1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: PACKAGE VERSION\n"
10 "POT-Creation-Date: 2014-02-21 20:25+0100\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
21 msgid "[[!meta title=\"Call for testing: MAC address spoofing\"]]\n"
26 msgid "[[!meta date=\"2013-12-29 12:00:00\"]]\n"
31 "You can help Tails! The [[MAC address spoofing|contribute/design/"
32 "MAC_address]] feature is ready for testing. This feature prevents "
33 "geographical tracking of your network devices (and by extension, you) by "
34 "randomising their [[!wikipedia MAC addresses]]."
39 "If you have security auditing skills you are more than welcome to review our "
40 "[[design|contribute/design/MAC_address]] and [[implementation|contribute/"
41 "design/MAC_address#implementation]]."
46 msgid "[[!toc levels=2]]\n"
56 "Every network device (wired, Wi-Fi/wireless, 3G/mobile) has a [[!wikipedia "
57 "MAC address]], which is a unique identifier used to address them on the "
58 "local network. Broadcasting a unique identifier in this manner introduce a "
59 "couple of potential privacy issues for Tails users. Geographical location "
60 "tracking is the main one: observing a MAC address at a particular location "
61 "and time ties the corresponding device to the same location and time. If the "
62 "real identity of the device's owner is known, their movements can be "
63 "determined. To prevent this one can temporarily change the MAC address to "
64 "something random at each boot, which is referred to as \"MAC address spoofing"
70 msgid "How to download the test image"
75 "Download the latest test ISO from [build_Tails_ISO_devel](http://nightly."
76 "tails.boum.org/build_Tails_ISO_devel/). **Keep in mind that this is a test "
77 "image.** Do not use it for anything else than testing this feature."
82 "To verify the download, use the `.shasum` file. It is signed with OpenPGP "
83 "key [0xD83A438B2F916605](http://keys.indymedia.org/pks/lookup?"
84 "op=get&fingerprint=on&search=0xD83A438B2F916605)."
89 msgid "How to use MAC spoofing in Tails"
94 "MAC spoofing is enabled by default in this test ISO. You can change this "
95 "with a [[startup option|doc/first_steps/startup_options#greeter]]. The "
96 "(preliminary) MAC spoofing documentation tries to explain situations where "
97 "it actually may be a bad idea to keep this option enabled. However, as this "
98 "is just a test version we of course urge you to not use it for anything "
99 "serious, and if possible, to test both to enable and disable the option."
109 "For any MAC spoofing-related issues you experience using this test ISO, "
110 "please include the output from the following commands when reporting it to "
111 "us (note: it requires setting an [[doc/first_steps/startup_options/"
112 "administration_password]]):"
118 " sudo grep spoof-mac /var/log/syslog\n"
119 " sudo grep unblock-network /var/log/syslog\n"
124 "In particular, we would like you to pay extra attention to the following "
130 msgid "Verify that the MAC spoofing setting is enforced"
135 "Please verify that the MAC spoofing setting you select actually is enforced "
136 "by issuing the following commands:"
142 " . /usr/local/lib/tails-shell-library/hardware.sh\n"
143 " for i in $(get_all_ethernet_nics); do\n"
144 " echo \"Interface $i\"\n"
151 "For each network device you'll get an entry looking something like this:"
158 " Permanent MAC: 12:34:56:78:90:ab (unknown)\n"
159 " Current MAC: 12:34:56:f4:fb:22 (unknown)\n"
164 "The \"Permanent MAC\" is the network device's \"real\", unique MAC address; "
165 "the \"Current MAC\" is whatever it is set to at the moment, spoofed or not. "
169 #. type: Bullet: '* '
170 msgid "if they are *different*, then MAC spoofing is *enabled*;"
173 #. type: Bullet: '* '
174 msgid "if they are *the* *same*, then MAC spoofing is *disabled*."
178 msgid "Please report if you ever get unexpected results."
183 msgid "MAC address whitelisting problems"
188 "Some wireless networks are configured to only allow connections for devices "
189 "with certain MAC addresses, called MAC address whitelisting. MAC address "
190 "spoofing will cause issues on networks like these. Therefore Tails has a "
191 "crude mechanism for detecting this, and will show an informative "
192 "notification about what to do about it."
197 "If you have access to a wireless network that employs MAC address "
198 "whitelisting, then connect to it with MAC spoofing enabled and verify that "
199 "Tails shows a notification with the headline: \"Network connection blocked?"
205 "Note: Tails detection mechanism for MAC address whitelisting only works for "
206 "wireless (Wi-Fi) networks."
211 msgid "Network problems"
216 "Please report all network device and connection issues, e.g. if any of your "
217 "network devices do not get detected by Tails at all, if the network "
218 "connection fails, or if the network connection succeeds but actually does "
219 "not work. Also check whether you experience the same issues using Tails 0.22."
229 msgid "No fail-safe for hotplugged devices after logging in"
234 "In order to prevent the real MAC address from leaking when MAC spoofing "
235 "fails for some network device, Tails has a fail-safe that simply disables "
236 "the device. At the moment this only works for network devices present before "
237 "logging in with Tails Greeter; the fail-safe does *not* work for e.g. Wi-Fi "
238 "USB dongles hotplugged *after* that."