I think it was an intentional choice, to describe "validity" (how long they expect it to be around for) rather than "notAfter" (what the self-signed cert says). I remember there being a (very) brief mention of it when they were asking for feedback on would became those pages, but I can't find it at the moment.
The certificates page contains a paragraph that explains this discrepancy:
Note that Root CAs don’t have expiration dates in quite the same way that other certificates do. Although their self-signed certificates do contain a notAfter date, Root Programs and Trust Stores may decide to trust a Root CA beyond that date, or terminate trust in it before that date. As such, the end-of-validity dates given below are approximate, based on current Root Program policies.
I could also see it being useful to list both. I know I've confirmed what certificates I'm looking at by comparing cert expiration dates in the past as well.
You and everyone else.
Roots aren't forever, and any trust store needs to have a plan to make changes. (Possibly suddenly, if it turns out that someone Mission Impossible'd into their datacenter and stole the keys, or if it turns out that they were made with a buggy random number generator, or even if Let's Encrypt runs out of funding and shuts down.) Like the Integration Guide says, "Plan for change", and also subscribe to the "API Announcements" category of this forum.
If your code need to know when specific roots expire that suggests your system has a potentially brittle dependency that carries some risk (ask me how I know!). You should be able to change CA (with a completely different or new root) at very short notice. CAs come and go and so do their roots.
My concern is how we'll handle switch over of the root CA when that happens.
It is an issue about automating "this is the same cert" when the cert is changed very 3 months.
So we rely on the chain still having the same root, but we need to know how that will change over time when it expires.
And yes, assuming it leaks, etc, that would be a surprise. But that is already something that is expected to be handled out of band, etc.
Somewhat, yes. We do client certificate auth, but we need to ensure that we keep track of the certificate as they change if they represent the same entity. We do that using the same key + chain, basically.
It's a bit complex, but basically, we do auth using X509 certificates.
Each server has a certificate, which we can use for TLS auth as well as a client certiicate.
Those are explicitly trusted, so not a chain of trust issue.
The problem is that they are short in duration, so we need to support refreshing them.