[lfs-fr] r6025 - in trunk/blfs: . postlfs/security traduc/commits

myou72 at orange.fr myou72 at orange.fr
Ven 18 Avr 04:10:31 PDT 2014


Author: myou72
Date: 2014-04-18 13:10:31 +0200 (Fri, 18 Apr 2014)
New Revision: 6025

Added:
   trunk/blfs/traduc/commits/r12958.txt
Modified:
   trunk/blfs/general.ent
   trunk/blfs/postlfs/security/stunnel.xml
Log:
[BLFS-EN] r12958.txt

Modified: trunk/blfs/general.ent
===================================================================
--- trunk/blfs/general.ent	2014-04-18 11:08:51 UTC (rev 6024)
+++ trunk/blfs/general.ent	2014-04-18 11:10:31 UTC (rev 6025)
@@ -126,7 +126,7 @@
 <!ENTITY polkit-version               "0.112">
 <!ENTITY shadow-version               "4.1.5.1">
 <!ENTITY ssh-askpass-version          "&openssh-version;">
-<!ENTITY stunnel-version              "4.56">
+<!ENTITY stunnel-version              "5.00">
 <!ENTITY sudo-version                 "1.8.10p2">
 <!ENTITY tripwire-version             "2.4.2.2">
 <!ENTITY fuse-version                 "2.9.3">

Modified: trunk/blfs/postlfs/security/stunnel.xml
===================================================================
--- trunk/blfs/postlfs/security/stunnel.xml	2014-04-18 11:08:51 UTC (rev 6024)
+++ trunk/blfs/postlfs/security/stunnel.xml	2014-04-18 11:10:31 UTC (rev 6025)
@@ -5,10 +5,10 @@
   %general-entities;
   <!ENTITY stunnel-download-http "http://mirrors.zerg.biz/stunnel/stunnel-&stunnel-version;.tar.gz">
   <!ENTITY stunnel-download-ftp  "ftp://ftp.stunnel.org/stunnel/stunnel-&stunnel-version;.tar.gz">
-  <!ENTITY stunnel-md5sum        "ac4c4a30bd7a55b6687cbd62d864054c">
-  <!ENTITY stunnel-size          "532 Ko">
-  <!ENTITY stunnel-buildsize     "6.0 Mo">
-  <!ENTITY stunnel-time          "0.2 SBU">
+  <!ENTITY stunnel-md5sum        "4f00fd0faf99e3c9cf258a19dd83d14a">
+  <!ENTITY stunnel-size          "580 Ko">
+  <!ENTITY stunnel-buildsize     "6.2 Mo">
+  <!ENTITY stunnel-time          "0.1 SBU">
 ]>
 <sect1 id="stunnel" xreflabel="Stunnel-&stunnel-version;">
   <?dbhtml filename="stunnel.html"?>
@@ -68,8 +68,7 @@
     tant qu'utilisateur <systemitem class="username">root</systemitem> :</para>
 <screen role="root">
 <userinput>groupadd -g 51 stunnel &&
-useradd -c "stunnel Daemon" -d /var/lib/stunnel \
-        -g stunnel -s /bin/false -u 51 stunnel</userinput>
+useradd -c "stunnel Daemon" -d /var/lib/stunnel         -g stunnel -s /bin/false -u 51 stunnel</userinput>
 </screen>
     <note>
       <para>Un certificat SSL signé et une clé privée sont nécessaires pour lancer
@@ -96,10 +95,7 @@
     <para>Installez <application>Stunnel</application> en lançant les commandes
     suivantes :</para>
 <screen>
-<userinput>./configure --prefix=/usr \
-            --sysconfdir=/etc \
-            --localstatedir=/var \
-            --disable-fips &&
+<userinput>./configure --prefix=/usr             --sysconfdir=/etc             --localstatedir=/var             --disable-fips &&
 make</userinput>
 </screen>
     <para>Ce paquet n'est pas fourni avec une suite de tests.</para>

Added: trunk/blfs/traduc/commits/r12958.txt
===================================================================
--- trunk/blfs/traduc/commits/r12958.txt	                        (rev 0)
+++ trunk/blfs/traduc/commits/r12958.txt	2014-04-18 11:10:31 UTC (rev 6025)
@@ -0,0 +1,127 @@
+Révision 12958
+
+fichiers modifiés :
+   introduction/welcome/changelog.xml
+   postlfs/security/stunnel.xml
+   general.ent
+
+Log :
+Update to stunnel-5.00
+
+Le robot a traité 40 % du commit anglais
+Index: introduction/welcome/changelog.xml
+===================================================================
+--- introduction/welcome/changelog.xml	(révision 12957)
++++ introduction/welcome/changelog.xml	(révision 12958)
+@@ -48,6 +48,10 @@
+       <para>April 15th, 2014</para>
+       <itemizedlist>
+        <listitem>
++          <para>[bdubbs] - stunnel-5.00. Fixes
++          <ulink url="&blfs-ticket-root;4770">#4770</ulink>.</para>
++        </listitem>
++       <listitem>
+           <para>[fernando] - xvid-1.3.3. Fixes
+           <ulink url="&blfs-ticket-root;4948">#4948</ulink>.</para>
+         </listitem>
+
+Index: postlfs/security/stunnel.xml
+===================================================================
+--- postlfs/security/stunnel.xml	(révision 12957)
++++ postlfs/security/stunnel.xml	(révision 12958)
+@@ -62,19 +62,18 @@
+      <xref linkend="openssl"/>
+    </para>
+ 
++    <bridgehead renderas="sect4">Optional</bridgehead>
++    <para role="optional">
++      <ulink url="ftp://ftp.porcupine.org/pub/security/">tcpwrappers</ulink>
++    </para>
+     <para condition="html" role="usernotes">User Notes:
+     <ulink url="&blfs-wiki;/stunnel"/></para>
+ 
+@@ -93,15 +92,13 @@
+      signed SSL Certificate you wish to use, copy it to
+       <filename>/etc/stunnel/stunnel.pem</filename> before starting the build
+       (ensure only <systemitem class="username">root</systemitem> has read and
+-write access), otherwise you will be
+-prompted to create one during the installation process. The
+-<filename class="extension">.pem</filename> file must be formatted as
+-shown below:</para>
++      write access).  The <filename class="extension">.pem</filename> file must
++      be formatted as shown below:</para>
+ 
+ <screen><literal>-----BEGIN PRIVATE KEY-----
+ <replaceable><many encrypted lines of private key></replaceable>
+@@ -119,8 +116,7 @@
+ 
+ <screen><userinput>./configure --prefix=/usr \
+             --sysconfdir=/etc \
+---localstatedir=/var \
+---disable-fips &&
++            --localstatedir=/var &&
+ make</userinput></screen>
+ 
+     <para>This package does not come with a test suite.</para>
+@@ -129,27 +125,30 @@
+ 
+ <screen role="root"><userinput>make docdir=/usr/share/doc/stunnel-&stunnel-version; install</userinput></screen>
+ 
++    <para>To create the <filename>stunnel.pem</filename> in the
++    <filename class="directory">/etc/stunnel</filename> directory, 
++    you need to create one.   The following command prompts you
++    for the necessary information. Ensure you reply to the</para>
++    
++<screen><prompt>Common Name (FQDN of your server) [localhost]:</prompt></screen>
++    <para>prompt with the name or IP address you will be using
++    to access the service(s).</para>
++    <para>To generate a certificate, as the 
++    <systemitem class="username">root</systemitem> user, run:</para>
++<screen role="root"><userinput>make cert</userinput></screen>
+   </sect2>
+ 
+   <sect2 role="commands">
+     <title>Command Explanations</title>
+ 
+-<para><parameter>--disable-fips</parameter>: This switch disables FIPS support
+-which will cause <application>Stunnel</application> to fail to start if
+-it is enabled.</para>
+     <para><command>make docdir=... install</command>: This command installs the
+     package, changes the documentation installation directory to standard
+-naming conventions and, if you did not copy an
+-<filename>stunnel.pem</filename> file to the
+-<filename class="directory">/etc/stunnel</filename> directory, prompts you
+-for the necessary information to create one. Ensure you reply to the</para>
++    naming conventions.</para>
+ 
+-<screen><prompt>Common Name (FQDN of your server) [localhost]:</prompt></screen>
+-<para>prompt with the name or IP address you will be using
+-to access the service(s).</para>
+   </sect2>
+ 
+   <sect2 role="configuration">
+@@ -184,13 +183,26 @@
+ <screen role="root"><userinput>cat >/etc/stunnel/stunnel.conf << "EOF" &&
+ <literal>; File: /etc/stunnel/stunnel.conf
+ 
++; Note: The pid and output locations are relative to the chroot location.
+ pid    = /run/stunnel.pid
+ chroot = /var/lib/stunnel
+ client = no
+@@     @@
+ setgid = stunnel
+cert   = /etc/stunnel/stunnel.pem
+ 
++;debug = 7
++;output = stunnel.log
++;[https]
++;accept  = 443
++;connect = 80
++;; "TIMEOUTclose = 0" is a workaround for a design flaw in Microsoft SSL
++;; Microsoft implementations do not use SSL close-notify alert and thus
++;; they are vulnerable to truncation attacks
++;TIMEOUTclose = 0</literal>
+ EOF
+ chmod -v 644 /etc/stunnel/stunnel.conf</userinput></screen>
+ 
+




More information about the lfs-traducfr mailing list