Package: ca-certificates
Version: 20140325
Severity: wishlist

Entries of NEWS.Debian are displayed by apt-listchanges. Having used testing 
for a decade with both apt-listchanges and ca-certificates installed, I have 
been shown such entries relatively often. Since ca-certificates is installed on 
about 96% of Debian installs, I must not be the only person who noticed these.

I rarely see multiple NEWS entries from packages which I never directly 
interact with. ca-certificates is one package I never had to install, remove, 
upgrade, downgrade, fix, or even learn about, yet it has 17 entries in 10 
years. In fact, ca-certificates is the biggest NEWS.Debian user of all packages 
installed on my machine (disregarding the package's age - zgrep -hc urgency 
/usr/share/doc/*/NEWS.Debian*|sort -g).

After examination of the entries, I do not think that this usage is optimal. First of 
all, as NEWS entries of packages for "users" can be displayed to system 
administrators of various proficiency, entries should be worded clearly. The latest entry 
illustrates that this aspect is deficient for ca-certificates:
ca-certificates (20140325) unstable; urgency=medium

  Update mozilla/certdata.txt to version 1.97+revert_of_936304
    Mozilla reverted the removal of 1024-bit root certificates for
    Entrust.net, GTE CyberTrust, and ValiCert (RSA), but did not update the
    version number in nssckbi.h.
    Certificates added (+) (none removed):
    + "Entrust.net Secure Server CA"
    + "GTE CyberTrust Global Root"
    + "RSA Root Certificate 1"
    + "ValiCert Class 1 VA"
    + "ValiCert Class 2 VA"

Even as a longtime Debian contributor, I have to focus quite a while before 
developing some understanding of what this might mean. Hopefully I understood 
the right thing (I think that means the 5 certificates mentioned were added). 
This description may be fine for the changelog (and better than a simplified 
version), but will surely lose most readers in NEWS.Debian.

I recognize that there are presumably security implications to changing the set 
of certificates. I suppose adding certificates facilitates phishing, but unless 
I'm missing something, trusting a phony certificate can't directly cause an 
exploit. I suppose removing certificates may confuse users and *perhaps* break 
automated scripts. I suppose a small number of administrators appreciate having 
a way to follow every change to the list of certificates. That being said, 
there are lots of changes in Debian. We can only afford to display those which 
we know would cause the most problematic unexpected issues. The risks should be 
compared with the costs. People particularly concerned about certificates can 
read the changelog when they upgrade the package. Also, since packages aren't 
upgraded at random times, system administrators should be monitoring a system 
more just after an upgrade, so potential issues can be expected to be less 
costly.

I leave it to experts to decide how to react, but I feel that certificate 
additions should not be mentioned, while I'm not sure that removals deserve 
mention. Use of judgment may also be warranted (a change affecting a top CA 
could be treated differently). If some mentions are kept, it would be great to 
phrase entries so that readers understand what issues a change could cause.

--
Filipus Klutiero
http://www.philippecloutier.com


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to