鍋太郎です。
インストールマニュアルの訳を追随しました。
本文と差分を添付しますので査読をお願いいたします。
アーカイブの内容は以下になります。
$ tar ztf d-i-update0724.tar.gz
ja/boot-new/boot-new.xml
--
+--------------------------------------------------------+
倉澤 望(鍋太郎)
KURASAWA Nozomu (nabetaro) <nabetaro @ caldron.jp>
GnuPG FingerPrint:
C4E5 7063 FD75 02EB E71D 559B ECF6 B9D2 8147 ADFB
+--------------------------------------------------------+
Attachment:
d-i-update0724.tar.gz
Description: Binary data
Index: ja/boot-new/boot-new.xml
===================================================================
--- ja/boot-new/boot-new.xml (ӥ 39257)
+++ ja/boot-new/boot-new.xml (ȥԡ)
@@ -1,6 +1,6 @@
<?xml version="1.0" encoding="EUC-JP"?>
<!-- retain these comments for translator revision tracking -->
-<!-- original version: 33725 -->
+<!-- original version: 38703 -->
<chapter id="boot-new">
<!--
@@ -344,6 +344,245 @@
</sect2>
</sect1>
+ <sect1 id="mount-encrypted-volumes">
+<!--
+ <title>Mounting encrypted volumes</title>
+-->
+ <title>Ź沽ܥ塼Υޥ</title>
+
+<para>
+
+<!--
+If you created encrypted volumes during the installation and assigned
+them mount points, you will be asked to enter the passphrase for each
+of these volumes during the boot. The actual procedure differs
+slightly between dm-crypt and loop-AES.
+-->
+ȡ˰Ź沽ܥ塼ޥȥݥȤ˳Ƥȡ
+Υܥ塼Фơư˥ѥե졼Ϥ褦˿֤Ƥޤ
+ºݤμϡdm-crypt loop-AES Ǥϼ㴳ۤʤޤ
+
+</para>
+
+ <sect2 id="mount-loop-aes">
+ <title>loop-AES</title>
+
+<para>
+
+<!--
+For partitions encrypted via loop-AES you will be shown the following
+prompt during the boot:
+-->
+loop-AES ǰŹ沽ѡƥǤϡ
+ư˰ʲΤ褦ʥץץȤɽޤ
+
+<informalexample><screen>
+mount: going to use loop device /dev/loop<replaceable>X</replaceable>
+Password:
+</screen></informalexample>
+
+<!--
+In the first line of the prompt, <replaceable>X</replaceable> is the
+number of the loop device. You are now probably wondering
+<emphasis>for which volume</emphasis> you are actually entering the
+passphrase. Does is relate to your <filename>/home</filename>? Or to
+<filename>/var</filename>? Of course, if you have just one encrypted
+volume, this is easy and you can just enter the passphrase you used
+when setting up this volume. If you set up more than one encrypted
+volume during the installation, the notes you wrote down as the last
+step in <xref linkend="partman-crypto"/> come in handy. If you did not
+make a note of the mapping between
+<filename>loop<replaceable>X</replaceable></filename> and the mount
+points before, you can still find it
+in <filename>/etc/fstab</filename> of your new system.
+-->
+ץץȤκǽιԤ <replaceable>X</replaceable> ϡ
+롼ץǥХֹǤ
+餯<emphasis>ܥ塼ऴȤ</emphasis> ѥե졼Ϥ뤳Ȥˡ
+´ΤǤϤʤǤ礦
+<filename>/home</filename> ˤĤ?
+⤷ <filename>/var</filename> ˤĤ?
+Ź沽ܥ塼ǤС
+åȥåפȤϤѥե졼ϤΤñǤ
+ȡˡŹ沽ܥ塼ʤȤĤꤷƤʤ顢
+<xref linkend="partman-crypto"/>
+κǸΥƥåפνα⤬ΩĤǤ礦
+ <filename>loop<replaceable>X</replaceable></filename>
+ȥޥȥݥȤδ֤ΥޥåԥϿʤ硢
+ƥ <filename>/etc/fstab</filename> ˤޤ
+
+</para><para>
+
+<!--
+No characters (even asterisks) will be shown while entering the
+passphrase. Be careful, you have only <emphasis>one try</emphasis>. If
+you enter wrong passphrase, an error message will appear and the boot
+process will skip that volume and continue to mount the next
+filesystem. Please see <xref linkend="crypto-troubleshooting"/> for
+further information.
+-->
+ѥե졼ϻˤʸ (ꥹ) ɽޤ
+<emphasis>Ԥ 1 </emphasis>ʤȤդƤ
+ѥե졼ְ㤨ȡΥܥ塼åפơ
+Υե륷ƥޥȤ褦Ȥޤ
+ܺ٤ϡ<xref linkend="crypto-troubleshooting"/>
+
+</para><para>
+
+<!--
+After entering all passphrases the boot should continue as usual.
+-->
+ѥե졼٤Ϥȡ̾Ʊͤ˵ư³ޤ
+
+</para>
+ </sect2>
+
+ <sect2 id="mount-dm-crypt">
+ <title>dm-crypt</title>
+
+<para condition="FIXME">
+
+<!--
+TODO: write something once it works.
+-->
+TODO: ɤΤ褦ư뤫Ƥ
+
+</para>
+ </sect2>
+
+ <sect2 id="crypto-troubleshooting">
+<!--
+ <title>Troubleshooting</title>
+-->
+ <title>ȥ֥륷塼</title>
+
+<para>
+
+<!--
+If some of the encrypted volumes could not be mounted because a wrong
+passphrase was entered, you will have to mount them manually after the
+boot. There are several cases.
+-->
+ѥե졼ְ㤨ơŹ沽ܥ塼ޥȤǤʤä硢
+֡ȸ˼ưǥޥȤɬפޤʲξͤޤ
+
+</para>
+
+<itemizedlist>
+<listitem><para>
+
+<!--
+The first case concerns the root partition. When it is not mounted
+correctly, the boot process will halt and you will have to reboot the
+computer to try again.
+-->
+ޤϤξϡ롼ȥѡƥ˴ؤ뤳ȤǤ
+ޥȤǤʤȥ֡ȥץߤ
+ƵưƤ⤦ٹԤʤФʤޤ
+
+</para></listitem>
+<listitem><para>
+
+<!--
+The easiest case is for encrypted volumes holding data like
+<filename>/home</filename> or <filename>/srv</filename>. You can
+simply mount them manually after the boot. For loop-AES this is
+one-step operation:
+-->
+Ǥñʾϡ<filename>/home</filename> <filename>/srv</filename>
+ȤäǡݻƤŹ沽ܥ塼ξǤ
+ξϡ֡ȸ˼ưǥޥȤƤǤ
+loop-AES ǤϡʲΤ褦 1 ƥåפǤ
+
+<informalexample><screen>
+<prompt>#</prompt> <userinput>mount <replaceable>/mount_point</replaceable></userinput>
+<prompt>Password:</prompt>
+</screen></informalexample>
+
+<!--
+where <replaceable>/mount_point</replaceable> should be replaced by
+the particular directory (e.g. <filename>/home</filename>). The only
+difference from an ordinary mount is that you will be asked to enter
+the passphrase for this volume.
+-->
+<replaceable>/mount_point</replaceable> ϡ
+Υǥ쥯ȥ֤Ƥ( <filename>/home</filename>)
+̾ΥޥȤȰ㤦Τϡ
+Υܥ塼Ѥ˥ѥե졼Ϥ褦¥롢ȤȤǤ
+
+
+</para><para>
+
+<!--
+For dm-crypt this is a bit trickier. First you need to register the
+volumes with <application>device mapper</application> by running:
+-->
+dm-crypt ξϾȥåǤ
+ޤ <application>device mapper</application> ¹Ԥơ
+ܥ塼Ͽɬפޤ
+
+<informalexample><screen>
+<prompt>#</prompt> <userinput>/etc/init.d/cryptdisks start</userinput>
+</screen></informalexample>
+
+<!--
+This will scan all volumes mentioned
+in <filename>/etc/crypttab</filename> and will create appropriate
+devices under the <filename>/dev</filename> directory after entering
+the correct passphrases. (Already registered volumes will be skipped,
+so you can repeat this command several times without worrying.) After
+successful registration you can simply mount the volumes the usual
+way:
+-->
+<filename>/etc/crypttab</filename> ˵Ҥ줿ܥ塼ह٤Ƥ
+ѥե졼Ϥȡ
+<filename>/dev</filename> ǥ쥯ȥʲˡŬڤʥǥХޤ
+(Ͽ줿ܥ塼ϥåפΤǡټ¹ԤƤٹ𤬤Ǥޤ)
+ϿȡʲΤ褦̾ˡǥޥȤǤޤ
+
+<informalexample><screen>
+<prompt>#</prompt> <userinput>mount <replaceable>/mount_point</replaceable></userinput>
+</screen></informalexample>
+
+</para></listitem>
+<listitem><para>
+
+<!--
+If the volumes holding noncritical system files could not be mounted
+(<filename>/usr</filename> or <filename>/var</filename>), the system
+should still boot and you should be able to mount the volumes manually
+like in the previous case. However, you will also need to (re)start
+any services usually running in your default runlevel because it is
+very likely that they were not started. The easiest way to achieve
+this is by switching to the first runlevel and back by entering
+-->
+ƥǤʤƥեܥ塼
+(<filename>/usr</filename> <filename>/var</filename>)
+ޥȤǤʤä硢Ǥ⥷ƥबư
+ҤξΤ褦˼ưǥܥ塼ޥȤǤǤ礦
+ǥեȤΥ٥̾ưƤ륵ӥ
+ưƤʤǽΤǡ() ưɬפޤ
+ǤñʤΤϡǽΥ٥˰ʲΤ褦ڤؤ뤳ȤǤ
+
+<informalexample><screen>
+<prompt>#</prompt> <userinput>init 1</userinput>
+</screen></informalexample>
+
+<!--
+at the shell prompt and pressing <keycombo> <keycap>Control</keycap>
+<keycap>D</keycap> </keycombo> when asked for the root password.
+-->
+rootΥѥɤ֤줿 <keycombo> <keycap>Control</keycap>
+<keycap>D</keycap> </keycombo>
+ΥץץȤǾ嵭ϤƤ
+
+</para></listitem>
+</itemizedlist>
+
+ </sect2>
+ </sect1>
+
+
<sect1 id="login">
<!--
<title>Log In</title>