Gianluca Sforna wrote:
On 8/24/06, Klaus Darilion <[EMAIL PROTECTED]> wrote:
You can reverse engineer by blocking the https port. openwengo will
fallback to http and you can use a packet sniffer to analyze the XML
provisioning format.


Considering this is an Open Source project, that sounds quite overkill...

Reverse Engineering is done in 10 minutes (blocking https port under Windows can be easily done using the netdefender firewall).

Writing an XLM file an put it on a webserver: 10 minutes

That is nothing compared to writing your own sip client :-)

Of course it would be best if these reverse engineered XML profile is published at the wiki, and the provisioning URL is a config option which can be changed without recompiling.

regards
klaus
_______________________________________________
Wengophone-devel mailing list
Wengophone-devel@lists.openwengo.com
http://dev.openwengo.com/mailman/listinfo/wengophone-devel

Reply via email to