devz@ - chat over SSH
I saw this over at Hacker News, I thought it was neat:
https://github.com/quackduck/devzat
The official instance is overwhelmed right now, but I threw a quick one up at leschat.farted.net. Just
ssh <nickname>@leschat.farted.net
using your favorite client. It's also listening on port 443 to bypass firewalls
ssh <nickname>@leschat.farted.net -p 443
@Not_Oles, this is probably right up your alley. If people like it maybe we can run it on a beefier VPS. Right now I'm using my 384MB/10GB VirMach mystery box. It's holding up with just me logged in, but who knows how much load it can bear. 😅
It's pronounced hacker.
Comments
This is cool
This is cool!
I tried it! It worked! Had two very fun chats!
Thanks @jqr!
I hope everyone gets the servers they want!
ive got kc2.bgp.199693.xyz (check ping)
pretty sure i can run it on there, 16G/150G
youtube.com/watch?v=k1BneeJTDcU
Thanks for offering! Let's wait see. I think we have to get enough network effect for it to be worth it.
It's pronounced hacker.
HN links:
https://news.ycombinator.com/item?id=40998158 (July 18, 2024; 60 comments)
https://news.ycombinator.com/item?id=30688691 (March 15, 2022; 150 comments)
I hope everyone gets the servers they want!
just tell me when to deploy and i will happily do so!
youtube.com/watch?v=k1BneeJTDcU
$75 invoice is coming.
The end is nigh.
Accepting submissions for IPv6 less than /64 Hall of Incompetence.
What's happening now with this wonderful leschat.farted.net thingy?
What's the story with the warnings about SSH Agent Forwarding: https://news.ycombinator.com/item?id=40227624 and shell escapes: https://news.ycombinator.com/item?id=41002245 ?
I feel like I have a lot more to learn. . . .
I hope everyone gets the servers they want!
I'm still running it. It seems there won't be enough interest to make it worthwhile, but I have fun learning/trying new things.
When you connect to a malicious remote server, and you have Agent Forwarding turned on (this is not the default, by the way), then a that server could take your private SSH key and use it to connect to other servers while impersonating you. Again, this is not a potential risk unless you purposefully turn on agent forwarding.
This one has to do with finding a way to "escape" out of the devz@ process and get shell access to the machine running it. Basically, getting hacked.
The person that posted the comment you linked, suggested using a Go SSH library instead of the OpenSSH daemon to minimize that risk.
The devz@ author then replied clarifying that he actually uses the Go library, so the original poster's fear was unfounded.
It's pronounced hacker.
Thanks @jqr!
I see
I thought it would be interesting and fun to try forwarding, which I never have used before. I wanted to look around and see what I could learn. But, I haven't got to it yet.
Here's another question. What happens to make devsat asynchronous! I'm running my IRC client in tmux on a shared ctrl-c.club VM. It works great! I guess I could run devsat the same way, in tmux on a VPS, if devsat wouldn't dump me for inactivity.
Another thing that might be fun would be to try the main devsat server. Have you tried it?
Thanks again!
I hope everyone gets the servers they want!
Yeah, this should work fine. I have been disconnected regularly, but that's just because I'm running the client on my workstation and it goes to sleep after a being idle for an hour.
I have not. 😀 I'm not "social" enough.
It's pronounced hacker.