Therefore I am under the impression that Lugdunum had access to the original MetaMachine edonkey server sources, but that he wrote his own version of an edonkey server from scratch with the knowledge thus acquired.
Did MetaMachine impose any legal restriction(s) on Lugdunum for his new edonkey server version? If so, what can we expect after MetaMachine recently trying to shut down the edonkey network?
Is open-sourcing the Lugdunum edonkey server possible? Does Lugdunum want to do it?
What is the rationale behind whatever decision is taken?
Inquiring minds want to know...
Original dserver was written by Metamachine, but could not handle more than 4000 users, because of poor design (and sources being the same for window and unix)
I did a complete reverse engineering of this program and network sniffing (as did emule for the client).
I did many patches in assembly in the binary image of dserver. Servers were then able to reach 100.000 users.
Then, assuming Metamachine was not interesting into maintaining themselves dserver (they were working on Overnet, wich was not using dservers anymore), I asked them if I could have a copy of sources so that I could go one step ahead.
Metamachine agreed and gave me a copy of their sources. As they were in C++ and with too many levels of abstraction (nice for the programmers, but performance killers), I decided to just delete them all and not spend any time on them. Sometime, it's better to throw the whole thing in the bin and not pollute your head with wrong design.
Later, when it became obvious that edonkey/emule network still needed big servers because Kademlia clients were not yet ready, I wrote a 100% lugdunum implementation, in C language and with the right design. This was three years ago (Sep 2003).
This C version let me add new protocol extension to reduce overall bandwith (zip compression, udp requests aggregation), and to reduce RAM usage with special allocators.
I own eserver 100%, and it is not open source because many bad guys would use the source to build fake servers. Fake clients already exist and harm the network.