Css Htaccess阻止字体很棒的Web字体?

Css Htaccess阻止字体很棒的Web字体?,css,.htaccess,font-awesome,webfonts,Css,.htaccess,Font Awesome,Webfonts,我相信我的htaccess文件中有什么东西阻止了webfont在我的网站上显示。我并不是百分之百支持这一点,但我已经禁用了安全插件和我网站上的所有东西,而且这种情况仍在发生。我想知道是否有更有经验的人可以透露一些信息 以下是我收到的错误(访问链接时出现403错误): 可下载字体:下载失败(字体系列:“FontAwesome”样式:正常重量:正常拉伸:正常src索引:1):状态=2147746065 来源:bean-shortcodes.css 可下载字体:下载失败(字体系列:“FontAweso

我相信我的htaccess文件中有什么东西阻止了webfont在我的网站上显示。我并不是百分之百支持这一点,但我已经禁用了安全插件和我网站上的所有东西,而且这种情况仍在发生。我想知道是否有更有经验的人可以透露一些信息

以下是我收到的错误(访问链接时出现403错误):

可下载字体:下载失败(字体系列:“FontAwesome”样式:正常重量:正常拉伸:正常src索引:1):状态=2147746065 来源:bean-shortcodes.css

可下载字体:下载失败(字体系列:“FontAwesome”样式:正常重量:正常拉伸:正常src索引:2):状态=2147746065 来源:bean-shortcodes.css

到目前为止,我的htaccess中有以下内容:

#开始WordPress
重新启动发动机
重写基/
重写规则^index\.php$-[L]
重写cond%{REQUEST_FILENAME}-F
重写cond%{REQUEST_FILENAME}-D
重写规则/index.php[L]
#结束WordPress
#关闭服务器签名
服务器签名关闭
#开始GZIP
AddOutputFilterByType DEFLATE text/text text/html text/plain text/xml application/xml application/xhtml+xml text/javascript text/css application/x-javascript
浏览器匹配^Mozilla/4 gzip纯文本/html
浏览器匹配^Mozilla/4.0[678]无gzip
布朗先生!没有gzip!仅限gzip文本/html
#结束GZIP
#开始过期标题
过期于
ExpiresDefault“访问加5秒”
ExpiresByType图像/x图标“访问加2592000秒”
ExpiresByType图像/jpeg“访问时间加2592000秒”
ExpiresByType图像/png“访问加2592000秒”
ExpiresByType image/gif“访问时间加2592000秒”
过期按类型应用程序/x-shockwave-flash“访问加2592000秒”
ExpiresByType文本/css“访问时间加604800秒”
ExpiresByType文本/javascript“访问时间加216000秒”
ExpiresByType应用程序/javascript“访问时间加216000秒”
ExpiresByType应用程序/x-javascript“访问时间加216000秒”
ExpiresByType text/html“访问加600秒”
ExpiresByType应用程序/xhtml+xml“访问加600秒”
#结束过期标头
#开始缓存控制头
标头集缓存控制“公共”
标头集缓存控制“公共”
标头集缓存控制“专用”
标题集缓存控制“专用,必须重新验证”
#结束缓存控制头
#不显示目录列表
#如果您遇到500个错误,请注释掉选项-索引
#在它前面加一个#符号。如果在这个文件的任何地方有输入错误,你也会看到500个错误。
选项-索引
#目录索引FORCE INDEX.PHP
#使用index.php作为默认目录索引文件
#index.html将被忽略,不会加载。
DirectoryIndex.php index.html/index.php
#拒绝访问受保护的服务器文件和文件夹
#以点开头的文件和文件夹:.htaccess、.htpasswd、.errordocs、.logs
重定向匹配403\(htaccess | htpasswd | errordocs |日志)$
#WP-ADMIN/包括
重新启动发动机
重写基/
重写规则^wp admin/includes/-[F,L]
重写规则^wp包括/-[S=3]
重写规则^wp包括/[^/]+\.php$-[F,L]
重写规则^wp包括/js/tinymce/langs/+\.php-[F,L]
重写规则^wp包括/theme compat/-[F,L]
#WP重写循环开始
重新启动发动机
重写基/
重写规则^index\.php$-[L]
#筛选的请求方法
#此筛选器用于阻止垃圾邮件机器人和垃圾邮件机器人发出HEAD请求,但也可能阻止某些垃圾邮件机器人
#在某些情况下,您希望允许来自机器人程序的HEAD请求。这不是一个安全过滤器,只是
#讨厌的过滤器。这个过滤器不会阻止任何像谷歌机器人这样的重要机器人。如果你想允许
#所有机器人发出HEAD请求,然后将HEAD从请求方法筛选器中移除。
#跟踪、删除、跟踪和调试请求方法绝对不允许用于您的网站。
重新启动发动机
RewriteCond%{REQUEST_METHOD}^(HEAD | TRACE | DELETE | TRACK | DEBUG)[NC]
重写规则^(.*)$-[F,L]
#插件/主题和各种利用漏洞过滤器跳过规则
#重要的!!!如果添加或删除跳过规则,则必须将S=更改为新的跳过编号
#示例:如果删除了重写规则S=5,则将S=6更改为S=5,将S=7更改为S=6,以此类推。
#管理员MySQL管理工具数据填充
RewriteCond%{REQUEST_URI}^/wp content/plugins/adminer/[NC]
重写规则[S=12]
#评论垃圾邮件包MU插件-未显示验证码图像
RewriteCond%{REQUEST_URI}^/wp content/mu plugins/custom anti-spam/[NC]
重写规则[S=11]
#Peters自定义反垃圾邮件显示验证码图像
RewriteCond%{REQUEST_URI}^/wp content/plugins/peters自定义反垃圾邮件图像/[NC]
重写规则[S=10]
#状态更新插件fb connect
RewriteCond%{REQUEST_URI}^/wp content/plugins/fb status updater/[NC]
重写规则[S=9]
#流视频播放器-添加阻止的FLV视频
RewriteCond%{REQUEST_URI}^/wp content/plugins/stream video player/[NC]
重写规则[S=8]
#更新设置时XCloner 404或403错误
RewriteCond%{REQUEST_URI}^/wp content/plugins/xcloner backup and restore/[NC]
重写规则[S=7]
#BuddyPress注销重定向
RewriteCond%{QUERY_STRING}action=logout&redirect_to=http%3A%2F%2F(.*)[NC]
重写规则[S=6]
#重定向到=
RewriteCond%{QUERY_STRING}将_重定向到=(.*)[NC]
重写规则[S=5]
#登录插件密码重置和重定向1
RewriteCond%{QUERY_STRING}action=resetpass&key=(.*)[NC]
重写规则[S=4]
#登录插件密码重置和重定向2
RewriteCond%{QUERY_STRING}action=rp&key=(.*)[NC]
重写规则[S=3]
#禁止RFI和杂项文件跳过/绕过规则
#仅允许来自您网站的内部文件请求
#要允许其他网站访问文件,请使用[或],如下所示。
#重写cond%{HTTP_REFERER}^.*YourWebsite.com.*[或]
#重写cond%{HTTP_REFERER}^.*另一个网站.com*
重写第二个%{QUERY_STRING}^.*(http | https | ftp)(%3A |:)(%2F |/)(%2F |/)(w){0,3}.?(blogger | picasa | blogspot | tsunami | petapolit)
# BEGIN WordPress
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^index\.php$ - [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>

# END WordPress

# TURN OFF YOUR SERVER SIGNATURE
ServerSignature Off

# BEGIN GZIP
<ifmodule mod_deflate.c>
AddOutputFilterByType DEFLATE text/text text/html text/plain text/xml application/xml application/xhtml+xml text/javascript text/css application/x-javascript
BrowserMatch ^Mozilla/4 gzip-only-text/html
BrowserMatch ^Mozilla/4.0[678] no-gzip
BrowserMatch bMSIE !no-gzip !gzip-only-text/html
</ifmodule>
# END GZIP

# BEGIN EXPIRE HEADERS
<ifModule mod_expires.c>
ExpiresActive On
ExpiresDefault "access plus 5 seconds"
ExpiresByType image/x-icon "access plus 2592000 seconds"
ExpiresByType image/jpeg "access plus 2592000 seconds"
ExpiresByType image/png "access plus 2592000 seconds"
ExpiresByType image/gif "access plus 2592000 seconds"
ExpiresByType application/x-shockwave-flash "access plus 2592000 seconds"
ExpiresByType text/css "access plus 604800 seconds"
ExpiresByType text/javascript "access plus 216000 seconds"
ExpiresByType application/javascript "access plus 216000 seconds"
ExpiresByType application/x-javascript "access plus 216000 seconds"
ExpiresByType text/html "access plus 600 seconds"
ExpiresByType application/xhtml+xml "access plus 600 seconds"
</ifModule>
# END EXPIRE HEADERS

# BEGIN CACHE-CONTROL HEADERS
<ifModule mod_headers.c>
    <filesMatch "\.(ico|jpe?g|png|gif|swf)$">
        Header set Cache-Control "public"
    </filesMatch>
    <filesMatch "\.(css)$">
        Header set Cache-Control "public"
    </filesMatch>
    <filesMatch "\.(js)$">
        Header set Cache-Control "private"
    </filesMatch>
    <filesMatch "\.(x?html?|php)$">
        Header set Cache-Control "private, must-revalidate"
    </filesMatch>
</ifModule>
# END CACHE-CONTROL HEADERS

# DO NOT SHOW DIRECTORY LISTING
# If you are getting 500 Errors then comment out Options -Indexes
# by adding a # sign in front of it. If there is a typo anywhere in this file you will also see 500 errors.
Options -Indexes

# DIRECTORY INDEX FORCE INDEX.PHP
# Use index.php as default directory index file
# index.html will be ignored will not load.
DirectoryIndex index.php index.html /index.php

# DENY ACCESS TO PROTECTED SERVER FILES AND FOLDERS
# Files and folders starting with a dot: .htaccess, .htpasswd, .errordocs, .logs
RedirectMatch 403 \.(htaccess|htpasswd|errordocs|logs)$

# WP-ADMIN/INCLUDES
RewriteEngine On
RewriteBase /
RewriteRule ^wp-admin/includes/ - [F,L]
RewriteRule !^wp-includes/ - [S=3]
RewriteRule ^wp-includes/[^/]+\.php$ - [F,L]
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php - [F,L]
RewriteRule ^wp-includes/theme-compat/ - [F,L]

# WP REWRITE LOOP START
RewriteEngine On
RewriteBase /
RewriteRule ^index\.php$ - [L]

# REQUEST METHODS FILTERED
# This filter is for blocking junk bots and spam bots from making a HEAD request, but may also block some
# HEAD request from bots that you want to allow in certains cases. This is not a security filter and is just
# a nuisance filter. This filter will not block any important bots like the google bot. If you want to allow
# all bots to make a HEAD request then remove HEAD from the Request Method filter.
# The TRACE, DELETE, TRACK and DEBUG request methods should never be allowed against your website.
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(HEAD|TRACE|DELETE|TRACK|DEBUG) [NC]
RewriteRule ^(.*)$ - [F,L]

# PLUGINS/THEMES AND VARIOUS EXPLOIT FILTER SKIP RULES
# IMPORTANT!!! If you add or remove a skip rule you must change S= to the new skip number
# Example: If RewriteRule S=5 is deleted than change S=6 to S=5, S=7 to S=6, etc.

# Adminer MySQL management tool data populate
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/adminer/ [NC]
RewriteRule . - [S=12]
# Comment Spam Pack MU Plugin - CAPTCHA images not displaying
RewriteCond %{REQUEST_URI} ^/wp-content/mu-plugins/custom-anti-spam/ [NC]
RewriteRule . - [S=11]
# Peters Custom Anti-Spam display CAPTCHA Image
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/peters-custom-anti-spam-image/ [NC]
RewriteRule . - [S=10]
# Status Updater plugin fb connect
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/fb-status-updater/ [NC]
RewriteRule . - [S=9]
# Stream Video Player - Adding FLV Videos Blocked
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/stream-video-player/ [NC]
RewriteRule . - [S=8]
# XCloner 404 or 403 error when updating settings
RewriteCond %{REQUEST_URI} ^/wp-content/plugins/xcloner-backup-and-restore/ [NC]
RewriteRule . - [S=7]
# BuddyPress Logout Redirect
RewriteCond %{QUERY_STRING} action=logout&redirect_to=http%3A%2F%2F(.*) [NC]
RewriteRule . - [S=6]
# redirect_to=
RewriteCond %{QUERY_STRING} redirect_to=(.*) [NC]
RewriteRule . - [S=5]
# Login Plugins Password Reset And Redirect 1
RewriteCond %{QUERY_STRING} action=resetpass&key=(.*) [NC]
RewriteRule . - [S=4]
# Login Plugins Password Reset And Redirect 2
RewriteCond %{QUERY_STRING} action=rp&key=(.*) [NC]
RewriteRule . - [S=3]

# TIMTHUMB FORBID RFI and MISC FILE SKIP/BYPASS RULE
# Only Allow Internal File Requests From Your Website
# To Allow Additional Websites Access to a File Use [OR] as shown below.
# RewriteCond %{HTTP_REFERER} ^.*YourWebsite.com.* [OR]
# RewriteCond %{HTTP_REFERER} ^.*AnotherWebsite.com.*
RewriteCond %{QUERY_STRING} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC,OR]
RewriteCond %{THE_REQUEST} ^.*(http|https|ftp)(%3A|:)(%2F|/)(%2F|/)(w){0,3}.?(blogger|picasa|blogspot|tsunami|petapolitik|photobucket|imgur|imageshack|wordpress\.com|img\.youtube|tinypic\.com|upload\.wikimedia|kkc|start-thegame).*$ [NC]
RewriteRule .* index.php [F,L]
RewriteCond %{REQUEST_URI} (timthumb\.php|phpthumb\.php|thumb\.php|thumbs\.php) [NC]
RewriteCond %{HTTP_REFERER} ^.*brandonmoner.me.*
RewriteRule . - [S=1]

# BEGIN QUERY STRING EXPLOITS
# The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too.
# Good sites such as W3C use it for their W3C-LinkChecker.
# Add or remove user agents temporarily or permanently from the first User Agent filter below.
# If you want a list of bad bots / User Agents to block then scroll to the end of this file.
RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR]
RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|wget|python|nikto|curl|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR]
RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR]
RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR]
RewriteCond %{THE_REQUEST} etc/passwd [NC,OR]
RewriteCond %{THE_REQUEST} cgi-bin [NC,OR]
RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR]
RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR]
RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR]
RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR]
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [NC,OR]
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [NC,OR]
RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR]
RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR]
RewriteCond %{QUERY_STRING} (\.\./|%2e%2e%2f|%2e%2e/|\.\.%2f|%2e\.%2f|%2e\./|\.%2e%2f|\.%2e/) [NC,OR]
RewriteCond %{QUERY_STRING} ftp\: [NC,OR]
RewriteCond %{QUERY_STRING} http\: [NC,OR]
RewriteCond %{QUERY_STRING} https\: [NC,OR]
RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR]
RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR]
RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR]
RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR]
RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR]
RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR]
RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR]
RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR]
RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR]
RewriteCond %{QUERY_STRING} (\.{1,}/)+(motd|etc|bin) [NC,OR]
RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR]
RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR]
RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR]
RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR]
RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR]
RewriteCond %{QUERY_STRING} (sp_executesql) [NC]
RewriteRule ^(.*)$ - [F,L]
# END QUERY STRING EXPLOITS
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
# WP REWRITE LOOP END

# DENY BROWSER ACCESS TO THESE FILES
# wp-config.php, bb-config.php, php.ini, php5.ini, readme.html
# Replace Allow from 88.77.66.55 with your current IP address and remove the
# pound sign # from in front of the Allow from line of code below to access these
# files directly from your browser.

<FilesMatch "^(wp-config\.php|php\.ini|php5\.ini|readme\.html|bb-config\.php)">
Order allow,deny
Deny from all
#Allow from 88.77.66.55
</FilesMatch>

# BLOCK HOTLINKING TO IMAGES
# To Test that your Hotlinking protection is working visit http://altlab.com/htaccess_tutorial.html
#RewriteEngine On
#RewriteCond %{HTTP_REFERER} !^https?://(www\.)?brandonmoner\.me [NC]
#RewriteCond %{HTTP_REFERER} !^$
#RewriteRule .*\.(jpeg|jpg|gif|bmp|png)$ - [F]