webcrawler-verifier
, (*1)
Webcralwer-Verifier is a PHP library to ensure that robots are from the operator they claim to be,
eg that Googlebot is actually coming from Google and not from some spoofer., (*2)
Installation
Install with Composer
If you're using Composer to manage dependencies, you can add Requests with it., (*3)
composer require itgalaxy/webcrawler-verifier
or, (*4)
{
"require": {
"itgalaxy/webcrawler-verifier": ">=1.0.0"
}
}
Usage
<?php
require_once 'vendor/autoload.php';
$userAgent = 'Some user agent';
$ip = '192.168.0.1';
$webcrawlerVerifier = new \WebcrawlerVerifier\WebcrawlerVerifier();
$verifiedStatus = $webcrawlerVerifier->verify(
$userAgent,
$ip
);
if ($verifiedStatus === $webcrawlerVerifier::VERIFIED) {
echo 'Good webcrawler';
} elseif ($verifiedStatus === $webcrawlerVerifier::UNVERIFIED) {
echo 'Bad webcrawler';
} else {
// Alias `$verifiedStatus === $webcrawlerVerifier::UNKNOWN`
echo 'Unknown good or bad wecrawler';
}
Or, (*5)
<?php
// This file is generated by Composer
require_once 'vendor/autoload.php';
if (!empty($_SERVER['HTTP_USER_AGENT']) && !empty($_SERVER['REMOTE_ADDR'])) {
$webcrawlerVerifier = new \WebcrawlerVerifier\WebcrawlerVerifier();
$verifiedStatus = $webcrawlerVerifier->verify(
$_SERVER['HTTP_USER_AGENT'],
$_SERVER['REMOTE_ADDR']
);
if ($verifiedStatus === $webcrawlerVerifier::VERIFIED) {
echo 'Good webcrawler';
} elseif ($verifiedStatus === $webcrawlerVerifier::UNVERIFIED) {
echo 'Bad webcrawler';
} else {
// Alias `$verifiedStatus === $webcrawlerVerifier::UNKNOWN`
echo 'Unknown good or bad wecrawler';
}
}
Built in crawler detection
By company
By webcrawler name
Contributions are welcome., (*6)
How it works
Step one is identification.
If the user-agent identifies as one of the bots you are checking for, it goes into step 2 for verification.
If not, none is reported., (*7)
Step two is verification.
The robot that was reported in the user-agent is verified by looking at the client's network address.
The big ones work with a combination of dns + reverse-dns lookup. That's not a hack, it's the officially
recommended way. The ip resolves to a hostname of the provider, and the hostname has a reverse dns entry
pointing back to that ip. This gives the crawler operators the freedom to to change and add networks
without risking of being locked out of websites., (*8)
The other method is to maintain lists of ip addresses. This is used for those operators that don't
officially endorse the first method. And it can optionally be used in combination with the first method
to avoid the one-time cost of the dns verification., (*9)
Except where it's required (for the 2nd method) this project does not maintain ip lists. The ones that
can currently be found on the internet all seem outdated. And that's exactly the problem... they will
always be lagging behind the ip ranges that the operators use., (*10)
Contribution
Don't hesitate to create a pull request. Every contribution is appreciated., (*11)