
751
#~ "    {\n"
752
#~ "        $incert = 1;\n"
753
#~ "        open( OUT, \"|openssl x509 -text -inform DER -fingerprint\" )\n"
754
#~ "            || die \"could not pipe to openssl x509\";\n"
755
#~ "    }\n"
756
#~ "\n"
757
#~ "    elsif ( /^END/ &amp;&amp; $incert )\n"
758
#~ "    {\n"
759
#~ "        close( OUT );\n"
760
#~ "        $incert = 0;\n"
761
#~ "        print \"\\n\\n\";\n"
762
#~ "    }\n"
763
#~ "\n"
764
#~ "    elsif ($incert)\n"
765
#~ "    {\n"
766
#~ "        my @bs = split( /\\\\/ );\n"
767
#~ "        foreach my $b (@bs)\n"
768
#~ "        {\n"
769
#~ "            chomp $b;\n"
770
#~ "            printf( OUT \"%c\", oct($b) ) unless $b eq '';\n"
771
#~ "        }\n"
772
#~ "    }\n"
773
#~ "}</literal>\n"
774
#~ "EOF\n"
775
#~ "\n"
776
#~ "chmod +x /usr/bin/make-cert.pl</userinput>"
777
 
778
#~ msgid ""
779
#~ "The following script creates the certificates and a bundle of all the "
780
#~ "certificates.  It creates a <filename class='directory'>./certs</filename> "
781
#~ "directory and <filename>./BLFS-ca-bundle-${VERSION}.crt</filename>.  Again "
782
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
783
#~ "user:"
784
#~ msgstr ""
785
#~ "Le script suivant crée les certificats et un bouquet de tous les "
786
#~ "certificats. Il crée un répertoire <filename "
787
#~ "class='directory'>./certs</filename> et <filename>./BLFS-ca-"
788
#~ "bundle-${VERSION}.crt</filename>.  Créez de nouveau ce script en tant "
789
#~ "qu'utilisateur <systemitem class=\"username\">root</systemitem>&nbsp;:"
790
 
791
#~ msgid ""
792
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
793
#~ "<literal>#!/bin/sh\n"
794
#~ "# Begin make-ca.sh\n"
795
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
796
#~ "#\n"
797
#~ "# The file certdata.txt must exist in the local directory\n"
798
#~ "# Version number is obtained from the version of the data.\n"
799
#~ "#\n"
800
#~ "# Authors: DJ Lucas\n"
801
#~ "#          Bruce Dubbs\n"
802
#~ "#\n"
803
#~ "# Version 20120211\n"
804
#~ "\n"
805
#~ "# Some data in the certs have UTF-8 characters\n"
806
#~ "export LANG=en_US.utf8\n"
807
#~ "\n"
808
#~ "certdata=\"certdata.txt\"\n"
809
#~ "\n"
810
#~ "if [ ! -r $certdata ]; then\n"
811
#~ "  echo \"$certdata must be in the local directory\"\n"
812
#~ "  exit 1\n"
813
#~ "fi\n"
814
#~ "\n"
815
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
816
#~ "\n"
817
#~ "if [ -z \"${REVISION}\" ]; then\n"
818
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
819
#~ "  exit 1\n"
820
#~ "fi\n"
821
#~ "\n"
822
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
823
#~ "\n"
824
#~ "TEMPDIR=$(mktemp -d)\n"
825
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
826
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
827
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
828
#~ "SSLDIR=\"/etc/ssl\"\n"
829
#~ "\n"
830
#~ "mkdir \"${TEMPDIR}/certs\"\n"
831
#~ "\n"
832
#~ "# Get a list of starting lines for each cert\n"
833
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
834
#~ "\n"
835
#~ "# Get a list of ending lines for each cert\n"
836
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
837
#~ "\n"
838
#~ "# Start a loop\n"
839
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
840
#~ "  for certend in ${CERTENDLIST}; do\n"
841
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
842
#~ "      break\n"
843
#~ "    fi\n"
844
#~ "  done\n"
845
#~ "\n"
846
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
847
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
848
#~ "done\n"
849
#~ "\n"
850
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
851
#~ "\n"
852
#~ "mkdir -p certs\n"
853
#~ "rm -f certs/*      # Make sure the directory is clean\n"
854
#~ "\n"
855
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
856
#~ "  # Make sure that the cert is trusted...\n"
857
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
858
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
859
#~ "\n"
860
#~ "  if test \"${?}\" = \"0\"; then\n"
861
#~ "    # Throw a meaningful error and remove the file\n"
862
#~ "    cp \"${tempfile}\" tempfile.cer\n"
863
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
864
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
865
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
866
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
867
#~ "    continue\n"
868
#~ "  fi\n"
869
#~ "\n"
870
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
871
#~ "  # Find the cert data and generate a cert file for it\n"
872
#~ "\n"
873
#~ "  cp \"${tempfile}\" tempfile.cer\n"
874
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
875
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
876
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
877
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
878
#~ "  echo \"Created ${keyhash}.pem\"\n"
879
#~ "done\n"
880
#~ "\n"
881
#~ "# Remove blacklisted files\n"
882
#~ "# MD5 Collision Proof of Concept CA\n"
883
#~ "if test -f certs/8f111d69.pem; then\n"
884
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
885
#~ "  rm -f certs/8f111d69.pem\n"
886
#~ "fi\n"
887
#~ "\n"
888
#~ "# Finally, generate the bundle and clean up.\n"
889
#~ "cat certs/*.pem >  ${BUNDLE}\n"
890
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
891
#~ "EOF\n"
892
#~ "\n"
893
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
894
#~ msgstr ""
895
#~ "<userinput>cat > /usr/bin/make-ca.sh &lt;&lt; \"EOF\"\n"
896
#~ "<literal>#!/bin/sh\n"
897
#~ "# Begin make-ca.sh\n"
898
#~ "# Script to populate OpenSSL's CApath from a bundle of PEM formatted CAs\n"
899
#~ "#\n"
900
#~ "# The file certdata.txt must exist in the local directory\n"
901
#~ "# Version number is obtained from the version of the data.\n"
902
#~ "#\n"
903
#~ "# Authors: DJ Lucas\n"
904
#~ "#          Bruce Dubbs\n"
905
#~ "#\n"
906
#~ "# Version 20120211\n"
907
#~ "\n"
908
#~ "# Some data in the certs have UTF-8 characters\n"
909
#~ "export LANG=en_US.utf8\n"
910
#~ "\n"
911
#~ "certdata=\"certdata.txt\"\n"
912
#~ "\n"
913
#~ "if [ ! -r $certdata ]; then\n"
914
#~ "  echo \"$certdata must be in the local directory\"\n"
915
#~ "  exit 1\n"
916
#~ "fi\n"
917
#~ "\n"
918
#~ "REVISION=$(grep CVS_ID $certdata | cut -f4 -d'$')\n"
919
#~ "\n"
920
#~ "if [ -z \"${REVISION}\" ]; then\n"
921
#~ "  echo \"$certfile has no 'Revision' in CVS_ID\"\n"
922
#~ "  exit 1\n"
923
#~ "fi\n"
924
#~ "\n"
925
#~ "VERSION=$(echo $REVISION | cut -f2 -d\" \")\n"
926
#~ "\n"
927
#~ "TEMPDIR=$(mktemp -d)\n"
928
#~ "TRUSTATTRIBUTES=\"CKA_TRUST_SERVER_AUTH\"\n"
929
#~ "BUNDLE=\"BLFS-ca-bundle-${VERSION}.crt\"\n"
930
#~ "CONVERTSCRIPT=\"/usr/bin/make-cert.pl\"\n"
931
#~ "SSLDIR=\"/etc/ssl\"\n"
932
#~ "\n"
933
#~ "mkdir \"${TEMPDIR}/certs\"\n"
934
#~ "\n"
935
#~ "# Get a list of starting lines for each cert\n"
936
#~ "CERTBEGINLIST=$(grep -n \"^# Certificate\" \"${certdata}\" | cut -d \":\" -f1)\n"
937
#~ "\n"
938
#~ "# Get a list of ending lines for each cert\n"
939
#~ "CERTENDLIST=`grep -n \"^CKA_TRUST_STEP_UP_APPROVED\" \"${certdata}\" | cut -d \":\" -f 1`\n"
940
#~ "\n"
941
#~ "# Start a loop\n"
942
#~ "for certbegin in ${CERTBEGINLIST}; do\n"
943
#~ "  for certend in ${CERTENDLIST}; do\n"
944
#~ "    if test \"${certend}\" -gt \"${certbegin}\"; then\n"
945
#~ "      break\n"
946
#~ "    fi\n"
947
#~ "  done\n"
948
#~ "\n"
949
#~ "  # Dump to a temp file with the name of the file as the beginning line number\n"
950
#~ "  sed -n \"${certbegin},${certend}p\" \"${certdata}\" > \"${TEMPDIR}/certs/${certbegin}.tmp\"\n"
951
#~ "done\n"
952
#~ "\n"
953
#~ "unset CERTBEGINLIST CERTDATA CERTENDLIST certbegin certend\n"
954
#~ "\n"
955
#~ "mkdir -p certs\n"
956
#~ "rm -f certs/*      # Make sure the directory is clean\n"
957
#~ "\n"
958
#~ "for tempfile in ${TEMPDIR}/certs/*.tmp; do\n"
959
#~ "  # Make sure that the cert is trusted...\n"
960
#~ "  grep \"CKA_TRUST_SERVER_AUTH\" \"${tempfile}\" | \\\n"
961
#~ "    egrep \"TRUST_UNKNOWN|NOT_TRUSTED\" > /dev/null\n"
962
#~ "\n"
963
#~ "  if test \"${?}\" = \"0\"; then\n"
964
#~ "    # Throw a meaningful error and remove the file\n"
965
#~ "    cp \"${tempfile}\" tempfile.cer\n"
966
#~ "    perl ${CONVERTSCRIPT} > tempfile.crt\n"
967
#~ "    keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
968
#~ "    echo \"Certificate ${keyhash} is not trusted!  Removing...\"\n"
969
#~ "    rm -f tempfile.cer tempfile.crt \"${tempfile}\"\n"
970
#~ "    continue\n"
971
#~ "  fi\n"
972
#~ "\n"
973
#~ "  # If execution made it to here in the loop, the temp cert is trusted\n"
974
#~ "  # Find the cert data and generate a cert file for it\n"
975
#~ "\n"
976
#~ "  cp \"${tempfile}\" tempfile.cer\n"
977
#~ "  perl ${CONVERTSCRIPT} > tempfile.crt\n"
978
#~ "  keyhash=$(openssl x509 -noout -in tempfile.crt -hash)\n"
979
#~ "  mv tempfile.crt \"certs/${keyhash}.pem\"\n"
980
#~ "  rm -f tempfile.cer \"${tempfile}\"\n"
981
#~ "  echo \"Created ${keyhash}.pem\"\n"
982
#~ "done\n"
983
#~ "\n"
984
#~ "# Remove blacklisted files\n"
985
#~ "# MD5 Collision Proof of Concept CA\n"
986
#~ "if test -f certs/8f111d69.pem; then\n"
987
#~ "  echo \"Certificate 8f111d69 is not trusted!  Removing...\"\n"
988
#~ "  rm -f certs/8f111d69.pem\n"
989
#~ "fi\n"
990
#~ "\n"
991
#~ "# Finally, generate the bundle and clean up.\n"
992
#~ "cat certs/*.pem >  ${BUNDLE}\n"
993
#~ "rm -r \"${TEMPDIR}\"</literal>\n"
994
#~ "EOF\n"
995
#~ "\n"
996
#~ "chmod +x /usr/bin/make-ca.sh</userinput>"
997
 
998
#~ msgid ""
999
#~ "Add a short script to remove expired certificates from a directory.  Again "
1000
#~ "create this script as the <systemitem class=\"username\">root</systemitem> "
1001
#~ "user:"
1002
#~ msgstr ""
1003
#~ "Ajoutez un script bref pour supprimer les certificats expirés d'un "
1004
#~ "répertoire. Créez de nouveau ce script en tant qu'utilisateur <systemitem "
1005
#~ "class=\"username\">root</systemitem>&nbsp;:"
1006
 
1007
#~ msgid ""
1008
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1009
#~ "<literal>#!/bin/sh\n"
1010
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1011
#~ "#\n"
1012
#~ "# Version 20120211\n"
1013
#~ "\n"
1014
#~ "# Make sure the date is parsed correctly on all systems\n"
1015
#~ "mydate()\n"
1016
#~ "{\n"
1017
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1018
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1019
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1020
#~ "  local m\n"
1021
#~ "\n"
1022
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1023
#~ "\n"
1024
#~ "  case $M in\n"
1025
#~ "    Jan) m=\"01\";;\n"
1026
#~ "    Feb) m=\"02\";;\n"
1027
#~ "    Mar) m=\"03\";;\n"
1028
#~ "    Apr) m=\"04\";;\n"
1029
#~ "    May) m=\"05\";;\n"
1030
#~ "    Jun) m=\"06\";;\n"
1031
#~ "    Jul) m=\"07\";;\n"
1032
#~ "    Aug) m=\"08\";;\n"
1033
#~ "    Sep) m=\"09\";;\n"
1034
#~ "    Oct) m=\"10\";;\n"
1035
#~ "    Nov) m=\"11\";;\n"
1036
#~ "    Dec) m=\"12\";;\n"
1037
#~ "  esac\n"
1038
#~ "\n"
1039
#~ "  certdate=\"${y}${m}${d}\"\n"
1040
#~ "}\n"
1041
#~ "\n"
1042
#~ "OPENSSL=/usr/bin/openssl\n"
1043
#~ "DIR=/etc/ssl/certs\n"
1044
#~ "\n"
1045
#~ "if [ $# -gt 0 ]; then\n"
1046
#~ "  DIR=\"$1\"\n"
1047
#~ "fi\n"
1048
#~ "\n"
1049
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1050
#~ "today=$( date +%Y%m%d )\n"
1051
#~ "\n"
1052
#~ "for cert in $certs; do\n"
1053
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1054
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1055
#~ "  mydate \"$date\"\n"
1056
#~ "\n"
1057
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1058
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1059
#~ "     rm -f \"${cert}\"\n"
1060
#~ "  fi\n"
1061
#~ "done</literal>\n"
1062
#~ "EOF\n"
1063
#~ "\n"
1064
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1065
#~ msgstr ""
1066
#~ "<userinput>cat > /usr/sbin/remove-expired-certs.sh &lt;&lt; \"EOF\"\n"
1067
#~ "<literal>#!/bin/sh\n"
1068
#~ "# Begin /usr/sbin/remove-expired-certs.sh\n"
1069
#~ "#\n"
1070
#~ "# Version 20120211\n"
1071
#~ "\n"
1072
#~ "# Make sure the date is parsed correctly on all systems\n"
1073
#~ "mydate()\n"
1074
#~ "{\n"
1075
#~ "  local y=$( echo $1 | cut -d\" \" -f4 )\n"
1076
#~ "  local M=$( echo $1 | cut -d\" \" -f1 )\n"
1077
#~ "  local d=$( echo $1 | cut -d\" \" -f2 )\n"
1078
#~ "  local m\n"
1079
#~ "\n"
1080
#~ "  if [ ${d} -lt 10 ]; then d=\"0${d}\"; fi\n"
1081
#~ "\n"
1082
#~ "  case $M in\n"
1083
#~ "    Jan) m=\"01\";;\n"
1084
#~ "    Feb) m=\"02\";;\n"
1085
#~ "    Mar) m=\"03\";;\n"
1086
#~ "    Apr) m=\"04\";;\n"
1087
#~ "    May) m=\"05\";;\n"
1088
#~ "    Jun) m=\"06\";;\n"
1089
#~ "    Jul) m=\"07\";;\n"
1090
#~ "    Aug) m=\"08\";;\n"
1091
#~ "    Sep) m=\"09\";;\n"
1092
#~ "    Oct) m=\"10\";;\n"
1093
#~ "    Nov) m=\"11\";;\n"
1094
#~ "    Dec) m=\"12\";;\n"
1095
#~ "  esac\n"
1096
#~ "\n"
1097
#~ "  certdate=\"${y}${m}${d}\"\n"
1098
#~ "}\n"
1099
#~ "\n"
1100
#~ "OPENSSL=/usr/bin/openssl\n"
1101
#~ "DIR=/etc/ssl/certs\n"
1102
#~ "\n"
1103
#~ "if [ $# -gt 0 ]; then\n"
1104
#~ "  DIR=\"$1\"\n"
1105
#~ "fi\n"
1106
#~ "\n"
1107
#~ "certs=$( find ${DIR} -type f -name \"*.pem\" -o -name \"*.crt\" )\n"
1108
#~ "today=$( date +%Y%m%d )\n"
1109
#~ "\n"
1110
#~ "for cert in $certs; do\n"
1111
#~ "  notafter=$( $OPENSSL x509 -enddate -in \"${cert}\" -noout )\n"
1112
#~ "  date=$( echo ${notafter} |  sed 's/^notAfter=//' )\n"
1113
#~ "  mydate \"$date\"\n"
1114
#~ "\n"
1115
#~ "  if [ ${certdate} -lt ${today} ]; then\n"
1116
#~ "     echo \"${cert} expired on ${certdate}! Removing...\"\n"
1117
#~ "     rm -f \"${cert}\"\n"
1118
#~ "  fi\n"
1119
#~ "done</literal>\n"
1120
#~ "EOF\n"
1121
#~ "\n"
1122
#~ "chmod u+x /usr/sbin/remove-expired-certs.sh</userinput>"
1123
 
1124
#~ msgid ""
1125
#~ "The following commands will fetch the certificates and convert them to the "
1126
#~ "correct format.  If desired, a web browser may be used instead of "
1127
#~ "<application>wget</application> but the file will need to be saved with the "
1128
#~ "name <filename>certdata.txt</filename>.  These commands can be repeated as "
1129
#~ "necessary to update the CA Certificates."
1130
#~ msgstr ""
1131
#~ "Les commandes suivantes récupéreront les certificats et les convertiront "
1132
#~ "dans le bon format.  Si vous le désirez, vous pouvez utiliser un navigateur "
1133
#~ "Internet plutôt que <application>wget</application> mais le fichier devra "
1134
#~ "être enregistré sous le nom <filename>certdata.txt</filename>.  Ces "
1135
#~ "commandes peuvent être répétées autant de fois que nécessaire pour mettre à "
1136
#~ "jour les Certificats CA."
1137
 
1138
#~ msgid ""
1139
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1140
#~ "rm -f certdata.txt &amp;&amp;\n"
1141
#~ "wget $URL          &amp;&amp;\n"
1142
#~ "make-ca.sh         &amp;&amp;\n"
1143
#~ "unset URL</userinput>"
1144
#~ msgstr ""
1145
#~ "<userinput>URL=&sources-anduin-http;/other/certdata.txt &amp;&amp;\n"
1146
#~ "rm -f certdata.txt &amp;&amp;\n"
1147
#~ "wget $URL          &amp;&amp;\n"
1148
#~ "make-ca.sh         &amp;&amp;\n"
1149
#~ "unset URL</userinput>"
1150
 
1151
#~ msgid ""
1152
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1153
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1154
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1155
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1156
#~ "c_rehash                                                     &amp;&amp;\n"
1157
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1158
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1159
#~ "unset SSLDIR</userinput>"
1160
#~ msgstr ""
1161
#~ "<userinput>SSLDIR=/etc/ssl                                              &amp;&amp;\n"
1162
#~ "remove-expired-certs.sh certs                                &amp;&amp;\n"
1163
#~ "install -d ${SSLDIR}/certs                                   &amp;&amp;\n"
1164
#~ "cp -v certs/*.pem ${SSLDIR}/certs                            &amp;&amp;\n"
1165
#~ "c_rehash                                                     &amp;&amp;\n"
1166
#~ "install BLFS-ca-bundle*.crt ${SSLDIR}/ca-bundle.crt          &amp;&amp;\n"
1167
#~ "ln -sfv ../ca-bundle.crt ${SSLDIR}/certs/ca-certificates.crt &amp;&amp;\n"
1168
#~ "unset SSLDIR</userinput>"
1169
 
1170
#~ msgid "Finally, clean up the current directory:"
1171
#~ msgstr "Enfin, nettoyez le répertoire courant&nbsp;:"
1172
 
1173
#~ msgid "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1174
#~ msgstr "<userinput>rm -r certs BLFS-ca-bundle*</userinput>"
1175
 
1176
#~ msgid ""
1177
#~ "After installing or updating certificates, if OpenJDK is installed, update "
1178
#~ "the certificates for Java using the procedures at <xref linkend='ojdk-"
1179
#~ "certs'/>."
1180
#~ msgstr ""
1181
#~ "Après l'installation ou la mise à jour des certificats, si OpenJDK est "
1182
#~ "installé, mettez à jour les certificats pour Java en utilisant la procédure "
1183
#~ "dans <xref linkend=\"ojdk-certs\"/>."
1184
 
1185
#~ msgid "make-ca.sh, make-cert.pl and remove-expired-certs.sh"
1186
#~ msgstr "make-ca.sh, make-cert.pl et remove-expired-certs.sh"
1187
 
1188
#~ msgid "<command>make-cert.pl</command>"
1189
#~ msgstr "<command>make-cert.pl</command>"
1190
 
1191
#~ msgid ""
1192
#~ "is a utility <application>perl</application> script that converts a single "
1193
#~ "binary certificate (.der format) into .pem format."
1194
#~ msgstr ""
1195
#~ "est un script <application>perl</application> qui convertit un certificat "
1196
#~ "binaire unique (format .der) au format .pem."
1197
 
1198
#~ msgid "make-cert"
1199
#~ msgstr "make-cert"
1200
 
1201
#~ msgid "<command>remove-expired-certs.sh</command>"
1202
#~ msgstr "<command>remove-expired-certs.sh</command>"
1203
 
1204
#~ msgid ""
1205
#~ "is a utility shell script that removes expired certificates from a "
1206
#~ "directory.  The default directory is <filename "
1207
#~ "class='directory'>/etc/ssl/certs</filename>."
1208
#~ msgstr ""
1209
#~ "est un script shell qui supprime les certificats expirés d'un répertoire. Le"
1210
#~ " répertoire par défaut est <filename "
1211
#~ "class='directory'>/etc/ssl/certs</filename>."
1212
 
1213
#~ msgid "remove-expired-certs"
1214
#~ msgstr "remove-expired-certs"