Hi,
A note in the output of 'apt show ca-certificates' caught my attention:
-----
Description: Common CA certificates
Contains the certificate authorities shipped with Mozilla's browser to allow
SSL-based applications to check for the authenticity of SSL connections.
.
Please note that Debian can neither confirm nor deny whether the
certificate authorities whose certificates are included in this package
have in any way been audited for trustworthiness or RFC 3647 compliance.
Full responsibility to assess them belongs to the local system
administrator.
-----
There is no such note in Fedora ('rpm -qi ca-certificates').
Considering:
- the potential impact of this
- the fact that perhaps nobody reads this note
- most users don't even think about it
- the security focus of Qubes
- the philosophy of infrastructure distrust and securing of endpoints
would the Qubes project go an extra mile and possibly check the
certificates shipped with the OS (templates and dom0)?
Or at least show a warning to the user and a guide how to do it oneself?
I understand this is extra work and the package is update-able but
considering other packages are checked, perhaps this essential one
might be worth it.
What do you think?
--
You received this message because you are subscribed to the Google Groups
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion visit
https://groups.google.com/d/msgid/qubes-devel/20251228192719.613271ba%40localhost.