TrawlerSSLCertificateInfo
TrawlerCrawlingGoogleApi.ContentWarehouse.V1.Model.TrawlerSSLCertificateInfo
SEO Analysis
AI GeneratedPart of Google's web crawling infrastructure (Trawler is Google's internal name for their web crawler). This model governs how Googlebot fetches and processes web pages, affecting crawl efficiency and frequency. Crawl management directly impacts how quickly new content is discovered and how often existing content is refreshed in the index.
Actionable Insights for SEOs
- Optimize crawl budget by fixing broken links and reducing redirect chains
- Use robots.txt and sitemap.xml effectively to guide crawling
- Monitor Google Search Console for crawl errors and indexing issues
Attributes
10ALPNNegotiatedProtocolstringnilFull type: String.tALPN negotiated protocol, see https://tools.ietf.org/html/rfc7301 The value will either be empty, or one of the protocol names sent by the client that the server accepted. Examples include "h2" and "acme-tls/1".
CertificateChainstringnilFull type: list(String.tIf present, this consists of the remote webserver's X.509 certificate chain in DER format. The chain stored here is the reversed result of SSL_get_peer_cert_chain(). That is to say, it is the chain presented by the peer (which may differ from the chain that was built and verified), but in leaf-last order. Typically the root cert will not be included. But do not assume anything, because servers do all manner of weird things. (For example on the beginning of the chain, there might be also some irrelevant certificates besides the root certificate.) Certificates may be the empty string, indicating an encoding failure. See also |IsTruncated|. Certs can be loaded with util/sig/cert.h Cert::LoadBinaryCert(), converted to ASCII PEM format (CertificateUtil::CertificateToPEM()) or shown as text at the commandline by piping them into 'openssl x509 -text -inform DER'.
ErrorMessagesstringnilFull type: list(String.tErrorMessages contains errors from HTTPS validation. Examples of such errors include invalid certificates, failure to build a certificate chain, certificates that do not match the expected hostname, and internal errors. If ErrorMessages is empty, HTTPS validation succeeded. Otherwise, it failed. This is the only guarantee about the contents of this field, though legacy code exists that embeds invalid assumptions, b/70904498. New code should not do anything with this field other than test whether it is empty and display its value to humans. If you need to know more about the details of a particular HTTPS validation, you can revalidate |CertificateChain| independently.
IsTruncatedboolean(nilThis SSLCertificateInfo had its fields truncated because it was too large. It is no longer set (cl/205356251) but may be true in old records.
OCSPResponsestringnilFull type: String.tStapled OCSP response obtained during the TLS handshake, if any. An OCSP (Online Certificate Status Protocol) response is an indication, signed by the issuing CA, that the certificate has not been revoked. A TLS handshake extension allows servers to "staple" a response to the certificate served in the handshake, saving the need for the client to fetch it itself from the CA. This field contain the stapled OCSP response if the server served one. See RFC6066, Section 8 for the data format: https://tools.ietf.org/html/rfc6066#section-8
SCTListstringnilFull type: String.tSCTList obtained during the TLS handshake, if any. See RFC6962, Section 3.3 for the data format: https://tools.ietf.org/html/rfc6962#section-3.3
SSLCipherSuiteinteger(nilSSLCipherSuiteNamestringnilFull type: String.tSSLProtocolVersioninteger(nilDetails about the SSL/TLS protocol and cipher. See RFC5246 and google3/crawler/trawler/hope/proto/ssl.proto for more details.
SSLProtocolVersionNamestringnilFull type: String.tThe names of the SSL protocol version and cipher suite. These strings are implementation defined and may be subject to change.