devz@ - chat over SSH
I saw this over at Hacker News, I thought it was neat:
https://github.com/quackduck/devzat
The official instance is overwhelmed right now, but I threw a quick one up at leschat.farted.net. Just
ssh <nickname>@leschat.farted.net
using your favorite client. It's also listening on port 443 to bypass firewalls
ssh <nickname>@leschat.farted.net -p 443
@Not_Oles, this is probably right up your alley. If people like it maybe we can run it on a beefier VPS. Right now I'm using my 384MB/10GB VirMach mystery box. It's holding up with just me logged in, but who knows how much load it can bear. 😅
It's pronounced hacker.

Comments
This is cool
This is cool!
I tried it! It worked! Had two very fun chats!
Thanks @jqr!
I hope everyone gets the servers they want!
ive got kc2.bgp.199693.xyz (check ping)
pretty sure i can run it on there, 16G/150G
youtube.com/watch?v=k1BneeJTDcU
Thanks for offering! Let's wait see. I think we have to get enough network effect for it to be worth it.
It's pronounced hacker.
HN links:
https://news.ycombinator.com/item?id=40998158 (July 18, 2024; 60 comments)
https://news.ycombinator.com/item?id=30688691 (March 15, 2022; 150 comments)
I hope everyone gets the servers they want!
just tell me when to deploy and i will happily do so!
youtube.com/watch?v=k1BneeJTDcU
$75 invoice is coming.
The end is nigh.
We are known to be "dangerous". affbrr
What's happening now with this wonderful leschat.farted.net thingy?
What's the story with the warnings about SSH Agent Forwarding: https://news.ycombinator.com/item?id=40227624 and shell escapes: https://news.ycombinator.com/item?id=41002245 ?
I feel like I have a lot more to learn. . . .
I hope everyone gets the servers they want!
I'm still running it. It seems there won't be enough interest to make it worthwhile, but I have fun learning/trying new things.
When you connect to a malicious remote server, and you have Agent Forwarding turned on (this is not the default, by the way), then a that server could take your private SSH key and use it to connect to other servers while impersonating you. Again, this is not a potential risk unless you purposefully turn on agent forwarding.
This one has to do with finding a way to "escape" out of the devz@ process and get shell access to the machine running it. Basically, getting hacked.
The person that posted the comment you linked, suggested using a Go SSH library instead of the OpenSSH daemon to minimize that risk.
The devz@ author then replied clarifying that he actually uses the Go library, so the original poster's fear was unfounded.
It's pronounced hacker.
Thanks @jqr!
I see
I thought it would be interesting and fun to try forwarding, which I never have used before. I wanted to look around and see what I could learn. But, I haven't got to it yet.
Here's another question. What happens to make devsat asynchronous! I'm running my IRC client in tmux on a shared ctrl-c.club VM. It works great! I guess I could run devsat the same way, in tmux on a VPS, if devsat wouldn't dump me for inactivity.
Another thing that might be fun would be to try the main devsat server. Have you tried it?
Thanks again!
I hope everyone gets the servers they want!
Yeah, this should work fine. I have been disconnected regularly, but that's just because I'm running the client on my workstation and it goes to sleep after a being idle for an hour.
I have not. 😀 I'm not "social" enough.
It's pronounced hacker.