/perl-install/Newt/

stro/mes5 Mageia Installer and base platform for many utilitiesThierry Vignaud [tv]
summaryrefslogtreecommitdiffstats
path: root/perl-install/security/help.pm
blob: 267dcd866bdd76e658d3773f577fce8f4e79381a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
package security::help;
# This help was forked from msec internal function descriptions
# They were then reworked in order to be targeted for end users, not msec developpers


use strict;
use common;

our %help = (

'accept_bogus_error_responses' => N("Accept bogus IPv4 error messages."),

'accept_broadcasted_icmp_echo' => N("Accept broadcasted icmp echo."),

'accept_icmp_echo' => N("Accept icmp echo."),

'allow_autologin' => N("Allow autologin."),

'allow_issues' =>
             #-PO: here "ALL" is a value in a pull-down menu; translate it the same as "ALL" is
             N("If set to \"ALL\", /etc/issue and /etc/issue.net are allowed to exist.

If set to \"None\", no issues are allowed.

Else only /etc/issue is allowed."),

'allow_reboot' => N("Allow reboot by the console user."),

'allow_remote_root_login' => N("Allow remote root login."),

'allow_root_login' => N("Allow direct root login."),

'allow_user_list' => N("Allow the list of users on the system on display managers (kdm and gdm)."),

'allow_xauth_from_root' => N("Allow to export display when
passing from the root account to the other users.

See pam_xauth(8) for more details.'"),

'allow_x_connections' => N("Allow X connections:

- \"All\" (all connections are allowed),

- \"Local\" (only connection from local machine),

- \"None\" (no connection)."),

'allow_xserver_to_listen' => N("The argument specifies if clients are authorized to connect
to the X server from the network on the tcp port 6000 or not."),

'authorize_services' =>
             #-PO: here "ALL", "Local" and "None" are values in a pull-down menu; translate them the same as they're
             N("Authorize:

- all services controlled by tcp_wrappers (see hosts.deny(5) man page) if set to \"ALL\",

- only local ones if set to \"Local\"

- none if set to \"None\".

To authorize the services you need, use /etc/hosts.allow (see hosts.allow(5))."),

'create_server_link' => N("If SERVER_LEVEL (or SECURE_LEVEL if absent)
is greater than 3 in /etc/security/msec/security.conf, creates the
symlink /etc/security/msec/server to point to
/etc/security/msec/server.<SERVER_LEVEL>.

The /etc/security/msec/server is used by chkconfig --add to decide to
add a service if it is present in the file during the installation of
packages."),

'enable_at_crontab' => N("Enable crontab and at for users.

Put allowed users in /etc/cron.allow and /etc/at.allow (see man at(1)
and crontab(1))."),

'enable_console_log' => N("Enable syslog reports to console 12"),

'enable_dns_spoofing_protection' => N("Enable name resolution spoofing protection.  If
\"%s\" is true, also reports to syslog.", N("Security Alerts:")),

'enable_ip_spoofing_protection' => N("Enable IP spoofing protection."),