Like all things I've learned, it all started out of need. Using Pidgin I realized that I could connect from my work to Messenger but not to Google TalkSo I set out to find out why and how to avoid this misfortune.
The first thing I discovered is that I couldn't connect to the usual options because my company redirects me from google.talk.com to another server that usurps it where it can spy on everything I write while I live in the illusion that it is a secure connection thanks to SSL.
The good news is that Pidgin realizes this and refuses to connect, considering this ruse as unsafe. And since the fences are to jump, the rules are to be broken, I share how to turn this with three simple steps:
- Open the pidgin options to connect to gtalk and go to the advanced options.
- Change the security tab to "Use old SSL" and change the connection port to 443.
- The most important thing: in "Connect to server" write the ip address instead of the address talk.google.com. To find out the IP, look for an online service from nslookup and enter talk.google.com or from the Gnu / Linux console type ping talk.google.com; that way you will find the ip.
That's it. If you just want to connect, this is enough. If you want to know more about what happens in the background, keep reading.
When you want to connect to talk.google.com the server verifies the encrypted connection and sends you to gmail.com, but since instead of connecting to talk.google.com you are connecting to another server, Pidgin stays forever in gmail.com connecting without ever succeeding.
By changing the port and forcing the use of the talk.google.com server (with its ip address) we evade the redirection to the spy server and create a secure connection (in theory at least).
If you want to know the name of the spy server, do the following: open a terminal and type
(you will need the dnsutils package).
It should come out something like this:
talk.google.com canonical name = talk.l.google.com.
The Non-authoritative answer is the true server and the wxyz server is the imposter. Now, type in the terminal nslookup wxyz and you will know the name of the server to which your company redirects you (surely its acronym is in the name).