That looks promising. 

BTW most Google Image bots are fake. But I don't allow hot linking. A legitimate Google user viewing the reduced resolution image provided by Google can click to see the referring page, so no loss to real users. 

That hacker was quite insistent. I got a 414 (large request) for the first time. Perhaps a buffer overflow attempt.

From: Wandenberg Peixoto
Sent: Sunday, September 25, 2016 3:05 PM
To: nginx@nginx.org
Reply To: nginx@nginx.org
Subject: Re: fake googlebots

Some time ago I wrote this module to check when an access is done through the Google Proxy using reverse DNS + DNS resolve and comparing the results to validate the access.
You can do something similar.

On Sun, Sep 25, 2016 at 11:58 PM, li...@lazygranch.com <li...@lazygranch.com> wrote:
I got a spoofed googlebot hit. It was easy to detect since there were
probably a hundred requests that triggered my hacker detection map
scheme. Only two requests received a 200 return and both were harmless.

200 118.193.176.53 - - [25/Sep/2016:17:45:23 +0000] "GET / HTTP/1.1" 847 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" "-"

For the fake googlebot:
# host 118.193.176.53
Host 53.176.193.118.in-addr.arpa not found: 3(NXDOMAIN)

For a real googlebot:
# host 66.249.69.184
184.69.249.66.in-addr.arpa domain name pointer crawl-66-249-69-184.googlebot.com.

IP2location shows it is a Chinese ISP:
3(NXDOMAIN)http://www.ip2location.com/118.193.176.53

Nginx has a reverse DNS module:
https://github.com/flant/nginx-http-rdns
I see it has a 10.1 issue:
https://github.com/flant/nginx-http-rdns/issues/8

Presuming this bug gets fixed, does anyone have code to verify
googlebots? Or some other method?

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx


_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to