messages.subr revision 251389
1210008Srdivacky# Copyright (c) 2012 Devin Teske
2210008Srdivacky# All rights reserved.
3210008Srdivacky#
4210008Srdivacky# Redistribution and use in source and binary forms, with or without
5210008Srdivacky# modification, are permitted provided that the following conditions
6210008Srdivacky# are met:
7210008Srdivacky# 1. Redistributions of source code must retain the above copyright
8210008Srdivacky#    notice, this list of conditions and the following disclaimer.
9210008Srdivacky# 2. Redistributions in binary form must reproduce the above copyright
10210008Srdivacky#    notice, this list of conditions and the following disclaimer in the
11210008Srdivacky#    documentation and/or other materials provided with the distribution.
12210008Srdivacky#
13210008Srdivacky# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14210008Srdivacky# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15210008Srdivacky# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16210008Srdivacky# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
17210008Srdivacky# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18210008Srdivacky# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19210008Srdivacky# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20210008Srdivacky# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
21210008Srdivacky# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
22210008Srdivacky# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
23210008Srdivacky# SUCH DAMAGE.
24210008Srdivacky#
25210008Srdivacky# $FreeBSD: head/usr.sbin/bsdconfig/security/include/messages.subr 251389 2013-06-04 16:48:23Z dteske $
26218893Sdim
27210008Srdivackyhline_arrows_tab_enter="Press arrows, TAB or ENTER"
28210008Srdivackyhline_select_securelevel_to_operate_at="Select a securelevel to operate at"
29210008Srdivackymsg_cancel="Cancel"
30210008Srdivackymsg_disable_securelevels="Disable securelevels"
31210008Srdivackymsg_disabled="Disabled"
32210008Srdivackymsg_exit="Exit"
33210008Srdivackymsg_exit_this_menu="Exit this menu"
34210008Srdivackymsg_highly_secure="Highly Secure"
35210008Srdivackymsg_highly_secure_mode="Highly secure mode"
36210008Srdivackymsg_menu_text="This menu allows you to configure aspects of the operating system security\npolicy.  Please read the system documentation carefully before modifying\nthese settings, as they may cause service disruption if used improperly.\n\nMost settings will take affect only following a system reboot."
37210008Srdivackymsg_network_secure="Network Secure"
38210008Srdivackymsg_network_secure_mode="Network secure mode"
39210008Srdivackymsg_nfs_port="NFS port"
40210008Srdivackymsg_nfs_port_desc="Require that the NFS clients use reserved ports"
41210008Srdivackymsg_ok="OK"
42210008Srdivackymsg_secure="Secure"
43210008Srdivackymsg_secure_mode="Secure mode"
44210008Srdivackymsg_securelevel="Securelevel"
45210008Srdivackymsg_securelevel_desc="Configure securelevels for the system"
46210008Srdivackymsg_securelevels_menu_text="This menu allows you to select the securelevel your system runs with.\nWhen operating at a securelevel, certain root privileges are disabled,\nwhich may increase resistance to exploits and protect system integrity.\nIn secure mode system flags may not be overridden by the root user,\naccess to direct kernel memory is limited, and kernel modules may not\nbe changed.  In highly secure mode, mounted file systems may not be\nmodified on-disk, tampering with the system clock is prohibited.  In\nnetwork secure mode configuration changes to firewalling are prohibited.\n "
47210008Srdivackymsg_securelevels_menu_title="Securelevel Configuration Menu"
48210008Srdivackymsg_system_security_options_menu="System Security Options Menu"
49210008Srdivacky