Cerca nel supporto

Attenzione alle mail truffa. Mozilla non chiederà mai di chiamare o mandare messaggi a un numero di telefono o di inviare dati personali. Segnalare qualsiasi attività sospetta utilizzando l'opzione “Segnala abuso”.

Ulteriori informazioni

Questa discussione è archiviata. Inserire una nuova richiesta se occorre aiuto.

Fontawesome works in chrome but not in firefox

more options

I'm working on a simple webpage and I noticed that fontawesome fonts don't work in Firefox, but it does work in Chrome. Why?

I'm working on a simple webpage and I noticed that fontawesome fonts don't work in Firefox, but it does work in Chrome. Why? <div id="footer-icons"> <a href="#" target="_blank"><i class="fab fa-facebook-f fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-twitter fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-github fa-2x" aria-hidden="true"></i></a> <a href="#" target="_blank"><i class="fab fa-google-plus-g fa-2x" aria-hidden="true"></i></a> </div>
Immagini allegate

Soluzione scelta

Hi wfarrar, I assume the deployed/live site still looks normal?

Firefox 68 contains a security patch which restricts the kinds of files that pages can load when you open them from a file:// URL. This change was made to prevent exfiltration of valuable data within reach of a local page, as demonstrated in an available exploit.

Font files don't seem that valuable, so hopefully there will be an exception for those in the future.

For now, though, if you need to see fonts retrieved on file:// URLs during local development, you can roll back the patch as follows:

(1) In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful or accepting the risk.

(2) In the search box above the list, type or paste uniq and pause while the list is filtered

(3) Double-click the privacy.file_unique_origin preference to switch the value from true to false

To mitigate the vulnerability: If you save pages from untrusted sites in a separate folder, e.g., Downloads\Untrusted, then it would be difficult for an attacker to find any valuable content using local file links.

Hopefully all of that will be educational for your students.

Leggere questa risposta nel contesto 👍 2

Tutte le risposte (4)

more options
more options

The first link is for the javascript console but this is not a JavaScript Problem. Not sure how the network monitor helps. The code is correct, it works in Chrome, Safari and IE. This is a Firefox problem.

For now I will inform my students Not to use Firefox, until I can figure out the problem

more options

Soluzione scelta

Hi wfarrar, I assume the deployed/live site still looks normal?

Firefox 68 contains a security patch which restricts the kinds of files that pages can load when you open them from a file:// URL. This change was made to prevent exfiltration of valuable data within reach of a local page, as demonstrated in an available exploit.

Font files don't seem that valuable, so hopefully there will be an exception for those in the future.

For now, though, if you need to see fonts retrieved on file:// URLs during local development, you can roll back the patch as follows:

(1) In a new tab, type or paste about:config in the address bar and press Enter/Return. Click the button promising to be careful or accepting the risk.

(2) In the search box above the list, type or paste uniq and pause while the list is filtered

(3) Double-click the privacy.file_unique_origin preference to switch the value from true to false

To mitigate the vulnerability: If you save pages from untrusted sites in a separate folder, e.g., Downloads\Untrusted, then it would be difficult for an attacker to find any valuable content using local file links.

Hopefully all of that will be educational for your students.

more options

wfarrar said

The first link is for the javascript console but this is not a JavaScript Problem.

Have you not used Firefox's Web Console? It would have flagged up a CORS issue retrieving the font files, because the patch redefines "same origin" in the context of file:// URLs. Admittedly, that would not have led you to the workaround, but telling us that's what you saw could have been helpful.