I've been thinking about it, on and off, and I always get the feeling it is a horrible idea, but I am not entirely sure why.
Flooding is one thing, I guess.
But hey, I'm sure people have opinions on this, so let's hear it.
Upload image to board, thumbnail saved in post, change picture on yur end to goatse.cx. lol.
The posted file wouldn't link directly to the source URL (for very obvious reasons); rather, it would be uploaded from that URL to the board's server, like you would upload it from your own system. The owner of the file's source can't tamper with it once it's posted.
It's a horrible idea because if someone managed to flood the forum and make your server leech a large picture with every post, someone completely random would get mad at you. Also, it possibly makes you more responsible for uploading the file.
it's not that hard to dl to desktop, then upload to site.
Alright, here's another reason it's a horrible idea:
<html>
Welcome to my awesome website! Click the button below to access free porn.
<form method="post" action="http://www.teamtao.com/neko/wakaba.pl">
<input type="hidden" name="subject" value="NEKO IS JAPANESE FOR CAT YOU STUPID FAGGOTS">
<input type="hidden" name="name" value="SHII AUTOPOST 2.5">
<input type="hidden" name="body" value="OUR DEMANDS:\rCHANGE THE NAME OF THIS BOARD TO "NEKOMIMI"\rOPEN UP A REAL CATS BOARD\rFALSE FUCKING ADVERTISING, YOU SHITHEADS!">
<input type="hidden" name="url" value="http://www.website-with-pictures-of-cats.com/random.php">
</form>
(Yes, I could technically do this right now by ticking the "no file" checkbox, but it's only funny with pictures of cats.)
That could be quite dangerous on sites that don't run with captcha. Find enough of them and it'd be a good way to really hurt a target site. Not that it's likely to happen.
You could always make it depend on captch being enabled.
Couldn't this be coupled with OpenID or something to prevent abuse?
Another thought: This is wide open to a denial-of-service attack where you set up a malicious server that trickle-feeds the data it serves. You can tie up a huge number of Apache processes that way.
Seems most scripts that fetch remote files would be vulnerable to that... Not that I can think of many that do, offhand.
sender.pl has something in it that's supposed to counter a similar problem. Whether it actually works is another question.
I need this feature, trust my users, and know nearly nothing about coding.
Could you send me in the right direction? I'm willing to learn.
>>16
They can actually just paste a URL in the file select window, and it'll work the same way. I know for sure this works in WIndows on Firefox.
>>17
I am aware of this option, but it's not optimal due to the long time it takes to finish.