+ Reply to Thread
Results 1 to 3 of 3

Thread: Extreme Mod Client File Documentation

  1. #1

    Post Extreme Mod Client File Documentation

    See VEM_PS2_Gui.png for file structure/GUI description.

    See File format.png for how to save .client files as UTF-8

    sample.client contains documentation on how to create a client file

    schema.client shows all available fields available for client files
    Attached Files Attached Files
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    rando007 (26.02.24) , mmmmm (19.11.21) , Lucius (10.11.21) , anon (08.11.21)

  3. #2
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,385
    Activity Longevity
    11/20 19/20
    Today Posts
    4/5 ssss39385
    Recommended reading: https://www.sb-innovation.de/showthread.php?t=32021, https://www.sb-innovation.de/showthread.php?t=33436

    Note there's a bug with rTorrent spoofing which causes the mod to send "{info_hash}" in announces instead of the actual hash, making the creation of rTorrent client files impossible.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  4. Who Said Thanks:

    Lucius (10.11.21)

  5. #3
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,385
    Activity Longevity
    11/20 19/20
    Today Posts
    4/5 ssss39385
    Obtaining and validating the reserved bytes and LTEP clientName takes a bit more work than the rest. https://www.sb-innovation.de/showthread.php?t=34729 gives a general overview to which I'd like to add some tips.
    • Under Windows, Wireshark with Npcap is the best method of capturing loopback traffic (and if you're reading this, you likely already have both installed). To get cleaner results, use (tcp port XXXXX || tcp port YYYYY) as a capture filter, where XXXXX and YYYYY are the listen ports configured in the torrent clients you'll be using.
    • Add a small torrent, preferably one created by yourself exclusively for this purpose that has the private flag set and no trackers defined. One client must be seeding it, and the other must be at 0% done.
    • Protocol encryption must always be disabled.
    • To initiate the connection, add 127.0.0.1 as a peer on either client; the port number must be that of the opposite one.

    Attachment 21469 provides an example of an unencrypted handshake between qBittorrent 4.5.1 and Clean uTorrent 3.5.5_46074, followed by the complete download of a 2.25 MB torrent, very much like what you'll get after doing the capture on your own. See if you can find the reserved bytes and LTEP identification string for both peers.

    Note mRatio does not connect to peers or respond to incoming connections, and therefore does not require any of this.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  6. Who Said Thanks:

    Lucas Kane (16.02.23) , mmmmm (15.02.23)

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •