It's hardly a no-brainer if you are a commercial host. Some of your clients may want this behavior to host a download area. But I agree that if you have a site based on any CMS (even a home brew one) directory indices should be turned off.
Well, the Joomla! team is a very loose term :) I have provided bug fix and feature patches to Joomla!, so that makes me part of the team, I guess (my name is in the JoomlaCode.org project listing of the Joomla! CMS anyways). What needs be done here is a decision among the people with commit access regarding what purpose the .htaccess should serve. Is it there for SEF only or does it serve a higher security purpose? In the latter case, most of my Master .htaccess should be included in it.
But this poses another issue. For years, there has been no "best practices" official document. Developers don't realise that media files which must be used by both the front and the back-end belong to the /media folder, NOT the administrator folder. They don't realise that everything MUST pass though Joomla!'s index.php files unless you're modifying the core Joomla! database or core Joomla! files (and there's only a handful of software which is supposed to do that). Nobody understands that the contents of the cache directory MUST NOT be accessed over the web. Several misconceptions which are in widespread use today and diminish our sites' security happened because nobody cared explaining Joomla! 1.5's directory structure to developers. Unfortunately, this means that if something close to my Master .htaccess was included in the core, a big portion of the JED-listed extensions would not work any more. Yup, it's Catch-22.
Regarding the "security through obscurity", I'm not entirely opposed to it. Sometimes it serves a good purpose. It's another thing, however, to insist that it is the ONLY security rule you should follow. I mean, JED gives a false sense of security to its users. Just because some software is JED-listed it doesn't mean it's secure. What if the developer did include index.html files but has a ton of potential SQLi and XSS vulnerabilities all over his gosh darn code? I've seen quite a few such extensions, but I can't report them. I have to create an exploit, notify the developer, wait for 15 days to see if he releases a fix, if he doesn't I have to publish the exploit and notify VEL which will notify JED which will delist the extension and notify the developer. And, yet, JED users believe that if an extensions is listed in JED it's secure. Big pile of cow droppings...
In any way, you can safely remove all index.html files. If you have SSH access you can go to your site's root and do something like:
find . -type f -name index.html -delete
You'll see a few hundreds to a few thousands of files being removed - and a backup which is 15% smaller. Woot! :)
As for developers, I'd first like 'em to think about basic security stuff when they're coding their extensions and then talk about index.html files. And some of 'em should really open up their bloody ears and listen. A particular developer of a popular extension has been contacted by at least a dozen of my users and notified that he's accessing files in the administrator directory from the front-end. He replied once and he simply said "that's how we did it, take it or leave it". Can you believe that? The guy is mixing up the contents of the two separate Joomla! applications (front- and back-end) and he feels very proud that he does that. Huh! So, no, I don't think that a rebellion against the JED rule is what we need. What we need is a rebellion against developers who refuse to fix security-related issues in their software.
OK, my rant is over :)
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!