https://bugzilla.redhat.com/show_bug.cgi?id=770682 alleges that setting NSS_SSL_CBC_RANDOM_IV=0 globally is a security problem. As an alternative, what I did was this:
Create the following file in /tmp/pidgin #!/bin/sh NSS_SSL_CBC_RANDOM_IV=0 exec /usr/bin/pidgin "$@" Then run the following commands: sudo cp /tmp/pidgin /usr/local/bin sudo chmod a+x /usr/local/bin/pidgin This is just a different way to implement the workaround so that the NSS_SSL_CBC_RANDOM_IV variable is only set for the Pidgin process instead of globally in your environment. It should not hurt if /usr/local/bin/pidgin remains in use even once a proper fix is deployed, assuming you have a modicum of trust for your local environment (and if not, you should hardly be using SIPE for messaging in the first place). ** Bug watch added: Red Hat Bugzilla #770682 https://bugzilla.redhat.com/show_bug.cgi?id=770682 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/950790 Title: Pidgin-sipe connection error after upgrade to Ubuntu 12.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/950790/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
