Forum Moderators: open
Lately I've been seeing a lot of Gecko-based user agents like this where the language property is missing.
Based on my logs it appears to be a regular browser.
Question: Is this a valid UA and should I include this variation in my browscap.ini file?
The language preferences will be sent in the HTTP request header, all of which is not visible in your logs. Here's an example of the Accept_Language header:
HTTP_ACCEPT_LANGUAGEen-us,en;q=0.5
This shows that I prefer U.S. english, followed by any other english.
Jim
Maintaining an accurate browscap.ini file is getting more and more difficult. I'm beginning to wonder if user agents still serve any useful purpose. Especially since they're so easily spoofed/modified.
In this week's analysis, out of 100+ unique user agents all but 12 were spoofed/modified by the user. My favorite was: "Bill Gates in person" from 172.186.24.103, an AOL IP Address.
To keep this somewhat on topic I had a spoofed YahooSeeker user agent and something called "Googelbot/Beta (+http://www.googlebot.com/bot.html). Note that Googlebot is spelled incorrectly.
It makes me wonder if the 2-3 hours I spend each Sunday morning creating an updated browscap.ini file for free download is worth it.
Is this an appropriate forum to discuss this issue?
While some of these methods -- indeed, all of these methods combined -- are not bulletproof, they work pretty well in combination because of the simple fact that there are more unsophisticated than sophisticated attacks. Therefore, even unsophisticated access controls block the majority of problems, and help to keep your bandwidth down.
I've stated it before, but it bears repeating occasionally: If you block even the most obvious attacks, then the total number of attempts seems to decrease over time. If your site is wide-open to abuse, then the number of attempts goes up over time. So, even less-than-perfect methods pay off.
While big corporate sites can afford to install 'smart' firewalls that updtate themselves with fee-based dynamically-maintained databases of intruder IP addresses, that option is typically not available to the small independent Webmaster. So even the simple three-part method described here is useful.
In short, keep up the good work, GaryK. Maybe put a few AdSense ads up on that page, and get some reward for you efforts!
Jim
I guess there is still a place for user agents, at least for now.
It's funny you should mention AdSense because I applied on Saturday. I was going to start soliciting donations but AdSense seems more professional and less greedy on my part. I don't want to make any money off of this project, but I do want to cover my out of pocket expenses like bandwidth.
Now you've got me wondering if I should consider distributing a free list of evil IP Addresses. I have thousands of them on file but never thought they were worth compiling into a file for distribution. If it would help the small webmaster who cannot afford the professional service you mentioned it would be one more thing I could do to help all of us.