Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

[2018]

Uncategorized
27 11 0
Feed RSS

Gli ultimi otto messaggi ricevuti dalla Federazione
  • @algernon @ansuz that's useful information too, thanks. I'm actually considering collecting more information about the request headers in general to see if there's other subtle hints about them. Is there a way to tell apache to log all request headers for every request? At least while debugging it'd come in handy.

    read more

  • @oblomov @ansuz It's even easier than that, and most bots can be caught on the first request: if the user-agent contains Firefox/ or Chrome/, and you're serving on HTTPS, the request will1 contain a sec-fetch-mode header too, when coming from a real browser. Bots don't send it.

    Pair it with blocking agents listed in ai.robots.txt, and ~90% of your bot traffic is gone. If you can afford to block Huawei's and Alibaba's ASNs, you pretty much got rid of all of them.

    Many of the bots do download CSS, and some even fetch the JS too, by the way. And images? Some of them love 'em.

    Exceptions apply: if you put a page in Reader Mode in Firefox, and reload while in reader mode, no sec-fetch-mode is sent. There are also some applications like gnome-podcasts that uses a Firefox user-agent, but doesn't send sec-fetch-mode. While there will be false positives, most of them can be worked around, and the gain of catching all the lame bots far outweights the cons, imo. ↩︎

    read more

  • @meposz
    Dal suo sito ufficiale! https://craphound.com/shop/

    read more

  • @informapirata @magostinelli Irc o Matrix non sono poi così difficili da utilizzare

    read more

  • @sio MEGLIO UN FUMETTO O UN ETTO DI FUMO?

    read more

  • @magostinelli

    "eh, ma è lì che stanno TUTTI!"

    dicono quelli che pensano le persone dovrebbero usare il loro software open source, invece che quello commerciale che già usano TUTTI... 😅

    read more

  • @ansuz that's very useful information, thanks.

    read more

  • @oblomov my approach involves a nodejs service and applies a chain of fairly complicated rules to categorize each one.

    Depending on how different requests are classified it then writes offending IPs to a different log which fail2ban follows. I don't think I could accomplish the same with fail2ban alone, or at least if I could it would be much less readable.

    Still, the write-to-a-log-to-ban is a nice API and I appreciate that fail2ban handles the rest of the details with so little attention.

    read more
Post suggeriti