Forum Moderators: open
Getting the client to execute some javascript and verifying it happened is a good idea.
I hear reports that Google are already running javascript on pages they visit. Doubtless some of the other bots will follow suit with headless browsers if they haven't already.
mouseMove + mouseOver or css/media query content overlay style & and touch(ontouchstart or onmsgesturechange) for Mobile UAs, think like a Human... triggered by unusual request not from.... (say you know where your overage visitor is from).
Well checking for JS to determine bot or human is a flawed & futile exercise. Half the bots I see support JS.
I'm interested to hear about people's experiences with referers: do browsers reliably send them? Do bots often not?
By 'auto-referer' do you mean a request for a url that sends the same url as the referer? I've seen quite a few of those in passing...
Oops. Sorry, tangor, we're not really talking about whitelisting are we?
Unconditionally deny such-and-such vast IP ranges (if you've got non-portable widgets like wilderness, that means everything non-ARIN)
Poke a hole for your good friend Boris who's got a floating IP within a /22 sector
My move to whitelisting was primarily to make sure my site(s) are available to USERS and not being hammered by bots. I generally use hosting that is robust enough to handle both... but why pay for the traffic that doesn't count?
My move to whitelisting was primarily to make sure my site(s) are available to USERS and not being hammered by bots. I generally use hosting that is robust enough to handle both... but why pay for the traffic that doesn't count?
That's physically impossible.
The bots crawl your site whether you think they are or not because they look like almost any other browser with a few exceptions.
The sneaky bots are color coded in the report to stand out so you can see the stuff trying to hide that is 100% bot and would slip right past the undiscerning eye.
Blocking server farms, etc is a part of whitelist in they are not allowed in bulk... and the whitelist of what I do allow is the other side.
Many of the color-highlighted UA's in your list offer simple solutions in black-listing
and that's part of this discussion. Your Firewall is my whitelist, ie, who gets through. Agreed?
His Class C changed by a rather large range, which isn't unusual for RIPE IP's, and I added an exception for a /29
Your Firewall is my whitelist, ie, who gets through. Agreed?
No, my firewall is the firewall, NOBODY GETS THROUGH, unless... they're on the WHITELIST!
it's proactive vs. reactive
Sorry Don, but in this modern world where Google penalizes people for literally anything and everything you can't wait until the damage is done before blocking something.
It's not different strokes really, it's proactive vs. reactive and I prefer to spend my time doing more productive things.
Besides, you block the entire WORLD except the whitelisted USA IP ranges,
because my ISP uses three different A segments.
however the same segments are consistently used