Package: apt-listbugs
Version: 0.1.42
Severity: wishlist

Hey.

I'd guess that apt-listbugs, when retrieving the bugs from the BTS, uses
the systemd wide default store of trusted certs (/etc/ssl/certs/)?!

Now the consquence is that if someone has changed the certs there to
not include the one used by Debian (or none at all), apt-listbugs will fail:

Retrieving bug reports... 0% Fail
Error retrieving bug reports from the server with the following error message:
E: SSL_connect returned=1 errno=0 peeraddr=209.87.16.39:443 state=error: 
certificate verify failed (unable to get local issuer certificate)
It could be because your network is down, or because of broken proxy servers, 
or the BTS server itself is down. Check network configuration and try again


I'd argue that the conceptual idea of any default store like
/etc/ssl/certs/ or e.g. that used by Java is for generic use cases, like
e.g. curl or wget, where the admin can decide which CAs to trust and which not.

But a program like apt-listbugs must per se be used with whichever CA Debian
uses for the HTTPs of the BTS, so I think it would be better if apt-listbugs
could hard-code that CA file (or at least, which would of course be less secure,
 the whole mozilla bundle, i.e. /usr/share/ca-certificates/mozilla/, should the
CA change a lot).

It makes no sense for the trusted cert of apt-listbugs to be configurable,
as that which Debian uses must be trusted or otherwise it will not work.

This also means that it makes no sense of using the (configurable) default
CA store.
The opposite, it actually just makes it impossible to distrust the cert
from the default store (for programs like curl, wget, etc.), because that
in turn breaks apt-listbugs.


I don't mean that the content of the CA file should be harcoded, but
simply the path to that file as shipped by ca-certificates.

That of course also means that ca-certificates should probably become a
dependency of the package (which it is already indirectly via
ruby/ruby3.1/rubygems-integration).


Cheers,
Chris.

Reply via email to