diff options
author | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2010-05-27 17:15:08 +0000 |
---|---|---|
committer | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2010-05-27 17:15:08 +0000 |
commit | f9da74f5b8464405e323bb9b6b8a2aa30a825060 (patch) | |
tree | d80a91080fae34c87869d35d33ef9ae2bfbf1117 /debian/strongswan-starter.templates | |
parent | 6c2828d075efdfc02348369149b4347447857c8c (diff) | |
download | vyos-strongswan-f9da74f5b8464405e323bb9b6b8a2aa30a825060.tar.gz vyos-strongswan-f9da74f5b8464405e323bb9b6b8a2aa30a825060.zip |
Resynchronize debconf templates with openswan.
Diffstat (limited to 'debian/strongswan-starter.templates')
-rw-r--r-- | debian/strongswan-starter.templates | 154 |
1 files changed, 67 insertions, 87 deletions
diff --git a/debian/strongswan-starter.templates b/debian/strongswan-starter.templates index a330005a9..01a67fda8 100644 --- a/debian/strongswan-starter.templates +++ b/debian/strongswan-starter.templates @@ -10,24 +10,23 @@ Template: strongswan/runlevel_changes Type: note _Description: Old runlevel management superseded - Previous versions of the strongSwan package allowed the user to choose between - three different Start/Stop-Levels. Due to changes in the standard system - startup procedure, this is no longer necessary and useful. For all new + Previous versions of the strongSwan package gave a choice between + three different Start/Stop-Levels. Due to changes in the standard system + startup procedure, this is no longer necessary or useful. For all new installations as well as old ones running in any of the predefined modes, - sane default levels set will now be set. If you are upgrading from a previous + sane default levels will now be set. If you are upgrading from a previous version and changed your strongSwan startup parameters, then please take a look at NEWS.Debian for instructions on how to modify your setup accordingly. Template: strongswan/restart Type: boolean Default: true -_Description: Do you wish to restart strongSwan? - Restarting strongSwan is a good idea, since if there is a security fix, it - will not be fixed until the daemon restarts. Most people expect the daemon +_Description: Restart strongSwan now? + Restarting strongSwan is recommended, since if there is a security fix, it + will not be applied until the daemon restarts. Most people expect the daemon to restart, so this is generally a good idea. However, this might take down - existing connections and then bring them back up (including the connection - currently used for this update, so it is recommended not to restart if you - are using any of the tunnel for administration). + existing connections and then bring them back up, so if you are using such + an strongSwan tunnel to connect for this update, restarting is not recommended. Template: strongswan/ikev1 Type: boolean @@ -46,62 +45,62 @@ _Description: Start strongSwan's IKEv2 daemon? Template: strongswan/install_x509_certificate Type: boolean Default: false -_Description: Do you want to use a X509 certificate for this host? - This installer can automatically create or import a X509 certificate for - this host. It can be used to authenticate IPsec connections to other hosts - and is the preferred way for building up secure IPsec connections. The other +_Description: Use an X.509 certificate for this host? + An X.509 certificate for this host can be automatically created or imported. + It can be used to authenticate IPsec connections to other hosts + and is the preferred way of building up secure IPsec connections. The other possibility would be to use shared secrets (passwords that are the same on - both sides of the tunnel) for authenticating an connection, but for a larger + both sides of the tunnel) for authenticating a connection, but for a larger number of connections, key based authentication is easier to administer and more secure. . - If you do not want to this now you can answer "No" and later use the command - "dpkg-reconfigure openswan" to come back. + Alternatively you can reject this option and later use the command + "dpkg-reconfigure strongswan" to come back. Template: strongswan/how_to_get_x509_certificate Type: select __Choices: create, import Default: create -_Description: Methods for using a X509 certificate to authenticate this host: - It is possible to create a new X509 certificate with user-defined settings +_Description: Methods for using a X.509 certificate to authenticate this host: + It is possible to create a new X.509 certificate with user-defined settings or to import an existing public and private key stored in PEM file(s) for authenticating IPsec connections. . - If you choose to create a new X509 certificate you will first be presented + If you choose to create a new X.509 certificate you will first be asked a number of questions which must be answered before the creation can start. Please keep in mind that if you want the public key to get signed by - an existing certification authority you should not select to create a + an existing Certificate Authority you should not select to create a self-signed certificate and all the answers given must match exactly the requirements of the CA, otherwise the certificate request may be rejected. . - In case you want to import an existing public and private key you will be - prompted for their filenames (may be identical if both parts are stored + If you want to import an existing public and private key you will be + prompted for their filenames (which may be identical if both parts are stored together in one file). Optionally you may also specify a filename where the - public key(s) of the certification authority are kept, but this file cannot - be the same as the former ones. Please be also aware that the format for the - X509 certificates has to be PEM and that the private key must not be encrypted + public key(s) of the Certificate Authority are kept, but this file cannot + be the same as the former ones. Please also be aware that the format for the + X.509 certificates has to be PEM and that the private key must not be encrypted or the import procedure will fail. Template: strongswan/existing_x509_certificate_filename Type: string -_Description: Please enter the location of your X509 certificate in PEM format: - Please enter the location of the file containing your X509 certificate in +_Description: File name of your PEM format X.509 certificate: + Please enter the location of the file containing your X.509 certificate in PEM format. Template: strongswan/existing_x509_key_filename Type: string -_Description: Please enter the location of your X509 private key in PEM format: +_Description: File name of your PEM format X.509 private key: Please enter the location of the file containing the private RSA key - matching your X509 certificate in PEM format. This can be the same file - that contains the X509 certificate. + matching your X.509 certificate in PEM format. This can be the same file + that contains the X.509 certificate. Template: strongswan/existing_x509_rootca_filename Type: string -_Description: You may now enter the location of your X509 RootCA in PEM format: - Optionally you can now enter the location of the file containing the X509 - certificate authority root used to sign your certificate in PEM format. If you +_Description: File name of your PEM format X.509 RootCA: + Optionally you can now enter the location of the file containing the X.509 + Certificate Authority root used to sign your certificate in PEM format. If you do not have one or do not want to use it please leave the field empty. Please - note that it's not possible to store the RootCA in the same file as your X509 + note that it's not possible to store the RootCA in the same file as your X.509 certificate or private key. Template: strongswan/rsa_key_length @@ -116,89 +115,70 @@ _Description: Please enter which length the created RSA key should have: Template: strongswan/x509_self_signed Type: boolean Default: true -_Description: Do you want to create a self-signed X509 certificate? - This installer can only create self-signed X509 certificates - automatically, because otherwise a certificate authority is needed to sign - the certificate request. If you want to create a self-signed certificate, +_Description: Create a self-signed X.509 certificate? + Only self-signed X.509 certificates can be created + automatically, because otherwise a Certificate Authority is needed to sign + the certificate request. If you choose to create a self-signed certificate, you can use it immediately to connect to other IPsec hosts that support - X509 certificate for authentication of IPsec connections. However, if you - want to use the new PKI features of strongSwan >= 1.91, you will need to - have all X509 certificates signed by a single certificate authority to - create a trust path. + X.509 certificate for authentication of IPsec connections. However, using + strongSwan's PKI features requires all certificates to be signed by a single + Certificate Authority to create a trust path. . - If you do not want to create a self-signed certificate, then this - installer will only create the RSA private key and the certificate request - and you will have to sign the certificate request with your certificate - authority. + If you do not choose to create a self-signed certificate, only the RSA + private key and the certificate request will be created, and you will + have to sign the certificate request with your Certificate Authority. Template: strongswan/x509_country_code Type: string Default: AT -_Description: Please enter the country code for the X509 certificate request: - Please enter the 2 letter country code for your country. This code will be - placed in the certificate request. +_Description: Country code for the X.509 certificate request: + Please enter the two-letter code for the country the server resides in + (such as "AT" for Austria). . - You really need to enter a valid country code here, because openssl will - refuse to generate certificates without one. An empty field is allowed for - any other field of the X.509 certificate, but not for this one. - . - Example: AT + OpenSSL will refuse to generate a certificate unless this is a valid + ISO-3166 country code; an empty field is allowed elsewhere in the X.509 + certificate, but not here. Template: strongswan/x509_state_name Type: string Default: -_Description: Please enter the state or province name for the X509 certificate request: - Please enter the full name of the state or province you live in. This name - will be placed in the certificate request. - . - Example: Upper Austria +_Description: State or province name for the X.509 certificate request: + Please enter the full name of the state or province the server resides in + (such as "Upper Austria"). Template: strongswan/x509_locality_name Type: string Default: -_Description: Please enter the locality name for the X509 certificate request: - Please enter the locality (e.g. city) where you live. This name will be - placed in the certificate request. - . - Example: Vienna +_Description: Locality name for the X.509 certificate request: + Please enter the locality the server resides in (often a city, such + as "Vienna"). Template: strongswan/x509_organization_name Type: string Default: -_Description: Please enter the organization name for the X509 certificate request: - Please enter the organization (e.g. company) that the X509 certificate - should be created for. This name will be placed in the certificate - request. - . - Example: Debian +_Description: Organization name for the X.509 certificate request: + Please enter the organization the server belongs to (such as "Debian"). Template: strongswan/x509_organizational_unit Type: string Default: -_Description: Please enter the organizational unit for the X509 certificate request: - Please enter the organizational unit (e.g. section) that the X509 - certificate should be created for. This name will be placed in the - certificate request. - . - Example: security group +_Description: Organizational unit for the X.509 certificate request: + Please enter the organizational unit the server belongs to (such as + "security group"). Template: strongswan/x509_common_name Type: string Default: -_Description: Please enter the common name for the X509 certificate request: - Please enter the common name (e.g. the host name of this machine) for - which the X509 certificate should be created for. This name will be placed - in the certificate request. - . - Example: gateway.debian.org +_Description: Common Name for the X.509 certificate request: + Please enter the Common Name for this host (such as + "gateway.example.org"). Template: strongswan/x509_email_address Type: string Default: -_Description: Please enter the email address for the X509 certificate request: - Please enter the email address of the person or organization who is - responsible for the X509 certificate, This address will be placed in the - certificate request. +_Description: Email address for the X.509 certificate request: + Please enter the email address of the person or organization + responsible for the X.509 certificate. Template: strongswan/enable-oe Type: boolean |