# translation of setroubleshoot.tip-plugins.po to Simplified Chinese # Xi Huang , 2006. # Tony Fu , 2006. # Leah Liu , 2008, 2009. # translation of zh_CN.po to # translation of zh_CN.po to # translation of zh_CN.po to # translation of zh_CN.po to msgid "" msgstr "" "Project-Id-Version: setroubleshoot.tip-plugins\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2009-10-26 10:05-0400\n" "PO-Revision-Date: 2009-11-18 16:27+0800\n" "Last-Translator: Leah Liu \n" "Language-Team: Simplified Chinese \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "X-Generator: KBabel 1.11.4\n" #: ../src/allow_cvs_read_shadow.py:28 msgid "" "\n" " SELinux prevented the CVS application from reading the shadow password " "file.\n" " " msgstr "" "\n" " SELinux 阻止了 CVS 应用程序读取 shadow 密码文件。\n" " " #: ../src/allow_cvs_read_shadow.py:32 msgid "" "\n" " SELinux prevented the CVS application from reading the shadow password " "file.\n" " The CVS application requires this access when it is configured for " "direct\n" " connection (i.e., pserver) and to authenticate to the system password / " "shadow\n" " files without PAM. It is possible that this access request signals an " "intrusion\n" " attempt.\n" "\n" " It is recommended that CVS be configured to use PAM, authenticate to a " "separate\n" " user file, or use another protocol (e.g., SSH) instead of allowing this " "access.\n" " See the CVS manual for more details on why this access is potentially " "insecure: \n" " (http://" "ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html).\n" " " msgstr "" "\n" " SELinux 阻止了 CVS 程序读取影子密码文件。\n" " 当将 CVS 程序配置为不使用 PAM 直接连接 (例如,pserver)\n" " 和验证系统密码/shadow文件,就需要需要访问该文件。\n" " 可能这次访问请求被记为一次入侵尝试。\n" "\n" " 建议将 CVS 程序设置为使用 PAM 验证独立用户文件,或者使用其他协议(例如," "SSH)。\n" " 关于为什么这个访问可能是不安全的,请查阅 CVS 手册来获得更详细的说明。\n" " (http://" "ximbiot.com/cvs/manual/cvs-1.11.22/cvs_2.html)。\n" " " #: ../src/allow_cvs_read_shadow.py:45 #: ../src/allow_postfix_local_write_mail_spool.py:43 #: ../src/httpd_unified.py:46 ../src/use_nfs_home_dirs.py:46 #: ../src/use_samba_home_dirs.py:45 msgid "" "\n" " Changing the \"$BOOLEAN\" boolean to true will allow this access:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 改变 \"$BOOLEAN\" 布尔值为 true 将允许这个访问:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/allow_cvs_read_shadow.py:60 msgid "CVS" msgstr "CVS" #: ../src/allow_daemons_dump_core.py:28 msgid "" "\n" " SELinux prevented $SOURCE from writing $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 写 $TARGET_PATH。\n" " " #: ../src/allow_daemons_dump_core.py:32 msgid "" "\n" " SELinux prevented $SOURCE from writing $TARGET_PATH. \n" " If $TARGET_PATH is a core file, you may want to allow this. If " "$TARGET_PATH is not a core file, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 防止 $SOURCE 写入 $TARGET_PATH。 \n" " 如果 $TARGET_PATH 是一个核文件,您可以允许这个行为。如果 $TARGET_PATH 不" "是一个核文件,这可能是一个入侵尝试信号。\n" " " #: ../src/allow_daemons_dump_core.py:37 ../src/allow_ftpd_use_cifs.py:45 #: ../src/allow_gssd_read_tmp.py:38 ../src/allow_java_execstack.py:41 #: ../src/allow_kerberos.py:39 ../src/allow_mount_anyfile.py:43 #: ../src/allow_mplayer_execstack.py:42 ../src/allow_ypbind.py:39 #: ../src/fcron_crond.py:39 ../src/ftpd_is_daemon.py:41 #: ../src/global_ssp.py:43 ../src/httpd_use_cifs.py:46 #: ../src/httpd_use_nfs.py:46 msgid "" "\n" " Changing the \"$BOOLEAN\" boolean to true will allow this access:\n" " \"setsebool -P $BOOLEAN=1.\"\n" " " msgstr "" "\n" " 改变 \"$BOOLEAN\" 布尔值为 true 将允许这个访问:\n" " \"setsebool -P $BOOLEAN=1.\"\n" " " #: ../src/allow_execheap.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from changing the access\n" " protection of memory on the heap.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 修改堆上\n" " 的内存访问保护.\n" " " #: ../src/allow_execheap.py:31 msgid "" "\n" " The $SOURCE application attempted to change the access protection of " "memory on\n" " the heap (e.g., allocated using malloc). This is a potential security\n" " problem. Applications should not be doing this. Applications are\n" " sometimes coded incorrectly and request this permission. The\n" " SELinux " "Memory Protection Tests\n" " web page explains how to remove this requirement. If $SOURCE does not " "work and\n" " you need it to work, you can configure SELinux temporarily to allow\n" " this access until the application is fixed. Please file a bug\n" " report against this package.\n" " " msgstr "" "\n" " $SOURCE 应用程序试图改变堆上的内存访问保护(例如,使用 malloc 分配内" "存)。\n" " 这是潜在的安全问题。应用程序不应该这样做。有时候应用程序编码不正确,会请" "求这样的允许。\n" " SELinux 内" "存保护测试\n" " 页面说明了怎样移除这个请求。如果 $SOURCE 不能工作而您需要它运行,\n" " 您可以配置 SELinux 临时允许这个访问直到这个应用程序被修正。\n" " 请发送一份关于这个软件包的 错误\n" " 报告 。\n" " " #: ../src/allow_execheap.py:43 msgid "" "\n" " If you want $SOURCE to continue, you must turn on the\n" " $BOOLEAN boolean. Note: This boolean will affect all applications\n" " on the system.\n" " " msgstr "" "\n" " 如果您想让 $SOURCE 继续执行, 您必须开启\n" " $BOOLEAN 布尔值. 注意:这个布尔值将会影响系统中的\n" " 所有应用程序。 \n" " " #. MATCH #: ../src/allow_execheap.py:58 ../src/allow_execmod.py:78 #: ../src/allow_execmod.py:82 ../src/allow_execstack.py:67 #: ../src/firefox.py:53 msgid "Memory" msgstr "内存" #: ../src/allow_execmod.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from loading $TARGET_PATH which " "requires text relocation.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 装载需要重新定位文本的 $TARGET_PATH。\n" " " #: ../src/allow_execmod.py:30 msgid "" "\n" " The $SOURCE application attempted to load $TARGET_PATH which\n" " requires text relocation. This is a potential security problem.\n" " Most libraries do not need this permission. Libraries are\n" " sometimes coded incorrectly and request this permission. The\n" " SELinux " "Memory Protection Tests\n" " web page explains how to remove this requirement. You can configure\n" " SELinux temporarily to allow $TARGET_PATH to use relocation as a\n" " workaround, until the library is fixed. Please file a \n" "bug report.\n" " " msgstr "" "\n" " $SOURCE 应用程序试图读取需要文本重定位的 $TARGET_PATH。\n" " 这是潜在的安全问题。\n" " 多数程序库不需要这样做。有时候程序库编码不正确会有这样的请求。\n" " SELinux 内" "存保护测试\n" " 页面说明如何移除这个请求。您能够设置 SELinux 临时允许 $TARGET_PATH\n" " 在工作区使用重定位直到程序库被修正。\n" " 请生成一份关于这个程序包的 错误报告\n" " " #: ../src/allow_execmod.py:42 msgid "" "\n" " The $SOURCE application attempted to load $TARGET_PATH which\n" " requires text relocation. This is a potential security problem.\n" " Most libraries should not need this permission. The \n" " \n" " SELinux Memory Protection Tests\n" " web page explains this check. This tool examined the library and it " "looks \n" " like it was built correctly. So setroubleshoot can not determine if " "this \n" " application is compromized or not. This could be a serious issue. " "Your \n" " system may very well be compromised.\n" "\n" " Contact your security administrator and report this issue.\n" "\n" " " msgstr "" "\n" " $SOURCE 程序试图载入需要文本重新定位\n" " 的 $TARGET_PATH。这是一个潜在的安全性问题。\n" " 大多数程序库应该不需要这个权限。\n" " \n" " SELinux Memory Protection Tests\n" " 网页中解释了这个检查。这个工具检查程序库且它 \n" " 看起来工作正常。因此 setroubleshoot 无法确定这个程序是否受到侵害。这可能" "是一个严重问题。您的系统可能受到侵害。请联络您的安全管理员并包括这个问题。\n" "\n" " " #: ../src/allow_execmod.py:59 msgid "" "\n" " If you trust $TARGET_PATH to run correctly, you can change the\n" " file context to textrel_shlib_t. \"chcon -t textrel_shlib_t\n" " '$TARGET_PATH'\"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "textrel_shlib_t '$TARGET_PATH'\"\n" " \n" " " msgstr "" "\n" " 如果您确信 $TARGET 正确运行,您可以将文件上下文改为\n" " textrel_shlib_t。\"chcon -t textrel_shlib_t\n" " $TARGET_PATH\"\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记时可保留它们。 " "\"semanage fcontext -a -t textrel_shlib_t '$TARGET_PATH'\"\n" " \n" " " #: ../src/allow_execstack.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from making the program stack " "executable.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 使程序栈可执行。\n" " " #: ../src/allow_execstack.py:30 msgid "" "\n" " The $SOURCE application attempted to make its stack\n" " executable. This is a potential security problem. This should\n" " never ever be necessary. Stack memory is not executable on most\n" " OSes these days and this will not change. Executable stack memory\n" " is one of the biggest security problems. An execstack error might\n" " in fact be most likely raised by malicious code. Applications are\n" " sometimes coded incorrectly and request this permission. The\n" " SELinux " "Memory Protection Tests\n" " web page explains how to remove this requirement. If $SOURCE does not\n" " work and you need it to work, you can configure SELinux\n" " temporarily to allow this access until the application is fixed. " "Please \n" "file a bug report.\n" " " msgstr "" "\n" " $SOURCE 应用程序试图使它的栈可执行。这是一个潜在的安全问题。\n" " 这应该是完全不必要的。栈内存在多数现代操作系统中是不能够执行的,而且这是" "不会被改变的。\n" " 可执行的栈内存是最大的安全问题之一。事实上,可运行栈错误很可能被恶意代码" "利用。\n" " 有时候应用程序编码不正确会请求这样的允许。\n" " SELinux 内" "存保护测试\n" " 页面说明了如何移除这个请求。如果 $SOURCE 不能工作且您需要它工作,\n" " 您可以配置 SELinux 临时允许这个访问直到应用程序被修正。\n" " 请生成一份关于这个程序包的 错误报告 。\n" " " #: ../src/allow_execstack.py:45 msgid "" "\n" " Sometimes a library is accidentally marked with the execstack flag,\n" " if you find a library with this flag you can clear it with the\n" " execstack -c LIBRARY_PATH. Then retry your application. If the\n" " app continues to not work, you can turn the flag back on with\n" " execstack -s LIBRARY_PATH. Otherwise, if you trust $SOURCE to\n" " run correctly, you can change the context of the executable to\n" " execmem_exec_t. \"chcon -t execmem_exec_t\n" " '$SOURCE_PATH'\"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "execmem_exec_t '$SOURCE_PATH'\"\n" " \n" " " msgstr "" "\n" " 有时候一个程序库被意外标记了 execstack 标志,如果您发现一个程序库拥有这种" "标志,\n" " 您可以使用 execstack -c LIBRARY_PATH 清除它。然后重新运行您的应用程序。\n" " 如果这个应用程序还是不工作,您可以使用\n" " execstack -s LIBRARY_PATH 恢复原来的设置。另外,如果您确定 $SOURCE 运行正" "确,\n" " 您可以将 executalbe 上下文改为 execmem_exec_t。\n" " \"chcon -t execmem_exec_t $SOURCE_PATH\"\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t unconfined_execmem_exec_t '$SOURCE_PATH'\"\n" " \n" " " #: ../src/allow_ftpd_anon_write.py:26 msgid "" "\n" " SELinux policy is preventing the ftp daemon from writing to a public\n" " directory.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 ftp 在后台写入公共目录。\n" " " #: ../src/allow_ftpd_anon_write.py:31 msgid "" "\n" " SELinux policy is preventing the ftp daemon from writing to a public\n" " directory. If ftpd is not setup to allow anonymous writes, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 ftp 守护进程写入公共目录。\n" " 如果未将 ftpd 设置为允许匿名写入, 这就可能是一次入侵尝试信号。\n" " " #: ../src/allow_ftpd_anon_write.py:37 msgid "" "\n" " If the ftp daemon should be allowed to write to this directory you need " "to turn\n" " on the $BOOLEAN boolean and change the file context of\n" " the public directory to public_content_rw_t. Read the ftpd_selinux\n" " man page for further information:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_rw_t \"\n" " " msgstr "" "\n" " 如果应该允许 ftp 守护进程写入这个目录,您需要开启$BOOLEAN布尔值\n" " 并且将公共目录的文件上下文改为 public_content_rw_t。\n" " 阅读 ftpd_selinux 的 man page 获得更多信息:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " 您还必须更改系统中文件的默认文件上下文以便在重新标记时仍可保留它们。" "\"semanage fcontext -a -t public_content_rw_t \"\n" " " #: ../src/allow_ftpd_anon_write.py:57 ../src/allow_ftpd_full_access.py:55 #: ../src/allow_ftpd_use_cifs.py:76 ../src/allow_ftpd_use_cifs.py:83 #: ../src/allow_ftpd_use_nfs.py:76 ../src/allow_ftpd_use_nfs.py:83 #: ../src/ftpd_is_daemon.py:70 ../src/ftpd_is_daemon.py:82 #: ../src/ftp_home_dir.py:53 msgid "FTP" msgstr "FTP" #: ../src/allow_ftpd_full_access.py:28 msgid "" "\n" " SELinux is preventing the ftp daemon from writing files outside the home " "directory ($TARGET_PATH).\n" " " msgstr "" "\n" " SELinux 正在阻止 ftp 写主目录 ($TARGET_PATH) 外的文件。\n" " " #: ../src/allow_ftpd_full_access.py:32 msgid "" "\n" " SELinux has denied the ftp daemon write access to directories outside\n" " the home directory ($TARGET_PATH). Someone has logged in via\n" " your ftp daemon and is trying to create or write a file. If you only " "setup\n" " ftp to allow anonymous ftp, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 ftp 守护进程写入主目录 ($TARGET_PATH) 外的目录。有\n" " 人通过您的 ftp 守护进程登录并正在创建或写入一个文件。如果您只将您的 ftp " "设置\n" " 为允许匿名访问,这可能是入侵尝试的信号。\n" " " #: ../src/allow_ftpd_full_access.py:39 msgid "" "\n" " If you do not want SELinux preventing ftp from writing files anywhere " "on\n" " the system you need to turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您不想让 SELinux 防止 ftp 在系统的任何地方写文件, \n" " 您需要打开 $BOOLEAN 布尔值: \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/allow_ftpd_use_cifs.py:28 msgid "" "\n" " SELinux prevented the ftp daemon from $ACCESS files stored on a CIFS " "filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 ftp 在后台 $ACCESS 一个存储在一个 CIFS 文件系统中的文件.\n" " " #: ../src/allow_ftpd_use_cifs.py:32 msgid "" "\n" " SELinux prevented the ftp daemon from $ACCESS files stored on a CIFS " "filesystem.\n" " CIFS (Comment Internet File System) is a network filesystem similar to\n" " SMB (http://www." "microsoft.com/mind/1196/cifs.asp)\n" " The ftp daemon attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As CIFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured the ftp daemon to read files from a CIFS " "filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了ftp后台 $ACCESS 存储在一个CIFS文件系统中的文件。\n" " CIFS (通用Internet文件系统)是一个网络文件系统,它类似SMB(http://www.microsoft.com/" "mind/1196/cifs.asp)\n" " ftp后台试图读取已经安装的这种类型的文件系统中的一个或多个文件或目录。\n" " 由于CIFS文件系统不支持 fine-grained SELinux标志,文件系统中的所有的文件和" "目录将拥有一样的请安全上下文。\n" " \n" " 如果您没有配置ftp后台从一个CIFS文件系统读取文件,这个访问被记为一次入侵尝" "试。\n" " " #: ../src/allow_ftpd_use_cifs.py:52 msgid "" " Changing the \"$BOOLEAN\" and\n" " \"$WRITE_BOOLEAN\" booleans to true will allow this access:\n" " \"setsebool -P $BOOLEAN=1 $WRITE_BOOLEAN=1\".\n" " warning: setting the \"$WRITE_BOOLEAN\" boolean to true will\n" " allow the ftp daemon to write to all public content (files and\n" " directories with type public_content_t) in addition to writing to\n" " files and directories on CIFS filesystems. " msgstr "" " 修改 \"$BOOLEAN\" 和 \n" " \"$WRITE_BOOLEAN\" 布尔值为true将允许这个访问:\n" " \"setsebool -P $BOOLEAN=1 $WRITE_BOOLEAN=1\"。\n" " 警告:设置 \"$WRITE_BOOLEAN\"布尔值为true将允许\n" " ftp后台向所有的公共内容(public_content_t类型的文件和目录)写入,\n" " 也可以写入CIFS文件系统中的文件和目录。" #: ../src/allow_ftpd_use_nfs.py:28 msgid "" "\n" " SELinux prevented the ftp daemon from $ACCESS files stored on a NFS " "filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 ftp 在后台 $ACCESS 存储在一个NFS文件系统的文件。\n" " " #: ../src/allow_ftpd_use_nfs.py:32 msgid "" "\n" " SELinux prevented the ftp daemon from $ACCESS files stored on a NFS " "filesystem.\n" " NFS (Network Filesystem) is a network filesystem commonly used on Unix / " "Linux\n" " systems.\n" " \n" " The ftp daemon attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As NFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured the ftp daemon to read files from a NFS " "filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了ftp后台 $ACCESS 存储在NFS文件系统中的文件。\n" " NFS(网络文件系统)是一个通常在Unix和Linux下被使用的网络文件系统。\n" " \n" " ftp后台试图从已经挂接的这种类型的文件操作系统中读取一个或多个文件或目" "录。\n" " 由于NFS文件系统不支持fine-grained的SELinux标志。在此文件系统下所有的文件" "和目录将拥有相同的安全上下文。\n" " \n" " 如果您没有配置ftp后台从NFS文件系统中读取文件,这个访问被记为一次入侵尝" "试。\n" " " #: ../src/allow_ftpd_use_nfs.py:46 msgid "" "\n" " Changing the \"allow_ftpd_use_nfs\" boolean to true will allow this " "access:\n" " \"setsebool -P allow_ftpd_use_nfs=1.\"\n" " " msgstr "" "\n" " 改变 \"allow_ftpd_use_nfs\" 的布尔值为 true 将允许这个访问:\n" " \"setsebool -P allow_ftpd_use_nfs=1.\"\n" " " #: ../src/allow_ftpd_use_nfs.py:53 msgid "" " Changing the \"allow_ftpd_use_nfs\" and\n" " \"$WRITE_BOOLEAN\" booleans to true will allow this access:\n" " \"setsebool -P allow_ftpd_use_nfs=1 $WRITE_BOOLEAN=1\".\n" " warning: setting the \"$WRITE_BOOLEAN\" boolean to true will\n" " allow the ftp daemon to write to all public content (files and\n" " directories with type public_content_t) in addition to writing to\n" " files and directories on NFS filesystems. " msgstr "" " 修改 \"allow_ftpd_use_nfs\" 和\n" " \"$WRITE_BOOLEAN\"布尔值为true将允许这个访问:\n" " \"setsebool -P allow_ftpd_use_nfs=1$WRITE_BOOLEAN=1\"。\n" " 警告:设置\"$WRITE_BOOLEAN\"布尔值为true将允许ftp后台写入所有公共内容" "(public_content_t类型的文件和目录),\n" " 另外,也允许写入NFS文件系统中的文件和目录。" #: ../src/allow_gssd_read_tmp.py:28 msgid "" "\n" " SELinux prevented the gss daemon from reading unprivileged user " "temporary files.\n" " " msgstr "" "\n" " SELinux 阻止了 gss 在后台读取非特权用户的临时文件。\n" " " #: ../src/allow_gssd_read_tmp.py:32 msgid "" "SELinux prevented the gss daemon from\n" " reading unprivileged user temporary files (e.g., files in /tmp). " "Allowing this\n" " access is low risk, but if you have not configured the gss daemon to\n" " read these files this access request could signal an intrusion\n" " attempt." msgstr "" "SELinux 阻止了 gss 守护进程读取非特权用户临时文件(例如,/tmp中的文件)。\n" " 允许这个访问是低风险的,但是如果您没有配置 gss 守护进程读取这些文件\n" " 这个访问请求记为一次入侵尝试。" #: ../src/allow_gssd_read_tmp.py:55 ../src/allow_kerberos.py:53 #: ../src/allow_saslauthd_read_shadow.py:54 ../src/allow_ypbind.py:53 msgid "Authorization" msgstr "验证" #: ../src/allow_httpd_anon_write.py:26 msgid "" "\n" " SELinux policy is preventing the http daemon from writing to a public\n" " directory.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 http daemon 写入一个公共目录。\n" " " #: ../src/allow_httpd_anon_write.py:31 msgid "" "\n" " SELinux policy is preventing the http daemon from writing to a public\n" " directory. If httpd is not setup to write to public directories, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 http 守护进程写入一个公共目录。\n" " 如果没有将 httpd 设置为可以写入公共目录,这就可能是一次\n" " 入侵尝试信号。\n" " " #: ../src/allow_httpd_anon_write.py:37 msgid "" "\n" " If httpd should be allowed to write to this directory you need to turn\n" " on the $BOOLEAN boolean and change the file context of\n" " the public directory to public_content_rw_t. Read the httpd_selinux\n" " man page for further information:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_rw_t \"\n" " " msgstr "" "\n" " 如果应该允许 httpd 写入这个公共目录,您需要开启\n" " $BOOLEAN 布尔值并且将这个公共目录的文件上下文改为\n" " public_content_rw_t。请阅读 httpd_selinux 的 man page 以便了解进一步的信" "息:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " 您还必须更改系统中文件的默认文件上下文以便在重新标记时仍可保留它们。 " "\"semanage fcontext -a -t public_content_rw_t \"\n" " " #: ../src/allow_httpd_anon_write.py:57 #: ../src/allow_httpd_sys_script_anon_write.py:55 #: ../src/httpd_builtin_scripting.py:52 #: ../src/httpd_can_network_connect_db.py:53 #: ../src/httpd_can_network_connect.py:59 ../src/httpd_can_network_relay.py:56 #: ../src/httpd_can_sendmail.py:56 ../src/httpd_enable_cgi.py:54 #: ../src/httpd_enable_ftp_server.py:53 ../src/httpd_enable_homedirs.py:51 #: ../src/httpd_ssi_exec.py:53 ../src/httpd_tty_comm.py:55 #: ../src/httpd_unified.py:65 ../src/httpd_unified.py:72 #: ../src/httpd_write_content.py:56 ../src/httpd_use_cifs.py:63 #: ../src/httpd_use_nfs.py:63 msgid "Web Server" msgstr "Web服务器" #: ../src/allow_httpd_sys_script_anon_write.py:26 msgid "" "\n" " SELinux policy is preventing an httpd script from writing to a public\n" " directory.\n" " " msgstr "" "\n" " SELinux 策略正在阻止一个 httpd 脚本写入一个公共目录。\n" " " #: ../src/allow_httpd_sys_script_anon_write.py:31 msgid "" "\n" " SELinux policy is preventing an httpd script from writing to a public\n" " directory. If httpd is not setup to write to public directories, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 httpd 脚本写入一个公共目录。\n" " 如果没有将 httpd 设置为可写入公共目录,这可能是一个入侵尝试信号。\n" " " #: ../src/allow_httpd_sys_script_anon_write.py:37 msgid "" "\n" " If httpd scripts should be allowed to write to public directories you " "need to turn on the $BOOLEAN boolean and change the file context of the " "public directory to public_content_rw_t. Read the httpd_selinux\n" " man page for further information:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_rw_t \"\n" " " msgstr "" "\n" " 如果需要让 httpd 脚本写入公共目录,您需要开启 $BOOLEAN 布尔值并且将公共目" "录的文件上下文改为 public_content_rw_t。阅读 httpd_selinux 的 man page 获得更" "多信息:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " 您还必须更改系统中文件的默认文件上下文以便在重新标记时仍可保留它们。 " "\"semanage fcontext -a -t public_content_rw_t \"\n" " " #: ../src/allow_java_execstack.py:28 msgid "" "\n" " SELinux prevented a java plugin ($SOURCE_TYPE) from making the stack " "executable.\n" " " msgstr "" "\n" " SELinux 阻止了一个 java 插件 ($SOURCE_TYPE) 使栈变为可执行。\n" " " #: ../src/allow_java_execstack.py:32 msgid "" "\n" " SELinux prevented the java plugin ($SOURCE_TYPE) from making the stack\n" " executable. An executable stack should not be required by any\n" " software (see SELinux Memory Protection Tests\n" " for more information). However, some versions of the Java plugin are " "known\n" " to require this access to work properly. You should check for updates\n" " to the software before allowing this access.\n" " " msgstr "" "\n" " SELinux 阻止了java插件($SOURCE_TYPE)使栈可执行。\n" " 任何软件不应该需要一个可执行的栈(阅读SELinux 内存保护测试\n" " 获得更多信息)。尽管如此,发现了一些版本的java插件需要可执行的栈。\n" " 您应该在允许这个访问请求前检查更新这个软件。\n" " " #: ../src/allow_java_execstack.py:56 msgid "Java" msgstr "Java" #: ../src/allow_kerberos.py:28 msgid "" "\n" " SELinux prevented $SOURCE from using kerberos.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 使用 kerberos.\n" " " #: ../src/allow_kerberos.py:32 msgid "" "\n" " SELinux prevented $SOURCE from using kerberos for\n" " authentication. If you have configured the system to use kerberos\n" " this access is expected but is not currently allowed by\n" " SELinux. Otherwise this access may signal an intrusion.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 使用 kerberos 进行验证。\n" " 如果您已经将系统配置为使用 kerberos 进行验证,那么这是一次正常的访问,\n" " 只是目前 SELinux 不允许使用。\n" " 如果不是,这次访问就可能是一次入侵尝试。\n" " " #: ../src/allow_mount_anyfile.py:28 msgid "" "\n" " SELinux prevented $SOURCE from mounting on the file or directory\n" " \"$TARGET_PATH\".\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 挂载文件或者目录\n" " \"$TARGET_PATH\"。\n" " " #: ../src/allow_mount_anyfile.py:33 msgid "" "\n" " SELinux prevented $SOURCE from mounting a filesystem on the file\n" " or directory \"$TARGET_PATH\" of type \"$TARGET_TYPE\". By default\n" " SELinux limits the mounting of filesystems to only some files or\n" " directories (those with types that have the mountpoint attribute). The\n" " type \"$TARGET_TYPE\" does not have this attribute. You can either\n" " relabel the file or directory or set the boolean \"$BOOLEAN\" to true " "to\n" " allow mounting on any file or directory.\n" " " msgstr "" "\n" " SELinux 防止了 $SOURCE 在类型为 \"TARGET_TYPE\" 的\n" " 文件或目录 \"TARGET_PATH\" 中挂载文件系统。\n" " SELinux 默认仅对一些文件或目录限制挂载文件系统(那些文件或目录拥有挂接点" "属性)。\n" " \"TARGET_TYPE\"类型没有这个属性。您可以重新设置这个文件或目录的标志,\n" " 或者将 \"$BOOLEAN\" 布尔值设为 true 来允许挂载任何文件或目录。\n" " " #: ../src/allow_mount_anyfile.py:59 ../src/allow_nfsd_anon_write.py:55 #: ../src/nfs_export_all_ro.py:52 ../src/nfs_export_all_rw.py:49 #: ../src/samba_export_all_ro.py:53 ../src/samba_export_all_rw.py:50 #: ../src/use_nfs_home_dirs.py:63 ../src/use_nfs_home_dirs.py:69 msgid "File System" msgstr "文件系统" #: ../src/allow_mplayer_execstack.py:29 msgid "" "\n" " SELinux prevented a mplayer plugin ($SOURCE_TYPE) from making the stack " "executable.\n" " " msgstr "" "\n" " SELinux 阻止了一个可使栈变为可执行 mplayer 插件($SOURCE_TYPE)。\n" " " #: ../src/allow_mplayer_execstack.py:33 msgid "" "\n" " SELinux prevented the mplayer plugin ($SOURCE_TYPE) from making the " "stack\n" " executable. An executable stack should not be required by any\n" " software (see SELinux Memory Protection Tests\n" " for more information). However, some versions of the mplayer plugin are " "known\n" " to require this access to work properly. You should check for updates\n" " to the software before allowing this access.\n" " " msgstr "" "\n" " SELinux 通过使栈可执行阻止了mplayer 插件($SOURCE_TYPE)。\n" " 任何软件不应该需要一个可执行的栈(阅读SELinux 内存保护测试\n" " 获得更多信息)。尽管如此,mplayer 插件的某些版本需要这个访问才可正常工" "作。\n" " 您应该在允许这个访问请求前检查这个软件的更新。\n" " " #: ../src/allow_mplayer_execstack.py:57 msgid "Media" msgstr "介质" #: ../src/allow_nfsd_anon_write.py:26 msgid "" "\n" " SELinux is preventing the nfs daemon from allowing clients to write to " "public directories.\n" " " msgstr "" "\n" " SELinux 正在阻止 nfs 在后台允许客户写入公共目录。\n" " " #: ../src/allow_nfsd_anon_write.py:30 msgid "" "\n" " SELinux has preventing the nfs daemon (nfsd) from writing to\n" " directories marked as public. Usually these directories are\n" " shared between multiple network daemons, like nfs, apache, ftp\n" " etc. If you have not exported any public file systems for\n" " writing, this could signal an intrusion.\n" " " msgstr "" "\n" " SELinux 阻止了nfs后台(nfsd)写入被标记为公共的目录。\n" " 通常这些目录是被多个网络之间共享的,例如像nfs,apache,ftp\n" " 如果您没有设置任何可写的公共文件系统,这会被记为一次入侵。\n" " " #: ../src/allow_nfsd_anon_write.py:38 msgid "" "\n" " If you want to export a public file systems using nfs you need to\n" " turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想用 nfs 导出一个公共文件系统,您需要开启\n" " $BOOLEAN 布尔值: \"setsebool -P\n" " $BOOLEAN=1\".\n" " " #: ../src/allow_postfix_local_write_mail_spool.py:28 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored mail spool " "directory.\n" " " msgstr "" "\n" " SELinux 通过保存在邮件池目录中的 $ACCESS 阻止了 $SOURCE。\n" " " #: ../src/allow_postfix_local_write_mail_spool.py:32 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored in the mail spool " "directory.\n" " \n" " $SOURCE attempted to write one or more files or directories, postfix\n" " ordinarily does not need this access. However it can be setup to " "allow \n" " this. \n" "\n" " If you have not configured $SOURCE to write to the mail spool\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 通过保存在邮件池目录中的 $ACCESS 阻止了 $SOURCE。\n" " \n" " $SOURCE 试图写入一个或者多个文件或者目录,postfix 一般不需要这个访问。\n" " 尽管可将其设置为允许这个访问。\n" " 将具有相同的安全上下文。\n" " \n" " 如果您没有将 $SOURCE 配置为写入到邮件池,这次访问尝试可能是入侵尝试的信" "号。\n" " " #: ../src/allow_postfix_local_write_mail_spool.py:62 msgid "Mail" msgstr "邮件" #: ../src/allow_rsync_anon_write.py:26 msgid "" "\n" " SELinux policy is preventing the rsync daemon from writing to a public\n" " directory.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 rsync 在后台写入一个公共目录。\n" " " #: ../src/allow_rsync_anon_write.py:31 msgid "" "\n" " SELinux policy is preventing the rsync daemon from writing to a public\n" " directory. If rsync is not setup to allow anonymous writes, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 rsync 守护进程写入一个公共目录。\n" " 如果没有将 rsync 设置为允许匿名写入,这可能就是一次入侵尝试信号。\n" " " #: ../src/allow_rsync_anon_write.py:37 msgid "" "\n" " If ftp should be allowed to write to this directory you need to turn\n" " on the $BOOLEAN boolean and change the file context of\n" " the public directory to public_content_rw_t. Read the rsync_selinux\n" " man page for further information:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_rw_t \"\n" " " msgstr "" "\n" " 如果应该允许 ftp 写入这个目录,您需要开启 $BOOLEAN 布尔值,\n" " 并且将这个公共目录的文件上下文改为 public_content_rw_t。\n" " 阅读 rsync_selinux 的 man page 获得更进一步的信息:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " 您还必须更改系统中文件的默认文件上下文以便在重新标记时仍可保留它们。 " "\"semanage fcontext -a -t public_content_rw_t \"\n" " " #: ../src/allow_rsync_anon_write.py:57 msgid "RSYNC" msgstr "RSYNC" #: ../src/allow_saslauthd_read_shadow.py:26 msgid "" "\n" " SELinux is preventing the sasl authentication server from reading the /" "etc/shadow file.\n" " " msgstr "" "\n" " SELinux 正在阻止 sasl 认证服务器读取 /etc/shadow 文件。\n" " " #: ../src/allow_saslauthd_read_shadow.py:30 msgid "" "\n" " SELinux has denied the sasl authentication daemon from reading the\n" " /etc/shadow file. If the sasl authentication daemon (saslauthd) is\n" " not setup to read the /etc/shadow, this could signal an\n" " intrusion.\n" " " msgstr "" "\n" " SELinux 拒绝了 sasl 验证守护进程读取 /etc/shadow 文件。\n" " 如果没有将 sasl 验证守护进程(saslauthd)设置为读取 /etc/shadow 文件\n" " 这可能是一次入侵信号。\n" " " #: ../src/allow_saslauthd_read_shadow.py:37 msgid "" "\n" " If you want the sasl authentication daemon to be able to read\n" " the /etc/shadow file change the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想sasl验证后台能够读取 /etc/shadow 文件,您可以修改 $BOOLEAN布尔" "值:\n" " \"setsebool -P $BOOLEAN=1\".\n" " " #: ../src/allow_smbd_anon_write.py:26 msgid "" "\n" " SELinux policy is preventing the samba daemon from writing to a public\n" " directory.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 samba 在后台写入一个公共目录。\n" " " #: ../src/allow_smbd_anon_write.py:31 msgid "" "\n" " SELinux policy is preventing the samba daemon from writing to a public\n" " directory. If samba is not setup to allow anonymous writes, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 策略正在阻止 samba 守护进程写入一个公共目录。如果没有将 samba 设" "置为允许\n" " 匿名写入公共目录,这可能会是一次入侵尝试信号。\n" " " #: ../src/allow_smbd_anon_write.py:37 msgid "" "\n" " If samba should be allowed to write to this directory you need to turn\n" " on the $BOOLEAN boolean and change the file context of\n" " the public directory to public_content_rw_t. Read the samba_selinux\n" " man page for further information:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_rw_t \"\n" " " msgstr "" "\n" " 如果应该允许 ftp 写入该目录,您需要打开 $BOOLEAN 布尔值并将公共\n" " 目录的文件上下文更改为 public_content_rw_t。请阅读 samba_selinux\n" " man page 以获取进一步的信息:\n" " \"setsebool -P $BOOLEAN=1; chcon -t public_content_rw_t \"\n" " 您还必须更改系统中文件的默认文件上下文以便在重新标记时仍可保留它们。 " "\"semanage fcontext -a -t public_content_rw_t \"\n" " " #: ../src/allow_smbd_anon_write.py:57 ../src/samba_enable_home_dirs.py:54 #: ../src/samba_share_nfs.py:52 ../src/spamd_enable_home_dirs.py:52 #: ../src/use_samba_home_dirs.py:62 ../src/use_samba_home_dirs.py:68 #: ../src/use_samba_home_dirs.py:74 msgid "SAMBA" msgstr "SAMBA" #: ../src/allow_ypbind.py:28 msgid "" "\n" " SELinux prevented $SOURCE from using NIS (yp).\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 使用 NIS(yp)。\n" " " #: ../src/allow_ypbind.py:32 msgid "" "\n" " SELinux prevented $SOURCE from using NIS (yp) for\n" " authentication. If you have configured the system to use NIS\n" " this access is expected but is not currently allowed by\n" " SELinux. Otherwise this access may signal an intrusion.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 使用 NIS(yp)验证。\n" " 如果您已经将该系统配置为使用 NIS,\n" " 那么这个访问是正常的,但是SELinux当前不允许这样的访问。\n" " 如果不是,这个访问可能就是一个入侵信号。\n" " " #: ../src/allow_zebra_write_config.py:26 msgid "" "\n" " SELinux is preventing the zebra daemon from writing its configuration " "files\n" " " msgstr "" "\n" " SELinux 正在阻止 zebra 守护进程写入它的配置文件\n" " " #: ../src/allow_zebra_write_config.py:30 msgid "" "\n" " SELinux has denied the zebra daemon from writing out its\n" " configuration files. Ordinarily, zebra is not required to write\n" " its configuration files. If zebra was not setup to write the\n" " config files, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 zebra 守护进程写入它的配置文件。通常 zebra 不需要写入它的" "配置文件。\n" " 如果没有将 zebra 设置为写入配置文件,这可能会是一次入侵尝试信号。\n" " " #: ../src/allow_zebra_write_config.py:37 msgid "" "\n" " If you want to allow zebra to overwrite its configuration you must\n" " turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想允许 zebra 覆盖它的配置,您必须开启$BOOLEAN布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/allow_zebra_write_config.py:53 msgid "Zebra" msgstr "Zebra" #: ../src/automount_exec_config.py:26 msgid "" "\n" " SELinux is preventing the $SOURCE_PATH from executing potentially " "mislabeled files $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 执行可能错误标记的文件 $TARGET_PATH 。\n" " " #: ../src/automount_exec_config.py:30 msgid "" "\n" " SELinux has denied the $SOURCE_PATH from executing potentially\n" " mislabeled files $TARGET_PATH. Automounter can be setup to execute\n" " configuration files. If $TARGET_PATH is an automount executable\n" " configuration file it needs to have a file label of bin_t.\n" " If automounter is trying to execute something that it is not supposed " "to, this could indicate an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 已经拒绝 $SOURCE_PATH 执行可能错\n" " 误标记的文件 $TARGET_PATH。可将 automounter 设置为\n" " 执行配置文件,如果 $TARGET_PATH 是一个自动挂载可执行\n" " 配置文件,则需要有一个 bin_t 文件标记。\n" " 如果 automounter 正在试图执行它不应该执行的动作, 则可能是一个入侵攻击提" "示。\n" " " #: ../src/automount_exec_config.py:38 msgid "" "\n" " If you want to change the file context of $TARGET_PATH so that the " "automounter can execute it you can execute \"chcon -t bin_t $TARGET_PATH\". " "If you want this to survive a relabel, you need to permanently change the " "file context: execute \"semanage fcontext -a -t bin_t $TARGET_PATH\".\n" " " msgstr "" "\n" " 如果您想要更改 $TARGET_PATH 的文件上下文以便 automounter 可对其进行操作," "您可以执行 \"chcon -t bin_t $TARGET_PATH\"。 如果您希望这个操作在重新标记后还" "可以保留,您需要永久地更改文件上下文:请执行 \"semanage fcontext -a -t bin_t " "'$TARGET_PATH'\"\n" " " #. MATCH #: ../src/automount_exec_config.py:52 ../src/cvs_data.py:54 #: ../src/default.py:61 ../src/execute.py:56 ../src/file.py:51 #: ../src/filesystem_associate.py:51 ../src/home_tmp_bad_labels.py:53 #: ../src/httpd_bad_labels.py:60 ../src/prelink_mislabled.py:59 #: ../src/public_content.py:54 ../src/qemu_blk_image.py:52 #: ../src/qemu_file_image.py:56 ../src/restorecon.py:90 #: ../src/rsync_data.py:54 ../src/samba_share.py:56 ../src/swapfile.py:53 #: ../src/xen_image.py:56 msgid "File Label" msgstr "文件标志" #: ../src/bind_ports.py:26 ../src/inetd_bind_ports.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from binding to port $PORT_NUMBER.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 绑定到端口 $PORT_NUMBER。\n" " " #: ../src/bind_ports.py:30 #, python-format msgid "" "\n" " SELinux has denied the $SOURCE from binding to a network port " "$PORT_NUMBER which does not have an SELinux type associated with it.\n" " If $SOURCE should be allowed to listen on $PORT_NUMBER, use the " "semanage command to assign $PORT_NUMBER to a port type that " "$SOURCE_TYPE can bind to (%s). \n" "

If $SOURCE is not supposed\n" " to bind to $PORT_NUMBER, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 已经拒绝 $SOURCE 绑定到没有 SELinux 类型与之关联的网络端口 " "$PORT_NUMBER。\n" " 如果本应允许 $SOURCE_NUMBER 在这个端口侦听,请使用 semanage 命令" "为 $PORT_NUMBER 分配一个 $SOURCE_TYPE 可绑定的端口类型(%s)。\n" " 如果 $SOURCE_NUMBER 本不应该绑定到这个端口,这可能就是一个入侵尝试信" "号。\n" " " #: ../src/bind_ports.py:37 #, python-format msgid "" "\n" " If you want to allow $SOURCE to bind to port $PORT_NUMBER, you can " "execute
\n" " # semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER\n" "
where PORT_TYPE is one of the following: %s.\n" "\n" "

If this system is running as an NIS Client, turning on the " "allow_ypbind boolean may fix the problem. setsebool -P allow_ypbind=1.\n" " " msgstr "" "\n" " 如果您想要允许 $SOURCE 绑定到端口 $PORT_NUMBER,您可以执行
\n" " # semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER\n" "
其中 PORT_TYPE 可为一下之一:%s.\n" "\n" "

如果这个系统正在一作为 NIS 客户端运行,打开 allow_ypbind 布尔值可" "能会解决这个问题。setsebool -P allow_ypbind=1。\n" " " #. MATCH #: ../src/bind_ports.py:58 ../src/connect_ports.py:57 #: ../src/inetd_bind_ports.py:54 ../src/user_tcp_server.py:54 msgid "Network Ports" msgstr "网络端口" #: ../src/catchall_boolean.py:31 msgid "" "\n" " SELinux is preventing $SOURCE_PATH \"$ACCESS\" access on $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE \"$ACCESS\" 访问设备 $TARGET_PATH。\n" " " #: ../src/catchall_boolean.py:35 msgid "" "\n" "\n" " SELinux denied access requested by $SOURCE. The current boolean \n" " settings do not allow this access. If you have not setup $SOURCE to\n" " require this access this may signal an intrusion attempt. If you do " "intend \n" " this access you need to change the booleans on this system to allow \n" " the access.\n" " " msgstr "" "\n" "\n" " SELinux 拒绝了 $SOURCE 请求的访问。当前的布尔值\n" " 设置并不允许这个访问。如果您没有将 $SOURCE 设置为请求这种访问,它可能是尝" "试入侵的一\n" " 个信号。如果您确实需要这个访问,您需要修改这个系统的布尔值以便允许这个访" "问。\n" " " #: ../src/catchall_boolean.py:44 msgid "" "\n" " Confined processes can be configured to run requiring different access, " "SELinux provides booleans to allow you to turn on/off \n" " access as needed.\n" "\n" " " msgstr "" "\n" " 受限制的进程可以配置为需要在不同访问权限下运行, SELinux 提供布尔值以便允" "许您根据需要打开/关闭 \n" " 访问权限。\n" "\n" " " #: ../src/catchall_boolean.py:68 #, python-format msgid "One of the following booleans is set incorrectly: %s" msgstr "以下布尔值之一的设置不正确:%s" #: ../src/catchall_boolean.py:70 msgid "Choose one of the following to allow access:
" msgstr "选择以下之一以便允许访问:
" #: ../src/catchall_boolean.py:76 #, python-format msgid "The boolean %s is set incorrectly. " msgstr "布尔值 %s 设置不正确。" #: ../src/catchall_boolean.py:77 #, python-format msgid "

Boolean Description:
%s

" msgstr "

布尔值描述:
%s

" #: ../src/catchall.py:28 msgid "SELinux is preventing $SOURCE_PATH \"$ACCESS\" access" msgstr "SELinux 正在阻止 $SOURCE_PATH \"$ACCESS\" access" #: ../src/catchall.py:30 msgid "" "\n" "\n" " SELinux denied access requested by $SOURCE. It is not\n" " expected that this access is required by $SOURCE and this access\n" " may signal an intrusion attempt. It is also possible that the specific\n" " version or configuration of the application is causing it to require\n" " additional access.\n" "\n" " " msgstr "" "\n" "\n" " SELinux 拒绝了 $SOURCE 的访问请求。\n" " $SOURCE 并不应请求这种访问,它可能是尝试入侵的一\n" " 个信号。也可能是应用程序的特别版本或配置导致它请求额外的访问。\n" "\n" " " #: ../src/catchall.py:40 msgid "" "\n" " You can generate a local policy module to allow this\n" " access - see FAQ\n" " Please file a bug report.\n" " " msgstr "" "\n" " 您可以创建一个本地策略模块来允许这个\n" " 访问 - 请查看 常见问题\n" " 请发送一个错误报告。\n" " " #: ../src/connect_ports.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from connecting to port " "$PORT_NUMBER.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 连接到端口 $PORT_NUMBER。\n" " " #: ../src/connect_ports.py:30 #, python-format msgid "" "\n" " SELinux has denied $SOURCE from connecting to a network port " "$PORT_NUMBER which does not have an SELinux type associated with it.\n" " If $SOURCE should be allowed to connect on $PORT_NUMBER, use the " "semanage command to assign $PORT_NUMBER to a port type that " "$SOURCE_TYPE can connect to (%s). \n" "

If $SOURCE is not supposed\n" " to connect to $PORT_NUMBER, this could signal a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 连接到没有 SELinux 类型与之关联的网络端口 " "$PORT_NUMBER。\n" " 如果应该允许 $SOURCE 连接到 $PORT_NUMBER,请使用 semanage 命令为这" "个端口分配一个 $SOURCE_TYPE 可以连接的端口类型(%s)。 \n" " 如果 $SOURCE 不应该与这个\n" " 端口连接,这可能就是一个入侵尝试信号。\n" " " #: ../src/connect_ports.py:38 #, python-format msgid "" "\n" " If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute " "
\n" " semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER\n" "
where PORT_TYPE is one of the following: %s.\n" " " msgstr "" "\n" " 如果您希望允许 $SOURCE 与 $PORT_NUMBER 连接,您可以执行
\n" " semanage port -a -t PORT_TYPE -p %s $PORT_NUMBER\n" "
其中 PORT_TYPE 是一下之一:%s。\n" " " #: ../src/cvs_data.py:26 msgid "" "\n" " SELinux is preventing cvs ($SOURCE_PATH) \"$ACCESS\" access to " "$TARGET_PATH\n" " " msgstr "" "\n" " SELinux 正在阻止 cvs ($SOURCE_PATH) \"$ACCESS\" 访问设备 $TARGET_PATH\n" " " #: ../src/cvs_data.py:30 msgid "" "\n" " SELinux denied cvs access to $TARGET_PATH.\n" " If this is a CVS repository it needs to have a file context label of\n" " cvs_data_t. If you did not intend to use $TARGET_PATH as a CVS " "repository\n" " it could indicate either a bug or it could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了cvs 访问 $TARGET_PATH。\n" " 如果这是一个 CVS 程序库,它应当有一个文件上下文标记 cvs_data_t。\n" " 如果您并没有打算将 $TARGET_PATH 作为 CVS 程序库使用,这可能是\n" " 一个 Bug 或是入侵尝试的信号。 \n" " " #: ../src/cvs_data.py:37 msgid "" "\n" " You can alter the file context by executing chcon -R -t cvs_data_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "cvs_data_t '$TARGET_PATH'\"\n" " \n" " " msgstr "" "\n" " 您可以通过执行 chcon -R -t cvs_data_t '$TARGET_PATH' 修改文件上下文。\n" " 您还必须修改系统中的默认文件上下文文件以便在完全重新标记后还可以保留它" "们。\"semanage fcontext -a -t vcs_data_t '$TARGET_PATH'\"\n" " \n" " " #: ../src/default.py:27 ../src/prelink_mislabled.py:26 #: ../src/public_content.py:26 ../src/qemu_blk_image.py:26 #: ../src/qemu_file_image.py:26 ../src/restorecon.py:31 #: ../src/rsync_data.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH \"$ACCESS\" access to $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH \"$ACCESS\" 访问设备 $TARGET_PATH。\n" " " #: ../src/default.py:31 msgid "" "\n" " SELinux is preventing $SOURCE \"$ACCESS\" access to files with the " "default label, default_t.\n" " The default_t label is the default label for new directories created " "under the / directory. No confined applications are allowed to access files " "labeled default_t. This probably indicates a labeling problem, especially " "if the files being referred\n" " to are not top level directories. Any files/directories under standard " "system directories, /usr,\n" " /var. /dev, /tmp, ..., should not be labeled with the default_t. If you " "create a new directory in / it will get this label.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE \"$ACCESS\" 访问具有默认标签 default_t 的文" "件。\n" " default_t 是在 / 中新生成目录的默认标记 。任何受限制的应用程序口不可以访" "问被标为 default_t 的文件。这可能表示有标记问题,特别是参考的文件不\n" "在顶极目录中时。所有标准系统目录中的文件/目录,\n" "比如 /usr、/var、/dev、/tmp 等等都不应被标记为 default_t。如果您在 / 这生成新" "目录,它就会获得这个标记。\n" " " #: ../src/default.py:38 #, python-format msgid "" "\n" " If you created a directory in / and want $SOURCE to use these files you " "must tell SELinux about it by changing the labels. Execute the following " "commands:
\n" " # semanage fcontext -t FILE_TYPE '$TARGET_PATH%s' \n" "
where FILE_TYPE is one of the following: %s.\n" "
# restorecon -v $TARGET_PATH\n" "

If the $TARGET_PATH is not in / you probably need to relabel the " "system. Execute: \n" "
\"touch /.autorelabel; reboot\"\n" " " msgstr "" "\n" " 如果您在 / 中生成一个目录并想要 $SOURCE 使用这些文件,则您必须通过更改标" "记告知 SELinux。请执行一下命令:
\n" " # semanage fcontext -t FILE_TYPE '$TARGET_PATH%s' \n" "
其中 FILE_TYPE 是以下之一:%s.\n" "
# restorecon -v $TARGET_PATH\n" "

如果 $TARGET_PATH 不在 / 中,您可能需要重新标记该系统。请执行:\n" "
\"touch /.autorelabel; reboot\"\n" " " #: ../src/device.py:28 msgid "" "\n" " SELinux is preventing $SOURCE_PATH \"$ACCESS\" access to device " "$TARGET_PATH. \n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH \"$ACCESS\" 访问设备 $TARGET_PATH。\n" " " #: ../src/device.py:32 msgid "" "\n" "\n" " SELinux has denied $SOURCE \"$ACCESS\" access to device $TARGET_PATH.\n" " $TARGET_PATH is mislabeled, this device has the default label of the /" "dev directory, which should not\n" " happen. All Character and/or Block Devices should have a label.\n" "\n" " You can attempt to change the label of the file using\n" "\n" " restorecon -v '$TARGET_PATH'.\n" "\n" " If this device remains labeled device_t, then this is a bug in SELinux " "policy.\n" "\n" " Please file a bg report.\n" "\n" " If you look at the other similar devices labels, ls -lZ /dev/SIMILAR, " "and find a type that would work for $TARGET_PATH,\n" " you can use chcon -t SIMILAR_TYPE '$TARGET_PATH', If this fixes the " "problem, you can make this permanent by executing\n" " semanage fcontext -a -t SIMILAR_TYPE '$TARGET_PATH'\n" "\n" " If the restorecon changes the context, this indicates that the " "application that created the device, created it without\n" " using SELinux APIs. If you can figure out which application created the " "device, please file a bug report against this application.\n" " \n" " " msgstr "" "\n" "\n" " SELinux 已经拒绝了 $SOURCE \"$ACCESS\" 访问设备 $TARGET_PATH。\n" " $TARGET_PATH错误标记了,这个设备的默认标签是 /dev 目录的,这本不应该发" "生。\n" " 所有的字符设备和/或者块设备都应该有一个标签。\n" "\n" " 您可以使用以下命令来更改文件的标签:\n" "\n" " restorecon -v $TARGET_PATH.\n" "\n" " 如果这个设备的标签仍被标记为 device_t,这可能是 SELinux 策略中的一个 " "bug。\n" "\n" " 请填写一个 " "错误报告\n" " 来反映与 selinux-policy 软件包相关的问题。\n" "\n" " 您可以查看其它相似设备的标签,ls -lZ /dev/SIMILAR,并找到一个对 " "$TARGET_PATH 有效的类型,\n" " 您可以使用 chcon -t SIMILAR_TYPE $TARGET_PATH。如果这个方法解决了这个问" "题,您可以执行以下命令来永久改变它:\n" " semanage fcontext -a -t SIMILAR_TYPE '$TARGET_PATH'\n" "\n" " 如果 restorecon 改变了上下文,这意味着创建这个设备的应用程序在创建该设备" "时没有使用 SELinux API。\n" " 如果您可以找出哪个应用程序创建了这个设备,请填写一个 错误报告\n" " 来反映这个应用程序的问题。\n" " \n" " " #: ../src/device.py:55 msgid "" "\n" " Attempt restorecon -v '$TARGET_PATH' or chcon -t SIMILAR_TYPE " "'$TARGET_PATH'\n" " " msgstr "" "\n" " 尝试 restorecon -v '$TARGET_PATH' 或 chcon -t SIMILAR_TYPE " "'$TARGET_PATH'\n" " " #: ../src/execute.py:24 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from executing $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 执行 $TARGET_PATH。\n" " " #: ../src/execute.py:28 msgid "" "\n" " SELinux has denied the $SOURCE from executing $TARGET_PATH.\n" " If $SOURCE is supposed to be able to execute $TARGET_PATH, this could be " "a labeling problem. Most confined domains are allowed to execute files " "labeled bin_t. So you could change the labeling on this file to bin_t and " "retry the application. If this $SOURCE is not supposed to execute " "$TARGET_PATH, this could signal an intrusion attempt. \n" " " msgstr "" "\n" " SELinux 已经拒绝 $SOURCE 执行 $TARGET_PATH。\n" " 如果应该允许 $SOURCE 执行 $TARGET_PATH,那么这就是一个标记问题。大多数受" "限制的域是允许执行被标记为 bin_t 的文件。因此,您应该将这个文件的标签改为 " "bin_t,并重试应用程序。如果$SOURCE 不应该执行 $TARGET_PATH,那么这应该是一个" "入侵尝试信号。\n" " " #: ../src/execute.py:33 msgid "" "\n" " If you want to allow $SOURCE to execute $TARGET_PATH:\n" " \n" " chcon -t bin_t '$TARGET_PATH'\n" "\n" " If this fix works, please update the file context on disk, with the " "following command:\n" "\n" " semanage fcontext -a -t bin_t '$TARGET_PATH'\n" "\n" " Please specify the full path to the executable, Please file a bug " "report\n" "to make sure this becomes the default labeling. \n" " " msgstr "" "\n" " 如果您想要允许 $SOURCE 执行 $TARGET_PATH:\n" " \n" " chcon -t bin_t '$TARGET_PATH'\n" "\n" " 如果这样修复有效,请使用以下命令更新磁盘中的文件上下文:\n" "\n" " semanage fcontext -a -t bin_t '$TARGET_PATH'\n" "\n" " 请指定到可执行文件的完整路径。请向 bug\n" " report 提交一个错误报告以确保其成为默认标签。 \n" " " #: ../src/fcron_crond.py:28 msgid "" "\n" " SELinux prevented $SOURCE from accessing the cron spool file.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 访问 cron spool 文件。\n" " " #: ../src/fcron_crond.py:32 msgid "" "\n" " SELinux prevented $SOURCE from accessing the cron spool file.\n" " This access is normally needed when using fcron as a cron daemon\n" " (http://fcron.free.fr). If you are " "using fcron you should allow this\n" " access. Otherwise this access attempt may signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 访问 cron 缓冲池文件。当使用 fcron \n" " 作为 cron 守护进程时通常会需要这个访问(http://fcron.free.fr)。\n" " 如果您正在使用 fcron ,您应当允许这个访问。否则这个访问尝试可能是入侵尝试" "的信号。\n" " " #: ../src/fcron_crond.py:56 msgid "CRON" msgstr "CRON" #: ../src/file.py:26 msgid "" "\n" " SELinux is preventing access to files with the label, file_t.\n" " " msgstr "" "\n" " SELinux 正在阻止访问使用file_t标签的文件。\n" " " #: ../src/file.py:30 msgid "" "\n" " SELinux permission checks on files labeled file_t are being\n" " denied. file_t is the context the SELinux kernel gives to files\n" " that do not have a label. This indicates a serious labeling\n" " problem. No files on an SELinux box should ever be labeled file_t.\n" " If you have just added a new disk drive to the system you can\n" " relabel it using the restorecon command. Otherwise you should\n" " relabel the entire file system.\n" " " msgstr "" "\n" " 对标记为 file_t 的文件的 SELinux 权限检查被拒绝。 file_t 是 \n" " SELinux 内核给没有标记的文件的上下文。这说明有严重的标记\n" " 问题。在 SELinux 系统中没有文件会被标记为 file_t 。如果您刚\n" " 给系统添加了一个新的磁盘驱动器,您可以使用 restorecon 命\n" " 令重新标记它。否则您应当重新标记整个系统的文件。\n" " " #: ../src/file.py:40 msgid "" "\n" " You can execute the following command as root to relabel your\n" " computer system: \"touch /.autorelabel; reboot\"\n" " " msgstr "" "\n" " 您可以以 root 身份执行以下命令来重新设置您计算机系统的标签:\n" " \"touch /.autorelabel; reboot\"\n" " " #: ../src/filesystem_associate.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from creating a file with a context " "of $SOURCE_TYPE on a filesystem.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 在文件系统中生成一个上下文为 $SOURCE_TYPE " "的文件。\n" " " #: ../src/filesystem_associate.py:30 msgid "" "\n" " SELinux is preventing $SOURCE from creating a file with a context of " "$SOURCE_TYPE on a filesystem.\n" " Usually this happens when you ask the cp command to maintain the context " "of a file when\n" " copying between file systems, \"cp -a\" for example. Not all file " "contexts should be maintained\n" " between the file systems. For example, a read-only file type like " "iso9660_t should not be placed\n" " on a r/w system. \"cp -P\" might be a better solution, as this will " "adopt the default file context\n" " for the destination. \n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 在文件系统中生成一个上下文为 $SOURCE_TYPE 的文" "件。\n" " 这通常会在您让 cp 命令在两个文件系统间进行复制操作时,比如\"cp -a\" 保留" "文件上下文时发生。\n" " 不是所有的文件上下文都应该保留在不同的文件系统中。\n" " 例如:只读文件 iso9660_t 就不应该放在 r/w 文件系统中。\n" " \"cp -P\" 可能是更好的解决方案,因为这样可以为目的地文件使用默认文件上下" "文。" #: ../src/filesystem_associate.py:39 msgid "" "\n" " Use a command like \"cp -P\" to preserve all permissions except SELinux " "context.\n" " " msgstr "" "\n" " 使用类似 \"cp -P\" 的命令保留除 SELinux 上下文外的所有权限。" #: ../src/firefox.py:26 msgid "" "\n" " SELinux is preventing firefox from making its memory writable and " "executable.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 使其内存可写可执行。\n" " " #: ../src/firefox.py:30 msgid "" "\n" " The $SOURCE application attempted to change the access protection\n" " of memory (e.g., allocated using malloc). This is a potential\n" " security problem. Firefox is probably not the problem here ,but one of " "its plugins. You could remove the plugin and the app would no longer " "require the access. If you figure out which plugin is causing the access " "request, please open a bug report on the plugin.\n" " " msgstr "" "\n" " $SOURCE 应用程序试图修改内存访问保护\n" " (e.g., allocated using malloc)。这是个潜在的\n" " 安全问题。问题可能不在于Firefox,而在于它的某个插件。你可以移除该插件," "firefox就不会再请求这样的访问。如果你找出了引起访问请求的插件,请根据该插件提" "交一个错误报告。\n" " " #: ../src/firefox.py:36 msgid "" "\n" "There are two ways to fix this problem, you can install the nsspluginwrapper " "package, which will cause firefox to run its plugins under a separate " "process. This process will allow the execmem access. This is the safest " "choice. You could also turn off the allow_unconfined_nsplugin_transition " "boolean. \n" "
\n" "setsebool -P allow_unconfined_nsplugin_transition=0\n" "
\n" " " msgstr "" "\n" "有2个方法修复这个问题:您可以安装nsspluginwrapper包,它将使firefox在独立进程" "中运行插件。该进程将允许可执行内存的访问。这是最安全的选择。您也可以关闭" "allow_unconfined_nsplugin_transition逻辑。\n" "
\n" "setsebool -P allow_unconfined_nsplugin_transition=0\n" "
\n" " " #: ../src/ftpd_is_daemon.py:28 msgid "" "\n" " SELinux prevented $SOURCE from correctly running as a daemon.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 后台作为守护进程正确运行。\n" " " #: ../src/ftpd_is_daemon.py:32 msgid "" "\n" " SELinux prevented $SOURCE from correctly running as a daemon.\n" " FTP servers can be configured to either run through xinetd or as a\n" " stand-alone daemon. Each configuration requires slightly different\n" " access. If you have configured your FTP server to run as a daemon\n" " you should allow this access. Otherwise this may signal an intrusion\n" " attempt.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 正确地作为守护进程运行。可将 FTP 服\n" " 务器配置为通过 xinetd 运行或做为独立的守护进程。每种配置需\n" " 要的访问稍有不同问。如果您将您的 FTP 服务器配置成作为守护进程运行,\n" " 您应当允许这个访问。否则这可能是入侵尝试的信号。\n" " " #: ../src/ftp_home_dir.py:26 msgid "" "\n" " SELinux is preventing the ftp daemon from reading users home directories " "($TARGET_PATH).\n" " " msgstr "" "\n" " SELinux 正在阻止 ftp 在后台读取用户的主目录 ($TARGET_PATH).\n" " " #: ../src/ftp_home_dir.py:30 msgid "" "\n" " SELinux has denied the ftp daemon access to users home directories\n" " ($TARGET_PATH). Someone is attempting to login via your ftp daemon\n" " to a user account. If you only setup ftp to allow anonymous ftp,\n" " this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 ftp 守护进程访问用户主目录 ($TARGET_PATH) 。有\n" " 人试图通过您的 ftp 守护进程登录一个用户帐户。如果您只将您的 ftp 设置\n" " 成允许匿名访问,这可能是入侵尝试的信号。\n" " " #: ../src/ftp_home_dir.py:37 msgid "" "\n" " If you want ftp to allow users access to their home directories\n" " you need to turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 ftp 允许用户访问他们的主目录,您需要开启\n" " $BOOLEAN 布尔值: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " #: ../src/global_ssp.py:28 msgid "" "\n" " SELinux prevented $SOURCE from reading from the urandom device.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 从 urandom 设备读取位器。\n" " " #: ../src/global_ssp.py:32 msgid "" "\n" " SELinux prevented $SOURCE from reading from the urandom device.\n" " This access should be allowed for individual applications, but there\n" " are situations where all applications require the access (for example,\n" " when ProPolice/SSP stack smashing protection is used). Allowing this\n" " access may allow malicious applications to drain the kernel entropy\n" " pool. This can compromise the ability of some software that is\n" " dependent on high quality random numbers (e.g., ssh-keygen) to operate\n" " effectively. The risk of this type of attack is relatively low.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 读取 urandom 设备。对单独的应用程序,应该允许这\n" " 个访问,但也存在所有程序都请求访问的情况(如:当启用 ProPolice/SSP\n" " 栈破坏保护(stack smashing protection)时)。允许该访问可能会让\n" " 恶意程序耗尽内核的熵池(entropy pool) 。这会危害一些依赖高质量随机数以\n" " 有效运行的程序的功能(如:ssh-keygen)。这类入侵的风险相对较低。\n" " " #: ../src/home_tmp_bad_labels.py:26 msgid "" "\n" " SELinux is preventing the $SOURCE_PATH from using potentially mislabeled " "files ($TARGET_PATH).\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 使用可能错误标记的文件($TARGET_PATH)。\n" " " #: ../src/home_tmp_bad_labels.py:30 msgid "" "\n" " SELinux has denied $SOURCE access to potentially\n" " mislabeled file(s) ($TARGET_PATH). This means that SELinux will not\n" " allow $SOURCE to use these files. It is common for users to edit\n" " files in their home directory or tmp directories and then move\n" " (mv) them to system directories. The problem is that the files \n" " end up with the wrong file context which confined applications are not " "allowed to access.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 访问可能错误标记的文件($TARGET_PATH)。\n" " 这意味着 SELinux 将不允许 $SOURCE 使用这些文件。用户通常会在他们的\n" " 主目录或 tmp 目录编辑一个文件然后把它们移动(mv)到系统目录。这样做的问题" "是\n" " 这些文件将会拥有错误的文件上下文并使得受限的应用程序不被允许访问它们。\n" " " #: ../src/home_tmp_bad_labels.py:39 msgid "" "\n" " If you want $SOURCE to access this files, you need to\n" " relabel them using restorecon -v '$TARGET_PATH'. You might want to\n" " relabel the entire directory using restorecon -R -v '$TARGET_DIR'.\n" " " msgstr "" "\n" " 如果您想让 $SOURCE 访问这个文件,您需要使用 restorecon -v '$TARGET_PATH' " "重\n" " 新标记它。您或许想要使用 restorecon -R -v '$TARGET_DIR' 重新标记整个目" "录。\n" " " #: ../src/httpd_bad_labels.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH from using potentially mislabeled " "files $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH 使用可能错误标记的文件($TARGET_PATH)。\n" " " #: ../src/httpd_bad_labels.py:30 #, python-format msgid "" "\n" " SELinux has denied the $SOURCE access to potentially\n" " mislabeled files $TARGET_PATH. This means that SELinux will not\n" " allow httpd to use these files. If httpd should be allowed this access " "to these files you should change the file context to one of the following " "types, %s.\n" " Many third party apps install html files\n" " in directories that SELinux policy cannot predict. These directories\n" " have to be labeled with a file context which httpd can access.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 对可能错误标记文件 $TARGET_PATH \n" " 的访问。这意味着 SELinux 将不允许 httpd 使用这些文件。如果应该允许 " "httpd \n" " 访问这些文件,那么您应该将该文件的上下文更改为以下类型 %s。\n" " 许多第三方应用程\n" " 序将 html 文件安装在 SELinux 策略无法预知的目录。这些目录必须以一个 \n" " httpd 能访问的文件上下文被标记。\n" " " #: ../src/httpd_bad_labels.py:39 #, python-format msgid "" "\n" " If you want to change the file context of $TARGET_PATH so that the " "httpd\n" " daemon can access it, you need to execute it using\n" " semanage fcontext -a -t FILE_TYPE '$TARGET_PATH'. \n" "

where FILE_TYPE is one of the following: %s. \n" "\n" "You can look at the httpd_selinux man page for additional information.\n" " " msgstr "" "\n" " 如果您想要改变 $TARGET_PATH 的文件上下文以便 httpd 守护进程能访问\n" " 它,您需要使用 semanage fcontext -a -t FILE_TYPE '$TARGET_PATH' 执行" "它,\n" "

其中 FILE_TYPE 是以下类型之一:%s 您可以\n" " 查看 httpd_selinux man page 来获得更多的信息。\n" " " #: ../src/httpd_builtin_scripting.py:26 msgid "" "\n" " SELinux is preventing the http daemon from using built-in scripting.\n" " " msgstr "" "\n" " SELinux 正在阻止http后台使用内置的脚本。\n" " " #: ../src/httpd_builtin_scripting.py:30 msgid "" "\n" " SELinux has denied the http daemon from using built-in scripting.\n" " This means that SELinux will not allow httpd to use loadable\n" " modules to run scripts internally. If you did not setup httpd to\n" " use built-in scripting, this may signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程使用内置程序。这意味着 SELinux \n" " 将不允许 httpd 使用可加载模块在内部运行脚本。如果您没有将 httpd 设置 \n" " 为使用内置程序,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_builtin_scripting.py:37 msgid "" "\n" " If you want the http daemon to use built in scripting you need to\n" " enable the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让http在后台使用内置的脚本,您需要开启$BOOLEAN布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_can_network_connect_db.py:26 msgid "" "\n" " SELinux is preventing the http daemon from connecting to a database.\n" " " msgstr "" "\n" " SELinux 正在阻止http在后台连接数据库。\n" " " #: ../src/httpd_can_network_connect_db.py:30 msgid "" "\n" " SELinux has denied the http daemon from connecting to a database. An\n" " httpd script is trying to connect to a database port. If you did not\n" " setup httpd to allow database connections, this could signal an " "intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程连接到数据库。一个 httpd 脚本正试图连接到\n" " 一个数据库端口。如果您没有将 httpd 设置为允许数据库连接,这可能是入侵\n" " 尝试的信号。\n" " " #: ../src/httpd_can_network_connect_db.py:36 msgid "" "\n" " If you want httpd to allow database connections you need to turn on the\n" " $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想允许httpd连接数据库,您需要开启$BOOLEAN布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_can_network_connect.py:29 msgid "" "\n" " SELinux is preventing the http daemon from connecting to network port " "$PORT_NUMBER" msgstr "" "\n" " SELinux 正在阻止 http 守护进程连接到网络端口 $PORT_NUMBER" #: ../src/httpd_can_network_connect.py:32 msgid "" "\n" " SELinux has denied the http daemon from connecting to $PORT_NUMBER. An\n" " httpd script is trying to make a network connection to a remote port. If " "you\n" " did not setup httpd to make network connections, this could signal an " "intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程连接到端口 $PORT_NUMBER 。一个 httpd 脚\n" " 本正试图进行到一个远程端口的网络连接。如果您\n" " 没有将 httpd 设置为使用网络\n" " 连接,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_can_network_connect.py:38 msgid "" "\n" " If you want httpd to connect to network ports you need to turn on the\n" " httpd_can_network_network_connect boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想允许httpd连接网络端口,您需要\n" " 开启httpd_can_network_connect 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_can_network_relay.py:28 msgid "" "\n" " SELinux is preventing the http daemon from connecting to itself or the " "relay ports\n" " " msgstr "" "\n" " SELinux 正在阻止 http 在后台连接他自己的或者中继端口\n" " " #: ../src/httpd_can_network_relay.py:32 msgid "" "\n" " SELinux has denied the http daemon from connecting to itself or\n" " the relay ports. An httpd script is trying to make a network " "connection \n" " to an http/ftp port. If you did not setup httpd to make network\n" " connections, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程连接到自身或中继端口(relay ports)。\n" " 一个 httpd 脚本正试图连接到 http/ftp 端口。如果您没有将\n" " httpd 设置为使用网络连接,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_can_network_relay.py:39 msgid "" "\n" " If you want httpd to connect to httpd/ftp ports you need to turn\n" " on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想允许httpd连接 httpd/ftp 端口,您需要开启$BOOLEAN布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_can_sendmail.py:27 msgid "" "\n" " SELinux is preventing the http daemon from sending mail.\n" " " msgstr "" "\n" " SELinux 正在阻止 http 守护进程发送电子邮件。\n" " " #: ../src/httpd_can_sendmail.py:31 msgid "" "\n" " SELinux has denied the http daemon from sending mail. An\n" " httpd script is trying to connect to a mail port or execute the \n" " sendmail command. If you did not setup httpd to sendmail, this could \n" " signal a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程发送电子邮件。一个 httpd 脚本正试图连接到\n" " 一个电子邮件端口或者执行 sendmail 命令。如果您没有将 httpd 设置发送的足" "可,这可能是入侵\n" " 尝试的信号。\n" " " #: ../src/httpd_can_sendmail.py:38 msgid "" "\n" " If you want httpd to send mail you need to turn on the\n" " $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想允许 httpd 发送电子邮件,您需要开启 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_enable_cgi.py:26 msgid "" "\n" " SELinux is preventing the http daemon from executing cgi scripts.\n" " " msgstr "" "\n" " SELinux 正在阻止 http 守护进程执行 cgi 脚本。\n" " " #: ../src/httpd_enable_cgi.py:30 msgid "" "\n" " SELinux has denied the http daemon from executing a cgi\n" " script. httpd can be setup in a locked down mode where cgi scripts\n" " are not allowed to be executed. If the httpd server has been setup\n" " to not execute cgi scripts, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程执行 cgi 脚本。可将 httpd 设\n" " 置为一种不允许执行 cgi 脚本的锁定模式。如果已经将 httpd 服务器设\n" " 置为不执行 cgi 脚本,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_enable_cgi.py:37 msgid "" "\n" " If you want httpd to be able to run cgi scripts, you need to\n" " turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想使 httpd 可以运行 cgi 脚本,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" "\n" " " #: ../src/httpd_enable_ftp_server.py:26 msgid "" "\n" " SELinux is preventing the http daemon from acting as a ftp server.\n" " " msgstr "" "\n" " SELinux 正在阻止 http 守护进程成为 ftp 服务器。\n" " " #: ../src/httpd_enable_ftp_server.py:30 msgid "" "\n" " SELinux has denied the http daemon from listening for incoming\n" " connections on the ftp port. This means that SELinux will not\n" " allow httpd to run as a ftp server. If you did not setup httpd to\n" " run as a ftp server, this may signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程侦听 ftp 端口进入的连接。这意味\n" " 着 SELinux 将不允许 httpd 作为 ftp 服务器运行。如果您没有将 httpd 设置为" "做\n" " 为 ftp 服务器运行,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_enable_ftp_server.py:37 msgid "" " If you want the http daemon to listen on the ftp port, you need to\n" " enable the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" " 如果您想让 http 守护进程监听 ftp 端口,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_enable_homedirs.py:26 msgid "" "\n" " SELinux is preventing the http daemon from reading users' home " "directories.\n" " " msgstr "" "\n" " SELinux 正在阻止 http 守护进程读取用户主目录。\n" " " #: ../src/httpd_enable_homedirs.py:30 msgid "" "\n" " SELinux has denied the http daemon access to users' home\n" " directories. Someone is attempting to access your home directories\n" " via your http daemon. If you have not setup httpd to share home\n" " directories, this probably signals an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程访问用户主目录。有人正试图通过您\n" " 的 http 守护进程访问您的主目录。如果您没有设置 httpd 共享主目录,这很\n" " 可能是入侵尝试的信号。\n" " " #: ../src/httpd_enable_homedirs.py:37 msgid "" "\n" " If you want the http daemon to share home directories you need to\n" " turn on the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 http 守护进程共享主目录,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_ssi_exec.py:26 msgid "" "\n" " SELinux is preventing the http daemon from executing a shell script" msgstr "" "\n" " SELinux 正在阻止 http 守护进程执行 shell 脚本" #: ../src/httpd_ssi_exec.py:29 msgid "" "\n" " SELinux has denied the http daemon from executing a shell\n" " script. Ordinarily, httpd requires that all scripts (CGIs) be\n" " labeled httpd_sys_script_exec_t. If httpd should not be running\n" " this shell script, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 http 守护进程执行 shell 脚本。通常情况下, http 要\n" " 求将所有的脚本 (CGI) 标记为 httpd_sys_script_exec_t 。如果 httpd 不应\n" " 当执行这个 shell 脚本,这可能是入侵尝试的信号。\n" " " #: ../src/httpd_ssi_exec.py:36 msgid "" "\n" " If you want httpd to be able to run a particular shell script,\n" " you can label it with chcon -t httpd_sys_script_exec_t SCRIPTFILE. If " "you\n" " want httpd to be able execute any shell script you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 httpd 守护进程能执行某个特定的 shell 脚本,您可以用\n" " chcon -t httpd_sys_script_exec_t SCRIPTFILE 来标记它。如果您想让 httpd " "能\n" " 执行任意的 shell 脚本,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_tty_comm.py:26 msgid "" "\n" " SELinux is preventing the http daemon from communicating with the " "terminal.\n" " " msgstr "" "\n" " SELinux 正在阻止 http 守护进程同终端通信。\n" " " #: ../src/httpd_tty_comm.py:30 msgid "" "\n" " SELinux is not allowing the http daemon to communicate with the\n" " terminal. Most daemons do not need to communicate\n" " with the terminal. httpd can be setup to require information\n" " during the boot process which would require this access. If you\n" " did not setup httpd to require access to the terminal, this may\n" " signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 不允许 http 守护进程与终端沟通。大多数服务守护进程都\n" " 不需要与终端沟通。可将 httpd 设置为在启动过程中需要一些必须访\n" " 问终端来得到的信息。如果您没有将 httpd 设置为需要访问终端,这可能是入\n" " 侵尝试的信号。\n" " " #: ../src/httpd_tty_comm.py:39 msgid "" "\n" " If you want the http daemon to be able to access the terminal, you\n" " must set the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 http 守护进程能访问终端,您必须设置 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/httpd_unified.py:28 msgid "" "\n" " SELinux prevented httpd $ACCESS access to http files.\n" " " msgstr "" "\n" " SELinux 阻止了 http $ACCESS 对 http 文件的访问。\n" " " #: ../src/httpd_unified.py:32 msgid "" "\n" " SELinux prevented httpd $ACCESS access to http files.\n" "\n" " Ordinarily httpd is allowed full access to all files labeled with http " "file\n" " context. This machine has a tightened security policy with the " "$BOOLEAN\n" " turned off, this requires explicit labeling of all files. If a file is\n" " a cgi script it needs to be labeled with httpd_TYPE_script_exec_t in " "order\n" " to be executed. If it is read-only content, it needs to be labeled\n" " httpd_TYPE_content_t, it is writable content. it needs to be labeled\n" " httpd_TYPE_content_rw_t or httpd_TYPE_content_ra_t. You can use the\n" " chcon command to change these contexts. Please refer to the man page\n" " \"man httpd_selinux\" for more information on setting up httpd and " "SELinux.\n" " " msgstr "" "\n" " SELinux 阻止了 httpd $ACCESS 对 http 文件的访问。\n" "\n" " 通常情况下,httpd 允许对所有标记为 http 文件上下文的文件的全部访问权限。这" "台机\n" " 器关闭了 $BOOLEAN 布尔值,从而具有更严格的安全策略。这要求对所有文件显式" "地\n" " 作标记。如果文件是一个 cgi 脚本,它必须被标记为 httpd_TYPE_script_exec_t " "方\n" " 可执行。如果是只读内容,它必须被标记为 httpd_TYPE_content_t 。如果是可写入" "内\n" " 容,它必须被标记为 httpd_TYPE_script_rw_t 或 httpd_TYPE_script_ra_t 。您可" "以\n" " 使用 chcon 命令来改变这些上下文。请参考 man 页“man httpd_selinux”来了解更" "多\n" " 搭建 httpd 和 SELinux 的设置信息。\n" " " #: ../src/httpd_write_content.py:28 msgid "" "\n" " SELinux prevented httpd ($SOURCE_PATH) $ACCESS access to $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止httpd ($SOURCE_PATH) \"$ACCESS\" 访问设备 " "$TARGET_PATH。\n" " " #: ../src/httpd_write_content.py:32 msgid "" "\n" " SELinux prevented httpd $ACCESS access to $TARGET_PATH.\n" "\n" " httpd scripts are not allowed to write to content without explicit \n" " labeling of all files. If $TARGET_PATH is writable content. it needs \n" " to be labeled httpd_sys_content_rw_t or if all you need is append you " "can label it httpd_sys_content_ra_t. Please refer to 'man httpd_selinux' " "for more information on setting up httpd and selinux.\n" " " msgstr "" "\n" " SELinux阻止了 httpd $ACCESS 访问 $TARGET_PATH。\n" "\n" " httpd 脚本不允许对没有被显式标记的所有文件的内容作写操作。如果 " "$TARGET_PATH 是可改写内容,它必须被标记为 httpd_sys_content_rw_t,或者如果您" "要的只是添加内容,可以把它标记为 httpd_sys_content_ra_t。请参考“man " "httpd_selinux” 来了解更多搭建 httpd 和 selinux 的信息。" #: ../src/httpd_write_content.py:40 msgid "" "\n" " You can alter the file context by executing chcon -R -t " "httpd_sys_content_rw_t '$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "httpd_sys_content_rw_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以执行 chcon -R -t httpd_sys_content_rw_t '$TARGET_PATH' 来改变文件上" "下文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们,执" "行\n" "“semanage fcontext -a -t httpd_sys_content_rw_t '$TARGET_PATH'”" #: ../src/httpd_use_cifs.py:28 msgid "" "\n" " SELinux prevented the http daemon from $ACCESS files stored on a CIFS " "filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 http 守护进程 $ACCESS 保存在 CIFS 文件系统中的文件。\n" " " #: ../src/httpd_use_cifs.py:32 msgid "" "\n" " SELinux prevented the http daemon from $ACCESS files stored on a CIFS " "filesystem.\n" " CIFS (Common Internet File System) is a network filesystem commonly used " "on Windows / Linux\n" " systems.\n" " \n" " The http daemon attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As CIFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured the http daemon to read files from a CIFS " "filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了http 守护进程 $ACCESS 保存在 CIFS 文件系统中的文件。\n" " CIFS(通用网络文件系统)是一个通常在 Windows / Linux 系统中使用的网络文件" "系统。\n" " \n" " http 守护进程后台试图从已经挂载的这种类型的文件操作系统中读取一个或多个文" "件或目录。\n" " 由于 CIFS 文件系统不支持精细 SELinux 标记,所以在此文件系统中的所有文件和" "目录将拥有相同的安全性上下文。\n" " \n" " 如果您没有将 http 守护进程配置为从 CIFS 文件系统中读取文件,这个访问就可" "能是一个 侵尝试信号。\n" " " #: ../src/httpd_use_nfs.py:28 msgid "" "\n" " SELinux prevented the http daemon from $ACCESS files stored on a NFS " "filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 ftp 守护进程 $ACCESS 保存在 NFS 文件系统中的文件。\n" " " #: ../src/httpd_use_nfs.py:32 msgid "" "\n" " SELinux prevented the http daemon from $ACCESS files stored on a NFS " "filesystem.\n" " NFS (Network Filesystem) is a network filesystem commonly used on Unix / " "Linux\n" " systems.\n" " \n" " The http daemon attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As NFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured the http daemon to read files from a NFS " "filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了 ftp 守护进程 $ACCESS 保存在 NFS 文件系统中的文件。\n" " NFS(网络文件系统)是一个通常在 Unix / Linux 中使用的网络文件系统。\n" " \n" " http 守护进程试图从已经挂接的这种类型的文件操作系统中读取一个或多个文件或" "目录。\n" " 由于 NFS 文件系统不支持 fine-grained SELinux 标志,所以此文件系统中的所有" "文件和目录将拥有相同的安全上下文。\n" " \n" " 如果您没有将 http 守护进程配置为从 NFS 文件系统中读取文件,这个访问被记为" "一次入侵尝试信号。\n" " " #: ../src/inetd_bind_ports.py:30 msgid "" "\n" " SELinux has denied the $SOURCE from binding to a network port " "$PORT_NUMBER which does not have an SELinux type associated with it.\n" " If $SOURCE is supposed to be allowed to listen on this port, you can use " "the semanage command to add this port to a inetd_child_port_t type. If you " "think this is the default please file a bug report against the selinux-" "policy package.\n" "If $SOURCE is not supposed\n" " to bind to this port, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 已经拒绝 $SOURCE 绑定到没有相关 SELinux 类型的网络端口 " "$PORT_NUMBER。\n" " 如果本应允许 $SOURCE 在这个端口侦听,您可以使用 semanage 命令将这个端口添" "加为 inetd_child_port_t 类型。如果您认为这是默认设置,请根据 selinux-policy " "软件包在 bug " "report 提交一个文件。\n" " 如果 $SOURCE 本不应该绑定到这个端口,这可能意味着有人在试图侵入网络。\n" " " #: ../src/inetd_bind_ports.py:37 msgid "" "\n" " If you want to allow $SOURCE to bind to this port\n" " semanage port -a -t inetd_child_port_t -p PROTOCOL $PORT_NUMBER\n" " Where PROTOCOL is tcp or udp.\n" " " msgstr "" "\n" " 如果您要允许 $SOURCE 绑定到这个端口,\n" " 请使用 semanage port -a -t PROTOCOL $PORT_NUMBER\n" " 其中 PROTOCOL 是 tcp 或者 udp。\n" " " #: ../src/kernel_modules.py:28 msgid "" "\n" " Your system may be seriously compromised! $SOURCE_PATH tried to modify " "kernel configuration.\n" " " msgstr "" "\n" " 您的系统可能被严重破坏! $SOURCE_PATH 试图修改内核配置。\n" " " #: ../src/kernel_modules.py:32 msgid "" "\n" " SELinux has prevented $SOURCE from modifying $TARGET. This denial \n" " indicates $SOURCE was trying to modify the way the kernel runs or to \n" " actually insert code into the kernel. All applications that need this \n" " access should have already had policy written for them. If a " "compromised \n" " application tries to modify the kernel this AVC will be generated. This " "is a \n" " serious issue. Your system may very well be compromised.\n" " " msgstr "" "\n" " SELinux 已不允许 $SOURCE 修改 $TARGET。\n" " 这个拒绝意味着 $SOURCE 曾试图修改内核运行的方式\n" " 或者在内核这插入编码。所有需要这个访问\n" " 的程序都应该在其中写入了策略。如果被破坏的\n" " 程序试图修改内核就会生成\n" " 这个 AVC。这是一个严重的问题,您的系统可能被严重破坏。\n" " " #: ../src/leaks.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH access to a leaked $TARGET_PATH file " "descriptor.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE 访问泄漏的文件描述符 $TARGET_PATH。\n" " " #: ../src/leaks.py:30 msgid "" "\n" " SELinux denied access requested by the $SOURCE command. It looks like " "this is either a leaked descriptor or $SOURCE output was redirected to a " "file it is not allowed to access. Leaks usually can be ignored since " "SELinux is just closing the leak and reporting the error. The application " "does not use the descriptor, so it will run properly. If this is a " "redirection, you will not get output in the $TARGET_PATH. You should " "generate a bugzilla on selinux-policy, and it will get routed to the " "appropriate package. You can safely ignore this avc.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 命令的请求。看起来可能是描述符泄露,也可能是将 " "$SOURCE 输出重新指向允许访问的文件。泄露一般可忽略,因为 SELinux 关闭泄露并报" "告了这个错误。该程序不使用描述符,因此可正常运行。如果这是一个重新指向,您在 " "$TARGET_PATH 中就不会看到输出。您应该可以根据 selinux-policy 生成一个 " "bugzilla,并被指向适当的软件包。您可以忽略这个 avc。\n" " " #: ../src/leaks.py:34 msgid "" "\n" " You can generate a local policy module to allow this\n" " access - see FAQ\n" " " msgstr "" "\n" " 您可以创建一个本地策略模块来允许这个\n" " 访问 - 请查看 常见问题\n" " " #: ../src/mmap_zero.py:28 msgid "" "\n" " Your system may be seriously compromised! $SOURCE_PATH attempted to mmap " "low kernel memory.\n" " " msgstr "" "\n" " 您的系统可能被严重破坏! $SOURCE_PATH 试图mmap低内核内存。\n" " " #: ../src/mmap_zero.py:32 msgid "" "\n" " SELinux has denied the $SOURCE the ability to mmap low area of the " "kernel \n" " address space. The ability to mmap a low area of the address space, " "as \n" " configured by /proc/sys/kernel/mmap_min_addr. Preventing such " "mappings \n" " helps protect against exploiting null deref bugs in the kernel. All \n" " applications that need this access should have already had policy " "written \n" " for them. If a compromised application tries modify the kernel this " "AVC \n" " would be generated. This is a serious issue. Your system may very well " "be \n" " compromised.\n" " " msgstr "" "\n" " SELinux 不允许 $SOURCE mmap 内核地址的低区域。mmap 地址空间低区域的功能是" "由配置 /proc/sys/kernel/mmap_min_addr 提供的。阻止这类映射可帮助保护内核空 " "deref bug 的问题。所有需要这个访问的程序都应该已被写入相应的策略。如果破坏的" "程序试图修改该内核则会生成这个 AVC。这是一个严重问题,您的系统可能被严重破" "坏。\n" " " #: ../src/mounton.py:28 msgid "" "\n" " SELinux prevented $SOURCE from mounting on the file or directory\n" " \"$TARGET_PATH\" (type \"$TARGET_TYPE\").\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 挂载文件或者目录\n" " \"$TARGET_PATH\" (type \"$TARGET_TYPE\")。\n" " " #: ../src/mounton.py:33 msgid "" "\n" " SELinux prevented $SOURCE from mounting a filesystem on the file\n" " or directory \"$TARGET_PATH\" of type \"$TARGET_TYPE\". By default\n" " SELinux limits the mounting of filesystems to only some files or\n" " directories (those with types that have the mountpoint attribute). The\n" " type \"$TARGET_TYPE\" does not have this attribute. You can change the \n" " label of the file or directory.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE 在类型为 \"$TARGET_TYPE\" 的文件\n" " 或目录 \"$TARGET_PATH\" 中挂载文件系统。默认情况下 SELinux 限制\n" " 文件系统只能挂载在一些文件或目录上(那些具有含挂载点属性类\n" " 型的文件)。类型 \"$TARGET_TYPE\" 不具有这个属性。您可以改变该\n" " 文件或目录的标签。\n" " " #: ../src/mounton.py:42 msgid "" "\n" " Changing the file_context to mnt_t will allow mount to mount the file " "system:\n" " \"chcon -t mnt_t '$TARGET_PATH'.\"\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "mnt_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 将 file_context 改为 mnt_t 可允许您挂载文件系统:\n" " \"chcon -t mnt_t '$TARGET_PATH'.\"\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。\n" "\"semanage fcontext -a -t mnt_t '$TARGET_PATH'\" " #: ../src/named_write_master_zones.py:27 msgid "" "\n" " SELinux is preventing the named daemon from writing to the zone directory" msgstr "" "\n" " SELinux 正在阻止 named 守护进程写入区(zone)目录" #: ../src/named_write_master_zones.py:30 msgid "" "\n" " SELinux has denied the named daemon from writing zone\n" " files. Ordinarily, named is not required to write to these files.\n" " Only secondary servers should be required to write to these\n" " directories. If this machine is not a secondary server, this\n" " could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 named 守护进程写入区文件。通常情况下不需要 named \n" " 写入这些文件。只要求从服务器写入这些文件。\n" " 如果这台机器不是从服务器,这可能是入侵尝试的信号。\n" " " #: ../src/named_write_master_zones.py:38 msgid "" "\n" " If you want named to run as a secondary server and accept zone\n" " transfers you need to turn on the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 named 作为从服务器运行并接受区传送,您需要打开 $BOOLEAN 布尔" "值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/named_write_master_zones.py:55 msgid "Domain Name Service" msgstr "DNS" #: ../src/nfs_export_all_ro.py:26 msgid "" "\n" " SELinux is preventing the nfs daemon from serving r/o local files to " "remote clients.\n" " " msgstr "" "\n" " SELinux 正在阻止 nfs 守护进程为远程客户端提供对本地文件的 r/o 操作。\n" " " #: ../src/nfs_export_all_ro.py:30 msgid "" "\n" " SELinux has preventing the nfs daemon (nfsd) from read files on\n" " the local system. If you have not exported these file systems, this\n" " could signal an intrusion.\n" " " msgstr "" "\n" " SELinux 已经阻止 nfs 守护进程(nfsd)读取本地系统中的文件。如果\n" " 您没有导出任何文件系统,这可能是入侵的信号。\n" " " #: ../src/nfs_export_all_ro.py:36 msgid "" "\n" " If you want to export file systems using nfs you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想使用 nfs 输出文件系统,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\".\n" " " #: ../src/nfs_export_all_rw.py:26 msgid "" "\n" " SELinux is preventing the nfs daemon from allowing remote clients to " "write local files.\n" " " msgstr "" "\n" " SELinux 正在阻止 nfs 守护进程允许远程客户端写入本地文件。\n" " " #: ../src/nfs_export_all_rw.py:30 msgid "" "\n" " SELinux has preventing the nfs daemon (nfsd) from writing files on the " "local system. If you have not exported any file systems (rw), this could " "signal an intrusion. \n" " " msgstr "" "\n" " SELinux 拒绝了 nfd 守护进程 (nfsd) 写入本地系统上的文件。如果\n" " 您没有导出任何文件系统(rw),这可能是入侵的信号。\n" " " #: ../src/nfs_export_all_rw.py:34 msgid "" "\n" " If you want to export writable file systems using nfs you need to turn " "on the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想使用 nfs 输出可写入的文件系统,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"。\n" " " #: ../src/pppd_can_insmod.py:26 msgid "" "\n" " SELinux is preventing the ppp daemon from inserting kernel modules.\n" " " msgstr "" "\n" " SELinux 正在阻止 ppp 守护进程插入内核模块。\n" " " #: ../src/pppd_can_insmod.py:30 msgid "" "\n" " SELinux has denied the Point-to-Point Protocol daemon from\n" " inserting a kernel module. If pppd is not setup to insert kernel\n" " modules, this probably signals a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 PPP 守护进程插入内核模块。如果 pppd 没有被设\n" " 置为插入内核模块,这很可能是入侵尝试的信号。\n" " " #: ../src/pppd_can_insmod.py:36 msgid "" "\n" " If you want ppp to be able to insert kernel modules you need to\n" " turn on the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 ppp 能插入内核模块,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/pppd_can_insmod.py:51 ../src/squid_connect_any.py:51 msgid "Networking" msgstr "网络" #: ../src/prelink_mislabled.py:30 msgid "" "\n" " SELinux denied prelink $ACCESS on $TARGET_PATH.\n" " The prelink program is only allowed to manipulate files that are " "identified as\n" " executables or shared libraries by SELinux. Libraries that get placed " "in\n" " lib directories get labeled by default as a shared library. Similarly,\n" " executables that get placed in a bin or sbin directory get labeled as " "executables by SELinux. However, if these files get installed in other " "directories\n" " they might not get the correct label. If prelink is trying\n" " to manipulate a file that is not a binary or share library this may " "indicate an\n" " intrusion attack. \n" "\n" " " msgstr "" "\n" " SELinux 拒绝了 prelink 到 $TARGET_PATH 的 $ACCESS。\n" " Prelink 只能对由 SELinux 定义为可执行或者共享程序库的文件进行操作。\n" " Lib 目录中的程序库会被默认标记为共享程序库。同样,\n" " Bin 或者 sbin 目录中的可执行文件也会被 SELinux 标记为可执行程序库。但如果" "是在其它目录中安装这些文件,则可能会被错误标记。如果 prelink 正身体对一个非二" "进制或者共享程序库进行操作,则可能意味着一个入侵尝试信号。" #: ../src/prelink_mislabled.py:42 msgid "" "\n" " You can alter the file context by executing \"chcon -t bin_t " "'$TARGET_PATH'\" or\n" " \"chcon -t lib_t '$TARGET_PATH'\" if it is a shared library. If you " "want to make these changes permanent you must execute the semanage command.\n" " \"semanage fcontext -a -t bin_t '$TARGET_PATH'\" or\n" " \"semanage fcontext -a -t lib_t '$TARGET_PATH'\".\n" " If you feel this executable/shared library is in the wrong location " "please file a bug against the package that includes the file. If you feel " "that SELinux should know about this file and label it correctly please file " "a bug against SELinux policy.\n" "\n" " " msgstr "" "\n" " 如果某个文件是共享程序库,您可以执行 \"chcon -t bin_t '$TARGET_PATH'\" 或" "者\n" " \"chcon -t lib_t '$TARGET_PATH'\" 更改其文件上下文。如果您要永久保留这个" "修改,您必须执行 semanage 命令。\n" " \"semanage fcontext -a -t bin_t '$TARGET_PATH'\" 或者\n" " \"semanage fcontext -a -t shlib_t '$TARGET_PATH'\"。\n" " 如果您认为这个可执行/共享程序库的位置有误,请您根据此软件包提交一个 bug " "报告,并将该文件包含在内。如果您认为 SELinux 本应了解并正确为该文件进行标记," "那么请根据 SELinux policy 提交 bug 报告。\n" "\n" " " #: ../src/public_content.py:30 msgid "" "\n" " SELinux denied access to $TARGET_PATH requested by $SOURCE.\n" " $TARGET_PATH has a context used for sharing by a different program. If " "you\n" " would like to share $TARGET_PATH from $SOURCE also, you need to\n" " change its file context to public_content_t. If you did not intend to\n" " allow this access, this could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 请求的对 $TARGET_PATH 的访问。\n" " $TARGET_PATH 具有一个用于被不同程序共享的上下文。如果您想\n" " 让 $SOURCE 也共享 $TARGET_PATH ,您需要将它的文件上下文改\n" " 为 public_content_t。如果您没有打算进行这个访问,这可能是入侵尝试的信" "号。\n" " " #: ../src/public_content.py:38 msgid "" "\n" " You can alter the file context by executing chcon -t public_content_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "public_content_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以执行 executing chcon -t public_content_t '$TARGET_PATH' 来改变文件" "上下文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t public_content_t '$TARGET_PATH'\"" #: ../src/qemu_blk_image.py:30 msgid "" "\n" " SELinux denied qemu access to the block device $TARGET_PATH.\n" " If this is a virtualization image, it needs to be labeled with a " "virtualization file context (virt_image_t). You can relabel $TARGET_PATH to " "be virt_image_t using chcon. You also need to execute semanage fcontext -a -" "t virt_image_t '$TARGET_PATH' to add this\n" " new path to the system defaults. If you did not intend to use " "$TARGET_PATH as a qemu\n" " image it could indicate either a bug or an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 qemu 访问 $TARGET_PATH。\n" " 如果这是一个虚拟映像,它应当有一个虚拟文件上下文标签(virt_image_t)。您" "可以使用 chcon 将 $TARGET_PATH 重新标记为 virt_image_t。您还需要执行 " "semanage fcontext -a -t virt_image_t '$TARGET_PATH' 将这个新路径添加到系统默" "认中。\n" " 如果您没想要使用 $TARGET_PATH 作为 qemu 映像,那么这可能意味着一个 Bug 或" "是入侵尝试的信号。\n" " " #: ../src/qemu_blk_image.py:37 ../src/qemu_file_image.py:40 msgid "" "\n" " You can alter the file context by executing chcon -t virt_image_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "virt_image_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以执行 chcon -t virt_image_t '$TARGET_PATH' 来更改文件上下文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t virt_image_t '$TARGET_PATH'\"" #: ../src/qemu_file_image.py:30 msgid "" "\n" " SELinux denied qemu access to $TARGET_PATH.\n" " If this is a virtualization image, it has to have a file context label " "of\n" " virt_image_t. The system is setup to label image files in directory./var/" "lib/libvirt/images\n" " correctly. We recommend that you copy your image file to /var/lib/" "libvirt/images.\n" " If you really want to have your qemu image files in the current " "directory, you can relabel $TARGET_PATH to be virt_image_t using chcon. You " "also need to execute semanage fcontext -a -t virt_image_t '$TARGET_PATH' to " "add this\n" " new path to the system defaults. If you did not intend to use " "$TARGET_PATH as a qemu\n" " image it could indicate either a bug or an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 qemu 访问 $TARGET_PATH。\n" " 如果这是一个虚拟映像,它应当有一个 virt_image_t 文件上下文标签。\n" " 已经将该系统设置为将目录 ./var/lib/libvirt/images 中的映像文件标记为 " "virt_image_t。\n" " 如果您确实希望将 qemu 映像保存在当前目录下,您可以使用 chcon 将 " "$TARGET_PATH 重新标记为 virt_image_t。您还需要执行 semanage fcontext -a -t " "virt_image_t '$TARGET_PATH' 将这个新路径添加到系统默认中。如果您没想要使用 " "$TARGET_PATH 作为 qemu 映像,那么这可能意味着一个 Bug 或是入侵尝试的信号。\n" " " #: ../src/restorecon.py:35 msgid "" "\n" " SELinux denied access requested by $SOURCE. $TARGET_PATH may\n" " be a mislabeled. $TARGET_PATH default SELinux type is\n" " $MATCHTYPE, but its current type is $TARGET_TYPE. " "Changing\n" " this file back to the default type, may fix your problem.\n" "

\n" " File contexts can be assigned to a file in the following ways.\n" "

    \n" "
  • Files created in a directory receive the file context of the " "parent directory by default.\n" "
  • The SELinux policy might override the default label inherited " "from the parent directory by\n" " specifying a process running in context A which creates a file " "in a directory labeled B\n" " will instead create the file with label C. An example of this " "would be the dhcp client running\n" " with the dhclient_t type and creating a file in the directory /" "etc. This file would normally\n" " receive the etc_t type due to parental inheritance but instead " "the file\n" " is labeled with the net_conf_t type because the SELinux policy " "specifies this.\n" "
  • Users can change the file context on a file using tools such as " "chcon, or restorecon.\n" "
\n" " This file could have been mislabeled either by user error, or if an " "normally confined application\n" " was run under the wrong domain.\n" "

\n" " However, this might also indicate a bug in SELinux because the file " "should not have been labeled\n" " with this type.\n" "

\n" " If you believe this is a bug, please file a bug report against this " "package.\n" " " msgstr "" "\n" " SELlinux 拒绝 $SOURCE 请求的访问。$TARGET_PATH 可能\n" " 被错误标记了。$TARGET_PATH 的默认 SELinux 类型为\n" " $MATCHTYPE,但它目前的类型是 $TARGET_TYPE。将其改回到默认类" "型可能会解决您的问题。\n" "

\n" " 为文件分配文件上下文有以下几种方法:\n" "

    \n" "
  • 在某个目录中生成的文件会默认继承其父目录的文件上下文。\n" "
  • SELinux 策略可能会覆盖从其父目录继承的标签,方法为指定一个在上下" "文 A 中运行的进程在标签为 B 的目录中生成一个文件,那么生成的文件的标签为 C。" "例如:以 dhclient_t 类型运行的 dhcp 客户端在目录 /etc 中生成一个文件。由于继" "承关系,通常这个文件会获得 etc_t 类型标签,但此时该文件会被标记为 net_conf_t " "类型,因为 SELinux 策略是这样指定的。\n" "
  • 用户可以使用类似 chcon 或者 restorecon 的工具更改某个文件的文件上" "下文。\n" "
\n" " 这个文件可能会因为用户错误或者由于限定的应用程序在错误的域中运行而被错误" "标记。\n" "

\n" " 但是这也可能说明是一个 SELinux 中的 bug,因为给文件本不应被标记为这个类" "型。\n" "

\n" " 如果您认为这是一个 bug,那么请根据这个软件包提交一个 bug report。\n" " " #: ../src/restorecon.py:61 msgid "" "\n" " You can restore the default system context to this file by executing " "the\n" " restorecon command. restorecon '$TARGET_PATH', if this file is a " "directory,\n" " you can recursively restore using restorecon -R '$TARGET_PATH'.\n" " " msgstr "" "\n" " 您可以执行 restorecon 命令为这个文件保存默认系统上下文。restorecon " "'$TARGET_PATH',如果这个文件是一个目录,\n" " 您可以使用 restorecon -R '$TARGET_PATH' 进行递归保存。" #: ../src/restorecon.py:92 msgid "Restore Context" msgstr "恢复上下文" #: ../src/rsync_data.py:30 msgid "" "\n" " SELinux denied rsync access to $TARGET_PATH.\n" " If this is a RSYNC repository it has to have a file context label of\n" " rsync_data_t. If you did not intend to use $TARGET_PATH as a rsync " "repository\n" " it could indicate either a bug or it could signal a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 rsync 访问 $TARGET_PATH 。\n" " 如果这是一个 RSYNC 仓库,它必须有一个 rsync_data_t 上下文标签。如果\n" " 您没有打算将 $TARGET_PATH 作为 rsync 仓库,这可能意味着一个 bug 或\n" " 是入侵尝试的信号。\n" " " #: ../src/rsync_data.py:37 msgid "" "\n" " You can alter the file context by executing chcon -R -t rsync_data_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "rsync_data_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您能够通过执行 chcon -R -t rsync_data_t '$TARGET_PATH' 更改文件上下文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t rsync_data_t '$TARGET_PATH'\"\n" " " #: ../src/samba_enable_home_dirs.py:26 msgid "" "\n" " SELinux is preventing the samba daemon from reading users' home " "directories.\n" " " msgstr "" "\n" " SELinux 正在阻止 samba 守护进程读取用户主目录。\n" " " #: ../src/samba_enable_home_dirs.py:30 msgid "" "\n" " SELinux has denied the samba daemon access to users' home\n" " directories. Someone is attempting to access your home directories\n" " via your samba daemon. If you only setup samba to share non-home\n" " directories, this probably signals an intrusion attempt.\n" " For more information on SELinux integration with samba, look at the\n" " samba_selinux man page. (man samba_selinux)\n" " " msgstr "" "\n" " SELinux 拒绝了 samba 守护进程访问用户主目录。有人正试图通过您的 samba 守" "护\n" " 进程访问您的主目录。如果您将 samba 设置成只共享非主目录,这可能是入侵尝" "试\n" " 的信号。更多的关于 SELinux 和 samba 集成的信息,请查看 samba_selinux " "man \n" " page(man samba_selinux) 。\n" " " #: ../src/samba_enable_home_dirs.py:39 msgid "" "\n" " If you want samba to share home directories you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 samba 共享主目录,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/samba_export_all_ro.py:26 msgid "" "\n" " SELinux is preventing the samba daemon from serving r/o local files to " "remote clients.\n" " " msgstr "" "\n" " SELinux 正在阻止 samba 守护进程允许远程客户端对本地文件进行 r/o 操作。\n" " " #: ../src/samba_export_all_ro.py:30 msgid "" "\n" " SELinux has preventing the samba daemon (smbd) from reading files on\n" " the local system. If you have not exported these file systems, this\n" " could signal an intrusion.\n" " " msgstr "" "\n" " SELinux 拒绝了 samba 守护进程 (smbd) 读取本地系统中的文件。如果\n" " 您没有导出任何文件系统,这可能是入侵的信号。\n" " " #: ../src/samba_export_all_ro.py:36 msgid "" "\n" " If you want to export file systems using samba you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想使用 samba 输出文件系统,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"。\n" " " #: ../src/samba_export_all_rw.py:26 msgid "" "\n" " SELinux is preventing the samba daemon from allowing remote clients to " "write local files.\n" " " msgstr "" "\n" " SELinux 正在阻止 samba 守护进程允许远程客户端写入本地文件。\n" " " #: ../src/samba_export_all_rw.py:30 msgid "" "\n" " SELinux has preventing the samba daemon (smbd) from writing files on the " "local system. If you have not exported any file systems (rw), this could " "signal an intrusion. \n" " " msgstr "" "\n" " SELinux 拒绝了 samba 守护进程(smbd)写入本地系统中的文件。\n" " 如果您没有导出任何文件系统(rw),这可能是入侵的信号。\n" " " #: ../src/samba_export_all_rw.py:34 msgid "" "\n" " If you want to export writable file systems using samba you need to turn " "on the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\".\n" " " msgstr "" "\n" " 如果您想使用 samba 输出可写入的文件系统,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"。\n" " " #: ../src/samba_share_nfs.py:26 msgid "" "\n" " SELinux is preventing the samba daemon from reading nfs file systems.\n" " " msgstr "" "\n" " SELinux 正在阻止 samba 守护进程读取 nfs 文件系统。\n" " " #: ../src/samba_share_nfs.py:30 msgid "" "\n" " SELinux has denied the samba daemon access to nfs file\n" " systems. Someone is attempting to access an nfs file system via\n" " your samba daemon. If you did not setup samba to share nfs file\n" " systems, this probably signals an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 samba 守护进程访问 nfs 文件系统。有人正试图\n" " 通过您的 samba 守护进程访问 nfs 文件系统。如果您没有设\n" " 置 samba 共享 nfs 文件系统,这很可能是入侵尝试的信号。\n" " " #: ../src/samba_share_nfs.py:37 msgid "" "\n" " If you want samba to share nfs file systems you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 samba 共享 nfs 文件系统,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/samba_share.py:26 msgid "" "\n" " SELinux is preventing Samba ($SOURCE_PATH) \"$ACCESS\" access to " "$TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 Samba ($SOURCE_PATH) \"$ACCESS\" 访问设备 " "$TARGET_PATH。\n" " " #: ../src/samba_share.py:30 msgid "" "\n" " SELinux denied samba access to $TARGET_PATH.\n" " If you want to share this directory with samba it has to have a file " "context label of\n" " samba_share_t. If you did not intend to use $TARGET_PATH as a samba " "repository\n" " it could indicate either a bug or it could signal a intrusion attempt.\n" "Please refer to 'man samba_selinux' for more information on setting up Samba " "and SELinux. \n" msgstr "" "\n" " SELinux 拒绝了 samba 访问 $TARGET_PATH 。\n" " 如果您想用 samba 共享这个目录,它必须有一个 samba_share_t 上下文标签。\n" "如果您没有打算将 $TARGET_PATH 作为 samba 仓库,这意味着一个 Bug 或是入侵\n" "尝试的信号。\n" "请参考“man samba_selinux”来了解更多搭建 Samba 和 SELinux 的信息。\n" #: ../src/samba_share.py:38 msgid "" "\n" " You can alter the file context by executing chcon -R -t samba_share_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "samba_share_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以通过执行 chcon -R -t samba_share_t '$TARGET_PATH' 更改文件上下" "文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t samba_share_t '$TARGET_PATH'\"" #: ../src/secure_mode_insmod.py:25 msgid "" "\n" " SELinux is preventing the kernel modules from being loaded.\n" " " msgstr "" "\n" " SELinux 正在阻止加载内核模块。\n" " " #: ../src/secure_mode_insmod.py:29 msgid "" "\n" " SELinux has denied kernel module utilities from modifying\n" " kernel modules. This machine is hardened to not allow the kernel to\n" " be modified, except in single user mode. If you did not try to\n" " manage a kernel module, this probably signals an intrusion.\n" " " msgstr "" "\n" " SELinux 拒绝了内核模块实用工具修改内核模块。如果不允许对内核进行修改,\n" " 您的计算机将会是是加固 (harden) 的(单用户模式是个例外)。如果您没有试图" "管理一个内核模块,\n" "这很可能是入侵的信号。\n" " " #: ../src/secure_mode_insmod.py:36 msgid "" "\n" " If you allow the management of the kernel modules on your machine,\n" " turn off the $BOOLEAN boolean: \"setsebool -P\n" " $BOOLEAN=0\".\n" " " msgstr "" "\n" " 如果您想允许对您的机器上的内核模块进行管理,关闭 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=0\".\n" " " #: ../src/secure_mode_insmod.py:52 msgid "Kernel" msgstr "内核" #: ../src/secure_mode_policyload.py:26 msgid "" "\n" " SELinux is preventing the modification of the running policy.\n" " " msgstr "" "\n" " SELinux 正在阻止修改运行中的 SELinux 策略。\n" " " #: ../src/secure_mode_policyload.py:30 msgid "" "\n" " SELinux has denied the management tools from modifying the way the\n" " SELinux policy runs. This machine is hardened, so if you did not run\n" " any SELinux tools, this probably signals an intrusion.\n" " " msgstr "" "\n" " SELinux 拒绝了管理工具修改 SELinux 策略的运行方式。\n" " 您的计算机是有防护的,因此如果您没有运行任何 SELinux 工具,这很可能是入侵" "的信号。\n" " " #: ../src/secure_mode_policyload.py:36 msgid "" "\n" " If you want to modify the way SELinux is running on your machine\n" " you need to bring the machine to single user mode with enforcing\n" " turned off. The turn off the secure_mode_policyload boolean:\n" " \"setsebool -P secure_mode_policyload=0\".\n" " " msgstr "" "\n" " 如果您想要修改 SELinux 在您的计算机上的运行方式,您需要将机器转入单\n" " 用户 (single user) 模式,并关闭强制 (enforcing) 模式。然后关闭 " "secure_mode_policyload boolean 布尔值:\n" " \"setsebool -P secure_mode_policyload=0\" 。\n" " " #: ../src/selinuxpolicy.py:28 msgid "" "\n" " Your system may be seriously compromised!\n" " " msgstr "" "\n" " 您的系统可能被严重破坏!\n" " " #: ../src/selinuxpolicy.py:32 msgid "" "\n" " SELinux has prevented $SOURCE from modifying $TARGET. This denial \n" " indicates $SOURCE was trying to modify the selinux policy " "configuration. \n" " All applications that need this access should have already had policy \n" " written for them. If a compromised application tries to modify the " "SELinux\n" " policy this AVC will be generated. This is a serious issue. Your " "system \n" " may very well be compromised.\n" " " msgstr "" "\n" " SELinux 已阻止 $SOURCE 修改 $TARGET。这个拒绝表明 $SOURCE 曾试图修改 " "selinux 策略配置。所有需要这个访问的程序都应该已经有写入的策略。如果破坏的程" "序试图修改 SELinux 则会生成这个 AVC。这是个严重问题。您的系统可能被严重破" "坏。\n" " " #: ../src/setenforce.py:27 msgid "" "\n" " Your system may be seriously compromised! $SOURCE_PATH tried to modify " "SELinux enforcement.\n" " " msgstr "" "\n" " 您的系统可能被严重破坏! $SOURCE_PATH 试图修改 SELinux enforcement.\n" " " #: ../src/setenforce.py:31 msgid "" "\n" " SELinux has prevented $SOURCE from writing to a file under /selinux.\n" " Files under /selinux control the way SELinux is configured.\n" " All programs that need to write to files under /selinux should have " "already had policy\n" " written for them. If a compromised application tries to turn off " "SELinux\n" " this AVC will be generated. This is a serious issue. Your system may " "very\n" " well be compromised.\n" " " msgstr "" "\n" " SELinux 阻止 $SOURCE 写入 /selinux 中的文件。/selinux 中的文件控制配置 " "SELinux 的方法。所有需要在 /selinux 中写入文件的程序都已经被写入了策略。如果" "破坏的程序试图关闭 SELiux 则会生成这个 AVC。这是个严重问题。您的系统可能被严" "重破坏。\n" " " #: ../src/spamd_enable_home_dirs.py:26 msgid "" "\n" " SELinux is preventing the spamd daemon from reading users' home " "directories.\n" " " msgstr "" "\n" " SELinux 正在阻止 spamd 守护进程读取用户主目录。\n" " " #: ../src/spamd_enable_home_dirs.py:30 msgid "" "\n" " SELinux has denied the spamd daemon access to users' home\n" " directories. Someone is attempting to access your home directories\n" " via your spamd daemon. If you only setup spamd to share non-home\n" " directories, this probably signals an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 spamd 守护进程访问用户主目录。有人正试图通过您的 spamd 守" "护\n" " 进程访问您的主目录。如果您将 spamd 设置成只共享非主目录,这很可能是入侵尝" "试的信号。\n" " " #: ../src/spamd_enable_home_dirs.py:37 msgid "" "\n" " If you want spamd to share home directories you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 spamd 共享主目录,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/squid_connect_any.py:26 msgid "" "\n" " SELinux is preventing the squid daemon from connecting to network port " "$PORT_NUMBER" msgstr "" "\n" " SELinux 正在阻止 squid 守护进程连接到网络端口 $PORT_NUMBER" #: ../src/squid_connect_any.py:29 msgid "" "\n" " SELinux has denied the squid daemon from connecting to\n" " $PORT_NUMBER. By default squid policy is setup to deny squid\n" " connections. If you did not setup squid to network connections,\n" " this could signal a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 squid 守护进程连接到端口 $PORT_NUMBER。默认的\n" " squid 安全策略被设置来拒绝 squid 连接。如果您没有设置 squid \n" " 连接,这可能是入侵尝试的信号。\n" " " #: ../src/squid_connect_any.py:36 msgid "" "\n" " If you want squid to connect to network ports you need to turn on\n" " the $BOOLEAN boolean: \"setsebool -P $BOOLEAN=1\"\n" " " msgstr "" "\n" " 如果您想让 squid 连接到网络端口,您需要打开 $BOOLEAN 布尔值:\n" " \"setsebool -P $BOOLEAN=1\"\n" " " #: ../src/swapfile.py:26 msgid "" "\n" " SELinux is preventing $SOURCE_PATH \"$ACCESS\" to $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 $SOURCE_PATH \"$ACCESS\" $TARGET_PATH。\n" " " #: ../src/swapfile.py:30 msgid "" "\n" " SELinux denied $SOURCE access to $TARGET_PATH.\n" " If this is a swapfile it has to have a file context label of\n" " swapfile_t. If you did not intend to use\n" " $TARGET_PATH as a swapfile it probably indicates a bug, however it could " "also\n" " signal a intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 访问 $TARGET_PATH。如果这是一个交换文\n" " 件,它应当有一个 swapfile_t 文件上下文标签。如果您没有打算使用 " "$TARGET_PATH 做\n" " 交换文件,这很可能意味着一个 Bug,但这也可能是入侵尝试的信号。\n" " " #: ../src/swapfile.py:38 msgid "" "\n" " You can alter the file context by executing chcon -t swapfile_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "swapfile_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以执行 executing chcon -t swapfile_t '$TARGET_PATH' 来改变文件上下" "文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t swapfile_t '$TARGET_PATH'\"" #: ../src/sys_module.py:28 msgid "" "\n" " Your system may be seriously compromised! $SOURCE_PATH tried to load a " "kernel module.\n" " " msgstr "" "\n" " 您的系统可能被严重破坏! $SOURCE_PATH试图装载一个内核模块。\n" " " #: ../src/sys_module.py:32 msgid "" "\n" " SELinux has prevented $SOURCE from loading a kernel module.\n" " All confined programs that need to load kernel modules should have " "already had policy\n" " written for them. If a compromised application \n" " tries to modify the kernel this AVC will be generated. This is a " "serious \n" " issue. Your system may very well be compromised.\n" " " msgstr "" "\n" " SELinux 阻止 $SOURCE 载入内核模块。所有需要载入内核模块的被限制的程序应该" "已经写入了策略。如果破坏的程序要修改内核则会生成这个 AVC。这是个严重问题。您" "的系统可能被严重破坏。\n" " " #: ../src/tftpd_write_content.py:26 msgid "" "\n" " SELinux is preventing the tftp daemon from modify $TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止 tftp 守护进程修改 $TARGET_PATH。\n" " " #: ../src/tftpd_write_content.py:30 msgid "" "\n" " SELinux prevented the tftp daemon from writing to $TARGET_PATH. " "Usually \n" " tftpd is setup only to read content and is not allowed to modify it. " "If\n" " you setup tftpd to modify $TARGET_PATH need to change its label. If " "you \n" " did not setup tftp to modify $TARGET_PATH, this could signal an " "intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 tftp 守护进程写入 $TARGET_PATH。通常是将 tftp 设置为读取内" "容,但不允许修改。如果您将 tftpd 设置为修改 $TARGET_PATH,则需要更改其标签。" "如果您没有将 tftp 设置为修改 $TARGET_PATH,这可能是一个入侵尝试信号。\n" " " #: ../src/tftpd_write_content.py:37 msgid "" "\n" " If you want to change the file context of $TARGET_PATH so that the tftp\n" " daemon can modify it, you need to execute it using
\n" " # semanage fcontext -m tftpdir_rw_t '/tftpboot(/.*)?'\n" "
# restorecon -R -v /tftpboot
\n" " " msgstr "" "\n" " 如果您想要更改 $TARGET_PATH 的文件上下文以让 tftp 守护进程能修改\n" " 它,您需要使用
\n" " # semanage fcontext -m tftpdir_rw_t '/tftpboot(/.*)?'\n" "
# restorecon -R -v /tftpboot
执行它\n" " " #. MATCH #: ../src/tftpd_write_content.py:54 msgid "TFTP" msgstr "TFTP" #: ../src/use_nfs_home_dirs.py:28 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored on a NFS filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE $ACCESS 存放在 NFS 文件系统中的文件。\n" " " #: ../src/use_nfs_home_dirs.py:32 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored on a NFS " "filesystem.\n" " NFS (Network Filesystem) is a network filesystem commonly used on Unix / " "Linux\n" " systems.\n" " \n" " $SOURCE attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As NFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured $SOURCE to read files from a NFS filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE $ACCESS 存放在 NFS 文件系统中的文件。\n" " NFS(网络文件系统)是一个通常在 Unix/Linux 系统中使用的网络文件系统。\n" " \n" " $SOURCE 试图读取一个已挂载的这种类型的文件系统中的一个或多个文件或目录。" "由\n" " 于 NFS 文件系统不支持细密的 (fine-grained) SELinux 标记,该文件系统中的所" "有文件和目录都\n" " 将具有相同的安全上下文。\n" " \n" " 如果您没有将 $SOURCE 配置为读取 NFS 文件系统中的文件,这次访问尝试可能是" "入侵尝试的信号。\n" " " #: ../src/user_tcp_server.py:26 msgid "" "\n" " SELinux is preventing the users from running TCP servers in the " "usedomain.\n" " " msgstr "" "\n" " SELinux 正在阻止用户在 usedomain 中运行 TCP 服务器。\n" " " #: ../src/user_tcp_server.py:30 msgid "" "\n" " SELinux has denied the $SOURCE program from binding to a network port " "$PORT_NUMBER which does not have an SELinux type associated with it.\n" " $SOURCE does not have an SELinux policy defined for it when run by the " "user, so it runs in the users domain. SELinux is currently setup to\n" " deny TCP servers to run within the user domain. If you do not expect " "programs like $SOURCE to bind to a network port, then this could signal\n" " an intrusion attempt. If this system is running as an NIS Client, " "turning on the allow_ypbind boolean may fix the problem.\n" " setsebool -P allow_ypbind=1.\n" " " msgstr "" "\n" " SELinux 拒绝了 $SOURCE 程序绑定到到没有 SELinux 类型与之关联的网络端口 " "$PORT_NUMBER。\n" " 如果用户在运行 $SOURCE 时它没有为其定义的 SELinux 策略,那么它会在用户域" "中运行。\n" "目前是将 SELinux 设定为拒绝在用户域中运行 TCP 服务器。如果类似 $SOURCE 的程序" "本不应该绑定到网络端口,那么这可能就是入侵尝试的信号。如果这个系统正作为 NIS " "客户端运行,打开 allow_ypbind 布尔值有可能解决这个问题。\n" " setsebool -P allow_ypbind=1。" #: ../src/user_tcp_server.py:38 msgid "" "\n" " If you want to allow user programs to run as TCP Servers, you can turn " "on the user_tcp_server boolean, by executing:\n" " setsebool -P $BOOLEAN=1\n" " " msgstr "" "\n" " 如果您想允许用户程序作为 TCP 服务器运行,您可以打开 user_tcp_server 布尔" "值,操作如下:\n" " setsebool -P $BOOLEAN=1" #: ../src/use_samba_home_dirs.py:28 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored on a Windows SMB/" "CIFS (Samba) filesytem.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE $ACCESS 存放在 Windows SMB/CIFS(Samba)文件系统中" "的文件。\n" " " #: ../src/use_samba_home_dirs.py:32 msgid "" "\n" " SELinux prevented $SOURCE from $ACCESS files stored on a Windows SMB/" "CIFS (Samba) filesystem.\n" " CIFS is a network filesystem commonly used on Windows systems.\n" " \n" " $SOURCE attempted to read one or more files or directories from\n" " a mounted filesystem of this type. As CIFS filesystems do not support\n" " fine-grained SELinux labeling, all files and directories in the\n" " filesystem will have the same security context.\n" " \n" " If you have not configured $SOURCE to read files from a CIFS filesystem\n" " this access attempt could signal an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 阻止了 $SOURCE $ACCESS 存放在一个 Windows SMB/CIFS(Samba)文件系" "统中的文件。\n" " CIFS 是一种在 Windows 系统中通常使用的网络文件系统。\n" " \n" " $SOURCE 试图读取一个已挂载的这种类型的文件系统中的一个或多个文件或目录。" "由\n" " 于 CIFS 文件系统不支持细粒的 SELinux 标记,它上面的所有文件和目录都\n" " 将具有相同的安全上下文。\n" " \n" " 如果您没有将 $SOURCE 配置为读取 CIFS 文件系统中的文件,这次访问尝试可能" "是\n" " 入侵尝试的信号。\n" " " #: ../src/vbetool.py:29 msgid "" "\n" " SELinux has prevented vbetool from performing an unsafe memory " "operation.\n" " " msgstr "" "\n" " SELinux 阻止了 vbetool 执行一项不安全的内存操作。\n" " " #: ../src/vbetool.py:33 msgid "" "\n" "SELinux denied an operation requested by $SOURCE, a program used\n" "to alter video hardware state. This program is known to use\n" "an unsafe operation on system memory but so are a number of\n" "malware/exploit programs which masquerade as vbetool. This tool is used " "to \n" "reset video state when a machine resumes from a suspend. If your machine \n" "is not resuming properly your only choice is to allow this\n" "operation and reduce your system security against such malware.\n" "\n" " " msgstr "" "\n" "SELinux 阻止了由 $SOURCE 请求的一次操作,它是用于改变视频硬件状态的程序。已知" "此程序对系统内存采用不安全的操作,但是大量伪装成 vbetool 的恶意/溢出程序也是" "如此。此工具用于当机器从挂起状态中恢复工作时重置视频状态。如果您的机器没有很" "好地恢复的话,您唯一的选择是允许此操作并降低您系统面对此类恶意软件的安全" "度。\n" "\n" " " #: ../src/vbetool.py:44 ../src/wine.py:55 msgid "" "\n" "If you decide to continue to run the program in question you will need\n" "to allow this operation. This can be done on the command line by\n" "executing:\n" "\n" "# setsebool -P mmap_low_allowed 1\n" msgstr "" "\n" "如果您想继续运行正在考虑的程序,您必须允许此操作。要允许就在命令行上执行:\n" "\n" "# setsebool -P mmap_low_allowed 1\n" #: ../src/vbetool.py:67 ../src/wine.py:78 msgid "Turn off memory protection" msgstr "关闭内存保护" #: ../src/wine.py:30 msgid "" "\n" " SELinux has prevented wine from performing an unsafe memory operation.\n" " " msgstr "" "\n" " SELinux 阻止了 wine 执行一项不安全的内存操作。\n" " " #: ../src/wine.py:34 msgid "" "\n" "SELinux denied an operation requested by wine-preloader, a program used\n" "to run Windows applications under Linux. This program is known to use\n" "an unsafe operation on system memory but so are a number of\n" "malware/exploit programs which masquerade as wine. If you were\n" "attempting to run a Windows program your only choices are to allow this\n" "operation and reduce your system security against such malware or to\n" "refrain from running Windows applications under Linux. If you were not\n" "attempting to run a Windows application this indicates you are likely\n" "being attacked by some for of malware or program trying to exploit your\n" "system for nefarious purposes.\n" "\n" "Please refer to \n" "\n" "http://wiki.winehq.org/PreloaderPageZeroProblem\n" "\n" "Which outlines the other problems wine encounters due to its unsafe use\n" "of memory and solutions to those problems.\n" "\n" " " msgstr "" "\n" "SELinux阻止了一项由 wine-preloader 请求的操作,它是用来在Linux下运行 " "Windows\n" "应用程序的程序。已知此程序会对系统内存采用不安全的操作,但大量伪装成 wine 的" "恶意/\n" "溢出程序也是如此。如果您曾尝试运行 Windows 程序,您只有选择允许此操作并降低您" "的\n" "系统面对此类恶意软件时的安全度,或避免在Linux下运行 Windows 应用程序。如果您" "不曾\n" "尝试运行Windows 应用程序,这说明您很可能被一些恶意软件或为了不法目的尝试剥削" "您系\n" "统的程序的攻击。\n" "\n" "请参考:\n" "\n" "http://wiki.winehq.org/PreloaderPageZeroProblem\n" "\n" "它概述了 wine 因其不安全的内存使用而遇到的其他问题以及解决方案。" #: ../src/xen_image.py:26 msgid "" "\n" " SELinux is preventing xen ($SOURCE_PATH) \"$ACCESS\" access to " "$TARGET_PATH.\n" " " msgstr "" "\n" " SELinux 正在阻止xen ($SOURCE_PATH) \"$ACCESS\" 访问设备 $TARGET_PATH。\n" " " #: ../src/xen_image.py:30 msgid "" "\n" " SELinux denied xen access to $TARGET_PATH.\n" " If this is a XEN image, it has to have a file context label of\n" " xen_image_t. The system is setup to label image files in directory /var/" "lib/xen/images\n" " correctly. We recommend that you copy your image file to /var/lib/xen/" "images.\n" " If you really want to have your xen image files in the current " "directory, you can relabel $TARGET_PATH to be xen_image_t using chcon. You " "also need to execute semanage fcontext -a -t xen_image_t '$TARGET_PATH' to " "add this\n" " new path to the system defaults. If you did not intend to use " "$TARGET_PATH as a xen\n" " image it could indicate either a bug or an intrusion attempt.\n" " " msgstr "" "\n" " SELinux 拒绝了 xen 访问 $TARGET_PATH。\n" " 如果这是一个 XEN 映像,它应当有一个 xen_image_t 文件上下文标签。\n" " 已经将该系统设置为在目录 /var/lib/xen/images 中标记映像文件\n" " 如果您确实希望将 xen 映像保存在当前目录下,您可以使用 chcon 将 " "$TARGET_PATH 重新标记为 xen_image_t。您还需要执行 semanage fcontext -a -t " "xen_image_t '$TARGET_PATH' 将这个新路径添加到系统默认中。如果您没想要使用 " "$TARGET_PATH 作为 xen 映像,那么这可能意味着一个 Bug 或是入侵尝试的信号。\n" " " #: ../src/xen_image.py:40 msgid "" "\n" " You can alter the file context by executing chcon -t xen_image_t " "'$TARGET_PATH'\n" " You must also change the default file context files on the system in " "order to preserve them even on a full relabel. \"semanage fcontext -a -t " "xen_image_t '$TARGET_PATH'\"\n" " " msgstr "" "\n" " 您可以执行 chcon -t xen_image_t '$TARGET_PATH' 来更改文件上下文。\n" " 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它们。" "\"semanage fcontext -a -t xen_image_t '$TARGET_PATH'\"" #~ msgid "" #~ "\n" #~ " SELinux prevented $SOURCE from using the terminal $TARGET_PATH.\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 阻止了 $SOURCE 使用终端 $TARGET_PATH。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux prevented $SOURCE from using the terminal $TARGET_PATH.\n" #~ " In most cases daemons do not need to interact with the terminal, so " #~ "usually\n" #~ " these avc messages can be ignored. All of the confined daemons " #~ "should\n" #~ " have dontaudit rules regarding using the terminal. Please file a " #~ "bug\n" #~ " report against this selinux-policy. If you would like to allow all\n" #~ " daemons to interact with the terminal, you can turn on the $BOOLEAN " #~ "boolean.\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 阻止 $SOURCE 使用终端 $TARGET_PATH。\n" #~ " 在多数情况下,守护进程不需要和终端进行交互工作,因此通常\n" #~ " 这些 avc 信息可以被忽略。所有受限制的守护进程都应该\n" #~ " 有关于使用终端的 dontaudit 规则。请填写一个 bug \n" #~ " 报告 来反映这个 selinux 策略。如果您希望允许所有的\n" #~ " 守护进程可以和终端进行交互工作,您可以打开 $BOOLEAN 布尔值。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing $SOURCE from changing a writable memory segment " #~ "executable.\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE 将内存从 writable 改变为 executable 的操" #~ "作。\n" #~ " " #, fuzzy #~ msgid "" #~ "\n" #~ " The $SOURCE application attempted to change the access protection\n" #~ " of memory (e.g., allocated using malloc). This is a potential\n" #~ " security problem. Applications should not be doing this. " #~ "Applications\n" #~ " are sometimes coded incorrectly and request this permission. The\n" #~ " SELinux " #~ "Memory Protection Tests\n" #~ " web page explains how to remove this requirement. If $SOURCE does " #~ "not work and you\n" #~ " need it to work, you can configure SELinux temporarily to allow this\n" #~ " access until the application is fixed. Please file a bug report " #~ "against \n" #~ "this package.\n" #~ " " #~ msgstr "" #~ "\n" #~ " $SOURCE 应用程序试图改变受访问保护的内存(例如,使用malloc分配内" #~ "存)。\n" #~ " 这有潜在的安全问题。应用程序不应该这样做。有时候应用程序编码不正确会有" #~ "这样的请求。\n" #~ " SELinux " #~ "内存保护测试\n" #~ " 页面说明怎样移除这个请求。如果$SOURCE 无法工作而您需要它工作,\n" #~ " 您可以配置 SELinux 临时允许这个访问直到修复了应用程序。\n" #~ " 请生成一份关于这个软件包的错误\n" #~ " 报告 。\n" #~ " " #~ msgid "" #~ "\n" #~ " If you trust $SOURCE to run correctly, you can change the context\n" #~ " of the executable to execmem_exec_t.\n" #~ " \"chcon -t execmem_exec_t '$SOURCE_PATH'\".\n" #~ " You must also change the default file context files on the system in " #~ "order to preserve them even on a full relabel. \"semanage fcontext -a -t " #~ "execmem_exec_t '$SOURCE_PATH'\"\n" #~ " " #~ msgstr "" #~ "\n" #~ " 如果您确信 $SOURCE 正确运行, 您可以将 executable 的上下文\n" #~ " 改为 execmem_exec_t。\n" #~ " \"chcon -t execmem_exec_t '$SOURCE_PATH'\"。\n" #~ " 您还必须在系统中修改默认文件上下文文件以便在完全重新标记后保留它" #~ "们。 您还必须在系统中更改默认文件上下文文件以便在完全重新标记后保留它" #~ "们。\"semanage fcontext -a -t execmem_exec_t '$SOURCE_PATH'\"\n" #~ " " #, fuzzy #~ msgid "" #~ "\n" #~ " Your system may be seriously compromised! $SOURCE tried to modify " #~ "SELinux configuration.\n" #~ " " #~ msgstr "" #~ "\n" #~ " 您的系统可能被严重破坏!\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing the $SOURCE_PATH from executing potentially " #~ "mislabeled files $TARGET_PATH ($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE_PATH 执行可能错误标记的文件 $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing $SOURCE ($SOURCE_TYPE) \"$ACCESS\" to " #~ "$TARGET_PATH ($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE($SOURCE_TYPE) \"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " You can generate a local policy module to allow this\n" #~ " access - see FAQ\n" #~ " Please file a bug report\n" #~ " against this package.\n" #~ " " #~ msgstr "" #~ "\n" #~ " 您可以创建一个本地策略模块来允许这个\n" #~ " 访问 - 参阅 FAQ\n" #~ " 请填写一个 错误报告\n" #~ " 来反映这个软件包的问题。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing access to files with the default label, " #~ "default_t.\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止访问带有默认标签 default_t 的文件。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing the $SOURCE from using potentially mislabeled " #~ "files $TARGET_PATH ($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE 使用错误标记的文件 $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing $SOURCE ($SOURCE_TYPE) \"$ACCESS\" $TARGET_PATH " #~ "($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE($SOURCE_TYPE) \"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing $SOURCE ($SOURCE_TYPE) \"$ACCESS\" to " #~ "$TARGET_PATH ($TARGET_TYPE).\n" #~ " $TARGET_TYPE is a base type for files/directories and few confined " #~ "processes are allowed to modify. These denials usually indicate " #~ "mislabeled files. If this is a standard file/directory that $SOURCE " #~ "should be able to modify, then this is probably a bug in policy. Please " #~ "file a bug report. If $SOURCE should not be modifying $TARGET_PATH, this " #~ "might indicate a security violation, you need to contact your security " #~ "administrator and report this issue.\n" #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE($SOURCE_TYPE) \"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ "$TARGET_TYPE 是文件/目录的基础类型,且只有几个进程可对其进行修改。这些拒绝" #~ "通常表示有错误标记的文件。如果这是一个 $SOURCE 应该可以修改的标准文件/目" #~ "录,那么这可能是在策略中有一个 bug。请提交 bug 报告。如果 $SOURCE 不应该修" #~ "改 $TARGET_PATH,这可能就是表示有严重的问题,您需要联络您的安全管理员并报" #~ "告这个问题。\n" #~ msgid "" #~ "\n" #~ " If you want allow $SOURCE to use $TARGET_PATH you must tell SELinux " #~ "about it by changing the labels. Execute the following commands:
\n" #~ " # semanage fcontext -t FILE_TYPE '$TARGET_PATH%s' \n" #~ "
where FILE_TYPE is one of the following: %s.\n" #~ "
# restorecon -v '$TARGET_PATH%s'\n" #~ " " #~ msgstr "" #~ "\n" #~ " 如果您想要允许 $SOURCE 使用 $TARGET_PATH,您必须修改标签来告知 " #~ "SELinux。请执行以下命令:
\n" #~ " # semanage fcontext -t FILE_TYPE '$TARGET_PATH%s' \n" #~ "
其中 FILE_TYPE 是以下之一:%s。\n" #~ "
# restorecon -v '$TARGET_PATH%s'\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing $SOURCE ($SOURCE_TYPE) \"$ACCESS\" on " #~ "$TARGET_PATH ($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 $SOURCE($SOURCE_TYPE) \"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。" #~ msgid "" #~ "\n" #~ " SELinux is preventing qemu ($SOURCE) \"$ACCESS\" to $TARGET_PATH " #~ "($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 qemu($SOURCE)\"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing rsync ($SOURCE) \"$ACCESS\" to $TARGET_PATH " #~ "($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 rsync($SOURCE) \"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing samba ($SOURCE) \"$ACCESS\" to $TARGET_PATH " #~ "($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 samba($SOURCE)\"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " " #~ msgid "" #~ "\n" #~ " SELinux is preventing xen ($SOURCE) \"$ACCESS\" to $TARGET_PATH " #~ "($TARGET_TYPE).\n" #~ " " #~ msgstr "" #~ "\n" #~ " SELinux 正在阻止 xen($SOURCE)\"$ACCESS\" $TARGET_PATH" #~ "($TARGET_TYPE)。\n" #~ " "