package com.aelitis.azureus.core.peermanager.utils; import org.gudy.azureus2.core3.internat.MessageText; import org.gudy.azureus2.core3.util.ByteFormatter; public class ClientIdentifier { public static String identifyBTOnly(String peer_id_client, byte[] handshake_bytes) { // BitThief check. if (peer_id_client.equals("Mainline 4.4.0") && (handshake_bytes[7] & (byte)1) == 0) { return asDiscrepancy("BitThief*", peer_id_client, "fake_client"); } // We do care if something is claiming to be Azureus when it isn't. If // it's a recent version of Azureus, but doesn't support advanced messaging, we // know it's a fake. if (!peer_id_client.startsWith("Azureus ")) {return peer_id_client;} // Older versions of Azureus won't have support, so discount these first. String version = peer_id_client.substring(8); if (version.startsWith("1") || version.startsWith("2.0") || version.startsWith("2.1") || version.startsWith("2.2")) { return peer_id_client; } // Must be a fake. return asDiscrepancy(null, peer_id_client, "fake_client"); } public static String identifyAZMP(String peer_id_client_name, String az_msg_client_name, String az_msg_client_version, byte[] peer_id) { /** * Hack for BitTyrant - the handshake resembles this: * Client: AzureusBitTyrant * ClientVersion: 2.5.0.0BitTyrant * * Yuck - let's format it so it resembles something pleasant. */ if (az_msg_client_name.endsWith("BitTyrant")) { return "BitTyrant " + az_msg_client_version.replaceAll("BitTyrant", "") + " (Azureus Mod)"; } String msg_client_name = az_msg_client_name + " " + az_msg_client_version; /** * Do both names seem to match? */ if (msg_client_name.equals(peer_id_client_name)) {return msg_client_name;} /** * There may be some discrepancy - a different version number perhaps. * If the main client name still seems to be the same, then return the one * given to us in the AZ handshake. */ String peer_id_client = peer_id_client_name.split(" ", 2)[0]; String az_client_name = az_msg_client_name.split(" ", 2)[0]; if (peer_id_client.equals(az_client_name)) { /** * If both are Azureus, the version numbers shouldn't differ. This is what * we should have - 15 characters both the same (sometimes beta version * is included in the version number but not in the peer ID, but we can deal * with that. * "Azureus a.b.c.d" */ if (az_client_name.equals("Azureus") && peer_id_client.equals("Azureus")) { if (msg_client_name.length()<15 || peer_id_client_name.length() < 15 || !msg_client_name.substring(0, 15).equals(peer_id_client_name.substring(0, 15))) { return asDiscrepancy("Azureus (Hacked)", peer_id_client_name, msg_client_name, "fake_client", "AZMP", peer_id); } } return msg_client_name; } // Transmission and XTorrent. String res = checkForTransmissionBasedClients(msg_client_name, peer_id_client, peer_id_client_name, msg_client_name, peer_id, "AZMP"); if (res != null) {return res;} // There is an inconsistency. Let's try figuring out what we can. String client_displayed_name = null; boolean is_peer_id_azureus = peer_id_client_name.startsWith("Azureus "); boolean is_msg_client_azureus = az_msg_client_name.equals("Azureus"); boolean is_fake = false; boolean is_mismatch = true; boolean is_peer_id_unknown = peer_id_client_name.startsWith(MessageText.getString("PeerSocket.unknown")); if (is_peer_id_azureus) { // Shouldn't happen. if (is_msg_client_azureus) { throw new RuntimeException("logic error in getExtendedClientName - both clients are Azureus"); } else { // We've got a peer ID that says Azureus, but it doesn't say Azureus in the handshake. // It's definitely fake. is_fake = true; // It might be XTorrent - it does use AZ2504 in the peer ID and "Transmission 0.7-svn" // in the handshake. if (msg_client_name.equals("Transmission 0.7-svn")) {client_displayed_name = "XTorrent";} } } else { if (is_msg_client_azureus) {is_fake = true;} else if (is_peer_id_unknown) { // Our peer ID decoding can't decode it, but the client identifies itself anyway. // In that case, we won't say that it is a mismatch, and we'll just use the name // provided to us. client_displayed_name = msg_client_name; is_mismatch = false; // Log it though. BTPeerIDByteDecoder.logClientDiscrepancy(peer_id_client_name, msg_client_name, "unknown_client", "AZMP", peer_id); } else { // We've got a general mismatch, we don't know what client it is - in most cases. // Ares Galaxy sometimes uses the same peer ID as Arctic Torrent, so allow it to be // overridden. if (msg_client_name.startsWith("Ares") && peer_id_client.equals("ArcticTorrent")) { return msg_client_name; } } } String discrepancy_type; if (is_fake) {discrepancy_type = "fake_client";} else if (is_mismatch) {discrepancy_type = "mismatch_id";} else {discrepancy_type = null;} if (discrepancy_type != null) { return asDiscrepancy(null, peer_id_client_name, msg_client_name, discrepancy_type, "AZMP", peer_id); } return client_displayed_name; } public static String identifyLTEP(String peer_id_name, String handshake_name, byte[] peer_id) { if (handshake_name == null) {return peer_id_name;} /** * Official BitTorrent clients should still be shown as Mainline. * This is to be consistent with previous Azureus behaviour. */ String handshake_name_to_process = handshake_name; if (handshake_name.startsWith("BitTorrent ")) { handshake_name_to_process = handshake_name.replaceFirst("BitTorrent", "Mainline"); } if (peer_id_name.startsWith("\u00B5Torrent")) { // 1.6.0 misidentifies itself as 1.5 in the handshake. if (peer_id_name.equals("\u00B5Torrent 1.6.0")) { return peer_id_name; } // Older �Torrent versions will not always use the appropriate character for the // first letter, so compensate here. if (!handshake_name.startsWith("\u00B5Torrent") && handshake_name.startsWith("Torrent", 1)) { handshake_name_to_process = "\u00B5" + handshake_name.substring(1); } // Some versions indicate they are the beta version in the peer ID, but not in the // handshake - we prefer to keep the beta identifier. if (peer_id_name.endsWith("Beta") && peer_id_name.startsWith(handshake_name_to_process)) { return peer_id_name; } } // Some Mainline 4.x versions identify themselves as �Torrent - according to alus, // this was a bug, so just identify as Mainline. if (peer_id_name.startsWith("Mainline 4.") && handshake_name.startsWith("Torrent", 1)) { return peer_id_name; } // Azureus should never be using LTEP when connected to another Azureus client! if (peer_id_name.startsWith("Azureus") && handshake_name.startsWith("Azureus")) { return asDiscrepancy(null, peer_id_name, handshake_name, "fake_client", "LTEP", peer_id); } // We allow a client to have a different version number than the one decoded from // the peer ID. Some clients separate version and client name using a forward slash, // so we split on that as well. String client_type_peer = peer_id_name.split(" ", 2)[0]; String client_type_handshake = handshake_name_to_process.split(" ", 2)[0].split("/", 2)[0]; // Transmission and XTorrent. String res = checkForTransmissionBasedClients(handshake_name_to_process, client_type_peer, peer_id_name, handshake_name, peer_id, "LTEP"); if (res != null) {return res;} if (client_type_peer.toLowerCase().equals(client_type_handshake.toLowerCase())) {return handshake_name_to_process;} // Like we do with AZMP peers, allow the handshake to define the client even if we can't extract the // name from the peer ID, but log it so we can possibly identify it in future. if (peer_id_name.startsWith(MessageText.getString("PeerSocket.unknown"))) { BTPeerIDByteDecoder.logClientDiscrepancy(peer_id_name, handshake_name, "unknown_client", "LTEP", peer_id); return handshake_name_to_process; } /** * libtorrent is... unsurprisingly... a torrent library. Many clients use it, so cope with clients * which don't identify themselves through the peer ID, but *do* identify themselves through the * handshake. */ if (peer_id_name.startsWith("libtorrent (Rasterbar)")) { if (handshake_name_to_process.toLowerCase().indexOf("libtorrent") == -1) { handshake_name_to_process += " (" + peer_id_name + ")"; } return handshake_name_to_process; } /** * And some clients do things the other way round - they don't bother with the handshake name, * but do remember to change the peer ID name. */ if (client_type_handshake.startsWith("libtorrent")) { // Peer ID doesn't mention libtorrent (just the client name) and the handshake name doesn't // mention the client name (just "libtorrent"), then combine them together. if (client_type_peer.toLowerCase().indexOf("libtorrent") == -1 && client_type_handshake.toLowerCase().indexOf(client_type_peer.toLowerCase()) == -1) { return peer_id_name + " (" + handshake_name_to_process + ")"; } } // Can't determine what the client is. return asDiscrepancy(null, peer_id_name, handshake_name, "mismatch_id", "LTEP", peer_id); } private static String checkForTransmissionBasedClients(String handshake_name_to_process, String client_type_peer, String peer_id_name, String handshake_name, byte[] peer_id, String protocol) { // Bloody XTorrent. if (handshake_name_to_process.equals("Transmission 0.7-svn") && client_type_peer.equals("Azureus")) { return asDiscrepancy("XTorrent", peer_id_name, handshake_name, "fake_client", protocol, peer_id); } // Bloody XTorrent! if (handshake_name_to_process.startsWith("Transmission") && client_type_peer.startsWith("XTorrent")) { return asDiscrepancy(client_type_peer, handshake_name_to_process, "fake_client"); } // Transmission 0.96 still uses 0.95 in the LT handshake, so cope with that and just display // 0.96. if (peer_id_name.equals("Transmission 0.96") && handshake_name.equals("Transmission 0.95")) { return peer_id_name; } return null; } private static String asDiscrepancy(String client_name, String peer_id_name, String handshake_name, String discrepancy_type, String protocol_type, byte[] peer_id) { if (client_name == null) { BTPeerIDByteDecoder.logClientDiscrepancy(peer_id_name, handshake_name, discrepancy_type, protocol_type, peer_id); } // Use this form as it is shorter. if (peer_id_name.equals(handshake_name)) {return asDiscrepancy(client_name, peer_id_name, discrepancy_type);} return asDiscrepancy(client_name, peer_id_name + "\" / \"" + handshake_name, discrepancy_type); } private static String asDiscrepancy(String real_client, String dodgy_client, String discrepancy_type) { if (real_client == null) { real_client = MessageText.getString("PeerSocket.unknown"); } return real_client + " [" + MessageText.getString("PeerSocket." + discrepancy_type) + ": \"" + dodgy_client + "\"]"; } private static int test_count = 1; private static void assertDecode(String client_name, String peer_id, String handshake_name, String handshake_version, byte[] handshake_reserved, String type) throws Exception { byte[] byte_peer_id = BTPeerIDByteDecoder.peerIDStringToBytes(peer_id); String peer_id_client = BTPeerIDByteDecoder.decode(byte_peer_id); String decoded_client; if (type.equals("AZMP")) {decoded_client = identifyAZMP(peer_id_client, handshake_name, handshake_version, byte_peer_id);} else if (type.equals("LTEP")) {decoded_client = identifyLTEP(peer_id_client, handshake_name, byte_peer_id);} else if (type.equals("BT")) {decoded_client = identifyBTOnly(peer_id_client, handshake_reserved);} else {throw new RuntimeException("invalid extension type: " + type);} boolean passed = client_name.equals(decoded_client); System.out.println(" Test " + test_count++ + ": \"" + client_name + "\" - " + (passed ? "PASSED" : "FAILED")); if (!passed) { throw new Exception("\n" + "Decoded : " + decoded_client + "\n" + "Peer ID name : " + peer_id_client + "\n" + "Extended name: " + handshake_name + "\n"); //throw new Exception("Client name decoded - " + decoded_client); } } private static void assertDecodeAZMP(String client_name, String peer_id, String handshake_name, String handshake_version) throws Exception { assertDecode(client_name, peer_id, handshake_name, handshake_version, null, "AZMP"); } private static void assertDecodeLTEP(String client_name, String peer_id, String handshake_name) throws Exception { assertDecode(client_name, peer_id, handshake_name, null, null, "LTEP"); } private static void assertDecodeExtProtocol(String client_name, String peer_id, String handshake_name, String handshake_version) throws Exception { assertDecodeAZMP(client_name, peer_id, handshake_name, handshake_version); assertDecodeLTEP(client_name, peer_id, handshake_name + " " + handshake_version); } private static void assertDecodeBT(String client_name, String peer_id, String handshake_reserved) throws Exception { if (handshake_reserved == null) {handshake_reserved = "0000000000000000";} handshake_reserved = handshake_reserved.replaceAll("[ ]", ""); byte[] handshake_reserved_bytes = ByteFormatter.decodeString(handshake_reserved); if (handshake_reserved_bytes.length != 8) {throw new RuntimeException("invalid handshake reserved bytes");} assertDecode(client_name, peer_id, null, null, handshake_reserved_bytes, "BT"); } public static void main(String[] args) throws Exception { System.setProperty("transitory.startup", "1"); BTPeerIDByteDecoder.client_logging_allowed = false; System.out.println("Testing simple BT clients:"); assertDecodeBT("BitThief* [FAKE: \"Mainline 4.4.0\"]", "M4-4-0--9aa757efd5be", "0000000000000000"); assertDecodeBT("Mainline 4.4.0", "M4-4-0--9aa757efd5be", "0000000000000001"); assertDecodeBT("Unknown [FAKE: \"Azureus 3.0.3.4\"]", "-AZ3034-6wfG2wk6wWLc", "0000000000000000"); System.out.println(""); System.out.println("Testing AZMP clients:"); assertDecodeAZMP("Azureus 3.0.4.2", "-AZ3042-6ozMq5q6Q3NX", "Azureus", "3.0.4.2"); assertDecodeAZMP("Azureus 3.0.4.3_B02", "-AZ3043-6ozMq5q6Q3NX", "Azureus", "3.0.4.3_B02"); assertDecodeAZMP("BitTyrant 2.5.0.0 (Azureus Mod)", "AZ2500BTeyuzyabAfo6U", "AzureusBitTyrant", "2.5.0.0BitTyrant"); //assertDecodeAZMP("", "-BS5820-oy4La2MWGEFj", "Bearshare Premium P2P", "5.8.2.0"); //assertDecodeAZMP("", "-AR6360-6oZyyMWoOOBe", "Imesh Turbo", "6.3.6.0"); assertDecodeAZMP("Azureus (Hacked) [FAKE: \"Azureus 2.4.0.2\" / \"Azureus 2.3.0.6\"]", "2D415A32 3430322D 2E414794 2C57D644 4989CA58", "Azureus", "2.3.0.6"); //assertDecodeAZMP("", "-AG2083-s1hiF8vGAAg0", "Ares", "2.0.8.3029"); //assertDecodeAZMP("", "-AG3003-lEl2Mm4NEO4n", "Ares Destiny", "3.0.0.3805"); System.out.println(""); System.out.println("Testing LTEP clients:"); assertDecodeLTEP("\u00B5Torrent 1.7.6", "2D555431 3736302D B39EC7AD F6B94610 AA4ACD4A", "\u00B5Torrent 1.7.6"); assertDecodeLTEP("\u00B5Torrent 1.6.1", "2D5554313631302DEA818D43F5E5EC3D67BF8D67", "\uFDFFTorrent 1.6.1"); assertDecodeLTEP("Unknown [FAKE: \"Azureus 3.0.4.2\"]", "-AZ3042-6ozMq5q6Q3NX", "Azureus 3.0.4.2"); assertDecodeLTEP("Mainline 6.0", "4D362D30 2D302D2D 8B92860D 05055DF5 B01C2D94", "BitTorrent 6.0"); //assertDecodeLTEP("libTorrent 0.11.9", "2D6C7430 4239302D 11F3EB39 5D44EEFD CEA07E79", "libTorrent 0.11.9"); assertDecodeLTEP("\u00B5Torrent 1.8.0 Beta", "2D555431 3830422D E69C9942 D1A5A6C2 0BE2E4BD", "\u00B5Torrent 1.8"); assertDecodeLTEP("Miro 1.1.0.0 (libtorrent/0.13.0.0)", "-MR1100-00HS~T7*65rm", "libtorrent/0.13.0.0"); assertDecodeLTEP("linkage/0.1.4 libtorrent/0.12.0.0", "-LK0140-ATIV~nbEQAMr", "linkage/0.1.4 libtorrent/0.12.0.0"); assertDecodeLTEP("KTorrent 2.2.2", "-KT2210-347143496631", "KTorrent 2.2.2"); //assertDecodeLTEP("", "B5546F72 72656E74 2F333037 36202020 20202020", "\uFDFFTorrent/3.0.7.6"); assertDecodeLTEP("Transmission 0.96", "-TR0960-6ep6svaa61r4", "Transmission 0.95"); assertDecodeLTEP("Opera 9.50", "O100634008270e29150a", "Opera 9.50"); System.out.println(""); System.out.println("Testing common clients:"); //assertDecodeExtProtocol("", "-XX1150-dv220cotgj4d", "Transmission", "0.72Z"); assertDecodeExtProtocol("XTorrent [FAKE: \"Azureus 2.5.0.4\" / \"Transmission 0.7-svn\"]", "-AZ2504-192gwethivju", "Transmission", "0.7-svn"); System.out.println(""); System.out.println("Done."); } }