https://bugzilla.redhat.com/show_bug.cgi?id=770682 alleges that setting
NSS_SSL_CBC_RANDOM_IV=0 globally is a security problem.  As an
alternative, what I did was this:

Create the following file in /tmp/pidgin

#!/bin/sh
NSS_SSL_CBC_RANDOM_IV=0 exec /usr/bin/pidgin "$@"

Then run the following commands:

sudo cp /tmp/pidgin /usr/local/bin
sudo chmod a+x /usr/local/bin/pidgin

This is just a different way to implement the workaround so that the
NSS_SSL_CBC_RANDOM_IV variable is only set for the Pidgin process
instead of globally in your environment.

It should not hurt if /usr/local/bin/pidgin remains in use even once a
proper fix is deployed, assuming you have a modicum of trust for your
local environment (and if not, you should hardly be using SIPE for
messaging in the first place).

** Bug watch added: Red Hat Bugzilla #770682
   https://bugzilla.redhat.com/show_bug.cgi?id=770682

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/950790

Title:
  Pidgin-sipe connection error after upgrade to Ubuntu 12.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/950790/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to