Kl$,$%$$%%/%?%?V%;%&%9%3&9P&7&&&'&,&$'.8',g'''&'/'.(&?(0f(S((( )7)T)X)_)s)))))))))/&*V*m*}*>*I*5 +&@+)g+<+'+%+I,*f,!,),$,$- '-(3-\-2d-- --2-# .1..2`.. ."../3112P 2[2y2!22"2-2%3(C31l3*3233%4@4^4{4$4!44%4 $5 E5f5(55$55%6$-6R6!o6$6'666777L7d77"777 7 838 L8m88$88%8 9#9;9#[9999*95:7:V:!u:(:!:":!;&';N;$h;/;/;4;"<?<<)|<)<.<)<))=.S=)=)=.=$>!*>L>)h>> >>>> >> ?? 9? E? Q?_?h?? ?W? ?g@dp@g@2=AJpA<A'A( BIB cBB"B#BBC$C!AC cC CFC CC DD7D JDTD gDuD D;D"D)DREnEuEyE E EE4EEF'F @F6aF FFFFF GG!G 4G?G VG<aG#G G GGGG G G H%H AHKH_H {H%H HHQH II4IMI)aIII I II II II8J8L]LoL L LL LLL:L7MVMuMMM MM,nNFN&N: ODO'4P<\PP(P$PP Q Q0'Q5XQ6QQqQLRRRYRwR|RS,S*S'S.#TERTTTT'RU)zUU"U,UV1VOVkV VVVVVV' W2W]CW W WrWU+XX XX X XX.X*YAYL^YYLY%Z6Z<RZZ0ZZ ZZZ,[44[#i[['[,[([(\=\"S\v\\\\\\]1]O]W]_]g]o]w]]]+]"]]#]7^W^[^$^^^^^^^%^$^#_:_Ma?Ta+aa+ab,b?b}bECcsc@cz>d<dddWe][eecei9f1f"fBf[;gTgNgi;hhSiliiXi ij@j*Wj"jAj2j)kGDk!klkWl"sl?l lhlLmtmPfn[nqo_o>o$pcp\JqcqT rT`rrLr sz$sAs-s(t\8tGtvtQTuRu:u<4vqv xz l||P|A|)1}H[}7}P}b-~J~m~lIXs<E2.9:hH<2)P\TA)DcnF҃K7eTF-9Wg>>4=QrXĆ5[S[J nV`ňH&_o[ωH+Et+LM39V.+AHmM92>Bq_c4x<Di/=T׏F,Ps2ĐTQLZd2^oIRK\GPCZP^@hEINNF.N0gǗ,ח$G)#q,Ә&( 44i 3=o-ߝPfL6D;DJşLI]5:ݠ<<U<|ϡL=f+?Т'8&H*o'£ң@R` 6 ɥ'0eC0ڦ L8:ܧ-7!"Y:|-'!(JKթ !.CGLbsI?֪,(IU#hë,CJ/ .;,jb" ; I.T ƮWr; ޯ3 4KAB3а-I2|+,ű$\t@}"۲Lf~$۳ s)q:5J"b˵~.W:z q${7*3b=Լ a^Ya/C,Hp[jW}f<J GT1QR CsA711c.z#2B3CXw/4"2= * HQUc s(#zE;<n7-Xe  0VksU5:DZSZ.?OEE_62C=S91 %-5F=->3%,=<CX@u?>S3{ 2j|V q{vJq-cz`i}p0 Jm\ )sYewl0r.9!?'p#b$aikm;~ M_A+=%B]fdRe@LaF]<Oy5gj +E>GlRK7NyQZSk&4D@1u<%,UhWVG2H-$I~8XCgP([ho o8&U=c^?LH\3^[bFxn6#}K`4" |n(YD s_:t*OX 6*Wz9w17IT,v  d)ZE.QfCx/B:u!/'">;PANTt5Mr SELinux Distribution fcontext Equivalence SELinux Local fcontext Equivalence %s changed labels. %s is already in %s%s is not a valid context %s is not in %s%s must be a directory%s! Could not get current context for %s, not relabeling tty. %s! Could not get new context for %s, not relabeling tty. %s! Could not set new context for %s %s: Can't load policy and enforcing mode requested: %s %s: Can't load policy: %s %s: Policy is already loaded and initial load requested ******************** IMPORTANT *********************** ...600-1024Add booleans from the %s policy:Add files/directories that %s managesApplicationsEnter name of application or user role:Enter network ports that %s binds on:Login UsersRoot UsersSelect additional roles for %s:Select common application traits for %s:Select domains that %s will administer:Select existing role to modify:Select network ports that %s connects to:Select the policy type for the application or user role you want to confine:Select:TCP PortsUDP PortsWhich directory you will generate the %s policy?AddAdd %sAdd Booleans DialogAdd File ContextAdd Network PortAdd SELinux Login MappingAdd SELinux Network PortsAdd SELinux UserAdd SELinux User MappingAdd UserAdd/Remove booleans used by the %s domainAddr %s is defined in policy, cannot be deletedAddr %s is not definedAdmin User RoleAllAllow %s to call bindresvport with 0. Binding to port 600-1024Allow ABRT to modify public files used for public file transfer services.Allow all daemons the ability to read/write terminalsAllow all daemons to use tcp wrappers.Allow all daemons to write corefiles to /Allow dhcpc client applications to execute iptables commandsAllow pppd to be run for a regular userAllow ssh logins as sysadm_r:sysadm_tAllow system cron jobs to relabel filesystem for restoring file contexts.Allow users to login using a radius serverAllows %s to bind to any udp portAllows %s to bind to any udp ports > 1024Allows %s to connect to any tcp portAllows %s to connect to any udp portApplicationAre you sure you want to delete %s '%s'?BooleanBoolean %s is defined in policy, cannot be deletedBoolean %s is not definedBoolean NameBuiltin Permissive TypesCan not combine +/- with other types of categoriesCan not have multiple sensitivitiesCan not modify sensitivity levels using '+' on %sCannot find your entry in the shadow passwd file. Cannot read policy store.Change process mode to enforcingChange process mode to permissive.Changing the policy type will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?Changing to SELinux disabled requires a reboot. It is not recommended. If you later decide to turn SELinux back on, the system will be required to relabel. If you just want to see if SELinux is causing a problem on your system, you can go to permissive mode which will only log errors and not enforce SELinux policy. Permissive mode does not require a reboot Do you wish to continue?Changing to SELinux enabled will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?Configue SELinuxContextCopyright (c)2006 Red Hat, Inc. Copyright (c) 2006 Dan Walsh Could not add SELinux user %sCould not add addr %sCould not add file context for %sCould not add interface %sCould not add login mapping for %sCould not check if SELinux user %s is definedCould not check if addr %s is definedCould not check if boolean %s is definedCould not check if file context for %s is definedCould not check if interface %s is definedCould not check if login mapping for %s is definedCould not close descriptors. Could not commit semanage transactionCould not create a key for %sCould not create addr for %sCould not create context for %sCould not create file context for %sCould not create interface for %sCould not create key for %sCould not create login mapping for %sCould not create semanage handleCould not delete SELinux user %sCould not delete addr %sCould not delete all interface mappingsCould not delete boolean %sCould not delete file context for %sCould not delete interface %sCould not delete login mapping for %sCould not delete the file context %sCould not delete the port %sCould not deleteall node mappingsCould not determine enforcing mode. Could not establish semanage connectionCould not extract key for %sCould not list SELinux modulesCould not list SELinux usersCould not list addrsCould not list booleansCould not list file contextsCould not list interfacesCould not list local file contextsCould not list login mappingsCould not list portsCould not list roles for user %sCould not list the file contextsCould not list the portsCould not modify SELinux user %sCould not modify addr %sCould not modify boolean %sCould not modify file context for %sCould not modify interface %sCould not modify login mapping for %sCould not open file %s Could not query addr %sCould not query file context %sCould not query file context for %sCould not query interface %sCould not query seuser for %sCould not query user for %sCould not remove module %s (remove failed)Could not remove permissive domain %s (remove failed)Could not set MLS level for %sCould not set MLS range for %sCould not set SELinux user for %sCould not set active value of boolean %sCould not set addr context for %sCould not set exec context to %s. Could not set file context for %sCould not set interface context for %sCould not set mask for %sCould not set message context for %sCould not set mls fields in addr context for %sCould not set mls fields in file context for %sCould not set mls fields in interface context for %sCould not set name for %sCould not set permissive domain %s (module installation failed)Could not set role in addr context for %sCould not set role in file context for %sCould not set role in interface context for %sCould not set type in addr context for %sCould not set type in file context for %sCould not set type in interface context for %sCould not set user in addr context for %sCould not set user in file context for %sCould not set user in interface context for %sCould not start semanage transactionCould not test MLS enabled statusCouldn't get default type. Create/Manipulate temporary files in /tmpCurrent Enforcing ModeCustomizedCustomized Permissive TypesDBUS System DaemonDefaultDelete %sDelete File ContextDelete Network PortDelete SELinux User MappingDelete UserDescriptionDisable AuditDisabledDisabled Permissive Enforcing Edit Network PortEnable AuditEnable/Disable additional audit rules, that are normally not reported in the log files.EnforcingEnter a comma separated list of tcp ports or ranges of ports that %s connects to. Example: 612, 650-660Enter a comma separated list of udp ports or ranges of ports that %s binds to. Example: 612, 650-660Enter a comma separated list of udp ports or ranges of ports that %s connects to. Example: 612, 650-660Enter complete path for executable to be confined.Enter complete path to init script used to start the confined application.Enter unique name for the confined application or user role.Equivalence class for %s already existsEquivalence class for %s does not existsError allocating memory. Error allocating shell's argv0. Error changing uid, aborting. Error connecting to audit system. Error resetting KEEPCAPS, aborting Error sending audit message. Error! Could not open %s. Error! Shell is not valid. Error: multiple levels specified Error: multiple roles specified Error: multiple types specified Error: you are not allowed to change levels on a non secure terminal ExecutableExisting User RolesExisting_UserFailed to close tty properly File SpecificationFile TypeFile Contexts fileFile LabelingFile SpecificationFile TypeFile context for %s is defined in policy, cannot be deletedFile context for %s is not definedFile specification can not include spacesFiles/Directories which the %s "manages". Pid Files, Log Files, /var/lib Files ...FilterGPLGenerate new policy moduleGroup ViewInit scriptInteracts with the terminalInterface %s is defined in policy, cannot be deletedInterface %s is not definedInterface fileInternet Services DaemonInternet Services Daemon (inetd)Internet Services Daemon are daemons started by xinetdInvalid PortInvalid file specificationLabelingLinux Group %s does not existLinux User %s does not existList ViewLoad Policy ModuleLoad policy moduleLogin NameLogin '%s' is requiredLogin NameLogin mapping for %s is defined in policy, cannot be deletedLogin mapping for %s is not definedMCS LevelMCS RangeMLSMLS/MLS/ MCS RangeMLS/MCS LevelMLS/MCS RangeMinimal Terminal User RoleMinimal X Windows User RoleModify %sModify File ContextModify SELinux User MappingModify UserModify an existing login user record.Module NameNameName must be alpha numberic with no spaces. Consider using option "-n MODULENAME"Network PortNo context in file %s Node Address is requiredNot yet implementedOnly Daemon apps can use an init script..Options Error %s Out of memory! Password:PermissivePolicy DirectoryPolicy ModulePortPort NumberPort is requiredPort number "%s" is not valid. 0 < PORT_NUMBER < 65536 Ports must be numbers or ranges of numbers from 1 to %d PrefixProcess DomainProtoProtocolProtocol udp or tcp is requiredRed Hat 2007Relabel on next reboot.Remove loadable policy moduleRequires at least one categoryRequires prefix or rolesRequires prefix, roles, level or rangeRequires setypeRequires setype or serangeRequires setype, serange or seuserRequires seuser or serangeRevert boolean setting to system defaultRoleRoot Admin User RoleSELinux UserSELinux AdministrationSELinux InterfaceSELinux Policy Generation ToolSELinux Port TypeSELinux Port TypeSELinux RolesSELinux TypeSELinux Type is requiredSELinux UserSELinux booleanSELinux fcontextSELinux policy is not managed or store cannot be accessed.SELinux user %s is defined in policy, cannot be deletedSELinux user %s is not definedSELinux user '%s' is requiredSandboxSelect Management ObjectSelect PortsSelect Root Administrator User Role, if this user will be used to administer the machine while running as root. This user will not be able to login to the system directly.Select directory to generate policy files inSelect directory(s) that the confined application owns and writes intoSelect executable file to be confined.Select file(s) that confined application creates or writesSelect if you wish to relabel then entire file system on next reboot. Relabeling can take a very long time, depending on the size of the system. If you are changing policy types or going from disabled to enforcing, a relabel is required.Select init script file to be confined.Select the domains that you would like this user administer.Selinux File TypeSemanage transaction already in progressSemanage transaction not in progressSends audit messagesSends emailSetup ScriptSorry, -l may be used with SELinux MLS support. Sorry, newrole may be used only on a SELinux kernel. Sorry, run_init may be used only on a SELinux kernel. Standard Init DaemonStandard Init Daemon are daemons started on boot via init scripts. Usually requires a script in /etc/rc.d/init.dStateStatusSystem Default Enforcing ModeSystem Default Policy Type: This user can login to a machine via X or terminal. By default this user will have no setuid, no networking, no sudo, no suThis user will login to a machine only via a terminal or remote login. By default this user will have no setuid, no networking, no su, no sudo.To make this policy package active, execute:Toggle between Customized and All BooleansToggle between Customized and All PortsToggle between all and customized file contextType %s_t already defined in current policy. Do you want to continue?Type Enforcement fileType is requiredUSAGE: run_init