2014-07-11 2 views
1

내 htaccess 파일에서 내 사이트에 웹 글꼴이 표시되지 않는다고 생각합니다. 나는 이것에 100 % 아니지만, 보안 플러그인과 내 사이트의 모든 것을 사용하지 못했고, 여전히 일어나고 있습니다. 경험이 많은 사람이 약간의 빛을 비출 수 있는지 궁금해하고 있었습니까?Htaccess Blocking 글꼴 굉장한 웹 글꼴?

다운로드 글꼴 : 다운로드 (실패 글꼴 - 가족 : "FontAwesome"스타일 : 정상 체중 : 일반 스트레치

은 (링크를 방문 는 403 오류를 가져옵니다) 내가지고있어 오류입니다 : 일반 SRC 지수 : 1) : 상태 = 2,147,746,065 출처 : http://brandonmoner.me/wp-content/plugins/bean-shortcodes/assets/font/fontawesome-webfont.woff?v=3.1.0 콩 shortcodes.css

다운로드 글꼴 : "FontAwesome"스타일 : 정상 체중 : 일반 스트레치 : 일반 SRC 지수 : 다운로드 (글꼴 - 가족 실패 2) : 상태 = 2147746065 출처 : http://brandonmoner.me/wp-content/plugins/bean-shortcodes/assets/font/fontawesome-webfont.ttf?v=3.1.0 bean-shortcodes.cs 의

그리고 여기에 지금까지 내 htaccess로에서의 내용은 다음과 같습니다 여기

# BEGIN WordPress 
<IfModule mod_rewrite.c> 
RewriteEngine On 
RewriteBase/
RewriteRule ^index\.php$ - [L] 
RewriteCond %{REQUEST_FILENAME} !-f 
RewriteCond %{REQUEST_FILENAME} !-d 
RewriteRule . /index.php [L] 
</IfModule> 

# END WordPress 

# TURN OFF YOUR SERVER SIGNATURE 
ServerSignature Off 

# BEGIN GZIP 
<ifmodule mod_deflate.c> 
AddOutputFilterByType DEFLATE text/text text/html text/plain text/xml application/xml application/xhtml+xml text/javascript text/css application/x-javascript 
BrowserMatch ^Mozilla/4 gzip-only-text/html 
BrowserMatch ^Mozilla/4.0[678] no-gzip 
BrowserMatch bMSIE !no-gzip !gzip-only-text/html 
</ifmodule> 
# END GZIP 

# BEGIN EXPIRE HEADERS 
<ifModule mod_expires.c> 
ExpiresActive On 
ExpiresDefault "access plus 5 seconds" 
ExpiresByType image/x-icon "access plus 2592000 seconds" 
ExpiresByType image/jpeg "access plus 2592000 seconds" 
ExpiresByType image/png "access plus 2592000 seconds" 
ExpiresByType image/gif "access plus 2592000 seconds" 
ExpiresByType application/x-shockwave-flash "access plus 2592000 seconds" 
ExpiresByType text/css "access plus 604800 seconds" 
ExpiresByType text/javascript "access plus 216000 seconds" 
ExpiresByType application/javascript "access plus 216000 seconds" 
ExpiresByType application/x-javascript "access plus 216000 seconds" 
ExpiresByType text/html "access plus 600 seconds" 
ExpiresByType application/xhtml+xml "access plus 600 seconds" 
</ifModule> 
# END EXPIRE HEADERS 

# BEGIN CACHE-CONTROL HEADERS 
<ifModule mod_headers.c> 
    <filesMatch "\.(ico|jpe?g|png|gif|swf)$"> 
     Header set Cache-Control "public" 
    </filesMatch> 
    <filesMatch "\.(css)$"> 
     Header set Cache-Control "public" 
    </filesMatch> 
    <filesMatch "\.(js)$"> 
     Header set Cache-Control "private" 
    </filesMatch> 
    <filesMatch "\.(x?html?|php)$"> 
     Header set Cache-Control "private, must-revalidate" 
    </filesMatch> 
</ifModule> 
# END CACHE-CONTROL HEADERS 

# DO NOT SHOW DIRECTORY LISTING 
# If you are getting 500 Errors then comment out Options -Indexes 
# by adding a # sign in front of it. If there is a typo anywhere in this file you will also see 500 errors. 
Options -Indexes 

# DIRECTORY INDEX FORCE INDEX.PHP 
# Use index.php as default directory index file 
# index.html will be ignored will not load. 
DirectoryIndex index.php index.html /index.php 

# DENY ACCESS TO PROTECTED SERVER FILES AND FOLDERS 
# Files and folders starting with a dot: .htaccess, .htpasswd, .errordocs, .logs 
RedirectMatch 403 \.(htaccess|htpasswd|errordocs|logs)$ 

# WP-ADMIN/INCLUDES 
RewriteEngine On 
RewriteBase/
RewriteRule ^wp-admin/includes/ - [F,L] 
RewriteRule !^wp-includes/ - [S=3] 
RewriteRule ^wp-includes/[^/]+\.php$ - [F,L] 
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F,L] 
RewriteRule ^wp-includes/theme-compat/ - [F,L] 

# WP REWRITE LOOP START 
RewriteEngine On 
RewriteBase/
RewriteRule ^index\.php$ - [L] 

# REQUEST METHODS FILTERED 
# This filter is for blocking junk bots and spam bots from making a HEAD request, but may also block some 
# HEAD request from bots that you want to allow in certains cases. This is not a security filter and is just 
# a nuisance filter. This filter will not block any important bots like the google bot. If you want to allow 
# all bots to make a HEAD request then remove HEAD from the Request Method filter. 
# The TRACE, DELETE, TRACK and DEBUG request methods should never be allowed against your website. 
RewriteEngine On 
RewriteCond %{REQUEST_METHOD} ^(HEAD|TRACE|DELETE|TRACK|DEBUG) [NC] 
RewriteRule ^(.*)$ - [F,L] 

# PLUGINS/THEMES AND VARIOUS EXPLOIT FILTER SKIP RULES 
# IMPORTANT!!! If you add or remove a skip rule you must change S= to the new skip number 
# Example: If RewriteRule S=5 is deleted than change S=6 to S=5, S=7 to S=6, etc. 

# Adminer MySQL management tool data populate 
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/adminer/ [NC] 
RewriteRule . - [S=12] 
# Comment Spam Pack MU Plugin - CAPTCHA images not displaying 
RewriteCond %{REQUEST_URI} ^/wp-content/mu-plugins/custom-anti-spam/ [NC] 
RewriteRule . - [S=11] 
# Peters Custom Anti-Spam display CAPTCHA Image 
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/peters-custom-anti-spam-image/ [NC] 
RewriteRule . - [S=10] 
# Status Updater plugin fb connect 
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/fb-status-updater/ [NC] 
RewriteRule . - [S=9] 
# Stream Video Player - Adding FLV Videos Blocked 
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/stream-video-player/ [NC] 
RewriteRule . - [S=8] 
# XCloner 404 or 403 error when updating settings 
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/xcloner-backup-and-restore/ [NC] 
RewriteRule . - [S=7] 
# BuddyPress Logout Redirect 
RewriteCond %{QUERY_STRING} action=logout&redirect_to=http%3A%2F%2F(.*) [NC] 
RewriteRule . - [S=6] 
# redirect_to= 
RewriteCond %{QUERY_STRING} redirect_to=(.*) [NC] 
RewriteRule . - [S=5] 
# Login Plugins Password Reset And Redirect 1 
RewriteCond %{QUERY_STRING} action=resetpass&key=(.*) [NC] 
RewriteRule . - [S=4] 
# Login Plugins Password Reset And Redirect 2 
RewriteCond %{QUERY_STRING} action=rp&key=(.*) [NC] 
RewriteRule . - [S=3] 

# TIMTHUMB FORBID RFI and MISC FILE SKIP/BYPASS RULE 
# Only Allow Internal File Requests From Your Website 
# To Allow Additional Websites Access to a File Use [OR] as shown below. 
# RewriteCond %{HTTP_REFERER} ^.*YourWebsite.com.* [OR] 
# RewriteCond %{HTTP_REFERER} ^.*AnotherWebsite.com.* 
RewriteCond %{QUERY_STRING} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC,OR] 
RewriteCond %{THE_REQUEST} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC] 
RewriteRule .* index.php [F,L] 
RewriteCond %{REQUEST_URI} (timthumb\.php|phpthumb\.php|thumb\.php|thumbs\.php) [NC] 
RewriteCond %{HTTP_REFERER} ^.*brandonmoner.me.* 
RewriteRule . - [S=1] 

# BEGIN QUERY STRING EXPLOITS 
# The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too. 
# Good sites such as W3C use it for their W3C-LinkChecker. 
# Add or remove user agents temporarily or permanently from the first User Agent filter below. 
# If you want a list of bad bots/User Agents to block then scroll to the end of this file. 
RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR] 
RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] 
RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|wget|python|nikto|curl|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR] 
RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR] 
RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR] 
RewriteCond %{THE_REQUEST} etc/passwd [NC,OR] 
RewriteCond %{THE_REQUEST} cgi-bin [NC,OR] 
RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR] 
RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR] 
RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR] 
RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR] 
RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR] 
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [NC,OR] 
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [NC,OR] 
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR] 
RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR] 
RewriteCond %{QUERY_STRING} (\.\./|%2e%2e%2f|%2e%2e/|\.\.%2f|%2e\.%2f|%2e\./|\.%2e%2f|\.%2e/) [NC,OR] 
RewriteCond %{QUERY_STRING} ftp\: [NC,OR] 
RewriteCond %{QUERY_STRING} http\: [NC,OR] 
RewriteCond %{QUERY_STRING} https\: [NC,OR] 
RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR] 
RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR] 
RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR] 
RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR] 
RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR] 
RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR] 
RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR] 
RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR] 
RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR] 
RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR] 
RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR] 
RewriteCond %{QUERY_STRING} (\.{1,}/)+(motd|etc|bin) [NC,OR] 
RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR] 
RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR] 
RewriteCond %{QUERY_STRING} concat[^\(]*\([NC,OR] 
RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR] 
RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR] 
RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR] 
RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR] 
RewriteCond %{QUERY_STRING} (sp_executesql) [NC] 
RewriteRule ^(.*)$ - [F,L] 
# END QUERY STRING EXPLOITS 
RewriteCond %{REQUEST_FILENAME} !-f 
RewriteCond %{REQUEST_FILENAME} !-d 
RewriteRule . /index.php [L] 
# WP REWRITE LOOP END 

# DENY BROWSER ACCESS TO THESE FILES 
# wp-config.php, bb-config.php, php.ini, php5.ini, readme.html 
# Replace Allow from 88.77.66.55 with your current IP address and remove the 
# pound sign # from in front of the Allow from line of code below to access these 
# files directly from your browser. 

<FilesMatch "^(wp-config\.php|php\.ini|php5\.ini|readme\.html|bb-config\.php)"> 
Order allow,deny 
Deny from all 
#Allow from 88.77.66.55 
</FilesMatch> 

# BLOCK HOTLINKING TO IMAGES 
# To Test that your Hotlinking protection is working visit http://altlab.com/htaccess_tutorial.html 
#RewriteEngine On 
#RewriteCond %{HTTP_REFERER} !^https?://(www\.)?brandonmoner\.me [NC] 
#RewriteCond %{HTTP_REFERER} !^$ 
#RewriteRule .*\.(jpeg|jpg|gif|bmp|png)$ - [F] 

어떤 아이디어?

+0

많은 재 작성 (및 기타 작업)이 진행되고 있습니다. (너무 혼란스러워 보입니다.) 그래서이 부분을 비활성화하여 글꼴에 대한 액세스를 차단하는 방법을 찾으십시오. 또한 서버의 오류 로그를 살펴보면 유용한 정보를 얻을 수 있습니다. – CBroe

+1

[.htaccess 예제] (http://support.maxcdn.com/tutorials/htaccess-examples/)에서 오류를 확인하는 데 도움이됩니다. – Gunaseelan

+0

@Gunaseelan 감사합니다. 확실히 그것을 이용하려고합니다. – bmoneruxui

답변

0

.htaccess 파일은 사이트에 대한 액세스 만 제어해야합니다. 외부 사이트로 403 오류가 발생하는 경우 이 웬일인지 당신을 차단하고있을 가능성이 큽니다. 어쩌면 그들은 당신이 사이트를 긁어 모으거나 일괄 적재하려고 시도하고 있거나, 귀하가 허용되지 않은 IP 주소에서왔다거나 귀하의 사용자 에이전트가 금지 된 목록에 있거나 뭔가 있다고 생각할 수도 있습니다. 다른 사이트에 어떤 제한 사항이 있는지 물어봐야 할 것입니다. 그들이 자원의 "핫 링크"를 막으려 고한다면 놀라운 일이 아닙니다.

+0

자신의 도메인에있는 글꼴 파일 _are_을 자신의'wp-content' 폴더에있는 것으로 생각합니다 ... – CBroe

+1

@bmoneruxui, _own_site의 리소스에 액세스하지 못하도록 차단되어 있는지 또는 다른 것이 있는지 확인해 주시겠습니까 대지? –

+0

글쎄, 나는 그들의 호스팅 CDN 방법을 사용할 때 CDN 경로에서 글꼴을 다운로드하지 못했다고 말합니다. 그런 다음 로컬 설치를 수행 할 때 위에 나열된 메시지가 나타나지 않습니다. 그리고 많은 사람들이 많이 사용하는 리소스이기 때문에 그들이 나를 긁어 모으는 것을 막지는 않는다고 생각합니다. 그리고 첫 번째 구현에서는 어느 쪽이든 작동하지 않습니다. – bmoneruxui