History
The standard for Magneted2k:
and freenet:
URI schemes used by btmh:
protocol in 2020 as part of its BitTorrent v2 changes.
Format
Magnet URIs consist of a series of one or more parameters, the order of which is not significant, formatted in the same way asExact Topic (xt)
The xt parameter specifies the URN for a given p2p protocol. Its purpose is to provide a search parameter for finding the metadata to the torrent. This effectively acts as a replacement to a .torrent file, which itself contains the torrent metadata, by instead searching the p2p network (using the URN) for that metadata. Each protocol handles a URN uniquely; for example,xt=urn:btih:FFC7E738EAA4CD4ECF51EC6FD669C6CDE2C281A8
uses the btih (BitTorrent v1 protocol), so a BitTorrent client can take the hash and lookup the torrent's metadata in the BitTorrent DHT. In the case of DHT the client searches through a set of pre-known nodes and requests the metadata for an infohash; those nodes will make the same request to other known nodes until eventually a swarm is found and returned.
xt also allows for a group setting. Multiple files can be included by adding a count number preceded by a dot (".") to each link parameter.
:magnet:?xt.1= [ URN
An urn is a vase, often with a cover, with a typically narrowed neck above a rounded body and a footed pedestal. Describing a vessel as an "urn", as opposed to a vase or other terms, generally reflects its use rather than any particular shape ...
of the first file]&xt.2=[ URN of the second file]
; Merkle tree#Tiger tree hash, Tiger Tree Hash (TTH): These hashes are used on Direct Connect (file sharing), Direct Connect and G2 (Gnutella2), among others.
:xt=urn:tree:tiger : TTH hash sum">Hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
xt=urn:sha1 : SHA-1 hash function">Hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
xt=urn:bitprint : SHA-1 hash function">Hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
(Base32
Base32 is an encoding method based on the Radix, base-32 numeral system. It uses an alphabet of 32 Numerical digit, digits, each of which represents a different combination of 5 bits (25). Since base32 is not very widely adopted, the question of no ...
) ]. TTH hash sum">Hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
(Base32
Base32 is an encoding method based on the Radix, base-32 numeral system. It uses an alphabet of 32 Numerical digit, digits, each of which represents a different combination of 5 bits (25). Since base32 is not very widely adopted, the question of no ...
) ]
; EDonkey network#Hash identification, ED2K (eDonkey2000) hash: These hash sums are used on xt=urn:ed2k :[ EDonkey network#Hash identification, ED2K hash sum, Hash (Hex
Hex usually refers to:
* A curse or supposed real and potentially supernaturally realized malicious wish
* Hexadecimal, a base-16 number system often used in computer nomenclature
Hex, HEX, or The Hex may also refer to:
Magic
* Hex sign, a b ...
) ]
; AICH, Advanced Intelligent Corruption Handler (AICH): Not formal URNs for Magnet links, such hash sums are used by xt=urn:aich : AICH, aich hash sum, Hash (Base32
Base32 is an encoding method based on the Radix, base-32 numeral system. It uses an alphabet of 32 Numerical digit, digits, each of which represents a different combination of 5 bits (25). Since base32 is not very widely adopted, the question of no ...
) ]
; Kazaa hash: Used on FastTrack, these hash sums are vulnerable to Collision attack, hash collision attacks.
:xt=urn:kzhash :[ Kazaa hash sum, Hash (Hex
Hex usually refers to:
* A curse or supposed real and potentially supernaturally realized malicious wish
* Hexadecimal, a base-16 number system often used in computer nomenclature
Hex, HEX, or The Hex may also refer to:
Magic
* Hex sign, a b ...
) ]
; BitTorrent info hash (BTIH): These are hex-encoded xt=urn:btih :[ BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
Info hash sum, Hash (Hex
Hex usually refers to:
* A curse or supposed real and potentially supernaturally realized malicious wish
* Hexadecimal, a base-16 number system often used in computer nomenclature
Hex, HEX, or The Hex may also refer to:
Magic
* Hex sign, a b ...
) ]
: Some clients require btmh
) to allow for torrents that can participate in both v1 and v2 swarms.
:xt=urn:btmh :[1220: (v2 prefix) BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
Info hash sum, Hash (Hex
Hex usually refers to:
* A curse or supposed real and potentially supernaturally realized malicious wish
* Hexadecimal, a base-16 number system often used in computer nomenclature
Hex, HEX, or The Hex may also refer to:
Magic
* Hex sign, a b ...
) ]
; MD5, Message Digest 5 (MD5): Supported by G2 (Gnutella2), such hashes are vulnerable to Collision attack, hash collision attacks.
:xt=urn:md5 : MD5 hash sum, Hash (Hex
Hex usually refers to:
* A curse or supposed real and potentially supernaturally realized malicious wish
* Hexadecimal, a base-16 number system often used in computer nomenclature
Hex, HEX, or The Hex may also refer to:
Magic
* Hex sign, a b ...
) ]
Web links to the file
There are two types of download links that a Magnet link can include as a direct or backup source. ; "as" ("acceptable source"): Most clients treat "as" as equal to the "xs" token when it comes to priority, and ignore the timeout before contacting "as" sources denoted by the specs. ; Content-Addressable Web URL: This type of -based link is used byxs=http:// lient Address ort of clienturi-res/N2R?URN
An urn is a vase, often with a cover, with a typically narrowed neck above a rounded body and a footed pedestal. Describing a vessel as an "urn", as opposed to a vase or other terms, generally reflects its use rather than any particular shape ...
containing a file hash sum">hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
]
:xs=http://192.0.2.27:6346/uri-res/N2R?urn:sha1:FINYVGHENTHSMNDSQQYDNLPONVBZTICF
;Link to a DirectConnect hub to find sources for a file: This type of link connects a DirectConnect client immediately to the hub in question.
:xs=dchub:// ub address ub port/code>
;Reference to a web-based source cache for a file on Gnutella2
Gnutella2, often referred to as G2, is a peer-to-peer protocol developed mainly by Michael Stokes and released in 2002.
While inspired by the gnutella protocol, G2 shares little of its design with the exception of its connection handshake and ...
: In this case, the included link points, not to a client IP or direct source, but to a source cache which stores the IPs of other clients contacting it to download the same file. Once a client connects to the cache, it is served IPs for alternate sources, while its own IP is stored within the cache and forwarded to the next one connecting to the cache. This system operates similar to a BitTorrent tracker
A BitTorrent tracker is a special type of server that assists in the communication between peers using the BitTorrent protocol.
In peer-to-peer file sharing, a software client on an end-user PC requests a file, and portions of the requested ...
.
:xs=http://cache.freebase.be/ SHA-1 hash sum">hash
Hash, hashes, hash mark, or hashing may refer to:
Substances
* Hash (food), a coarse mixture of ingredients, often based on minced meat
* Hash (stew), a pork and onion-based gravy found in South Carolina
* Hash, a nickname for hashish, a canna ...
]
;Reference to an eD2k source
:xs=ed2kftp://[client address]:[client port]/[ed2k hash]/[file size]/
Supplement format (x.)
For experimental and self-complementing informal options, the prefix followed by a chosen suffix letter can be used. These names are guaranteed to never be standardized.
:x. ame of the new parameter ata of the new parameter (URL encoded)">URL.html" ;"title="ata of the new parameter (URL">ata of the new parameter (URL encoded)/code>
Clients
See also
* BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
* Burnbit
* ed2k URI scheme
* InterPlanetary File System
* Metalink
* Named data networking
* Peer-to-peer
Explanatory notes
References
External links
* , an early definition of the format (last update 2002)
CHK
Freeware checksum utility with SHA1-Base32 and ED2K support
* , an open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
command-line tool, which can calculate magnet links
{{DEFAULTSORT:Magnet Uri Scheme
File sharing
URI schemes