Forum Moderators: open
I'm positive that if it's conspicuous, the malicious sites will cloak a squeaky clean page to thwart the toolbar and those " people out there who aren't computer savvy and need whatever help they can get" will get just the opposite
From my standpoint, this tool is essentially a commercial bot. They should declare themselves just like everybody else. Whether this causes problems with their (IMO misguided) security implementation for this toolbar is their own problem. If the program can detect malware based on scanning HTML, then it will be able to block it should a user clickthrough. There's no increased danger for the user.
Of course, it's highly likely that they will go for an inconspicuous UA. But then, I think this feature is about noise rather than security. I'd like them to give me a mechanism to stop them automatically requesting pages from sites I operate.
Today I had one IP using the ";1813" UA hit the same 2 pages 25 times is rapid succession so it's obvious it doesn't cache what it's doing. There was never a human hitting those pages, no js, CSS or images, just the 2 pages over and over.
Then another case of 5 identical page hits from ";1813" within a minute and never a human on the site.
This thing is a waste of bandwidth.
Then I found a real curious case where ";1813" actually loaded 15 images.
My hackles are up.
Instead of all this current mess which is causing everyone to get all bent out of shape including me in this thread.
requests go though that proxy
Actually, once the proxy is identified you can still cloak good pages to the proxy and serve up malicious pages.
I'm sure you remember that conversation we had about the screening service trying to keep corporate surfers off adult sites and such, once I figured out which proxy was their's I had the option to a) cloak false adult pages to the proxy server for a safe site to get the employee in trouble or b) cloak false clean pages for an unsafe site to let an employee use it without repercussion, the proxy cuts both ways.
Not only that, if you remember I was able to figure out most of the time which IPs were using both my site and that proxy service because they requested the same exact pages which are fairly unique on the site being monitored.
So a proxy isn't exactly going to solve the cloaking/spoofing issues but it does add a level of abstraction that will give a false sense of security and in theory allows caching at a minimum.
[edited by: incrediBILL at 6:45 pm (utc) on May 11, 2008]
They should declare themselves just like everybody else
Effectively they do - MSIE 6.0; Windows NT 5.1;1813 might as well be AVG Toolbar; Cloak Me and I understand why some were sceptical that it came from a well-regarded security company.
Whatever happens, the toolbar will become very widespread in the next few weeks.
Can we expect similar from Symantec, MacAfee et al, or do we already have them?
it might actually be a useful tool if it works similar to "This site may harm your computer" warning Google labels some sites
As I understand it the difference here is the "grey" category - while Grisoft can claim that their assessment of "unknown... unable to read this page... may no longer exist or there may have been an error" is technically accurate, users naturally perceive it as a vote of no confidence from the people they rely on for security.
I had a hard time persuading one of my oldest friends to ignore that warning for my personal site.
There are a lot of people out there who aren't computer savvy and need whatever help they can get
Those are the ones I am worried about.
Post by Samizdata #3646002
I was until now a fan of AVG and installed it on many computers. The previous version is end-of-life and users are expected to upgrade to this new version in their millions within a few weeks, and a large proportion of them will not uncheck the "Install Security Toolbar" option.
I'm not a fan of any these companies, In fact I uninstalled Norton 2 years ago and never looked back. Either my computer is virus haven right now or just all illusion and those firewall/virus companies got alot of people feeding of lies. I really think its the latter.
But this thread is not about whether AV companies trade in illusions and lies. It's about how an apparently-malformed user-agent is triggering server-security access-blocking routines, and therefore causing AVG's toolbar to put up a warning that will scare off visitors.
Secondarily, it's about the fact that since the user-agent is so easy to identify, cloaking a malicious site to look good to it will be trivial.
Thirdly, it's about how a security scanner that identifies itself in this way makes the user a target for any known "hole" in its vendor's anti-malware protection.
IMO, the AVG Linkscanner security toolbar should use the user's browser user-agent string, should cache anything it fetches to minimize wasted bandwidth from the sites that it checks and keep itself hidden, and should present entirely browser-like HTTP request headers; They just did not do their homework or think this implementation through very thoroughly.
Jim
[edited by: jdMorgan at 3:38 am (utc) on May 11, 2008]
AVG is changing users' search results in a visually subtle but psychologically dramatic way.
Anything Grisoft doesn't class as clean is by definition potentially dirty and a threat.
That means your site, if you don't play nice with their fake user-agent.
It's business, not personal.
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648)
notice the space between 'SV1)' & ';'
from perfectly normal UA:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648)
It looks like AVG may be trying to use the browser's UA string, but clearly, their UA string parser and reconstructor is buggy.
I've been wondering where those multiple-"compatible" UA strings have been coming from... mystery solved - at least partly.
Jim
Due to the number of these requests I'm seeing, I'd guess that their UA-builder code is buggy. Based only on "gut feel," I'd say this toolbar is enormously popular -- at least among my sites' visitors.
Jim
These are the headers were sent by this UA:
Cache-Control: no-cache
Host: www.mysite.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;1813)
request_method: GET
server_protocol: HTTP/1.1
Now we know that that UA definitely belongs to AVG.
The interesting part that it(bot) only visits the pages that are listed on search engine, so once you get to the site, AVG is not scanning the links on that page. So what's the point? and Do the collect that data and if they do who is buying it and for what purpose?
And no IT IS NOT OK FOR AVG(Grisoft) to use my server resources and bandwidth, especially when user did not even get to my site/page.
403
Jim,
I am not sure what the registry said before but for now it is Blank.
Blend27
--added:
Key_Master,
I am not sure if it would trip the mod_security, not my environment, but it does get caught in my code as of a few minutes ago.
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;1813)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
And those are the only two user agents that in some cases (not all according to the logs) are causing 404s on my AdWords ads as they convert special characters like “?” and “=”.
Interesting thing in logs is that IP address of those user agents is not preceded nor followed by same IP. It is usually as a single entry with no referrer. In some cases I found same IP as a single entry being 2-3 minutes apart, again no referrer. Finally, there are some entries where there would be a bunch of GET requests, just like normal browser request would do it.
Single GET entries would appear in either 200 or 404 cases.
Just for today, I had over 50 404s from these UAs. That is roughly 50x$1 as they all come from Google AdWords.
Time to install AVG and see what happens when I click onto my ads…
P.S.
I sent them an email a few days ago, still no reply.
However, I still see the requests with ";1813" added to the user-agent string in my server log when I visit my site with this machine. So, this is not the AVG Security Toolbar per se, but rather the "Linkscanner" component of the AVG 8.0 AV program.
Interesting thing in logs is that IP address of those user agents is not preceded nor followed by same IP. It is usually as a single entry with no referrer. In some cases I found same IP as a single entry being 2-3 minutes apart, again no referrer. Finally, there are some entries where there would be a bunch of GET requests, just like normal browser request would do it.
Remember, this is the user's AVG Link Scanner prefetching the links on a Google, Yahoo, etc. search results page. If the user does not visit your site, all you'll see is a single request each time the search results page is loaded or reloaded. If the user *does* visit your site, then you'll see the normal page-fetching from that IP address.
Jim
That is roughly 50x$1 as they all come from Google AdWords.
Are you sure you're being charged for those clicks?
There has been speculation that the AVG Security Toolbar is doing pre-fetch and it appears they have a feature called "AVG Search-Shield" that claims "It checks the SEARCHED (using Yahoo or Google services right now) web pages content.".
From that language I'm assuming it checks the links on the SERPs and perhaps the top AdWords ad above the SERPs is being included or maybe all of the AdWords ads on the page are being included, hard to speculate.
If this is the case, this is truly a huge problem if AdWords advertisers are getting charged for AVG's toolbar pre-fetch their landing page.
Can someone confirm whether or not this toolbar pre-fetch is actually resulting in AdWords charges?
There's another thread about this in the AdWords forum and the consensus was it's probably not charging the advertiser.
[webmasterworld.com...]
Can someone confirm whether or not this toolbar pre-fetch is actually resulting in AdWords charges?
I still see the requests with ";1813" added to the user-agent string
I just downloaded a fresh copy of AVG 8.0 and installed it on another Windows XP SP3 box.
As before, the user-agent for search result pre-fetches was the famous:
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;1813)
The user-agent for normal visits in IE7 was unchanged, no 1813 added.
This is with the "insecurity toolbar" installed.
403
Imagine for one moment that you are my competitor.
Your site ranks number 1 for the primary keywords on all major search engines but you block the wonderful AVG toolbar user-agent and your listing is marked "not confirmed safe", so few AVG users are willing to click your link.
My site ranks number 2 for the primary keywords on all major search engines (grrr!) but I allow the wonderful AVG toolbar user-agent and my listing gets the Grisoft seal of approval, so all AVG users are willing to click my link.
All your SERPS are belong to us.
First sighting: 12/13/2006
2006 - 4 hits
2007 - 358 hits
2008
Jan - 32 hits
Feb - 18 hits
Mar - 243 hits
Apr - 1656 hits
May - 5533 hits (to date 5/11/08)
So you can see that there's a pretty good adoption rate since it's launch on Apr 24 '08.
edit-begin
RewriteCond %{HTTP_USER_AGENT} 1813 [NC,OR]
RewriteCond %{HTTP_USER_AGENT} heritrix [NC]
RewriteRule ^(.*)$ - [F,L]
edit-end
The reason I ask is that I just did this, but my site in Google results still gets the green passing checkmark.
I wonder what I’m missing here…
However, if you must block it, I would use the prefix ";" as well and check for ";1813" just so you don't get any false positives in those big long .NET data strings you often see in MSIE user agents.