r472 - community/trunk/SELinux_User_Guide/ru-RU
transif at fedoraproject.org
transif at fedoraproject.org
Wed Aug 4 06:02:58 UTC 2010
Author: transif
Date: 2010-08-04 06:02:57 +0000 (Wed, 04 Aug 2010)
New Revision: 472
Modified:
community/trunk/SELinux_User_Guide/ru-RU/Contexts_and_Attributes.po
Log:
l10n: Updates to Russian (ru) translation
Transmitted-via: Transifex (translate.fedoraproject.org)
Modified: community/trunk/SELinux_User_Guide/ru-RU/Contexts_and_Attributes.po
===================================================================
--- community/trunk/SELinux_User_Guide/ru-RU/Contexts_and_Attributes.po 2010-07-29 18:04:34 UTC (rev 471)
+++ community/trunk/SELinux_User_Guide/ru-RU/Contexts_and_Attributes.po 2010-08-04 06:02:57 UTC (rev 472)
@@ -1,382 +1,228 @@
# SOME DESCRIPTIVE TITLE.
# FIRST AUTHOR <EMAIL at ADDRESS>, YEAR.
#
-#, fuzzy
msgid ""
msgstr ""
-"Project-Id-Version: PACKAGE VERSION\n"
+"Project-Id-Version: SELinux User Guide\n"
"Report-Msgid-Bugs-To: http://bugs.kde.org\n"
"POT-Creation-Date: 2010-04-15T00:19:31\n"
-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
-"Last-Translator: FULL NAME <EMAIL at ADDRESS>\n"
-"Language-Team: LANGUAGE <kde-i18n-doc at kde.org>\n"
+"PO-Revision-Date: 2010-08-04 10:43+0500\n"
+"Last-Translator: Alexey Cicin <daydrim at gmail.com>\n"
+"Language-Team: trans-ru <trans-ru at lists.fedoraproject.org>\n"
"MIME-Version: 1.0\n"
-"Content-Type: application/x-xml2pot; charset=UTF-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Poedit-Language: Russian\n"
+"X-Poedit-Country: RUSSIAN FEDERATION\n"
+"X-Poedit-SourceCharset: utf-8\n"
#. Tag: title
#, no-c-format
msgid "SELinux Contexts"
-msgstr ""
+msgstr "ÐонÑекÑÑÑ SELinux"
#. Tag: para
#, no-c-format
-msgid ""
-"Processes and files are labeled with an SELinux context that contains "
-"additional information, such as an SELinux user, role, type, and, "
-"optionally, a level. When running SELinux, all of this information is used "
-"to make access control decisions. In Fedora, SELinux provides a combination "
-"of Role-Based Access Control (RBAC), <trademark class=\"registered\">Type "
-"Enforcement</trademark> (TE), and, optionally, Multi-Level Security (MLS)."
-msgstr ""
+msgid "Processes and files are labeled with an SELinux context that contains additional information, such as an SELinux user, role, type, and, optionally, a level. When running SELinux, all of this information is used to make access control decisions. In Fedora, SELinux provides a combination of Role-Based Access Control (RBAC), <trademark class=\"registered\">Type Enforcement</trademark> (TE), and, optionally, Multi-Level Security (MLS)."
+msgstr "ÐÑоÑеÑÑÑ Ð¸ ÑÐ°Ð¹Ð»Ñ Ð¼Ð°ÑкиÑÑÑÑÑÑ Ð¼ÐµÑками - конÑекÑÑом SELinux, коÑоÑÑй ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑиÑ: полÑзоваÑÐµÐ»Ñ SELinux, ÑолÑ, Ñип и ÑÑÐ¾Ð²ÐµÐ½Ñ (опÑионалÑно). Ðогда SELinux вклÑÑен, вÑÑ ÑÑа инÑоÑмаÑÐ¸Ñ Ð¸ÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑинÑÑÐ¸Ñ ÑеÑÐµÐ½Ð¸Ñ Ð¾ пÑедоÑÑавлении доÑÑÑпа. Ð Fedora, SELinux пÑедоÑÑавлÑÐµÑ ÑоÑеÑание Ñолевого ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑÑпом (Role-Based Access Control (RBAC), <trademark class=\"registered\">Type Enforcement</trademark> (TE), и опÑиаоналÑно многоÑÑовневой модели безопаÑноÑÑи, Multi-Level Security (MLS)."
#. Tag: para
#, no-c-format
-msgid ""
-"The following is an example showing SELinux context. SELinux contexts are "
-"used on processes, Linux users, and files, on Linux operating systems that "
-"run SELinux. Use the <command>ls -Z</command> command to view the SELinux "
-"context of files and directories:"
-msgstr ""
+msgid "The following is an example showing SELinux context. SELinux contexts are used on processes, Linux users, and files, on Linux operating systems that run SELinux. Use the <command>ls -Z</command> command to view the SELinux context of files and directories:"
+msgstr "Ð ÑледÑÑÑем пÑимеÑе показÑваеÑÑÑ ÐºÐ¾Ð½ÑÐµÐºÑ SELinux. ÐонÑекÑÑ SELinux иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑоÑеÑÑов, полÑзоваÑелей Linux и Ñайлов в опеÑаÑионной ÑиÑÑеме Linux, запÑÑенной Ñ SELinux. ÐÑполÑзÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>ls -Z</command> можно ÑвидеÑÑ ÐºÐ¾Ð½ÑекÑÑ SELinux Ð´Ð»Ñ Ñайлов и диÑекÑоÑий:"
#. Tag: para
#, no-c-format
-msgid ""
-"SELinux contexts follow the <emphasis>SELinux user:role:type:level</"
-"emphasis> syntax:"
-msgstr ""
+msgid "SELinux contexts follow the <emphasis>SELinux user:role:type:level</emphasis> syntax:"
+msgstr "РконÑекÑÑе SELinux иÑполÑзÑеÑÑÑ ÑледÑÑÑий ÑинÑакÑÐ¸Ñ <emphasis>SELinux user:role:type:level</emphasis>:"
#. Tag: term
#, no-c-format
msgid "<emphasis>SELinux user</emphasis>"
-msgstr ""
+msgstr "<emphasis>полÑзоваÑÐµÐ»Ñ SELinux</emphasis>"
#. Tag: para
#, no-c-format
-msgid ""
-"The SELinux user identity is an identity known to the policy that is "
-"authorized for a specific set of roles, and for a specific MLS range. Each "
-"Linux user is mapped to an SELinux user via SELinux policy. This allows "
-"Linux users to inherit the restrictions placed on SELinux users. The mapped "
-"SELinux user identity is used in the SELinux context for processes in that "
-"session, in order to define what roles and levels they can enter. Run the "
-"<command>semanage login -l</command> command as the Linux root user to view "
-"a list of mappings between SELinux and Linux user accounts:"
-msgstr ""
+msgid "The SELinux user identity is an identity known to the policy that is authorized for a specific set of roles, and for a specific MLS range. Each Linux user is mapped to an SELinux user via SELinux policy. This allows Linux users to inherit the restrictions placed on SELinux users. The mapped SELinux user identity is used in the SELinux context for processes in that session, in order to define what roles and levels they can enter. Run the <command>semanage login -l</command> command as the Linux root user to view a list of mappings between SELinux and Linux user accounts:"
+msgstr "ÐолÑзоваÑÐµÐ»Ñ SELinux - ÑÑо ÑÑÑноÑÑÑ Ð¾Ð¿ÑеделÑÐ½Ð½Ð°Ñ Ð² полиÑике, коÑоÑÐ°Ñ Ð¾ÑвеÑÐ°ÐµÑ Ð·Ð° опÑеделÑннÑй Ð½Ð°Ð±Ð¾Ñ Ñолей и за опÑеделÑннÑй Ð½Ð°Ð±Ð¾Ñ MLS ÑÑовней. ÐаждÑй полÑзоваÑÐµÐ»Ñ Linux ÑопоÑÑавлен полÑзоваÑÐµÐ»Ñ SELinux поÑÑедÑÑвом полиÑики SELinux. ÐÑо позволÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑм Linux наÑледоваÑÑ Ð¾Ð³ÑаниÑÐµÐ½Ð¸Ñ ÑÑÑановленнÑе на полÑзоваÑелей SELinux. СопоÑÑавленнÑе ÑÑÑноÑÑи полÑзоваÑелей SELinux иÑполÑзÑÑÑÑÑ Ð² конÑекÑÑе SELinux Ð´Ð»Ñ Ð¿ÑоÑеÑÑов в ÑеÑÑии, в поÑÑдке опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÐºÐ°ÐºÐ¸Ñ
Ñолей и ÑÑовней они пÑименимÑ. ÐÐ»Ñ Ñого, ÑÑÐ¾Ð±Ñ Ð¿Ð¾ÑмоÑÑеÑÑ ÑопоÑÑавление Ð¼ÐµÐ¶Ð´Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÐ
¼Ð¸ SELinux и Linux иÑполÑзÑеÑÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ð° <command>semanage login -l</command>:"
#. Tag: para
#, no-c-format
-msgid ""
-"Output may differ slightly from system to system. The <computeroutput>Login "
-"Name</computeroutput> column lists Linux users, and the "
-"<computeroutput>SELinux User</computeroutput> column lists which SELinux "
-"user the Linux user is mapped to. For processes, the SELinux user limits "
-"which roles and levels are accessible. The last column, <computeroutput>MLS/"
-"MCS Range</computeroutput>, is the level used by Multi-Level Security (MLS) "
-"and Multi-Category Security (MCS). Levels are briefly discussed later."
-msgstr ""
+msgid "Output may differ slightly from system to system. The <computeroutput>Login Name</computeroutput> column lists Linux users, and the <computeroutput>SELinux User</computeroutput> column lists which SELinux user the Linux user is mapped to. For processes, the SELinux user limits which roles and levels are accessible. The last column, <computeroutput>MLS/MCS Range</computeroutput>, is the level used by Multi-Level Security (MLS) and Multi-Category Security (MCS). Levels are briefly discussed later."
+msgstr "ÐÑвод ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¾ÑлиÑаÑÑÑÑ Ð¼ÐµÐ¶Ð´Ñ Ð¾Ð¿ÐµÑаÑионнÑми ÑиÑÑемами. Ð ÑÑолбÑе <computeroutput>Login Name</computeroutput> пеÑеÑиÑÐ»ÐµÐ½Ñ Ð¿Ð¾Ð»ÑзоваÑели Linux, а в ÑÑолбÑе <computeroutput>SELinux User</computeroutput> Ð¿Ð¾ÐºÐ°Ð·Ð°Ð½Ñ Ñ ÐºÐ°ÐºÐ¸Ð¼Ð¸ полÑзоваÑелÑми SELinux они ÑопоÑÑавленÑ. ÐÐ»Ñ Ð¿ÑоÑеÑÑов полÑзоваÑели SELinux огÑаниÑиваÑÑ Ð´Ð¾ÑÑÑпноÑÑÑ Ñолей и ÑÑовней. РпоÑледнем ÑÑолбÑе <computeroutput>MLS/MCS Range</computeroutput> показан ÑÑÐ¾Ð²ÐµÐ½Ñ ÐºÐ¾ÑоÑÑй иÑполÑзÑеÑÑÑ Ð² Multi-Level Security (MLS) and Multi-Category Security (MCS), даннÑе меÑ
Ð°Ð½Ð¸Ð·Ð¼Ñ Ð±ÑдÑÑ ÑаÑÑмоÑÑÐµÐ½Ñ Ð¿Ð¾Ð·Ð¶Ðµ."
#. Tag: term
#, no-c-format
msgid "<emphasis>role</emphasis>"
-msgstr ""
+msgstr "<emphasis>ÑолÑ</emphasis>"
+# ÐÐµÑ ÑоÑного пеÑевода.
+# Ðне кажеÑÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑÑÑлаÑÑ Ð½Ð° понÑÑÐ¸Ñ Ð¸ опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¾ÑÑÑда:
+# http://www.opennet.ru/base/sec/intro_selinux.txt.html
#. Tag: para
#, no-c-format
-msgid ""
-"Part of SELinux is the Role-Based Access Control (RBAC) security model. The "
-"role is an attribute of RBAC. SELinux users are authorized for roles, and "
-"roles are authorized for domains. The role serves as an intermediary between "
-"domains and SELinux users. The roles that can be entered determine which "
-"domains can be entered - ultimately, this controls which object types can be "
-"accessed. This helps reduce vulnerability to privilege escalation attacks."
-msgstr ""
+msgid "Part of SELinux is the Role-Based Access Control (RBAC) security model. The role is an attribute of RBAC. SELinux users are authorized for roles, and roles are authorized for domains. The role serves as an intermediary between domains and SELinux users. The roles that can be entered determine which domains can be entered - ultimately, this controls which object types can be accessed. This helps reduce vulnerability to privilege escalation attacks."
+msgstr "Ð Ð¾Ð»Ñ - ÑÑо ÑаÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ безопаÑноÑÑи Ролевого ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑÑпом Role-Based Access Control (RBAC). Ð Ð¾Ð»Ñ - ÑÑо аÑÑибÑÑ RBAC. ÐолÑзоваÑели SELinux, авÑоÑиÑеÑÐ½Ñ Ð´Ð»Ñ Ñолей, а ÑÐ¾Ð»Ñ Ð°Ð²ÑоÑиÑеÑна Ð´Ð»Ñ Ð´Ð¾Ð¼ÐµÐ½Ð¾Ð². ÐпÑеделÑÐ½Ð½Ð°Ñ ÑÐ¾Ð»Ñ Ð¾Ð¿ÑеделÑÐµÑ ÐºÐ°ÐºÐ¸Ðµ Ð´Ð¾Ð¼ÐµÐ½Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ð½Ñ Ð´Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей Ñ ÑÑой ÑолÑÑ. Ð Ð¾Ð»Ñ ÑлÑÐ¶Ð¸Ñ Ð¿ÑомежÑÑоÑнÑм звеном Ð¼ÐµÐ¶Ð´Ñ Ð´Ð¾Ð¼ÐµÐ½Ð°Ð¼Ð¸ и полÑзоваÑелÑми SELinux. РолÑ, коÑоÑой Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ, опÑеделÑÐµÑ Ð² какие Ð´Ð¾Ð¼ÐµÐ½Ñ Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾Ð¿Ð°ÑÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ - ÑакÑиÑеÑки, ÑÑÐ¾Ñ Ð¼ÐµÑ
анизм ÑпÑавлÑÐµÑ Ð´Ð¾ÑÑÑпноÑÑÑÑ Ð¾Ð±ÑекÑов. Таким обÑазом, ÑменÑÑаеÑÑÑ ÑиÑк, ÑвÑз
аннÑй Ñ ÑÑзвимоÑÑÑÑ Ð¿Ð¾Ð²ÑÑÐµÐ½Ð¸Ñ Ð¿Ñивелегий в ÑиÑÑеме."
#. Tag: term
#, no-c-format
msgid "<emphasis>type</emphasis>"
-msgstr ""
+msgstr "<emphasis>Ñип</emphasis>"
#. Tag: para
#, no-c-format
-msgid ""
-"The type is an attribute of Type Enforcement. The type defines a domain for "
-"processes, and a type for files. SELinux policy rules define how types can "
-"access each other, whether it be a domain accessing a type, or a domain "
-"accessing another domain. Access is only allowed if a specific SELinux "
-"policy rule exists that allows it."
-msgstr ""
+msgid "The type is an attribute of Type Enforcement. The type defines a domain for processes, and a type for files. SELinux policy rules define how types can access each other, whether it be a domain accessing a type, or a domain accessing another domain. Access is only allowed if a specific SELinux policy rule exists that allows it."
+msgstr "Тип - ÑÑо аÑÑибÑÑ Type Enforcement. Тип опÑеделÑÐµÑ Ð´Ð¾Ð¼ÐµÐ½ Ð´Ð»Ñ Ð¿ÑоÑеÑÑов и Ñип Ð´Ð»Ñ Ñайлов. ÐÑавила полиÑики SELinux опÑеделÑÑÑ ÐºÐ°Ðº ÑÐ¸Ð¿Ñ Ð²Ð·Ð°Ð¸Ð¼Ð¾Ð´ÐµÐ¹ÑÑвÑÑÑ Ð´ÑÑг Ñ Ð´ÑÑгом, ÑвлÑеÑÑÑ Ð»Ð¸ Ñип доменом, полÑÑаÑÑим доÑÑÑп к ÑипÑ, или доменом, полÑÑаÑÑим доÑÑÑп к дÑÑÐ³Ð¾Ð¼Ñ Ð´Ð¾Ð¼ÐµÐ½Ñ. ÐоÑÑÑп ÑазÑеÑаеÑÑÑ, ÑолÑко еÑли ÑÑÑеÑÑвÑÐµÑ Ð¾Ð¿Ñеделенное пÑавило полиÑики SELinux позволÑÑÑиÑ
данное дейÑÑвие."
#. Tag: term
#, no-c-format
msgid "<emphasis>level</emphasis>"
-msgstr ""
+msgstr "<emphasis>ÑÑовенÑ</emphasis>"
#. Tag: para
#, no-c-format
-msgid ""
-"The level is an attribute of MLS and Multi-Category Security (MCS). An MLS "
-"range is a pair of levels, written as <emphasis>lowlevel-highlevel</"
-"emphasis> if the levels differ, or <emphasis>lowlevel</emphasis> if the "
-"levels are identical (<computeroutput>s0-s0</computeroutput> is the same as "
-"<computeroutput>s0</computeroutput>). Each level is a sensitivity-category "
-"pair, with categories being optional. If there are categories, the level is "
-"written as <emphasis>sensitivity:category-set</emphasis>. If there are no "
-"categories, it is written as <emphasis>sensitivity</emphasis>."
-msgstr ""
+msgid "The level is an attribute of MLS and Multi-Category Security (MCS). An MLS range is a pair of levels, written as <emphasis>lowlevel-highlevel</emphasis> if the levels differ, or <emphasis>lowlevel</emphasis> if the levels are identical (<computeroutput>s0-s0</computeroutput> is the same as <computeroutput>s0</computeroutput>). Each level is a sensitivity-category pair, with categories being optional. If there are categories, the level is written as <emphasis>sensitivity:category-set</emphasis>. If there are no categories, it is written as <emphasis>sensitivity</emphasis>."
+msgstr "УÑÐ¾Ð²ÐµÐ½Ñ - ÑÑо аÑÑибÑÑ Ð¼Ð½Ð¾Ð³Ð¾ÑÑовневого ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑÑпом MLS и MCS. ÐÑоÑÑÑанÑÑво MLS - ÑÑо паÑа ÑÑовней, запиÑаннÑÑ
в виде <emphasis>lowlevel-highlevel</emphasis>, еÑли ÑÑовни в данной паÑе оÑлиÑаÑÑÑÑ Ð¸Ð»Ð¸, еÑли не оÑлиÑаÑÑÑÑ, Ñо <emphasis>lowlevel</emphasis>. То еÑÑÑ (<computeroutput>s0-s0</computeroutput> Ñо же Ñамое, ÑÑо и <computeroutput>s0</computeroutput>). ÐÑли дополниÑелÑно опÑÐµÐ´ÐµÐ»ÐµÐ½Ñ ÐºÐ°ÑегоÑии, Ñо ÑÑÐ¾Ð²ÐµÐ½Ñ Ð·Ð°Ð¿Ð¸ÑÑваеÑÑÑ ÐºÐ°Ðº <emphasis>sensitivity:category-set</emphasis>. ÐÑли каÑегоÑии не опÑеделенÑ, Ñо запиÑÑ Ð²ÑглÑÐ´Ð¸Ñ ÐºÐ°Ðº <emphasis>sensitivity</emphasis>."
#. Tag: para
#, no-c-format
-msgid ""
-"If the category set is a contiguous series, it can be abbreviated. For "
-"example, <computeroutput>c0.c3</computeroutput> is the same as "
-"<computeroutput>c0,c1,c2,c3</computeroutput>. The <filename>/etc/selinux/"
-"targeted/setrans.conf</filename> file maps levels (<computeroutput>s0:c0</"
-"computeroutput>) to human-readable form (ie. "
-"<computeroutput>CompanyConfidential</computeroutput>). Do not edit "
-"<filename>setrans.conf</filename> with a text editor: use <command>semanage</"
-"command> to make changes. Refer to the"
-msgstr ""
+msgid "If the category set is a contiguous series, it can be abbreviated. For example, <computeroutput>c0.c3</computeroutput> is the same as <computeroutput>c0,c1,c2,c3</computeroutput>. The <filename>/etc/selinux/targeted/setrans.conf</filename> file maps levels (<computeroutput>s0:c0</computeroutput>) to human-readable form (ie. <computeroutput>CompanyConfidential</computeroutput>). Do not edit <filename>setrans.conf</filename> with a text editor: use <command>semanage</command> to make changes. Refer to the"
+msgstr "ÐÑли Ð½Ð°Ð±Ð¾Ñ ÐºÐ°ÑегоÑий ÑвлÑеÑÑÑ Ð½ÐµÐ¿ÑеÑÑвной поÑледоваÑелÑноÑÑÑÑ, он Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿ÑиведÑн к ÑокÑаÑÑнной ÑоÑме запиÑи. ÐапÑÐ¸Ð¼ÐµÑ <computeroutput>c0.c3</computeroutput> - ÑÑо Ñоже Ñамое, ÑÑо <computeroutput>c0,c1,c2,c3</computeroutput>. Ð Ñайле <filename>/etc/selinux/targeted/setrans.conf</filename> Ñ
ÑаниÑÑÑ Ð¾Ð¿Ð¸Ñание ÑÑовней (<computeroutput>s0:c0</computeroutput>) в ÑдобоÑиÑаемом ÑоÑмаÑе (Ñаким как <computeroutput>CompanyConfidential</computeroutput>). Ðе ÑедакÑиÑÑйÑе <filename>setrans.conf</filename> Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑекÑÑового ÑедакÑоÑа: необÑ
одимо иÑполÑзоваÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>semanage</command> Ð´Ð»Ñ Ð²Ð½ÐµÑÐµÐ½Ð¸Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹. СоглаÑно Ñ"
#. Tag: refentrytitle
#, no-c-format
msgid "semanage"
-msgstr ""
+msgstr "semanage"
#. Tag: citerefentry
#, no-c-format
-msgid ""
-"manual page for further information. In Fedora, targeted policy enforces "
-"MCS, and in MCS, there is just one sensitivity, <computeroutput>s0</"
-"computeroutput>. MCS in Fedora supports 1024 different categories: "
-"<computeroutput>c0</computeroutput> through to <computeroutput>c1023</"
-"computeroutput>. <computeroutput>s0-s0:c0.c1023</computeroutput> is "
-"sensitivity <computeroutput>s0</computeroutput> and authorized for all "
-"categories."
-msgstr ""
+msgid "manual page for further information. In Fedora, targeted policy enforces MCS, and in MCS, there is just one sensitivity, <computeroutput>s0</computeroutput>. MCS in Fedora supports 1024 different categories: <computeroutput>c0</computeroutput> through to <computeroutput>c1023</computeroutput>. <computeroutput>s0-s0:c0.c1023</computeroutput> is sensitivity <computeroutput>s0</computeroutput> and authorized for all categories."
+msgstr "ÑпÑавоÑной ÑÑÑаниÑей (man) Ñ Ð±Ð¾Ð»ÐµÐµ подÑобной инÑоÑмаÑией. Ð Fedora ÑÐµÐ»ÐµÐ²Ð°Ñ Ð¿Ð¾Ð»Ð¸Ñика targeted назнаÑÐ°ÐµÑ MCS, и в MCS, ÑолÑко один ÑÑÐ¾Ð²ÐµÐ½Ñ <computeroutput>s0</computeroutput>. MCS в Fedora поддеÑÐ¶Ð¸Ð²Ð°ÐµÑ 1024 ÑазлиÑнÑÑ
каÑегоÑии: Ð¾Ñ <computeroutput>c0</computeroutput> до <computeroutput>c1023</computeroutput>. <computeroutput>s0-s0:c0.c1023</computeroutput> - ÑÑо ÑÑÐ¾Ð²ÐµÐ½Ñ <computeroutput>s0</computeroutput> и пÑименим Ð´Ð»Ñ Ð²ÑеÑ
каÑегоÑий."
#. Tag: para
#, no-c-format
-msgid ""
-"MLS enforces the <ulink url=\"http://en.wikipedia.org/wiki/Bell-"
-"LaPadula_model\">Bell-La Padula Mandatory Access Model</ulink>, and is used "
-"in Labeled Security Protection Profile (LSPP) environments. To use MLS "
-"restrictions, install the <package>selinux-policy-mls</package> package, and "
-"configure MLS to be the default SELinux policy. The MLS policy shipped with "
-"Fedora omits many program domains that were not part of the evaluated "
-"configuration, and therefore, MLS on a desktop workstation is unusable (no "
-"support for the X Window System); however, an MLS policy from the <ulink url="
-"\"http://oss.tresys.com/projects/refpolicy\">upstream SELinux Reference "
-"Policy</ulink> can be built that includes all program domains."
-msgstr ""
+msgid "MLS enforces the <ulink url=\"http://en.wikipedia.org/wiki/Bell-LaPadula_model\">Bell-La Padula Mandatory Access Model</ulink>, and is used in Labeled Security Protection Profile (LSPP) environments. To use MLS restrictions, install the <package>selinux-policy-mls</package> package, and configure MLS to be the default SELinux policy. The MLS policy shipped with Fedora omits many program domains that were not part of the evaluated configuration, and therefore, MLS on a desktop workstation is unusable (no support for the X Window System); however, an MLS policy from the <ulink url=\"http://oss.tresys.com/projects/refpolicy\">upstream SELinux Reference Policy</ulink> can be built that includes all program domains."
+msgstr "MLS Ð²Ð²Ð¾Ð´Ð¸Ñ Ð² дейÑÑвие <ulink url=\"http://en.wikipedia.org/wiki/Bell-LaPadula_model\">Bell-La Padula Mandatory Access Model</ulink>, и иÑполÑзÑеÑÑÑ Ð² ÑÑедаÑ
Labeled Security Protection Profile (LSPP). ÐÐ»Ñ Ð¸ÑполÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÑ
анизмов MLS, необÑ
одимо ÑÑÑановиÑÑ Ð¿Ð°ÐºÐµÑ <package>selinux-policy-mls</package> и ÑконÑигÑÑиÑоваÑÑ MLS в каÑеÑÑве полиÑики SELinux по ÑмолÑаниÑ. ÐолиÑика MLS поÑÑавлÑÐµÐ¼Ð°Ñ Ñ Fedora не вклÑÑÐ°ÐµÑ Ð´Ð¾Ð¼ÐµÐ½Ñ Ð´Ð»Ñ Ð¿ÑогÑамм, коÑоÑÑе не ÑвлÑÑÑÑÑ ÑаÑÑÑÑ Ð¿ÑоÑеÑÑиÑованной конÑигÑÑаÑии и более Ñого, MLS не пÑименима на деÑкÑопе или ÑабоÑей ÑÑанÑии (Ñак как Ð½ÐµÑ Ð¿Ð¾Ð´Ð´ÐµÑжки Ð´Ð»Ñ X Window System); однако полиÑика MLS Ð¾Ñ <ulink url=\"http://oss.tresys.com/projects/
refpolicy\"> upstream SELinux Reference Policy</ulink> Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿Ð¾ÑÑÑоена Ñак, ÑÑÐ¾Ð±Ñ ÑÑиÑÑваÑÑ Ð²Ñе пÑогÑаммнÑе доменÑ."
#. Tag: title
#, no-c-format
msgid "Domain Transitions"
-msgstr ""
+msgstr "ÐоменнÑе ÐеÑеÑ
одÑ, ТÑанзиÑивноÑÑÑ (Domain Transitions)"
+# неÑоÑнÑй
#. Tag: para
#, no-c-format
-msgid ""
-"A process in one domain transitions to another domain by executing an "
-"application that has the <computeroutput>entrypoint</computeroutput> type "
-"for the new domain. The <computeroutput>entrypoint</computeroutput> "
-"permission is used in SELinux policy, and controls which applications can be "
-"used to enter a domain. The following example demonstrates a domain "
-"transition:"
-msgstr ""
+msgid "A process in one domain transitions to another domain by executing an application that has the <computeroutput>entrypoint</computeroutput> type for the new domain. The <computeroutput>entrypoint</computeroutput> permission is used in SELinux policy, and controls which applications can be used to enter a domain. The following example demonstrates a domain transition:"
+msgstr "ÐÑоÑеÑÑ Ð¸Ð· одного домена пеÑеÑ
Ð¾Ð´Ð¸Ñ Ð² дÑÑгой домен, еÑли пеÑвÑй пÑоÑеÑÑ Ð²ÑполнÑÐµÑ Ð¿Ñиложение, коÑоÑое запÑÑкаеÑÑÑ Ð¸Ð· Ñайла Ñ Ñипом <computeroutput>entrypoint</computeroutput> нового домена. РазÑеÑение пеÑеÑ
ода <computeroutput>entrypoint</computeroutput> иÑполÑзÑеÑÑÑ Ð² полиÑике SELinux и конÑÑолиÑÑÐµÑ ÐºÐ°ÐºÐ¸Ðµ пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð²Ñ
ода в домен. Ð ÑледÑÑÑем пÑимеÑе Ð¿Ð¾ÐºÐ°Ð·Ð°Ð½Ñ Ð´Ð¾Ð¼ÐµÐ½Ð½Ñе пеÑеÑ
Ð¾Ð´Ñ (domain transitions)"
#. Tag: para
#, no-c-format
-msgid ""
-"A user wants to change their password. To do this, they run the "
-"<command>passwd</command> application. The <filename>/usr/bin/passwd</"
-"filename> executable is labeled with the <computeroutput>passwd_exec_t</"
-"computeroutput> type:"
-msgstr ""
+msgid "A user wants to change their password. To do this, they run the <command>passwd</command> application. The <filename>/usr/bin/passwd</filename> executable is labeled with the <computeroutput>passwd_exec_t</computeroutput> type:"
+msgstr "ÐолÑзоваÑÐµÐ»Ñ Ñ
оÑÐµÑ Ð¸Ð·Ð¼ÐµÐ½Ð¸ÑÑ Ñвой паÑолÑ. ÐÐ»Ñ Ñого, ÑÑÐ¾Ð±Ñ ÑÑо ÑделаÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð²ÑполнÑÐµÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>passwd</command>. Файл <filename>/usr/bin/passwd</filename> ÑвлÑеÑÑÑ Ð¸ÑполнÑемÑм и пÑомаÑкиÑован меÑкой Ñ Ñипом <computeroutput>passwd_exec_t</computeroutput>:"
#. Tag: para
#, no-c-format
-msgid ""
-"The <application>passwd</application> application accesses <filename>/etc/"
-"shadow</filename>, which is labeled with the <computeroutput>shadow_t</"
-"computeroutput> type:"
-msgstr ""
+msgid "The <application>passwd</application> application accesses <filename>/etc/shadow</filename>, which is labeled with the <computeroutput>shadow_t</computeroutput> type:"
+msgstr "ÐÑиложение <application>passwd</application> полÑÑÐ°ÐµÑ Ð´Ð¾ÑÑÑп <application>passwd</application>, коÑоÑое помеÑено Ñипом <computeroutput>shadow_t</computeroutput>:"
#. Tag: para
#, no-c-format
-msgid ""
-"An SELinux policy rule states that processes running in the "
-"<computeroutput>passwd_t</computeroutput> domain are allowed to read and "
-"write to files labeled with the <computeroutput>shadow_t</computeroutput> "
-"type. The <computeroutput>shadow_t</computeroutput> type is only applied to "
-"files that are required for a password change. This includes <filename>/etc/"
-"gshadow</filename>, <filename>/etc/shadow</filename>, and their backup files."
-msgstr ""
+msgid "An SELinux policy rule states that processes running in the <computeroutput>passwd_t</computeroutput> domain are allowed to read and write to files labeled with the <computeroutput>shadow_t</computeroutput> type. The <computeroutput>shadow_t</computeroutput> type is only applied to files that are required for a password change. This includes <filename>/etc/gshadow</filename>, <filename>/etc/shadow</filename>, and their backup files."
+msgstr "ÐÑавило полиÑики SELinux опÑеделÑеÑ, ÑÑо пÑоÑеÑам, запÑÑеннÑм в домене <computeroutput>passwd_t</computeroutput>, ÑазÑеÑено ÑиÑаÑÑ Ð¸ запиÑаÑÑ Ð² ÑÐ°Ð¹Ð»Ñ Ð¿Ð¾Ð¼ÐµÑеннÑе Ñипом <computeroutput>shadow_t</computeroutput>. Тип <computeroutput>shadow_t</computeroutput> пÑименÑеÑÑÑ ÑолÑко к Ñайлам, коÑоÑÑе необÑ
Ð¾Ð´Ð¸Ð¼Ñ Ð´Ð»Ñ ÑÐ¼ÐµÐ½Ñ Ð¿Ð°ÑолÑ. ÐÑо ÑÐ°Ð¹Ð»Ñ <filename>/etc/gshadow</filename>, <filename>/etc/shadow</filename> и иÑ
ÑезеÑвнÑе копии."
#. Tag: para
#, no-c-format
-msgid ""
-"An SELinux policy rule states that the <computeroutput>passwd_t</"
-"computeroutput> domain has <computeroutput>entrypoint</computeroutput> "
-"permission to the <computeroutput>passwd_exec_t</computeroutput> type."
-msgstr ""
+msgid "An SELinux policy rule states that the <computeroutput>passwd_t</computeroutput> domain has <computeroutput>entrypoint</computeroutput> permission to the <computeroutput>passwd_exec_t</computeroutput> type."
+msgstr "ÐÑавило полиÑики SELinux опÑеделÑеÑ, ÑÑо домен <computeroutput>passwd_t</computeroutput> Ð¸Ð¼ÐµÐµÑ ÑазÑеÑÐµÐ½Ð¸Ñ Ð¿ÐµÑеÑ
ода <computeroutput>entrypoint</computeroutput> Ð´Ð»Ñ Ñипа <computeroutput>passwd_exec_t</computeroutput>."
#. Tag: para
#, no-c-format
-msgid ""
-"When a user runs the <command>/usr/bin/passwd</command> application, the "
-"user's shell process transitions to the <computeroutput>passwd_t</"
-"computeroutput> domain. With SELinux, since the default action is to deny, "
-"and a rule exists that allows (among other things) applications running in "
-"the <computeroutput>passwd_t</computeroutput> domain to access files labeled "
-"with the <computeroutput>shadow_t</computeroutput> type, the "
-"<application>passwd</application> application is allowed to access "
-"<filename>/etc/shadow</filename>, and update the user's password."
-msgstr ""
+msgid "When a user runs the <command>/usr/bin/passwd</command> application, the user's shell process transitions to the <computeroutput>passwd_t</computeroutput> domain. With SELinux, since the default action is to deny, and a rule exists that allows (among other things) applications running in the <computeroutput>passwd_t</computeroutput> domain to access files labeled with the <computeroutput>shadow_t</computeroutput> type, the <application>passwd</application> application is allowed to access <filename>/etc/shadow</filename>, and update the user's password."
+msgstr "Ðогда полÑзоваÑÐµÐ»Ñ Ð²ÑполнÑÐµÑ Ð¿Ñиложение <command>/usr/bin/passwd</command>, оболоÑка shell полÑзоваÑÐµÐ»Ñ Ð¿ÐµÑеÑ
Ð¾Ð´Ð¸Ñ Ð² домен <computeroutput>passwd_t</computeroutput>. С SELinux, где по ÑмолÑÐ°Ð½Ð¸Ñ Ð¿ÑинимаеÑÑÑ Ð´ÐµÐ¹ÑÑвие блокиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ ÑÑÑеÑÑвÑÐµÑ Ð¿Ñавило позволÑÑÑее пÑиложениÑм, вÑполнÑÑÑимÑÑ Ð² домене <computeroutput>passwd_t</computeroutput>, полÑÑаÑÑ Ð´Ð¾ÑÑÑп к Ñайлам помеÑеннÑм Ñипом <computeroutput>shadow_t</computeroutput>, пÑиложение <application>passwd</application> полÑÑÐ°ÐµÑ Ð´Ð¾ÑÑÑп к <filename>/etc/shadow</filename>, и менÑÐµÑ Ð¿Ð°ÑÐ¾Ð»Ñ Ð¿Ð¾Ð»Ð·Ð¾Ð²Ð°ÑелÑ."
#. Tag: para
#, no-c-format
-msgid ""
-"This example is not exhaustive, and is used as a basic example to explain "
-"domain transition. Although there is an actual rule that allows subjects "
-"running in the <computeroutput>passwd_t</computeroutput> domain to access "
-"objects labeled with the <computeroutput>shadow_t</computeroutput> file "
-"type, other SELinux policy rules must be met before the subject can "
-"transition to a new domain. In this example, Type Enforcement ensures:"
-msgstr ""
+msgid "This example is not exhaustive, and is used as a basic example to explain domain transition. Although there is an actual rule that allows subjects running in the <computeroutput>passwd_t</computeroutput> domain to access objects labeled with the <computeroutput>shadow_t</computeroutput> file type, other SELinux policy rules must be met before the subject can transition to a new domain. In this example, Type Enforcement ensures:"
+msgstr "ÐаннÑй пÑÐ¸Ð¼ÐµÑ Ð½Ðµ ÑвлÑеÑÑÑ Ð¸ÑÑеÑпÑваÑÑим и иÑполÑзÑеÑÑÑ ÐºÐ°Ðº пÑоÑÑейÑий пÑÐ¸Ð¼ÐµÑ Ð´Ð»Ñ Ð¾Ð±ÑÑÑÐ½ÐµÐ½Ð¸Ñ Ð¿ÐµÑеÑ
одов (domain transitions). Таким обÑазом опÑеделено ÑабоÑаÑÑее пÑавило, коÑоÑое позволÑÐµÑ ÑÑбÑекÑам вÑполнÑÑÑÑÑ Ð² домене <computeroutput>passwd_t</computeroutput> Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа к обÑекÑам маÑкиÑованнÑм Ñ Ñипом Ñайлов <computeroutput>shadow_t</computeroutput>, дÑÑгие пÑавила полиÑики SELinux Ð´Ð¾Ð»Ð¶Ð½Ñ Ð±ÑÑÑ Ð¿ÑойденгнÑ, пеÑед Ñем как ÑÑбÑÐµÐºÑ ÑÐ¼Ð¾Ð¶ÐµÑ Ð²ÑполниÑÑ Ð¿ÐµÑеÑ
од в дÑÑгой домен. Ð ÑÑом пÑимеÑе Type Enforcement ÑдоÑÑовеÑÑеÑ, ÑÑо:"
#. Tag: para
#, no-c-format
-msgid ""
-"the <computeroutput>passwd_t</computeroutput> domain can only be entered by "
-"executing an application labeled with the <computeroutput>passwd_exec_t</"
-"computeroutput> type; can only execute from authorized shared libraries, "
-"such as the <computeroutput>lib_t</computeroutput> type; and can not execute "
-"any other applications."
-msgstr ""
+msgid "the <computeroutput>passwd_t</computeroutput> domain can only be entered by executing an application labeled with the <computeroutput>passwd_exec_t</computeroutput> type; can only execute from authorized shared libraries, such as the <computeroutput>lib_t</computeroutput> type; and can not execute any other applications."
+msgstr "Рдомен <computeroutput>passwd_t</computeroutput> можно войÑи, вÑполнением пÑиложений, маÑкиÑованнÑÑ
Ñипом <computeroutput>passwd_exec_t</computeroutput>; и могÑÑ Ð¸ÑполнÑÑÑ ÑолÑко авÑоÑизованнÑе ÑазделеннÑе библиоÑеки, Ñакие как Ñип <computeroutput>lib_t</computeroutput>; и не могÑÑ Ð²ÑполнÑÑÑ Ð»ÑбÑе дÑÑие пÑиложениÑ"
#. Tag: para
#, no-c-format
-msgid ""
-"only authorized domains, such as <computeroutput>passwd_t</computeroutput>, "
-"can write to files labeled with the <computeroutput>shadow_t</"
-"computeroutput> type. Even if other processes are running with superuser "
-"privileges, those processes can not write to files labeled with the "
-"<computeroutput>shadow_t</computeroutput> type, as they are not running in "
-"the <computeroutput>passwd_t</computeroutput> domain."
-msgstr ""
+msgid "only authorized domains, such as <computeroutput>passwd_t</computeroutput>, can write to files labeled with the <computeroutput>shadow_t</computeroutput> type. Even if other processes are running with superuser privileges, those processes can not write to files labeled with the <computeroutput>shadow_t</computeroutput> type, as they are not running in the <computeroutput>passwd_t</computeroutput> domain."
+msgstr "ТолÑко авÑоÑизованнÑе Ð´Ð¾Ð¼ÐµÐ½Ñ <computeroutput>passwd_t</computeroutput>, могÑÑ Ð·Ð°Ð¿Ð¸ÑÑваÑÑ Ð² ÑÐ°Ð¹Ð»Ñ Ð¼Ð°ÑкиÑованнÑе Ñипом <computeroutput>shadow_t</computeroutput>. Ðаже еÑли дÑÑгие пÑоÑеÑÑÑ Ð·Ð°Ð¿ÑÑÐµÐ½Ñ Ñ Ð¿ÑивелегиÑми ÑÑпеÑполÑзоваÑелÑ, ÑÑи пÑоÑеÑÑÑ Ð½Ðµ могÑÑ Ð²ÑполнÑÑÑ Ð·Ð°Ð¿Ð¸ÑÑÑ Ð² ÑÐ°Ð¹Ð»Ñ Ñ Ñипом <computeroutput>shadow_t</computeroutput>, до ÑеÑ
поÑ, Ñак как они не запÑÑÐµÐ½Ñ Ð² домене <computeroutput>passwd_t</computeroutput>."
#. Tag: para
#, no-c-format
-msgid ""
-"only authorized domains can transition to the <computeroutput>passwd_t</"
-"computeroutput> domain. For example, the <systemitem class=\"daemon"
-"\">sendmail</systemitem> process running in the <computeroutput>sendmail_t</"
-"computeroutput> domain does not have a legitimate reason to execute "
-"<command>passwd</command>; therefore, it can never transition to the "
-"<computeroutput>passwd_t</computeroutput> domain."
-msgstr ""
+msgid "only authorized domains can transition to the <computeroutput>passwd_t</computeroutput> domain. For example, the <systemitem class=\"daemon\">sendmail</systemitem> process running in the <computeroutput>sendmail_t</computeroutput> domain does not have a legitimate reason to execute <command>passwd</command>; therefore, it can never transition to the <computeroutput>passwd_t</computeroutput> domain."
+msgstr "ТолÑко авÑоÑизованнÑе Ð´Ð¾Ð¼ÐµÐ½Ñ Ð¼Ð¾Ð³ÑÑ Ð²ÑпоолнÑÑÑ Ð¿ÐµÑеÑ
од в домен <computeroutput>passwd_t</computeroutput>. ÐапÑимеÑ, пÑоÑеÑÑ <systemitem class=\"daemon\">sendmail</systemitem> запÑÑкаеÑÑÑ Ð² домене <computeroutput>sendmail_t</computeroutput> и не Ð¸Ð¼ÐµÐµÑ Ð»Ð¾Ð³Ð¸ÑнÑÑ
(законнÑÑ
) пÑиÑин Ð´Ð»Ñ Ð·Ð°Ð¿ÑÑка <command>passwd</command>; Ñаким обÑазом он не Ð¼Ð¾Ð¶ÐµÑ Ð²ÑполниÑÑ Ð¿ÐµÑеÑ
од в домен <computeroutput>passwd_t</computeroutput>."
#. Tag: para
#, no-c-format
-msgid ""
-"processes running in the <computeroutput>passwd_t</computeroutput> domain "
-"can only read and write to authorized types, such as files labeled with the "
-"<computeroutput>etc_t</computeroutput> or <computeroutput>shadow_t</"
-"computeroutput> types. This prevents the <application>passwd</application> "
-"application from being tricked into reading or writing arbitrary files."
-msgstr ""
+msgid "processes running in the <computeroutput>passwd_t</computeroutput> domain can only read and write to authorized types, such as files labeled with the <computeroutput>etc_t</computeroutput> or <computeroutput>shadow_t</computeroutput> types. This prevents the <application>passwd</application> application from being tricked into reading or writing arbitrary files."
+msgstr "ÐÑоÑеÑÑÑ Ð·Ð°Ð¿ÑÑеннÑе в домене <computeroutput>passwd_t</computeroutput> могÑÑ ÑолÑко ÑиÑаÑÑ Ð¸ запиÑÑваÑÑ Ð² авÑоÑизованнÑе ÑÐ°Ð¹Ð»Ñ Ð¿ÑомаÑкиÑованнÑе Ñипом <computeroutput>etc_t</computeroutput> или <computeroutput>shadow_t</computeroutput>. ÐÑо пÑедоÑвÑаÑÐ°ÐµÑ Ð¿Ñиложение <application>passwd</application> Ð¾Ñ Ð·Ð°Ð¿Ð¸Ñи или ÑÑÐµÐ½Ð¸Ñ Ð² дÑÑгие ÑайлÑ."
#. Tag: title
#, no-c-format
msgid "SELinux Contexts for Processes"
-msgstr ""
+msgstr "ÐонÑекÑÑÑ SELinux Ð´Ð»Ñ Ð¿ÑоÑеÑÑов"
#. Tag: para
#, no-c-format
-msgid ""
-"Use the <command>ps -eZ</command> command to view the SELinux context for "
-"processes. For example:"
-msgstr ""
+msgid "Use the <command>ps -eZ</command> command to view the SELinux context for processes. For example:"
+msgstr "ÐÑполÑзÑйÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>ps -eZ</command> Ð´Ð»Ñ Ð¿ÑоÑмоÑÑа конÑекÑÑа SELinux Ð´Ð»Ñ Ð¿ÑоÑеÑÑов. ÐапÑимеÑ:"
#. Tag: para
#, no-c-format
-msgid ""
-"Open a terminal, such as <menuchoice><guimenu>Applications</"
-"guimenu><guisubmenu>System Tools</guisubmenu><guimenuitem>Terminal</"
-"guimenuitem></menuchoice>."
-msgstr ""
+msgid "Open a terminal, such as <menuchoice><guimenu>Applications</guimenu><guisubmenu>System Tools</guisubmenu><guimenuitem>Terminal</guimenuitem></menuchoice>."
+msgstr "ÐÑкÑойÑе ÑеÑминал, напÑÐ¸Ð¼ÐµÑ <menuchoice><guimenu>Applications</guimenu><guisubmenu>System Tools</guisubmenu><guimenuitem>Terminal</guimenuitem></menuchoice>."
#. Tag: para
#, no-c-format
-msgid ""
-"Run the <command>/usr/bin/passwd</command> command. Do not enter a new "
-"password."
-msgstr ""
+msgid "Run the <command>/usr/bin/passwd</command> command. Do not enter a new password."
+msgstr "ÐÑполниÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>/usr/bin/passwd</command>. Ðе вводиÑе новÑй паÑолÑ."
#. Tag: para
#, no-c-format
-msgid ""
-"Open a new tab, or another terminal, and run the <command>ps -eZ | grep "
-"passwd</command> command. The output is similar to the following:"
-msgstr ""
+msgid "Open a new tab, or another terminal, and run the <command>ps -eZ | grep passwd</command> command. The output is similar to the following:"
+msgstr "ÐÑкÑойÑе новÑÑ Ð²ÐºÐ»Ð°Ð´ÐºÑ Ð¸ вÑполниÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>ps -eZ | grep passwd</command>. ÐÑвод ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð±ÑÐ´ÐµÑ ÑÑ
ож Ñ ÑказаннÑм ниже:"
#. Tag: para
#, no-c-format
-msgid ""
-"In the first tab/terminal, press <userinput>Ctrl+C</userinput> to cancel the "
-"<application>passwd</application> application."
-msgstr ""
+msgid "In the first tab/terminal, press <userinput>Ctrl+C</userinput> to cancel the <application>passwd</application> application."
+msgstr "РпеÑвой вкладке\\ÑеÑминале нажмиÑе <userinput>Ctrl+C</userinput> Ð´Ð»Ñ Ð·Ð°Ð²ÐµÑÑÐµÐ½Ð¸Ñ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ <application>passwd</application>."
#. Tag: para
#, no-c-format
-msgid ""
-"In this example, when the <filename>/usr/bin/passwd</filename> application "
-"(labeled with the <computeroutput>passwd_exec_t</computeroutput> type) is "
-"executed, the user's shell process transitions to the "
-"<computeroutput>passwd_t</computeroutput> domain. Remember: the type defines "
-"a domain for processes, and a type for files."
-msgstr ""
+msgid "In this example, when the <filename>/usr/bin/passwd</filename> application (labeled with the <computeroutput>passwd_exec_t</computeroutput> type) is executed, the user's shell process transitions to the <computeroutput>passwd_t</computeroutput> domain. Remember: the type defines a domain for processes, and a type for files."
+msgstr "Ð ÑÑом пÑимеÑе, когда пÑиложение <filename>/usr/bin/passwd</filename> (помеÑенное Ñипом <computeroutput>passwd_exec_t</computeroutput>) вÑполнÑеÑÑÑ, оболÑка (shell) полÑзоваÑÐµÐ»Ñ Ð¿ÐµÑеÑ
Ð¾Ð´Ð¸Ñ Ð² домен <computeroutput>passwd_t</computeroutput>. Ðажно: Тип опÑеделÑÐµÑ Ð´Ð¾Ð¼ÐµÐ½ Ð´Ð»Ñ Ð¿ÑоÑеÑÑов и Ñип Ð´Ð»Ñ Ñайлов."
#. Tag: para
#, no-c-format
-msgid ""
-"Use the <command>ps -eZ</command> command to view the SELinux contexts for "
-"running processes. The following is a limited example of the output, and may "
-"differ on your system:"
-msgstr ""
+msgid "Use the <command>ps -eZ</command> command to view the SELinux contexts for running processes. The following is a limited example of the output, and may differ on your system:"
+msgstr "Ðоманда <command>ps -eZ</command> иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑоÑмоÑÑа конÑекÑÑов SELinux запÑÑеннÑÑ
пÑоÑеÑÑов. Ðиже показан огÑаниÑеннÑй вÑвод командÑ, коÑоÑÑй Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑазлиÑнÑÑ
Ð´Ð»Ñ ÑазнÑÑ
опеÑаÑионнÑÑ
ÑиÑÑем:"
+# ФÑаза Type Enforcement then separates each domain не Ð¸Ð¼ÐµÐµÑ Ð°Ð´ÐµÐºÐ²Ð°Ñного ÑÑÑÑкого пеÑевода, Ñак как ÑеÑмин Type Enforcement не полÑÑаеÑÑÑ Ð¿ÐµÑевеÑÑи коÑÑекÑно в данном конÑекÑÑе и ÑÑÐ¾Ñ ÑеÑмин не Ð¸Ð¼ÐµÐµÑ ÑÑÑÑкого аналога на даннÑй моменÑ.
#. Tag: para
#, no-c-format
-msgid ""
-"The <computeroutput>system_r</computeroutput> role is used for system "
-"processes, such as daemons. Type Enforcement then separates each domain."
-msgstr ""
+msgid "The <computeroutput>system_r</computeroutput> role is used for system processes, such as daemons. Type Enforcement then separates each domain."
+msgstr "Ð Ð¾Ð»Ñ <computeroutput>system_r</computeroutput> иÑполÑзÑеÑÑÑ Ð´Ð»Ñ ÑиÑÑемнÑÑ
пÑоÑеÑÑов, ÑакиÑ
как демонÑ."
#. Tag: title
#, no-c-format
msgid "SELinux Contexts for Users"
-msgstr ""
+msgstr "ÐонÑекÑÑÑ SELinux Ð´Ð»Ñ Ð¿Ð¾Ð»ÑзоваÑелей"
#. Tag: para
#, no-c-format
-msgid ""
-"Use the <command>id -Z</command> command to view the SELinux context "
-"associated with your Linux user:"
-msgstr ""
+msgid "Use the <command>id -Z</command> command to view the SELinux context associated with your Linux user:"
+msgstr "ÐÑполÑзÑйÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ <command>id -Z</command> Ð´Ð»Ñ Ð¿ÑоÑмоÑÑа конÑекÑÑа SELinux аÑÑоÑииÑованного Ñ Ð¿Ð¾Ð»ÑзоваÑелем Linux:"
#. Tag: para
#, no-c-format
-msgid ""
-"In Fedora, Linux users run unconfined by default. This SELinux context shows "
-"that the Linux user is mapped to the SELinux <computeroutput>unconfined_u</"
-"computeroutput> user, running as the <computeroutput>unconfined_r</"
-"computeroutput> role, and is running in the <computeroutput>unconfined_t</"
-"computeroutput> domain. <computeroutput>s0-s0</computeroutput> is an MLS "
-"range, which in this case, is the same as just <computeroutput>s0</"
-"computeroutput>. The categories the user has access to is defined by "
-"<computeroutput>c0.c1023</computeroutput>, which is all categories "
-"(<computeroutput>c0</computeroutput> through to <computeroutput>c1023</"
-"computeroutput>)."
-msgstr ""
+msgid "In Fedora, Linux users run unconfined by default. This SELinux context shows that the Linux user is mapped to the SELinux <computeroutput>unconfined_u</computeroutput> user, running as the <computeroutput>unconfined_r</computeroutput> role, and is running in the <computeroutput>unconfined_t</computeroutput> domain. <computeroutput>s0-s0</computeroutput> is an MLS range, which in this case, is the same as just <computeroutput>s0</computeroutput>. The categories the user has access to is defined by <computeroutput>c0.c1023</computeroutput>, which is all categories (<computeroutput>c0</computeroutput> through to <computeroutput>c1023</computeroutput>)."
+msgstr "Ð Fedora, полÑоваÑели Linux ÑабоÑаÑÑ Ð½ÐµÐ¾Ð³ÑаниÑенно по ÑмолÑаниÑ. Рданном ÑлÑÑае конÑекÑÑ SELinux показÑваеÑ, ÑÑо полÑзоваÑÐµÐ»Ñ Linux ÑопоÑÑавлен Ñ Ð¿Ð¾Ð»ÑзоваÑелем SELinux <computeroutput>unconfined_u</computeroutput>, ÑабоÑаÑÑим Ñ ÑолÑÑ <computeroutput>unconfined_r</computeroutput>, и в <computeroutput>unconfined_t</computeroutput> домене. <computeroutput>s0-s0</computeroutput> показÑÐ²Ð°ÐµÑ Ð´Ð¸Ð°Ð¿Ð°Ð·Ð¾Ð½ ÑÑовней MLS, коÑоÑÑй в данном ÑлÑÑае одинаковÑй <computeroutput>s0</computeroutput>. ÐаÑегоÑии, к коÑоÑÑм полÑзоваÑÐµÐ»Ñ Ð¸Ð¼ÐµÐµÑ Ð´Ð¾ÑÑÑп опÑеделенÑ: <computeroutput>c0.c1023</computeroutput>, ÑÑо вÑе каÑегоÑии (Ð¾Ñ <computeroutput>c0</computeroutput> до <computeroutput>c1023</computeroutput>)."
+
More information about the docs-commits
mailing list