Feeds

Google Oompa Loompas cloaking user agents?

Goobuntu rumor resurfaces

3 Big data security analytics techniques

Over 10 per cent of Google's internal machines are hiding their software makeup from the outside world, according to data collected by Net Applications, a web analytics outfit that captures user traffic on more than 40,000 sites across the net.

When visiting webpages, the firm says, 11 to 13 per cent of internal Google machines display browser user agents that are completely empty. And judging from the behavior of these machines, Net Applications is confident they're operated by real people. "We are quite certain it’s not the Google search spider," Net Applications' Vince Vizzaccaro tells The Reg.

Net Applications would not provide additional information, and when we contacted Google, the company declined to comment - multiple times.

Late last week, Net Applications told InternetNews - and The Reg - that these Google machines were leaving user agents where only the operating system was stripped out. Vizzacarro has now told The Reg that this characterization was not true, that the user agents in question are stripped of everything. But his initial claim led InternetNews to speculate that Google was testing some sort of new-fangled operating system behind its firewall - and the rumor was off and running.

A browser user agent not only identifies the browser a machine is using, but also its operating system.

It's well known that Google uses its own version of Ubuntu Linux - dubbed Goobuntu. And at one point, according to a former employee, engineers also used a customized version of RedHat known as GRHat. But this employee - who did not work with the core engineering team - was unaware of Google using a proxy server or any other means of blanking out user agents.

In the past, Google and Ubuntu boss Mark Shuttleworth have denied that Mountain View has any interest in distributing Goobuntu outside the company.

But as Google beefs up its online office apps and builds out massive data centers across the planet, the world has long assumed that the search giant would one day build its own "cloud OS" - an operating system that depends heavily on web-based services.

And that may be the case. But blank user agents are no proof of it. If Google were attempting to hide an internal operating system, it could just as easily change the OS identifier in its user agents to something run-of-the-mill rather than blank the agents out entirely.

Johann Burkard, a programmer and webmaster who closely tracks browser user agents, says that empty agents account for less than one per cent of the traffic he sees. But he tells us he has not seen the Google traffic Net Applications speaks of, and he doesn't see why Google would do such a thing.

Burkard blocks traffic with empty user agent headers and many other webmasters do the same. And he agrees that if Google were testing a top secret OS, disguising it as Windows or an ordinary Linux would make the most sense.

So why is Net Applications seeing what it's seeing? ®

SANS - Survey on application security programs

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.