From owner-man-jp-reviewer@jp.FreeBSD.org Fri Apr 12 02:19:54 2002
Received: (from daemon@localhost)
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) id g3BHJs662082;
	Fri, 12 Apr 2002 02:19:54 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from soda.bekkoame.ne.jp (soda.bekkoame.ne.jp [202.231.192.80])
	by castle.jp.FreeBSD.org (8.11.6+3.4W/8.11.3) with ESMTP/inet id g3BHJsv62077
	for <man-jp-reviewer@jp.FreeBSD.org>; Fri, 12 Apr 2002 02:19:54 +0900 (JST)
	(envelope-from haffner@sag.bekkoame.ne.jp)
Received: from 3W1G31S (M106081.ppp.dion.ne.jp [61.117.106.81])
	by soda.bekkoame.ne.jp (Postfix) with SMTP id 70B6610E5
	for <man-jp-reviewer@jp.FreeBSD.org>; Fri, 12 Apr 2002 02:19:30 +0900 (JST)
Message-ID: <027201c1e17d$343d9fe0$0300a8c0@3W1G31S>
From: "Toshiro Kamei" <haffner@sag.bekkoame.ne.jp>
To: <man-jp-reviewer@jp.FreeBSD.org>
Date: Fri, 12 Apr 2002 02:20:40 +0900
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Reply-To: man-jp-reviewer@jp.FreeBSD.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+020409
X-Sequence: man-jp-reviewer 4080
Subject: [man-jp-reviewer 4080] A translated manual of pam_ssh.8
Errors-To: owner-man-jp-reviewer@jp.FreeBSD.org
Sender: owner-man-jp-reviewer@jp.FreeBSD.org
X-Originator: haffner@sag.bekkoame.ne.jp

$B$3$s$P$s$O!"550f(B@$B?@8M$G$9!#(B

pam_ssh.8$B$NLu$,$G$-$^$7$?$N$G!"%A%'%C%/$r$*4j$$$7$^$9!#(B

--$B0J2<$h$jK\J8(B--

--- pam_ssh_eng00.txt Fri Apr 12 01:51:06 2002
+++ pam_ssh_jpn00_trans.txt Fri Apr 12 02:16:10 2002
@@ -35,114 +35,99 @@
 .\" $FreeBSD: src/lib/libpam/modules/pam_ssh/pam_ssh.8,v 1.8.2.1 2002/04/04 12:29:36 des Exp $
 .\"
 .Dd November 26, 2001
+.\" jpman %Id: pam_ssh.8,v 0.0 2002/04/07 00:46:45 horikawa Stab %
 .Dt PAM_SSH 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm pam_ssh
-.Nd SSH PAM module
-.Sh SYNOPSIS
+.Nd SSH PAM $B%b%8%e!<%k(B
+.Sh $B=q<0(B
 .Op Ar service-name
 .Ar module-type
 .Ar control-flag
 .Pa pam_ssh
 .Op Ar options
-.Sh DESCRIPTION
-The
+.Sh $B2r@b(B
+PAM$BMQ(B
 SSH
-authentication service module for PAM,
+$BG'>Z%5!<%S%9%b%8%e!<%k$G$9!#(B
 .Nm
-provides functionality for two PAM categories:
-authentication
-and session management.
-In terms of the
+$B$OG'>Z$H%;%C%7%g%s4IM}$N(B 2 $B$D$N(B PAM $BJ,Ln$N$?$a$N4X?t$rDs6!$7$^$9!#(B
 .Ar module-type
-parameter, they are the
+$B%Q%i%a!<%?Cf$G$O(B
 .Dq Li auth
-and
 .Dq Li session
-features.
-It also provides null functions for the remaining categories.
-.Ss SSH Authentication Module
-The
+$B$HI=8=$5$l$^$9!#(B
+$B$=$NB>$NJ,Ln$N$?$a$N4X?t$O$"$j$^$;$s!#(B
+.Ss SSH $BG'>Z%b%8%e!<%k(B
 SSH
-authentication component
-provides a function to verify the identity of a user
-.Pq Fn pam_sm_authenticate ,
-by prompting the user for a passphrase and verifying that it can
-decrypt the target user's SSH key using that passphrase.
+$BG'>Z%3%s%]!<%M%s%H$O!"%f!<%6$NK\?M3NG'$N4X?t(B
+.Pq Fn pam_sm_authenticate 
+$B$rDs6!$7$^$9!#4X?t$O!"%f!<%6$KBP$7%Q%9%U%l!<%:$rMW5a$7!"(B
+$B$=$l$r;H$C$F3:Ev%f!<%6$N(B SSH $B%-!<$,2rFI$G$-$k$+$r3N$+$a$^$9!#(B
 .Pp
-The following options may be passed to the authentication module:
+$B$3$NG'>Z%b%8%e!<%k$G$O!"<!$K<($9%*%W%7%g%s$,MxMQ$G$-$^$9!#(B
 .Bl -tag -width ".Cm use_first_pass"
 .It Cm debug
 .Xr syslog 3
-debugging information at
 .Dv LOG_DEBUG
-level.
+$B%l%Y%k$G$N%G%P%C%/>pJs(B
 .It Cm use_first_pass
-If the authentication module
-is not the first in the stack,
-and a previous module
-obtained the user's password,
-that password is used
-to authenticate the user.
-If this fails,
-the authentication module returns failure
-without prompting the user for a password.
-This option has no effect
-if the authentication module
-is the first in the stack,
-or if no previous modules
-obtained the user's password.
+$B$3$NG'>Z%b%8%e!<%k$,%9%?%C%/Cf$G@hF,$K$O$J$$$H$-$K!"(B
+$B$3$l$h$j$bA0$N%b%8%e!<%k$,!"(B
+$B%f!<%6$N%Q%9%o!<%I$rF~<j$7$F$$$k>l9g$K$O!"(B
+$B$=$N%Q%9%o!<%I$r%f!<%6$NG'>Z$KMxMQ$7$^$9!#(B
+$B$b$7G'>Z$K<:GT$9$k$H!"$3$NG'>Z%b%8%e!<%k$O(B
+$B%Q%9%o!<%I$NMW5a$r$;$:$K!"!I<:GT!I$rJV$7$^$9!#(B
+$B$3$NG'>Z%b%8%e!<%k$,%9%?%C%/Cf$G@hF,$K$"$k>l9g!"(B
+$B$b$7$/$O!"$3$l$h$jA0$N%b%8%e!<%k$,%f!<%6$N%Q%9%o!<%I$r(B
+$BF~<j$7$J$$>l9g$K$O!"$3$N%*%W%7%g%s$OL58z$K$J$j$^$9!#(B
 .It Cm try_first_pass
-This option is similar to the
-.Cm use_first_pass
-option,
-except that if the previously obtained password fails,
-the user is prompted for another password.
+$B$3$N%*%W%7%g%s$O(B
+.Cm use_first_pass 
+$B%*%W%7%g%s$K;w$F$$$^$9$,!"(B
+$BA0$N%b%8%e!<%k$GF@$?%Q%9%o!<%I$,<:GT$7$F$b(B
+$B%f!<%6$KB>$N%Q%9%o!<%I$rMW5a$7$^$9!#(B
 .El
-.Ss SSH Session Management Module
-The
+.Ss SSH $B%;%C%7%g%s4IM}%b%8%e!<%k(B
 SSH
-session management component
-provides functions to initiate
+$B%;%C%7%g%s4IM}%3%s%]!<%M%s%H$O(B
+$B%;%C%7%g%s$N3+;O(B
 .Pq Fn pam_sm_open_session
-and terminate
+$B$H=*N;(B
 .Pq Fn pam_sm_close_session
-sessions.
-The
+$B$N4X?t$rDs6!$7$^$9!#(B
 .Fn pam_sm_open_session
-function starts an SSH agent,
-passing it any private keys it decrypted
-during the authentication phase,
-and sets the environment variables
-the agent specifies.
-The
+$B4X?t$O(B SSH $B%(!<%8%'%s%H$r3+;O$5$;$^$9!#(B
+$B$=$7$F!"HkL)80$,G'>Z2aDx$K$*$$$F2rFI$5$l!"(B
+$B%(!<%8%'%s%H$,7hDj$7$?4D6-JQ?t$,%;%C%H$5$l$^$9!#(B
 .Fn pam_sm_close_session
-function kills the previously started SSH agent
-by sending it a
-.Dv SIGTERM .
+$B4X?t$OA0$K3+;O$5$l$?(B SSH $B%(!<%8%'%s%H$K(B
+.Dv SIGTERM 
+$B$rAw$C$F=*N;$5$;$^$9!#(B
 .Pp
-The following options may be passed to the session management module:
+$B%;%C%7%g%s4IM}%b%8%e!<%k$G$O0J2<$N%*%W%7%g%s$,M-8z$G$9!#(B
 .Bl -tag -width ".Cm use_first_pass"
 .It Cm debug
-.Xr syslog 3
-debugging information at
-.Dv LOG_DEBUG
-level.
+.Xr syslog 3 
+$B$N(B 
+.Dv LOG_DEBUG 
+$B%l%Y%k$N%G%P%C%/>pJs$G$9!#(B
 .El
-.Sh FILES
+.Sh $B4XO"%U%!%$%k(B
 .Bl -tag -width ".Pa $HOME/.ssh2/id_dsa_*" -compact
 .It Pa $HOME/.ssh/identity
-SSH1/OpenSSH RSA key.
+SSH1/OpenSSH RSA $B%-!<!#(B
 .It Pa $HOME/.ssh/id_dsa
-OpenSSH DSA key.
+OpenSSH DSA $B%-!<!#(B
 .It Pa $HOME/.ssh2/id_rsa_*
-SSH2 RSA keys.
+SSH2 RSA $B%-!<!#(B
 .It Pa $HOME/.ssh2/id_dsa_*
-SSH2 DSA keys.
+SSH2 DSA $B%-!<!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ssh-agent 1 ,
 .Xr syslog 3 ,
 .Xr pam.conf 5 ,
 .Xr pam 8
+

--$B0J>e(B--

