Package: ca-certificates Version: 20140325 Severity: wishlist
Entries of NEWS.Debian are displayed by apt-listchanges. Having used testing for a decade with both apt-listchanges and ca-certificates installed, I have been shown such entries relatively often. Since ca-certificates is installed on about 96% of Debian installs, I must not be the only person who noticed these. I rarely see multiple NEWS entries from packages which I never directly interact with. ca-certificates is one package I never had to install, remove, upgrade, downgrade, fix, or even learn about, yet it has 17 entries in 10 years. In fact, ca-certificates is the biggest NEWS.Debian user of all packages installed on my machine (disregarding the package's age - zgrep -hc urgency /usr/share/doc/*/NEWS.Debian*|sort -g). After examination of the entries, I do not think that this usage is optimal. First of all, as NEWS entries of packages for "users" can be displayed to system administrators of various proficiency, entries should be worded clearly. The latest entry illustrates that this aspect is deficient for ca-certificates:
ca-certificates (20140325) unstable; urgency=medium Update mozilla/certdata.txt to version 1.97+revert_of_936304 Mozilla reverted the removal of 1024-bit root certificates for Entrust.net, GTE CyberTrust, and ValiCert (RSA), but did not update the version number in nssckbi.h. Certificates added (+) (none removed): + "Entrust.net Secure Server CA" + "GTE CyberTrust Global Root" + "RSA Root Certificate 1" + "ValiCert Class 1 VA" + "ValiCert Class 2 VA"
Even as a longtime Debian contributor, I have to focus quite a while before developing some understanding of what this might mean. Hopefully I understood the right thing (I think that means the 5 certificates mentioned were added). This description may be fine for the changelog (and better than a simplified version), but will surely lose most readers in NEWS.Debian. I recognize that there are presumably security implications to changing the set of certificates. I suppose adding certificates facilitates phishing, but unless I'm missing something, trusting a phony certificate can't directly cause an exploit. I suppose removing certificates may confuse users and *perhaps* break automated scripts. I suppose a small number of administrators appreciate having a way to follow every change to the list of certificates. That being said, there are lots of changes in Debian. We can only afford to display those which we know would cause the most problematic unexpected issues. The risks should be compared with the costs. People particularly concerned about certificates can read the changelog when they upgrade the package. Also, since packages aren't upgraded at random times, system administrators should be monitoring a system more just after an upgrade, so potential issues can be expected to be less costly. I leave it to experts to decide how to react, but I feel that certificate additions should not be mentioned, while I'm not sure that removals deserve mention. Use of judgment may also be warranted (a change affecting a top CA could be treated differently). If some mentions are kept, it would be great to phrase entries so that readers understand what issues a change could cause. -- Filipus Klutiero http://www.philippecloutier.com -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org