Knowledge (XXG)

ed2k URI scheme

Source 📝

33: 323:. Following the latter interpretation, some implementations added a zero byte chunk in case the last chunk of a file was a complete one. This practice is discouraged however and the first interpretation is used as a standard nowadays to prevent some files from having different hashes depending on the algorithm implementation used to calculate their hash. 303:
of 9500 KiB (9728000 bytes) plus a remainder chunk, and a separate 128-bit MD4 checksum is computed for each. If the file is greater than 9500 KiB (which means that there is more than one chunk), the eD2k hash is computed by concatenating the chunks' MD4 checksums in order and hashing the result
310:
In the past, there has been some ambiguity for files whose size is a multiple of the chunk size (9500 KiB). Old versions of some eD2k hash tools computed file hashes with an additional 0-byte chunk at the end. This is because an ambiguity of the term
211:
for files within the network, so even if the linked-to file has a different name on two computers within the network, the file can be found on both of them, and file chunks can be obtained from both sources. This is done by using a
345:. The block hashes further feed into a Merkle tree, the root hash of which is the actual AICH root hash. The smaller block size allows eMule clients to more precisely identifify locations of corruption. 261:
and port of specific clients that are known to share the linked-to file. This is done by adding a list of sources after the main part of the link, like shown in the following example:
192:
file sharing, and had a vast effect on the development of the eDonkey network, as it allowed external link sites to provide verified content within the network. Nowadays, so-called
307:
This method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually have the file present on disk.
223:, the eD2k protocol is optionally registered so that clicking on it in the browser automatically starts the download or asks whether the user wants to start downloading. 177:, which introduced the link type, as well as others using the eDonkey file sharing protocol, can be used to manage files stored in the filesharing network. 353:
A server link is a reference to an eDonkey2000 server; clicking on such a link typically adds it to the server list. Server links are indicated by the
668: 724: 698: 602: 524: 337:
The AICH (Advanced Intelligent Corruption Handling) is an eMule extension. It subdivides the 9500 KiB chunk into 180-KiB blocks and builds a
196:
have replaced eD2k links in practice. They serve a similar role, but are not limited to the eD2k hash and can contain other hashes such as
755: 116: 204:
for example, which makes it possible to use these links to point to files in several networks (as well as in BitTorrent) at once.
50: 264:
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/|sources,202.89.123.6:4662|/
180:
eD2k links allow a file to be identified from a link in a web browser and to be downloaded thereafter by a client like eMule,
97: 825: 617: 220: 54: 69: 484: 451: 557: 76: 185: 43: 517: 83: 219:
Like other URI protocols, web browsers can be configured to automatically handle ed2k URIs. After installing an
304:
again using MD4. Otherwise, the MD4 hash of the only chunk of the file is used with no further modifications.
65: 642: 572: 231:
File links are preceded with the "file" token, which indicates that this is a file link, as opposed to a
945: 748: 637: 393: 950: 510: 254:
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/
874: 693: 612: 533: 916: 173: 251:
and the file size. An example (a link to the 15 MB Purist Edit trailer) is provided below:
216:
on the file to calculate its checksum, depending only from the file content, not from its name.
800: 703: 688: 678: 582: 383: 208: 193: 90: 741: 713: 547: 502: 472: 778: 764: 683: 597: 567: 562: 552: 142: 341:
out of the SHA1 hashes of the 53 blocks, so that the root hash of each block is called a
905: 627: 622: 577: 939: 293: 213: 490: 900: 189: 839: 788: 338: 271: 168: 148: 145: 32: 924: 849: 258: 184:
or any other compatible software. This linking feature was one of the first
647: 426: 286: 138: 879: 869: 793: 388: 248: 181: 164: 17: 296:. It gives a different result than a simple usage of the MD4 algorithm. 783: 367:
PORT – Port where the server is listening for incoming eD2k connections
864: 632: 607: 277:
to help recover the file in case of corruption during file transfer.
884: 859: 854: 844: 834: 733: 708: 592: 478: 357:
token at the beginning of the link and have the following format:
332: 197: 160: 207:
eD2k links include file hashes, as these hashes can be used as a
652: 587: 268: 737: 506: 290: 201: 26: 475:
How to remove the ed2k link protocol association in windows.
141:
used to denote files stored on computers connected to the
496: 914: 893: 821: 771: 661: 540: 247:link. The typical eD2k file link also includes the 57:. Unsourced material may be challenged and removed. 257:eD2k links can also include a reference to the 749: 518: 8: 487:Ed2k link formats supported by emule client. 756: 742: 734: 525: 511: 503: 267:On eMule, the link often contains also an 534:Uniform Resource Identifier (URI) schemes 117:Learn how and when to remove this message 810: 405: 7: 374:ed2k://|server|207.44.222.51|4242|/ 364:IP – IP of the server to connect to. 275:|h=H52BRVWPBBTAED5NXQDH2RJDDAKRUWST| 55:adding citations to reliable sources 315:which can be interpreted as either 299:The file data is divided into full 25: 31: 42:needs additional citations for 1: 285:The eD2k hash function is a 493:Tool to create ED2K hashes. 333:eMule § Basic concepts 967: 414:CKnownFile::CreateFromFile 330: 722: 360:ed2k://|server|IP|PORT|/ 321:non-full chunk at the end 431:mldonkey.sourceforge.net 159:Many programs, such as 491:ED2K tools - ED2K_Hash 427:"Ed2k-hash - MLDonkey" 479:aMule wiki: ed2k link 456:www.emule-project.net 452:"Corruption Handling" 412:emule source, method 394:Named data networking 188:to be introduced in 51:improve this article 499:eD2k Links Provider 281:eD2k hash algorithm 473:emule forum guides 933: 932: 801:Magnet URI scheme 731: 730: 694:irc / irc6 / ircs 384:Magnet URI scheme 209:unique identifier 167:and the original 127: 126: 119: 101: 66:"Ed2k URI scheme" 16:(Redirected from 958: 758: 751: 744: 735: 527: 520: 513: 504: 460: 459: 448: 442: 441: 439: 437: 423: 417: 415: 410: 356: 246: 242: 238: 234: 227:File link format 122: 115: 111: 108: 102: 100: 59: 35: 27: 21: 966: 965: 961: 960: 959: 957: 956: 955: 936: 935: 934: 929: 910: 889: 823: 817: 806:ed2k URI scheme 779:eDonkey network 767: 765:eDonkey network 762: 732: 727: 718: 657: 536: 531: 469: 464: 463: 450: 449: 445: 435: 433: 425: 424: 420: 413: 411: 407: 402: 380: 375: 361: 354: 351: 335: 329: 313:remainder chunk 283: 265: 255: 244: 240: 236: 232: 229: 157: 123: 112: 106: 103: 60: 58: 48: 36: 23: 22: 15: 12: 11: 5: 964: 962: 954: 953: 948: 938: 937: 931: 930: 928: 927: 921: 919: 912: 911: 909: 908: 906:ShareConnector 903: 897: 895: 894:Indexing sites 891: 890: 888: 887: 882: 877: 872: 867: 862: 857: 852: 847: 842: 837: 831: 829: 819: 818: 816: 815: 814: 813: 803: 798: 797: 796: 786: 781: 775: 773: 769: 768: 763: 761: 760: 753: 746: 738: 729: 728: 723: 720: 719: 717: 716: 711: 706: 701: 696: 691: 686: 681: 676: 671: 665: 663: 659: 658: 656: 655: 650: 645: 640: 635: 630: 625: 620: 615: 610: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 544: 542: 538: 537: 532: 530: 529: 522: 515: 507: 501: 500: 494: 488: 482: 476: 468: 467:External links 465: 462: 461: 443: 418: 404: 403: 401: 398: 397: 396: 391: 386: 379: 376: 373: 369: 368: 365: 359: 350: 347: 331:Main article: 328: 325: 317:the last chunk 282: 279: 263: 253: 228: 225: 156: 153: 129:In computing, 125: 124: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 963: 952: 949: 947: 944: 943: 941: 926: 923: 922: 920: 918: 913: 907: 904: 902: 899: 898: 896: 892: 886: 883: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 836: 833: 832: 830: 827: 820: 812: 809: 808: 807: 804: 802: 799: 795: 792: 791: 790: 787: 785: 782: 780: 777: 776: 774: 770: 766: 759: 754: 752: 747: 745: 740: 739: 736: 726: 725:Protocol list 721: 715: 712: 710: 707: 705: 702: 700: 697: 695: 692: 690: 687: 685: 682: 680: 677: 675: 672: 670: 667: 666: 664: 660: 654: 651: 649: 646: 644: 641: 639: 636: 634: 631: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 545: 543: 539: 535: 528: 523: 521: 516: 514: 509: 508: 505: 498: 495: 492: 489: 486: 485:emule project 483: 480: 477: 474: 471: 470: 466: 457: 453: 447: 444: 432: 428: 422: 419: 409: 406: 399: 395: 392: 390: 387: 385: 382: 381: 377: 372: 366: 363: 362: 358: 348: 346: 344: 340: 334: 326: 324: 322: 318: 314: 308: 305: 302: 297: 295: 292: 289:of a list of 288: 280: 278: 276: 273: 270: 262: 260: 252: 250: 226: 224: 222: 217: 215: 214:hash function 210: 205: 203: 199: 195: 191: 187: 183: 178: 176: 175: 170: 166: 162: 154: 152: 150: 147: 144: 140: 136: 132: 121: 118: 110: 99: 96: 92: 89: 85: 82: 78: 75: 71: 68: –  67: 63: 62:Find sources: 56: 52: 46: 45: 40:This article 38: 34: 29: 28: 19: 946:File sharing 901:ShareReactor 805: 673: 455: 446: 434:. Retrieved 430: 421: 408: 370: 352: 349:Server links 342: 336: 320: 316: 312: 309: 306: 300: 298: 284: 274: 266: 256: 230: 218: 206: 194:Magnet links 190:peer-to-peer 179: 172: 158: 134: 130: 128: 113: 104: 94: 87: 80: 73: 61: 49:Please help 44:verification 41: 951:URI schemes 840:eDonkey2000 789:Kad network 643:view-source 497:Phantom P2P 339:Merkle tree 221:eD2k client 174:MetaMachine 169:eDonkey2000 149:P2P network 146:filesharing 940:Categories 925:Razorback2 850:eMule Plus 826:comparison 772:Technology 662:Unofficial 623:sip / sips 400:References 343:block hash 259:IP address 237:serverlist 171:client by 139:hyperlinks 131:eD2k links 77:newspapers 811:eD2k Hash 371:Example: 287:root hash 107:June 2016 18:Ed2k link 880:Shareaza 875:Morpheus 870:MLDonkey 794:Kademlia 648:ws / wss 541:Official 436:23 April 389:Metalink 378:See also 272:top hash 249:filename 241:nodelist 182:Shareaza 165:MLDonkey 917:servers 915:Famous 822:Clients 784:Overnet 155:General 143:eDonkey 135:ed2k:// 91:scholar 865:Lphant 704:magnet 689:finger 679:gemini 669:coffee 633:telnet 608:mailto 583:gopher 355:server 301:chunks 294:hashes 245:friend 233:server 137:) are 93:  86:  79:  72:  64:  885:xMule 860:lMule 855:JMule 845:eMule 835:aMule 714:ymsgr 709:rsync 699:ldaps 593:https 548:about 319:or a 198:SHA-1 161:eMule 98:JSTOR 84:books 684:feed 674:ed2k 653:xmpp 618:nntp 603:ldap 598:info 588:http 568:file 563:data 558:crid 553:acct 438:2018 327:AICH 269:AICH 186:URIs 70:news 638:urn 628:tag 613:nfs 578:geo 573:ftp 291:MD4 243:or 202:MD5 200:or 53:by 942:: 454:. 429:. 239:, 235:, 163:, 151:. 828:) 824:( 757:e 750:t 743:v 526:e 519:t 512:v 481:. 458:. 440:. 416:. 133:( 120:) 114:( 109:) 105:( 95:· 88:· 81:· 74:· 47:. 20:)

Index

Ed2k link

verification
improve this article
adding citations to reliable sources
"Ed2k URI scheme"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
hyperlinks
eDonkey
filesharing
P2P network
eMule
MLDonkey
eDonkey2000
MetaMachine
Shareaza
URIs
peer-to-peer
Magnet links
SHA-1
MD5
unique identifier
hash function
eD2k client
filename

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.