[l10n-russian CVS] shadow/man chpasswd.8.xml, 1.3, 1.4 gpasswd.1.xml, 1.3, 1.4 login.defs.5.xml, 1.3, 1.4 passwd.1.xml, 1.3, 1.4 passwd.5.xml, 1.3, 1.4 pwck.8.xml, 1.3, 1.4 sg.1.xml, 1.3, 1.4 useradd.8.xml, 1.3, 1.4

Yuri Kozlov yuray-guest at alioth.debian.org
Thu Mar 9 18:24:14 UTC 2006


Update of /cvsroot/l10n-russian/shadow/man
In directory haydn:/tmp/cvs-serv6192

Modified Files:
	chpasswd.8.xml gpasswd.1.xml login.defs.5.xml passwd.1.xml 
	passwd.5.xml pwck.8.xml sg.1.xml useradd.8.xml 
Log Message:
Sync with upstream

Index: useradd.8.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/useradd.8.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- useradd.8.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ useradd.8.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -74,7 +74,7 @@
 	    dir is not specified. <replaceable>BASE_DIR</replaceable> is
 	    concatenated with the account name to define the home directory. 
 	    If the <option>-m</option> option is not used,
-            <replaceable>BASE_DIR</replaceable> must exist.
+	    <replaceable>BASE_DIR</replaceable> must exist.
 	  </para>
 	</listitem>
       </varlistentry>
@@ -91,7 +91,7 @@
 	    <replaceable>LOGIN</replaceable> name to
 	    <replaceable>BASE_DIR</replaceable> and use that as the login
 	    directory name. The directory <replaceable>HOME_DIR</replaceable>
-            does not have to exist but will not be created if it is missing.
+	    does not have to exist but will not be created if it is missing.
 	  </para>
 	</listitem>
       </varlistentry>

Index: gpasswd.1.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/gpasswd.1.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- gpasswd.1.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ gpasswd.1.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -66,7 +66,7 @@
 	useful tool for permitting co-operation between different users.
       </para>
     </refsect2>
-          
+
   </refsect1>
 
   <refsect1 id='options'>

Index: pwck.8.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/pwck.8.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- pwck.8.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ pwck.8.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -106,8 +106,8 @@
 	</term>
 	<listitem>
 	  <para>
-            Report errors only. The warnings which do not require any
-            action from the user won't be displayed.
+	    Report errors only. The warnings which do not require any
+	    action from the user won't be displayed.
 	  </para>
 	</listitem>
       </varlistentry>

Index: sg.1.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/sg.1.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- sg.1.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ sg.1.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -1,6 +1,6 @@
 <?xml version="1.0" encoding="ISO-8859-1"?>
 <!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"
-                   "http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd">
+		"http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd">
 <refentry id='sg.1'>
   <!-- $Id$ -->
   <refmeta>
@@ -18,7 +18,7 @@
       <command>sg</command>
       <arg choice='opt'>- </arg>
       <arg choice='opt'>group
-        <arg choice='opt'>-c </arg>
+	<arg choice='opt'>-c </arg>
 	command
       </arg>
     </cmdsynopsis>

Index: login.defs.5.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/login.defs.5.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- login.defs.5.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ login.defs.5.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -162,7 +162,7 @@
 	<listitem>
 	  <para>
 	    The permission mask is initialized to this value. If not
-	    specified, the permission mask will be initialized to 077.
+	    specified, the permission mask will be initialized to 022.
 	  </para>
 	</listitem>
       </varlistentry>

Index: passwd.5.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/passwd.5.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- passwd.5.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ passwd.5.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -95,7 +95,7 @@
 	</listitem>
       </varlistentry>
       <varlistentry>
-        <term><filename>/etc/shadow</filename></term>
+	<term><filename>/etc/shadow</filename></term>
 	<listitem>
 	  <para>optional encrypted password file</para>
 	</listitem>

Index: chpasswd.8.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/chpasswd.8.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- chpasswd.8.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ chpasswd.8.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -78,9 +78,8 @@
   <refsect1 id='caveats'>
     <title>CAVEATS</title>
     <para>
-      Remember keep protected for reading by others file passed to standard
-      input <command>chpasswd</command> command if it contains unencrypted
-      passwords.
+      Remember to set permissions or umask to prevent readability of
+      unencrypted files by other users.
     </para>
   </refsect1>
 

Index: passwd.1.xml
===================================================================
RCS file: /cvsroot/l10n-russian/shadow/man/passwd.1.xml,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- passwd.1.xml	7 Feb 2006 18:25:34 -0000	1.3
+++ passwd.1.xml	9 Mar 2006 18:24:12 -0000	1.4
@@ -16,22 +16,9 @@
   <refsynopsisdiv id='synopsis'>
     <cmdsynopsis>
       <command>passwd</command>
-      <arg choice='opt'>-x <replaceable>max</replaceable></arg>
-      <arg choice='opt'>-n <replaceable>min</replaceable></arg>
-      <arg choice='opt'>-w <replaceable>warn</replaceable></arg>
-      <arg choice='opt'>-i <replaceable>inact</replaceable></arg>
-      <arg choice='plain'><replaceable>login</replaceable>
+      <arg choice='opt'>
+	<replaceable>options</replaceable>
       </arg>
-    </cmdsynopsis>
-    <cmdsynopsis>
-      <command>passwd</command>
-      <group choice='opt'>
-	<arg choice='plain'>-l </arg>
-	<arg choice='plain'>-u </arg>
-	<arg choice='plain'>-d </arg>
-	<arg choice='plain'>-S </arg>
-	<arg choice='plain'>-e </arg>
-      </group>
       <arg choice='plain'><replaceable>login</replaceable></arg>
     </cmdsynopsis>
   </refsynopsisdiv>
@@ -50,7 +37,7 @@
     <refsect2 id='password_changes'>
       <title>Password Changes</title>
       <para>
-        The user is first prompted for his/her old password, if one is
+	The user is first prompted for his/her old password, if one is
 	present. This password is then encrypted and compared against the
 	stored password. The user has only one chance to enter the correct
 	password. The super user is permitted to bypass this step so that
@@ -58,14 +45,14 @@
       </para>
 
       <para>
-        After the password has been entered, password aging information is
+	After the password has been entered, password aging information is
 	checked to see if the user is permitted to change the password at
 	this time. If not, <command>passwd</command> refuses to change the
 	password and exits.
       </para>
 
       <para>
-        The user is then prompted for a replacement password. This password
+	The user is then prompted for a replacement password. This password
 	is tested for complexity. As a general guideline, passwords should
 	consist of 6 to 8 characters including one or more from each of
 	following sets:
@@ -84,22 +71,22 @@
       </itemizedlist>
 
       <para>
-        Care must be taken not to include the system default erase or kill
+	Care must be taken not to include the system default erase or kill
 	characters. <command>passwd</command> will reject any password which
 	is not suitably complex.
       </para>
 
-      <para>If the password is accepted, <command>passwd</command> will
-	prompt again and compare the second entry against the first. Both
-	entries are required to match in order for the password to be
-	changed.
+      <para>
+	If the password is accepted, <command>passwd</command> will prompt
+	again and compare the second entry against the first. Both entries
+	are required to match in order for the password to be changed.
       </para>
     </refsect2>
 
     <refsect2 id='hints_for_user_passwords'>
       <title>Hints for user passwords</title>
       <para>
-        The security of a password depends upon the strength of the
+	The security of a password depends upon the strength of the
 	encryption algorithm and the size of the key space. The
 	<emphasis>UNIX</emphasis> System encryption method is based on the
 	NBS DES algorithm and is very secure. The size of the key space
@@ -107,7 +94,7 @@
       </para>
 
       <para>
-        Compromises in password security normally result from careless
+	Compromises in password security normally result from careless
 	password selection or handling. For this reason, you should not
 	select a password which appears in a dictionary or which must be
 	written down. The password should also not be a proper name, your
@@ -116,14 +103,14 @@
       </para>
 
       <para>
-        Your password must be easily remembered so that you will not be forced
+	Your password must be easily remembered so that you will not be forced
 	to write it on a piece of paper. This can be accomplished by
 	appending two small words together and separating each with a
 	special character or digit. For example, Pass%word.
       </para>
 
       <para>
-        Other methods of construction involve selecting an easily remembered
+	Other methods of construction involve selecting an easily remembered
 	phrase from literature and selecting the first or last letter from
 	each word. An example of this is:
       </para>
@@ -141,7 +128,7 @@
       </itemizedlist>
 
       <para>
-        You may be reasonably sure few crackers will have included this in
+	You may be reasonably sure few crackers will have included this in
 	their dictionaries. You should, however, select your own methods for
 	constructing passwords and not rely exclusively on the methods given
 	here.




More information about the l10n-russian-cvs-commits mailing list