aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols/gnutella.c
diff options
context:
space:
mode:
authorLuca Deri <deri@Lucas-MacBookPro.local>2015-04-19 07:25:59 +0200
committerLuca Deri <deri@Lucas-MacBookPro.local>2015-04-19 07:25:59 +0200
commit2e5ceac844c32fb52f4f3042be5b872f8b0b4ff0 (patch)
tree01af171f4af2b86efa64d0166dc540ee5c027c95 /src/lib/protocols/gnutella.c
parent7fa4694dadf869d1de2baa99383308a163902f8f (diff)
Initial import from SVN
Diffstat (limited to 'src/lib/protocols/gnutella.c')
-rw-r--r--src/lib/protocols/gnutella.c375
1 files changed, 375 insertions, 0 deletions
diff --git a/src/lib/protocols/gnutella.c b/src/lib/protocols/gnutella.c
new file mode 100644
index 000000000..022df6e3d
--- /dev/null
+++ b/src/lib/protocols/gnutella.c
@@ -0,0 +1,375 @@
+/*
+ * gnutella.c
+ *
+ * Copyright (C) 2009-2011 by ipoque GmbH
+ * Copyright (C) 2011-15 - ntop.org
+ *
+ * This file is part of nDPI, an open source deep packet inspection
+ * library based on the OpenDPI and PACE technology by ipoque GmbH
+ *
+ * nDPI is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * nDPI is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with nDPI. If not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+
+/* include files */
+
+#include "ndpi_protocols.h"
+
+#ifdef NDPI_PROTOCOL_GNUTELLA
+
+static void ndpi_int_gnutella_add_connection(struct ndpi_detection_module_struct *ndpi_struct,
+ struct ndpi_flow_struct *flow,
+ ndpi_protocol_type_t protocol_type)
+{
+
+ struct ndpi_packet_struct *packet = &flow->packet;
+ struct ndpi_id_struct *src = flow->src;
+ struct ndpi_id_struct *dst = flow->dst;
+
+ ndpi_int_add_connection(ndpi_struct, flow, NDPI_PROTOCOL_GNUTELLA, protocol_type);
+
+ if (src != NULL) {
+ src->gnutella_ts = packet->tick_timestamp;
+ if (packet->udp != NULL) {
+ if (!src->detected_gnutella_udp_port1) {
+ src->detected_gnutella_udp_port1 = (packet->udp->source);
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_DEBUG, "GNUTELLA UDP PORT1 DETECTED as %u\n",
+ src->detected_gnutella_udp_port1);
+
+ } else if ((ntohs(packet->udp->source) != src->detected_gnutella_udp_port1)
+ && !src->detected_gnutella_udp_port2) {
+ src->detected_gnutella_udp_port2 = (packet->udp->source);
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_DEBUG, "GNUTELLA UDP PORT2 DETECTED as %u\n",
+ src->detected_gnutella_udp_port2);
+
+ }
+ }
+ }
+ if (dst != NULL) {
+ dst->gnutella_ts = packet->tick_timestamp;
+ }
+}
+
+void ndpi_search_gnutella(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
+{
+ struct ndpi_packet_struct *packet = &flow->packet;
+
+ struct ndpi_id_struct *src = flow->src;
+ struct ndpi_id_struct *dst = flow->dst;
+
+ u_int16_t c;
+ if (packet->detected_protocol_stack[0] == NDPI_PROTOCOL_GNUTELLA) {
+ if (src != NULL && ((u_int32_t)
+ (packet->tick_timestamp - src->gnutella_ts) < ndpi_struct->gnutella_timeout)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_DEBUG, "gnutella : save src connection packet detected\n");
+ src->gnutella_ts = packet->tick_timestamp;
+ } else if (dst != NULL && ((u_int32_t)
+ (packet->tick_timestamp - dst->gnutella_ts) < ndpi_struct->gnutella_timeout)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_DEBUG, "gnutella : save dst connection packet detected\n");
+ dst->gnutella_ts = packet->tick_timestamp;
+ }
+ if (src != NULL && (packet->tick_timestamp - src->gnutella_ts) > ndpi_struct->gnutella_timeout) {
+ src->detected_gnutella_udp_port1 = 0;
+ src->detected_gnutella_udp_port2 = 0;
+ }
+ if (dst != NULL && (packet->tick_timestamp - dst->gnutella_ts) > ndpi_struct->gnutella_timeout) {
+ dst->detected_gnutella_udp_port1 = 0;
+ dst->detected_gnutella_udp_port2 = 0;
+ }
+
+ return;
+ }
+
+ /* skip packets without payload */
+ if (packet->payload_packet_len < 2) {
+ return;
+ }
+ if (packet->tcp != NULL) {
+ /* this case works asymmetrically */
+ if (packet->payload_packet_len > 10 && memcmp(packet->payload, "GNUTELLA/", 9) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "GNUTELLA DETECTED\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ /* this case works asymmetrically */
+ if (packet->payload_packet_len > 17 && memcmp(packet->payload, "GNUTELLA CONNECT/", 17) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "GNUTELLA DETECTED\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+
+ if (packet->payload_packet_len > 50 && ((memcmp(packet->payload, "GET /get/", 9) == 0)
+ || (memcmp(packet->payload, "GET /uri-res/", 13) == 0)
+ )) {
+ ndpi_parse_packet_line_info(ndpi_struct, flow);
+ for (c = 0; c < packet->parsed_lines; c++) {
+ if ((packet->line[c].len > 19 && memcmp(packet->line[c].ptr, "User-Agent: Gnutella", 20) == 0)
+ || (packet->line[c].len > 10 && memcmp(packet->line[c].ptr, "X-Gnutella-", 11) == 0)
+ || (packet->line[c].len > 7 && memcmp(packet->line[c].ptr, "X-Queue:", 8) == 0)
+ || (packet->line[c].len > 36 && memcmp(packet->line[c].ptr,
+ "Content-Type: application/x-gnutella-", 37) == 0)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG, "DETECTED GNUTELLA GET.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ return;
+ }
+ }
+ }
+ if (packet->payload_packet_len > 50 && ((memcmp(packet->payload, "GET / HTTP", 9) == 0))) {
+ ndpi_parse_packet_line_info(ndpi_struct, flow);
+ if ((packet->user_agent_line.ptr != NULL && packet->user_agent_line.len > 15
+ && memcmp(packet->user_agent_line.ptr, "BearShare Lite ", 15) == 0)
+ || (packet->accept_line.ptr != NULL && packet->accept_line.len > 24
+ && memcmp(packet->accept_line.ptr, "application n/x-gnutella", 24) == 0)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG, "DETECTED GNUTELLA GET.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ }
+
+ }
+ /* haven't found this pattern in any trace. */
+ if (packet->payload_packet_len > 50 && ((memcmp(packet->payload, "GET /get/", 9) == 0)
+ || (memcmp(packet->payload, "GET /uri-res/", 13) == 0))) {
+ c = 8;
+ while (c < (packet->payload_packet_len - 9)) {
+ if (packet->payload[c] == '?')
+ break;
+ c++;
+ }
+
+ if (c < (packet->payload_packet_len - 9) && memcmp(&packet->payload[c], "urn:sha1:", 9) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE,
+ "detected GET /get/ or GET /uri-res/.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ }
+
+ }
+
+ /* answer to this packet is HTTP/1.1 ..... Content-Type: application/x-gnutella-packets,
+ * it is searched in the upper paragraph. */
+ if (packet->payload_packet_len > 30 && memcmp(packet->payload, "HEAD /gnutella/push-proxy?", 26) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "detected HEAD /gnutella/push-proxy?\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ return;
+ }
+ /* haven't found any trace with this pattern */
+ if (packet->payload_packet_len == 46
+ && memcmp(packet->payload, "\x50\x55\x53\x48\x20\x67\x75\x69\x64\x3a", 10) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE,
+ "detected \x50\x55\x53\x48\x20\x67\x75\x69\x64\x3a\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ /* haven't found any trace with this pattern */
+ if (packet->payload_packet_len > 250 && memcmp(packet->payload, "GET /gnutella/", 14) == 0)
+ //PATTERN IS :: GET /gnutella/tigertree/v3?urn:tree:tiger/:
+ {
+ const u_int16_t end = packet->payload_packet_len - 3;
+
+ c = 13;
+ while (c < end) {
+ if ((memcmp(&packet->payload[14], "tigertree/", 10) == 0)
+ || (end - c > 18 && memcmp(&packet->payload[c], "\r\nUser-Agent: Foxy", 18) == 0)
+ || (end - c > 44
+ && memcmp(&packet->payload[c],
+ "\r\nAccept: application/tigertree-breadthfirst",
+ 44) == 0) || (end - c > 10 && memcmp(&packet->payload[c], "\r\nX-Queue:", 10) == 0)
+ || (end - c > 13 && memcmp(&packet->payload[c], "\r\nX-Features:", 13) == 0)) {
+
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA,
+ ndpi_struct, NDPI_LOG_TRACE, "FOXY :: GNUTELLA GET 2 DETECTED\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ return;
+ }
+
+ c++;
+ }
+ }
+ /* haven't found any trace with this pattern */
+ if (packet->payload_packet_len > 1 && packet->payload[packet->payload_packet_len - 1] == 0x0a
+ && packet->payload[packet->payload_packet_len - 2] == 0x0a) {
+ if (packet->payload_packet_len > 3 && memcmp(packet->payload, "GIV", 3) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "MORPHEUS GIV DETECTED\n");
+ /* Not Excludeing the flow now.. We shall Check the next Packet too for Gnutella Patterns */
+ return;
+ }
+ }
+ /* might be super tricky new ssl gnutella transmission, but the certificate is strange... */
+ if (packet->payload_packet_len == 46 && get_u_int32_t(packet->payload, 0) == htonl(0x802c0103) &&
+ get_u_int32_t(packet->payload, 4) == htonl(0x01000300) && get_u_int32_t(packet->payload, 8) == htonl(0x00002000) &&
+ get_u_int16_t(packet->payload, 12) == htons(0x0034)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "detected gnutella len == 46.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if (packet->payload_packet_len == 49 &&
+ memcmp(packet->payload, "\x80\x2f\x01\x03\x01\x00\x06\x00\x00\x00\x20\x00\x00\x34\x00\x00\xff\x4d\x6c",
+ 19) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "detected gnutella len == 49.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if (packet->payload_packet_len == 89 && memcmp(&packet->payload[43], "\x20\x4d\x6c", 3) == 0 &&
+ memcmp(packet->payload, "\x16\x03\x01\x00\x54\x01\x00\x00\x50\x03\x01\x4d\x6c", 13) == 0 &&
+ memcmp(&packet->payload[76], "\x00\x02\x00\x34\x01\x00\x00\x05", 8) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE,
+ "detected gnutella asymmetrically len == 388.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ } else if (packet->payload_packet_len == 82) {
+ if (get_u_int32_t(packet->payload, 0) == htonl(0x16030100)
+ && get_u_int32_t(packet->payload, 4) == htonl(0x4d010000)
+ && get_u_int16_t(packet->payload, 8) == htons(0x4903)
+ && get_u_int16_t(packet->payload, 76) == htons(0x0002)
+ && get_u_int32_t(packet->payload, 78) == htonl(0x00340100)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_TRACE, "detected len == 82.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ }
+ } else if (packet->udp != NULL) {
+ if (src != NULL && (packet->udp->source == src->detected_gnutella_udp_port1 ||
+ packet->udp->source == src->detected_gnutella_udp_port2) &&
+ (packet->tick_timestamp - src->gnutella_ts) < ndpi_struct->gnutella_timeout) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG, "port based detection\n\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_CORRELATED_PROTOCOL);
+ }
+ /* observations:
+ * all the following patterns send out many packets which are the only ones of their flows,
+ * often on the very beginning of the traces, or flows with many packets in one direction only.
+ * but then suddenly, one gets an answer as you can see in netpeker-gnutella-rpc.pcap packet 11483.
+ * Maybe gnutella tries to send out keys?
+ */
+ if (packet->payload_packet_len == 23 && packet->payload[15] == 0x00
+ && packet->payload[16] == 0x41 && packet->payload[17] == 0x01
+ && packet->payload[18] == 0x00 && packet->payload[19] == 0x00
+ && packet->payload[20] == 0x00 && packet->payload[21] == 0x00 && packet->payload[22] == 0x00) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 23.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+
+ return;
+ }
+ if (packet->payload_packet_len == 35 && packet->payload[25] == 0x49
+ && packet->payload[26] == 0x50 && packet->payload[27] == 0x40
+ && packet->payload[28] == 0x83 && packet->payload[29] == 0x53
+ && packet->payload[30] == 0x43 && packet->payload[31] == 0x50 && packet->payload[32] == 0x41) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 35.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if (packet->payload_packet_len == 32
+ && (memcmp(&packet->payload[16], "\x31\x01\x00\x09\x00\x00\x00\x4c\x49\x4d\x45", 11) == 0)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 32.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if (packet->payload_packet_len == 34 && (memcmp(&packet->payload[25], "SCP@", 4) == 0)
+ && (memcmp(&packet->payload[30], "DNA@", 4) == 0)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 34.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if ((packet->payload_packet_len == 73 || packet->payload_packet_len == 96)
+ && memcmp(&packet->payload[32], "urn:sha1:", 9) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 73,96.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+
+ if (memcmp(packet->payload, "GND", 3) == 0) {
+ if ((packet->payload_packet_len == 8 && (memcmp(&packet->payload[6], "\x01\x00", 2) == 0))
+ || (packet->payload_packet_len == 11 && (memcmp(&packet->payload[6], "\x01\x01\x08\x50\x49", 5)
+ == 0)) || (packet->payload_packet_len == 17
+ &&
+ (memcmp
+ (&packet->payload[6], "\x01\x01\x4c\x05\x50",
+ 5) == 0))
+ || (packet->payload_packet_len == 28
+ && (memcmp(&packet->payload[6], "\x01\x01\x54\x0f\x51\x4b\x52\x50\x06\x52", 10) == 0))
+ || (packet->payload_packet_len == 41
+ && (memcmp(&packet->payload[6], "\x01\x01\x5c\x1b\x50\x55\x53\x48\x48\x10", 10) == 0))
+ || (packet->payload_packet_len > 200 && packet->payload_packet_len < 300 && packet->payload[3] == 0x03)
+ || (packet->payload_packet_len > 300 && (packet->payload[3] == 0x01 || packet->payload[3] == 0x03))) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, GND.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ }
+
+ if ((packet->payload_packet_len == 32)
+ && memcmp(&packet->payload[16], "\x31\x01\x00\x09\x00\x00\x00", 7) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 32 ii.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ if ((packet->payload_packet_len == 23)
+ && memcmp(&packet->payload[16], "\x00\x01\x00\x00\x00\x00\x00", 7) == 0) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct, NDPI_LOG_DEBUG,
+ "detected gnutella udp, len = 23 ii.\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ }
+ //neonet detection follows
+
+ /* haven't found any trace with this pattern */
+ if (packet->tcp != NULL && ntohs(packet->tcp->source) >= 1024 && ntohs(packet->tcp->dest) >= 1024) {
+ if (flow->l4.tcp.gnutella_stage == 0) {
+ if (flow->packet_counter == 1
+ && (packet->payload_packet_len == 11
+ || packet->payload_packet_len == 33 || packet->payload_packet_len == 37)) {
+ flow->l4.tcp.gnutella_msg_id[0] = packet->payload[4];
+ flow->l4.tcp.gnutella_msg_id[1] = packet->payload[6];
+ flow->l4.tcp.gnutella_msg_id[2] = packet->payload[8];
+ flow->l4.tcp.gnutella_stage = 1 + packet->packet_direction;
+ return;
+ }
+ } else if (flow->l4.tcp.gnutella_stage == 1 + packet->packet_direction) {
+ if (flow->packet_counter == 2 && (packet->payload_packet_len == 33 || packet->payload_packet_len == 22)
+ && flow->l4.tcp.gnutella_msg_id[0] == packet->payload[0]
+ && flow->l4.tcp.gnutella_msg_id[1] == packet->payload[2]
+ && flow->l4.tcp.gnutella_msg_id[2] == packet->payload[4]
+ && NDPI_SRC_OR_DST_HAS_PROTOCOL(src, dst, NDPI_PROTOCOL_GNUTELLA)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_TRACE, "GNUTELLA DETECTED due to message ID match (NEONet protocol)\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ } else if (flow->l4.tcp.gnutella_stage == 2 - packet->packet_direction) {
+ if (flow->packet_counter == 2 && (packet->payload_packet_len == 10 || packet->payload_packet_len == 75)
+ && flow->l4.tcp.gnutella_msg_id[0] == packet->payload[0]
+ && flow->l4.tcp.gnutella_msg_id[1] == packet->payload[2]
+ && flow->l4.tcp.gnutella_msg_id[2] == packet->payload[4]
+ && NDPI_SRC_OR_DST_HAS_PROTOCOL(src, dst, NDPI_PROTOCOL_GNUTELLA)) {
+ NDPI_LOG(NDPI_PROTOCOL_GNUTELLA, ndpi_struct,
+ NDPI_LOG_TRACE, "GNUTELLA DETECTED due to message ID match (NEONet protocol)\n");
+ ndpi_int_gnutella_add_connection(ndpi_struct, flow, NDPI_REAL_PROTOCOL);
+ return;
+ }
+ }
+ }
+
+ NDPI_ADD_PROTOCOL_TO_BITMASK(flow->excluded_protocol_bitmask, NDPI_PROTOCOL_GNUTELLA);
+}
+#endif