This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
computing:mailserver [2025/04/12 23:17] – oemb1905 | computing:mailserver [2025/04/23 20:55] (current) – oemb1905 | ||
---|---|---|---|
Line 22: | Line 22: | ||
sudo apt install ufw | sudo apt install ufw | ||
sudo ufw allow 22/tcp | sudo ufw allow 22/tcp | ||
- | sudo ufw allow 53/tcp | ||
sudo ufw allow 25/tcp | sudo ufw allow 25/tcp | ||
sudo ufw allow 587/tcp | sudo ufw allow 587/tcp | ||
sudo ufw allow 143/tcp | sudo ufw allow 143/tcp | ||
+ | sudo ufw allow 465/tcp | ||
sudo ufw allow 993/tcp | sudo ufw allow 993/tcp | ||
sudo ufw allow 80 | sudo ufw allow 80 | ||
Line 125: | Line 125: | ||
< | < | ||
- | Let's make sure dovecot is part of the mail group with '' | + | Let's make sure dovecot is part of the mail group, including any users you intend to use email: |
+ | |||
+ | | ||
+ | sudo adduser username mail | ||
+ | |||
+ | Now we can configure dovecot | ||
service lmtp { | service lmtp { | ||
Line 200: | Line 205: | ||
sudo chmod 711 / | sudo chmod 711 / | ||
| | ||
- | Once all the directories and key locations are created, let's open the signing table with '' | + | Once all the directories and key locations are created, let's open the signing table with '' |
- | *@example.com | + | |
- | *@*.example.com | + | |
Now that the signing table is setup, we need to edit the key table with '' | Now that the signing table is setup, we need to edit the key table with '' | ||
Line 211: | Line 216: | ||
The trusted hosts is next, over in '' | The trusted hosts is next, over in '' | ||
+ | 127.0.0.1 | ||
+ | localhost | ||
.domain.com | .domain.com | ||
| | ||
Line 251: | Line 258: | ||
RejectFailures true | RejectFailures true | ||
IgnoreAuthenticatedClients true | IgnoreAuthenticatedClients true | ||
+ | RequireHeaders true | ||
SPFSelfValidate true | SPFSelfValidate true | ||
Socket local:/ | Socket local:/ | ||
Line 361: | Line 369: | ||
# | # | ||
report_safe 0 | report_safe 0 | ||
- | | + | add_header all Spam-Flag _YESNO_ |
- | #add_header all Flag _YESNO_ | + | |
- | | + | add_header all Report _REPORT_ |
- | | + | add_header all Level _STARS_ |
- | #add_header all Level _STARS_ | + | |
- | #add_header all Checker-Version " | + | add_header all Checker-Version " |
+ | # | ||
+ | # | ||
I included some header options, which can help with debugging. Also, I disable safe reporting and Subject rewriting because they alter the original email, which I think is overkill. In order to activate all that spam assassin can do, we need to have our own recursive DNS resolver, required by RBL services. Let's use the DNS server unbound and install it as follows '' | I included some header options, which can help with debugging. Also, I disable safe reporting and Subject rewriting because they alter the original email, which I think is overkill. In order to activate all that spam assassin can do, we need to have our own recursive DNS resolver, required by RBL services. Let's use the DNS server unbound and install it as follows '' | ||
Line 496: | Line 506: | ||
These tools prove helpful if/when emails get stuck, etc. | These tools prove helpful if/when emails get stuck, etc. | ||
- | --- // | + | --- // |