-
Notifications
You must be signed in to change notification settings - Fork 1
01 Set Up Your Mail Server
Check out this repository to the directory you want the mailserver to operate from. A good choice is /opt/mailserver
.
$ cd /opt
$ git clone https://github.com/t-lo/mailserver.git
$ cd mailserver
Copy the skeleton settings.env.empty
to settings.env
, then edit the file and fill in variables that have no default value set.
Note that your mail server HOSTNAME
does not necessarily need to be a member of DOMAIN
- mail.t-lo.net
can happily serve mails for users of domain wombathub.de
.
# Name of your main email domain. Likely (but not necessarily) the domain part of your hostname.
DOMAIN=
# Hostname of the mail server. A valid DNS name entry must exist and point to this server's IP address.
HOSTNAME=
# Initial SMTP / IMAP password of the admin / postmaster account.
ADMIN_USER_INITIAL_PASSWORD=
NOTE this is a docker environment file. Do not use quotation marks around values as these will become part of the value.
Use e.g. HOSTNAME=mymail.mydomain.tld
, not HOSTNAME="mymail.mydomain.tld"
.
Optionally, add additional domains served by the mailserver:
# Comma-separated list of additiona domain names for which this server will accept mail.
# Also known as "virtual domains".
ADDITIONAL_DOMAINS=
By default, metrics / monitoring is enabled. If you want to disable it, set
METRICS=false
For access to monitoring dashboards, a password must be set. Set the password with:
GF_SECURITY_ADMIN_PASSWORD=
If you like, change the username of the default admin / postmaster user by updating:
ADMIN_USER=postmaster
to something else.
A correct and complete DNS setup is important not only for your mailserver to be found but also for other mailservers to trust your server.
A record and reverse-DNS PTR
First, make you're you have an A record (a generic server entry) for your server's HOSTNAME
pointing to your server's public IP address.
This is commonly i(generalised) referred to as "DNS entry".
If you run a ping -n $HOSTNAME
your mail server's IP should be pinged.
NOTE The A record should be created before the mail server is started for the first time. Letsencrypt requires a correct A record to be set in order to grant certificates.
Complementarily, create a PTR for your server's public IP address to HOSTNAME
.
When sending email, other mail servers will look up your server's A record, reverse-DNS resolve the IP address via the PTR record, and compare the results.
This will allow the system to bootstrap / initialise.
Start the server:
$ ./start_mailserver.sh
The above script will forward the following TCP ports to the mail server container:
- 80: HTTP, for letsencrypt's www challenges. We'll assume you do not have a webserver running on your mailserver (see Use custom HTTP / HTTPS ports if you do).
- 443: HTTPS if
METRICS=true
for the monitoring dashboards.
- 443: HTTPS if
- 25, 465: SMTP and SMTPS
- 143, 993: IMAP and IMAPS
- 4190 for managesieve
Initial start-up can take a few minutes since it requests letsencrypt certificates, generates DKIM keys, and calculates DH parameters for postfix' TLS connections to other SMTP servers.
Subsequent start-ups will be much faster.
Furthermore, the script binds the local _server_workspace_
directory into the container for all stateful data, and it passes the settings.env
environment into the container.
For instance, letsencrypt certificates for the mail service are stored in _server_workspace_/etc/letsencrypt
.
First start will also create the postmaster user and a respective inbox.
If you configured monitoring (METRICS=true
), also start the monitoring container:
$ ./start_monitoring.sh
Monitoring dashboards can now be accessed at https://<HOSTNAME>/monitoring/
.
First, run a DNS check to get a report on what's missing, and how to fix it:
$ ./dns_check.sh
Almost all checks (except for host DNS and PTR) will fail at this point. However,the script will print out example SPF, DMARC, and DKIM DNS entries which we'll use to set up domain DNS for our mailserver.
NOTE If you are using monitoring, example SPF, DMARC, and DKIM records can also be found in the "DNS Sanity" dashboard:
https://HOSTNAME/monitoring/d/dnsy/dns-sanity
.
The dashboard also provides live checks for all host and domain DNS settings and instant feedback on changes.
Simply copy+paste the entries from the dashboard into the DNS configuration of your DNS provider.
MX, SPF, DMARC, and DKIM records for all domains served by the mailserver
Every domain served by the mailserver (both the main DOMAIN
as well as additional domains listed in ADDITIONAL_DOMAINS
) needs MX, SPF, DMARC, and DKIM entries added.
This makes it easier for other mail servers to trust us when we send mails to them.
Not setting these up risks being classified as spammer and having mails we send quarantined, or rejected outright.
First, add an MX entry for HOSTNAME
to all domains served by the mailserver.
MX defines which mail server(s) is/are handling email for a domain.
Add MX record to all domains (DOMAIN
and ADDITIONAL_DOMAINS
if you use these).
Then, add an SPF record to all domains served by the mailserver.
SPF defines which IP addresses are allowed to send mail for a domain.
Contrary to MX, SPF does not use a specific DNS entry type - instead, SPF information is recorded in a TXT entry.
A very simple TXT SPF record is e.g. v=spf1 a mx ip4:<ipv4> -all
(replace <ipv4>
with the mail server's public IP).
Add this TXT record to all domains (DOMAIN
and ADDITIONAL_DOMAINS
if you use these).
Thirdly, add a DMARC entry to all domains.
DMARC records prevent domain spoofing and are published in a TXT record to a _dmarc.
subdomain.
For example, domain wombathub.de
would define its DMARC record at _dmarc.wombathub.de
.
A very simple TXT DMARC record is e.g. v=DMARC1;p=quarantine;sp=quarantine;pct=100;adkim=r;aspf=r;rua=mailto:abuse@<DOMAIN>;ruf=mailto:abuse@<DOMAIN>;ri=1800;fo=1
(replace <DOMAIN>
with the domain you're setting the record up for).
Add this TXT record to a _dmarc
subdomain for all domains (DOMAIN
and ADDITIONAL_DOMAINS
if you use these).
Lastly, add a DKIM record to each domain.
DKIM deals with domain keysi, the public part of which is stored in DNS.
It allows mailservers to verify whether incoming email really originated from the mailserver an email claims to be coming from.
DKIM uses TXT entries to a subdomain determined by the DKIM "selector": <selector>._domainkey.
THe selector can be configured in settings.env
and defaults to mailserver
.
DKIM keys are generated during initial set-up; refer to the output of dns_check.sh
Add DKIM TXT records containing the public DKIM keys as printed out by dns_check.sh
to mailserver._domainkey
subdomain for all domains (DOMAIN
and ADDITIONAL_DOMAINS
if you use these).
The keys are stored at _server_workspace_/etc/opendkim/keys/
; you can also consult the .txt
files in that directory to get the DKIM TXT record instead of looking at the script output.
Test your DNS set-up
Now it's time to run the DNS test again:
./dns_check.sh
More complex checks are available via e.g.https://www.checktls.com/TestReceiver and https://mxtoolbox.com/dnscheck.aspx.
The repository includes systemd unit files to automatically start the mailserver at boot time. The unit files assume the mailserver resides in /opt/mailserver
.
If you use custom ports for HTTP and HTTPS edit systemd/mailserver.service
and add the ports as positional arguments to ExecStart=/opt/mailserver/start_mailserver.sh
.
First, make sure both mailserver and monitoring are stopped. Then copy the unit files to /etc
:
$ cp systemd/ /etc/systemd/system/
Now update systemd with the new unit files:
$ systemd daemon-reload
Lastly, enable the mailserver service and (if you're using it) the monitoring service:
$ systemd enable --now mailserver
$ systemd enable --now mailserver-monitoring