starkzarn

joined 2 years ago
[–] starkzarn 3 points 2 weeks ago* (last edited 2 weeks ago)

I'll add to the pile: https://roguesecurity.dev/blog/xmpp

Prosody gets my vote as well for extensibility over snikket and still being relatively easy.

My guide caters more towards OCI runtimes if you're into that. I like podman and quadlets, but you could do docker as well.

XMPP for the win!

[–] starkzarn 3 points 2 weeks ago

XMPP gang rise up! There are dozens of us!

[–] starkzarn 1 points 2 weeks ago

I'm all about adding to the proverbial arsenal. 🤘

[–] starkzarn 3 points 2 weeks ago

You're absolutely right! I'd point you back to my notion of cost-benefit analysis. Anything more than the 20min that I've spent on analysis so far isn't worth my time. If the VM falls over permanently, that was a risk and my time savings has already been worth that risk. If I were looking at something like a production file server or domain controller, sure -- I'd spend more time on it. Likely though, I'd just have engineered it better in the first place. Not every problem warrants a high precision solution. 🙂

 

Hey everybody. I found this interesting. It's likely not a game changer for anyone, but "hardware" watchdogs in Proxmox was a new one for me, and was a cheap and easy, hacky fix to deal with a low value VM that was periodically hanging. This is a nice tool to add to the belt, hope you all enjoy!

[–] starkzarn 2 points 3 weeks ago

I'd be interested in seeing that, or at least knowing which ejabberd container you chose and why.

[–] starkzarn 19 points 1 month ago

XMPP is the way! There are dozens of us!

https://roguesecurity.dev/blog/xmpp

[–] starkzarn 2 points 2 months ago

I'm now morbidly curious for my own sake...

[–] starkzarn 21 points 3 months ago (1 children)

Sort of liminal space vibes

[–] starkzarn 3 points 3 months ago

Amazing writing yet again. Appreciate the sharing you do here. You're a god damn gentleman and a scholar.

[–] starkzarn 2 points 3 months ago (1 children)

You haven't mentioned your distro. Are you using systemd-homed? There are some footguns there that can manifest like this.

As another poster mentioned, btrfs quotas or subvolume allocation could be a favtor as well.

[–] starkzarn 1 points 4 months ago

Hey thanks so much for the engagement. I was trying to run it on a VPS that cost $35/year. 2GiB of RAM wasn't quite enough to make it work for me, granted that was with the webserver and ancillary supporting services.

I'll find an opportunity to test it out though, as rybbit looks great. I appreciate the mention on the other FOSS products, that's a good look for you. I have plenty of experience with umami already. Cheers!

 

Decided to write up a quick post on a hacky workaround I came up with for custom distros Oracle free tier and thought I'd share. Don't rely on Oracle, but definitely do leverage as much of their free compute as you can for non-critical workloads!

 

cross-posted from: https://infosec.pub/post/36118098

Take control of your data, join the tech chat. Host an XMPP server and leverage end-to-end encryption for your personal data

 

Take control of your data, join the tech chat. Host an XMPP server and leverage end-to-end encryption for your personal data

30
Systemd Service Hardening (roguesecurity.dev)
submitted 7 months ago by starkzarn to c/linux@lemmy.world
 

cross-posted from: https://infosec.pub/post/32937284

This one is a little self-hosting specific, and more casual Linux best practices, but I've got a new blog post down for general security! Harden your systemd units (especially custom ones) for better peace of mind on the internet!

1
Systemd Service Hardening (roguesecurity.dev)
submitted 7 months ago by starkzarn to c/linux@lemmy.ml
 

cross-posted from: https://infosec.pub/post/32937284

This one is a little self-hosting specific, and more casual Linux best practices, but I've got a new blog post down for general security! Harden your systemd units (especially custom ones) for better peace of mind on the internet!

131
Systemd Service Hardening (roguesecurity.dev)
 

This one is a little self-hosting specific, and more casual Linux best practices, but I've got a new blog post down for general security! Harden your systemd units (especially custom ones) for better peace of mind on the internet!

 

cross-posted from: https://infosec.pub/post/32151664

This is a generic metrics post to leverage a spare ESP32 meshtastic node to ingest metrics into Grafana! We've had some congestion issues due to poor config in my area, and this has helped me pinpoint which nodes are causing the biggest problems, and block them at my repeater.

 

This is a generic metrics post to leverage a spare ESP32 meshtastic node to ingest metrics into Grafana! We've had some congestion issues due to poor config in my area, and this has helped me pinpoint which nodes are causing the biggest problems, and block them at my repeater.

 
view more: next ›