Summer of code 2010 ideas
ashish shubham
ashubham at gmail.com
Thu Mar 25 00:08:18 EDT 2010
Hi Mark,
Thanks for the reply.
In reference to your concerns:
XMPP XEP-0214 standard deals with file repository and sharing. But this
protocol has been *deferred *by the standards foundation. And has not been
superseeded by any. Can we still implement this protocol ?
Also, I have done courses on Cryptography, Network security and Information
& System security at my university, will mentioning these reflect upon my
knowledge of cautious network programming ?
Thanks in advance
Ashish Shubham.
On Mon, Mar 15, 2010 at 11:00 AM, Mark Doliner <mark at kingant.net> wrote:
> On Wed, Mar 10, 2010 at 4:16 AM, ashish shubham <ashubham at gmail.com>
> wrote:
> > Hello,
> >
> > I am a student in India and I intend to apply for a google summer of code
> > 2010 project with Pidgin. I wanted to share an idea of windows like file
> > share integrated with the pidgin IM client for the Gtalk protocol.
> >
> > I have made a webpage detailing my proposal (as the limit here was 40KB
> :(
> > ), please give ideas and suggestions to help me formalize as a good
> summer
> > project.
> >
> > the link is :
> > http://cse.iitkgp.ac.in/~ashishs/test.html<http://cse.iitkgp.ac.in/%7Eashishs/test.html>
> >
> > Thanks
> > Ashish Shubham
>
> Hi Ashish. I think that's a cool idea. Older AIM clients used to
> have something similar, right? Called "get file" or something? Newer
> clients might have it, too.
>
> A few concerns:
>
> * "The file share information can be shared via the use of special
> format text recognized by the pidgin client."
>
> I haven't spoken to other developers, but I suspect we would want this
> functionality to use a more formal XMPP XEP (they may be one already)
> rather than a specially formatted IM. The XML nature of Jabber allows
> for a lot of flexibility and custom add-ons--it probably doesn't make
> sense to overload the meaning of IMs.
>
> * "Security may be built by putting a password for viewing the file share."
>
> Maybe also restrict based on JID?
>
> * This code for this type of functionality has the potential to
> contain REALLY horrible bugs. For example, a buffer overflow that
> allows an attacker skip authentication or access any file on your
> system. If you do submit a proposal for this, you may want to include
> information about your knowledge of cautious network programming.
>
> --Mark
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://pidgin.im/pipermail/devel/attachments/20100325/b56bd216/attachment.html>
More information about the Devel
mailing list