I fired up #Snikket on a $5/mo VPS and I'm impressed. It's really fast, E2EE, and easy on resources. It and Docker are using a little less than 500MB combined.

If anyone has advice on hardening the install, I'd love to hear it. I don't know what the specific risks are, but there are a lot of ports open for the various services. Basic VPS stuff is done, e.g., SSH keys, no root login, no passwords, etc. No other services on that server, only Snikket.

https://snikket.org

Reply to this note

Please Login to reply.

Discussion

+1 for #snikket

You can usually find hardening guides for specific OSs. I only have experience with RHEL and Debian. I've used scripts on RHEL based that go through and check all the common points of entry for attackers and provide recommendations. Unfortunately, it takes time and research for some of the recommendations, but well worth it for a long time server. You can even compile all of your settings into a script for the future if you want.

I'll check that out, thanks!