Maximo Pech [mak...@gmail.com] wrote:
> 
> I already knew an answer (not the only one) could be "write it".
> 

What others did you have in mind? "Thank you for bringing the most important 
software project of modern time to our attention. We will now begin writing it 
for you." ???

> > >
> > > Do you have any idea how abusrd this is?
> 
> No I don't, if you don't mind please explain why that's absurd.
> 
> That's completely subjective and also it is a problem that has more work
> behind than the "problem" I think there is with the non existence of bsd
> tools like gnupg on *base* not on ports and not openssl.
> 

It's not subjective. It's history. SSH.COM became the standard for people who 
need to manage hundreds of thousands of keys with a rolled-out package. OpenSSH 
became the GOLD standard because EVERYONE ELSE uses it and it has a very high 
quality track record. I can only imagine that SSH was conceived as telnet + 
PGP. PGP was its own standard, improved and turned into a commercial product 
and now nobody even remembers exactly what it does. Do you use PGP? GnuPG? .... 
This part is subjective. How useful is PGP to you?

> What I say is simply that it would be cool if by default on the *base*
> system OpenBSD had a tool called opgp, opengp, puffypg or whatever, to
> encrypt files like gnupg does and I was wondering why it does not exist if
> OpenBSD cares a lot about cryptography.
> 

OpenBSD's push was to more tightly integrate crypto into all parts of the 
system where it might prove to be useful. One big part of this is the inclusion 
of the OpenSSL package for userland apps. Another was the creation of OpenSSH. 
And another was the OCF which allows the kernel to use crypto in all manner of 
operations. And it does.

OpenBSD was really the first full free IPsec stack with a complete free OS and 
key management all working out of the box with photurisd and later isakmpd. It 
was more advanced, at the time. Along came OCF, which the framework that other 
BSDs built on and improved for their kernel crypto subsystems. It was ported to 
linux as a significant improvement to their prior kernel crypto tools. OCF is 
no longer the last word. Processors now include direct crypto transforms, so 
this area is changing again. But nobody had a sane asynchronous framework for 
crypto performed in the kernel context (for disk, network, memory crypto 
operations) prior to OCF. These are major things that took lots of time and 
money, DoD funding even. And it was accomplished under the OpenBSD project, and 
crypto accelerator support was merged with OpenSSL and benefits everyone now, 
kernel and userland. That is why OpenBSD is proud of crypto. Not because we 
care about encrypting files. Although, you can use OpenS!
 SL+OCF accelerators to do that too, if you wish. 

> Well, with the information you have given me so far, I think the answer is
> something like "nobody has written it because we have more important things
> to do and nobody believes there is a real need for that". Am I right?

Yeah.

Essentially, if you wanted to clean up netpgp and port it over to take full 
advantage of openssl+OCF, that would fit right in the plan. But otherwise, 
you're missing the history here. Work done is driven by desire and finances. 
Just like everything else in life. The absurdity is in not understanding the 
magnitude at which OpenBSD attempted to integrate crypto into everday computing 
life, just because the solution you imagined isn't part of the base52.tgz.

Reply via email to