email:install_a_full_secure_mail_server
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
email:install_a_full_secure_mail_server [2019/11/27 22:05] – removed peter | email:install_a_full_secure_mail_server [2020/07/26 11:22] (current) – old revision restored (2016/11/28 17:09) 158.69.243.115 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Email - Install a full secure mail server ====== | ||
+ | |||
+ | ===== Prerequisites ===== | ||
+ | |||
+ | * A Linux server, preferably Debian or Ubuntu to follow this tutorial step by step, on other distributions the software packages and file paths can be different. | ||
+ | |||
+ | * A Public IP address preferably directly on the server (If you do not have an IP in the RIPE database, then a provider of your IP address who is willing to set reverse DNS entry on this IP address). | ||
+ | |||
+ | * A publicly registered domain name either with some DNS hosting company or you can do yourself a small DNS server. | ||
+ | |||
+ | |||
+ | ===== My example users and domain used in this tutorial ===== | ||
+ | |||
+ | This tutorial will be using " | ||
+ | |||
+ | An example email account of demouser@example.com will be used. | ||
+ | |||
+ | The target that we desire at the end of this tutorial is: | ||
+ | |||
+ | * An email system with email in the form of xxxx@example.com. | ||
+ | * IMAP secured with SSL for access to your emails. | ||
+ | * All standard protection mechanisms on the emails so that other email systems do not classify the emails as SPAM. This includes SPF, DKIM, rDNS and SpamAssassin headers. | ||
+ | |||
+ | |||
+ | ===== Step 1: Configure local hostname and domain on linux server ===== | ||
+ | |||
+ | This uses " | ||
+ | |||
+ | The DNS server will be 8.8.8.8 (which is the gmail DNS system, but adjust to any other DNS server as required). | ||
+ | |||
+ | <code bash> | ||
+ | echo exampleserver> | ||
+ | hostname -F / | ||
+ | echo " | ||
+ | </ | ||
+ | |||
+ | Verification is easy, just use these commands and you should get the answers. | ||
+ | |||
+ | <code bash> | ||
+ | hostname --short | ||
+ | exampleserver | ||
+ | |||
+ | hostname --domain | ||
+ | example.com | ||
+ | |||
+ | hostname --fqdn | ||
+ | exampleserver.example.com | ||
+ | |||
+ | hostname --ip-address | ||
+ | 8.8.8.8 | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 2: Install email system exim4 and supporting packages ===== | ||
+ | |||
+ | The following software is needed: | ||
+ | |||
+ | - **Exim4** – the SMTP daemon. | ||
+ | - **Courier** – communication extension for Exim4 to have IMAP and POP access to emails; or | ||
+ | - **Dovecot** - communication extension for Exim4 to have IMAP and POP access to emails. | ||
+ | - **Swaks** – Swiss army knife for SMTP troubleshooting. | ||
+ | - **SSL-cert packages** – for easy work with generating certificates in later parts of the tutorial. | ||
+ | |||
+ | <WRAP todo> | ||
+ | **TODO**: Update to use alternatives to Courier, such as Dovecot. | ||
+ | </ | ||
+ | |||
+ | Issue these commands: | ||
+ | |||
+ | <code bash> | ||
+ | apt-get update | ||
+ | apt-get install exim4-daemon-heavy swaks libnet-ssleay-perl ssl-cert | ||
+ | </ | ||
+ | |||
+ | Decide on using Courier or Dovecot. | ||
+ | |||
+ | ==== For Courier ==== | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install courier-authdaemon courier-imap courier-imap-ssl courier-pop courier-pop-ssl | ||
+ | </ | ||
+ | |||
+ | <WRAP warning> | ||
+ | **WARNING**: | ||
+ | |||
+ | < | ||
+ | SSL Certificate Required | ||
+ | |||
+ | POP and IMAP over SSL requires a valid, signed, X.509 certificate. | ||
+ | During the installation of courier-pop-ssl or courier-imap-ssl, | ||
+ | self-signed certificate will be generated if necessary. | ||
+ | |||
+ | For production use, the X.509 certificate must be signed by a recognized | ||
+ | certificate authority, in order for mail clients to accept the | ||
+ | certificate. | ||
+ | / | ||
+ | </ | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | ==== For Dovecot ==== | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install dovecot-imapd dovecot-pop3d | ||
+ | </ | ||
+ | |||
+ | Edit the file / | ||
+ | |||
+ | < | ||
+ | protocols = pop3 pop3s imap imaps | ||
+ | </ | ||
+ | |||
+ | In addition, add the following line in the " | ||
+ | |||
+ | < | ||
+ | pop3_uidl_format = %08Xu%08Xv | ||
+ | </ | ||
+ | |||
+ | Configure Dovecot to use the maildir mailbox format. | ||
+ | |||
+ | < | ||
+ | mail_location = maildir: | ||
+ | </ | ||
+ | |||
+ | <WRAP info> | ||
+ | **NOTE**: | ||
+ | </ | ||
+ | |||
+ | or alternatively change to: | ||
+ | |||
+ | < | ||
+ | mail_location = maildir:/ | ||
+ | </ | ||
+ | |||
+ | <WRAP note> | ||
+ | If !include conf.d/ | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | mail_location = maildir: | ||
+ | </ | ||
+ | |||
+ | For SSL add or amend the following to the / | ||
+ | |||
+ | < | ||
+ | disable_plaintext_auth = no | ||
+ | ssl = yes | ||
+ | ssl_cert_file = </ | ||
+ | ssl_key_file = </ | ||
+ | </ | ||
+ | |||
+ | Uncomment following line in / | ||
+ | |||
+ | < | ||
+ | listen = * | ||
+ | </ | ||
+ | |||
+ | However, this method may cause conflicts with other servers already listening on other ports. The alternative (and probably more desirable) method, then, is to enable the specific listening ports for the protocols that are intended to be used. For example, for IMAP/IMAPS and POP3/POP3S, add to the correct protocol imap and protocol pop3 sections: | ||
+ | |||
+ | < | ||
+ | protocol imap { | ||
+ | | ||
+ | | ||
+ | ... | ||
+ | } | ||
+ | |||
+ | protocol pop3 { | ||
+ | | ||
+ | | ||
+ | ... | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | If you want to see the config Dovecot is currently using (including the mail_location), | ||
+ | |||
+ | <code bash> | ||
+ | dovecot -n | ||
+ | </ | ||
+ | |||
+ | Start dovecot: | ||
+ | |||
+ | <code bash> | ||
+ | / | ||
+ | </ | ||
+ | |||
+ | See https:// | ||
+ | |||
+ | |||
+ | ==== Verify the setup ==== | ||
+ | |||
+ | Verification of the installation can be done by checking the running ports with a netstat command. | ||
+ | |||
+ | <code bash> | ||
+ | netstat –utal | ||
+ | -- omitted -- | ||
+ | tcp6 | ||
+ | tcp6 | ||
+ | tcp6 | ||
+ | tcp6 | ||
+ | tcp6 | ||
+ | tcp6 | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 3: Preparing local users for mail system (Maildir) ===== | ||
+ | |||
+ | In this example, each user will have their email inside their own home directory under ~/ | ||
+ | |||
+ | It's a good idea to pre-create the Maildir for future users: | ||
+ | |||
+ | <code bash> | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | </ | ||
+ | |||
+ | Then, for an existing user: | ||
+ | |||
+ | <code bash> | ||
+ | sudo cp -r / | ||
+ | sudo chown -R myuser: | ||
+ | sudo chmod -R 700 / | ||
+ | </ | ||
+ | |||
+ | or for the example test user " | ||
+ | |||
+ | <code bash> | ||
+ | maildirmake ~demouser/ | ||
+ | chown –R demouser.demouser ~demouser/ | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 4: Create new user to test the mail system ===== | ||
+ | |||
+ | <code bash> | ||
+ | adduser demouser | ||
+ | </ | ||
+ | |||
+ | Give this user a password when prompted. | ||
+ | |||
+ | |||
+ | ===== Step 5: Configure exim4 ===== | ||
+ | |||
+ | Now, first step here is to use the Debian and Ubuntu built-in configuration package to configure the " | ||
+ | |||
+ | <code bash> | ||
+ | dpkg-reconfigure exim4-config | ||
+ | </ | ||
+ | |||
+ | It will give you several options in a wizard. | ||
+ | |||
+ | * General type of mail configuration: | ||
+ | * System mail name: **example.com** | ||
+ | * IP-addresses to listen on for incoming SMTP connections: | ||
+ | * Other destinations for which mail is accepted: leave this field empty!!! | ||
+ | * Domains to relay mail for: leave this field empty!!! | ||
+ | * Machines to relay mail for: leave this field empty!!! | ||
+ | * Keep number of DNS-queries minimal (Dial-on-Demand)?: | ||
+ | * Delivery method for local mail: **Maildir format in home directory** | ||
+ | * Split configuration into small files?: **NO** | ||
+ | * Root and postmaster mail recipient: **demouser** (or your real administrator name, but non-root account) | ||
+ | |||
+ | |||
+ | ===== Step 6: X.509 certificate for exim4 TLS support ===== | ||
+ | |||
+ | Generate a certificate based on example from exim. | ||
+ | |||
+ | <code bash> | ||
+ | / | ||
+ | [*] Creating a self signed SSL certificate for Exim! | ||
+ | This may be sufficient to establish encrypted connections but for | ||
+ | secure identification you need to buy a real certificate! | ||
+ | | ||
+ | Please enter the hostname of your MTA at the Common Name (CN) prompt! | ||
+ | | ||
+ | Generating a 1024 bit RSA private key | ||
+ | ...........................................++++++ | ||
+ | ....................................................................++++++ | ||
+ | writing new private key to '/ | ||
+ | ----- | ||
+ | You are about to be asked to enter information that will be incorporated | ||
+ | into your certificate request. | ||
+ | What you are about to enter is what is called a Distinguished Name or a DN. | ||
+ | There are quite a few fields but you can leave some blank | ||
+ | For some fields there will be a default value, | ||
+ | If you enter ' | ||
+ | ----- | ||
+ | Country Code (2 letters) [US]:JE | ||
+ | State or Province Name (full name) []:Jersey | ||
+ | Locality Name (eg, city) []:St. Helier | ||
+ | Organization Name (eg, company; recommended) []: | ||
+ | Organizational Unit Name (eg, section) []: | ||
+ | Server name (eg. ssl.domain.tld; | ||
+ | Email Address []:demouser | ||
+ | [*] Done generating self signed certificates for exim! | ||
+ | Refer to the documentation and example configuration files | ||
+ | over at / | ||
+ | support in your mail transfer agent. | ||
+ | </ | ||
+ | |||
+ | Next, based on the documentation you find in / | ||
+ | |||
+ | <code bash> | ||
+ | echo " | ||
+ | echo " | ||
+ | </ | ||
+ | |||
+ | Inside / | ||
+ | |||
+ | < | ||
+ | SMTPLISTENEROPTIONS='' | ||
+ | </ | ||
+ | |||
+ | To this: | ||
+ | |||
+ | < | ||
+ | SMTPLISTENEROPTIONS=' | ||
+ | </ | ||
+ | |||
+ | Ok, now restart exim4 again with the service command | ||
+ | |||
+ | <code bash> | ||
+ | service exim4 restart | ||
+ | </ | ||
+ | |||
+ | And check if the exim4 is listening on port 465: | ||
+ | |||
+ | <code bash> | ||
+ | netstat -atupln | grep 465 | ||
+ | tcp 0 0 0.0.0.0: | ||
+ | tcp6 | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 7: Verification of emails delivery ===== | ||
+ | |||
+ | The basic email system should now be running. | ||
+ | |||
+ | This test will send email to testuser from testuser. | ||
+ | |||
+ | <code bash> | ||
+ | echo "test message content" | ||
+ | </ | ||
+ | |||
+ | You can either check the inbox of demouser, or more simply check logs inside / | ||
+ | |||
+ | <code bash> | ||
+ | cat / | ||
+ | 2014-12-23 16:56:42 1Y3XRa-0004B4-Sj <= root@example.com U=root P=local S=391 | ||
+ | 2014-12-23 16:56:42 1Y3XRa-0004B4-Sj => demouser < | ||
+ | 2014-12-23 16:56:42 1Y3XRa-0004B4-Sj Completed | ||
+ | </ | ||
+ | |||
+ | All looks good. Now try sending an external email. | ||
+ | |||
+ | <code bash> | ||
+ | echo "test message content" | ||
+ | </ | ||
+ | |||
+ | Now the good and the bad part, the email arrived, but it ended most probably in the spam folder because technically this is a " | ||
+ | |||
+ | |||
+ | ===== Step 8-9: First problem with PAM not enabled in courier ===== | ||
+ | |||
+ | An immediate step after my emails got working was that Thunderbird was unable to connect to the courier with IMAPS (with TLS enabled) despite the basic certificates existed from the installation (during apt-get install a default set was generated). | ||
+ | |||
+ | To verify what is going on, run a simple test using SWAKS to troubleshoot: | ||
+ | |||
+ | <code bash> | ||
+ | swaks -a -tls -q AUTH -s localhost -au demouser | ||
+ | Password: playingwithexim4 | ||
+ | === Trying localhost: | ||
+ | === Connected to localhost. | ||
+ | <- 220 exampleserver.example.com ESMTP Exim 4.80 Tue, 23 Dec 2014 20:10:29 -0500 | ||
+ | -> EHLO exampleserver.example.com | ||
+ | <- 250-exampleserver.example.com Hello localhost [127.0.0.1] | ||
+ | <- 250-SIZE 52428800 | ||
+ | <- 250-8BITMIME | ||
+ | <- 250-PIPELINING | ||
+ | <- 250-STARTTLS | ||
+ | <- 250 HELP | ||
+ | -> STARTTLS | ||
+ | <- 220 TLS go ahead | ||
+ | === TLS started w/ cipher DHE-RSA-AES256-SHA256 | ||
+ | === TLS peer subject DN="/ | ||
+ | ~> EHLO exampleserver.example.com | ||
+ | <~ 250-exampleserver.example.com Hello localhost [127.0.0.1] | ||
+ | <~ 250-SIZE 52428800 | ||
+ | <~ 250-8BITMIME | ||
+ | <~ 250-PIPELINING | ||
+ | <~ 250 HELP | ||
+ | *** Host did not advertise authentication | ||
+ | ~> QUIT | ||
+ | <~ 221 exampleserver.example.com closing connection | ||
+ | === Connection closed with remote host. | ||
+ | </ | ||
+ | |||
+ | As you noticed, the TLS layer is there successfully, | ||
+ | |||
+ | Add these lines to / | ||
+ | |||
+ | < | ||
+ | MAIN_TLS_ENABLE = yes | ||
+ | tls_on_connect_ports=465 | ||
+ | rfc1413_query_timeout = 0s | ||
+ | </ | ||
+ | |||
+ | Install the SASLAUTH daemon that will do the authentication against local UNIX usernames. | ||
+ | |||
+ | **NOTE**: If you want some other method of authentication, | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install sasl2-bin | ||
+ | </ | ||
+ | |||
+ | Edit / | ||
+ | |||
+ | < | ||
+ | START=yes | ||
+ | </ | ||
+ | |||
+ | Restart the SASLAUTH daemon: | ||
+ | |||
+ | < | ||
+ | / | ||
+ | </ | ||
+ | |||
+ | Add exim to sasl group | ||
+ | |||
+ | <code bash> | ||
+ | adduser Debian-exim sasl | ||
+ | Adding user `Debian-exim' | ||
+ | Adding user Debian-exim to group sasl | ||
+ | Done. | ||
+ | </ | ||
+ | |||
+ | Inside / | ||
+ | |||
+ | <file bash / | ||
+ | # Authenticate against local passwords using sasl2-bin | ||
+ | # Requires exim_uid to be a member of sasl group, see README.Debian.gz | ||
+ | # plain_saslauthd_server: | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | # | ||
+ | </ | ||
+ | |||
+ | Do a restart of both exim4 and saslauth | ||
+ | |||
+ | <code bash> | ||
+ | update-exim4.conf | ||
+ | service exim4 restart | ||
+ | service saslauthd restart | ||
+ | </ | ||
+ | |||
+ | **VERIFICATION** is again with swaks the same command, but now you should get this (note "235 Authentication succeeded" | ||
+ | |||
+ | <code bash> | ||
+ | swaks -a -tls -q AUTH -s localhost -au demouser | ||
+ | Password: kreten | ||
+ | === Trying localhost: | ||
+ | === Connected to localhost. | ||
+ | <- 220 exampleserver.example.com ESMTP Exim 4.80 Tue, 23 Dec 2014 20:58:57 -0500 | ||
+ | -> EHLO exampleserver.example.com | ||
+ | <- 250-exampleserver.example.com Hello localhost [127.0.0.1] | ||
+ | <- 250-SIZE 52428800 | ||
+ | <- 250-8BITMIME | ||
+ | <- 250-PIPELINING | ||
+ | <- 250-STARTTLS | ||
+ | <- 250 HELP | ||
+ | -> STARTTLS | ||
+ | <- 220 TLS go ahead | ||
+ | === TLS started w/ cipher DHE-RSA-AES256-SHA256 | ||
+ | === TLS peer subject DN="/ | ||
+ | ~> EHLO exampleserver.example.com | ||
+ | <~ 250-exampleserver.example.com Hello localhost [127.0.0.1] | ||
+ | <~ 250-SIZE 52428800 | ||
+ | <~ 250-8BITMIME | ||
+ | <~ 250-PIPELINING | ||
+ | <~ 250-AUTH PLAIN | ||
+ | <~ 250 HELP | ||
+ | ~> AUTH PLAIN AGRlbW91c2VyAGtyZXRlbg== | ||
+ | <~ 235 Authentication succeeded | ||
+ | ~> QUIT | ||
+ | <~ 221 exampleserver.example.com closing connection | ||
+ | === Connection closed with remote host. | ||
+ | </ | ||
+ | |||
+ | ===== Step 10: Configure courier for IMAP ===== | ||
+ | |||
+ | Ensure that the email client is definitely supporting IMAP. Just follow these basic commands: | ||
+ | |||
+ | <code bash> | ||
+ | rm -rf / | ||
+ | make-ssl-cert / | ||
+ | make-ssl-cert / | ||
+ | |||
+ | service courier-imap restart | ||
+ | service courier-imap-ssl restart | ||
+ | service courier-authdaemon restart | ||
+ | service courier-pop restart | ||
+ | service courier-pop-ssl restart | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 11: Test access with email client (e.g. Thunderbird) ===== | ||
+ | |||
+ | This setup shows how Thunderbird is configured, but if you have a different preferred client, please feel free to try using it (including smartphone mail clients that support IMAP protocol). | ||
+ | |||
+ | <WRAP todo> | ||
+ | **TODO**: Add an image here of Thunderbird "Mail Account Setup" | ||
+ | </ | ||
+ | |||
+ | **NOTE**: | ||
+ | |||
+ | <WRAP todo> | ||
+ | **TODO**: Add an image here of Thunderbird "Add security exception" | ||
+ | </ | ||
+ | |||
+ | If your connection with any client was successful, please try writing a quick email to yourself, for example this is how it looked in my system in Thunderbird. | ||
+ | |||
+ | < | ||
+ | From: Me < | ||
+ | Subject: Test | ||
+ | To: Me < | ||
+ | Hello World | ||
+ | </ | ||
+ | |||
+ | Or here is the raw message code: | ||
+ | |||
+ | < | ||
+ | Return-path: | ||
+ | Envelope-to: | ||
+ | Delivery-date: | ||
+ | Received: from [123.123.123.123] (helo=[192.168.1.2]) | ||
+ | by exampleserver.example.com with esmtpsa (TLS1.2: | ||
+ | (Exim 4.80) | ||
+ | (envelope-from < | ||
+ | id 1Y3c8X-00055r-CJ | ||
+ | for demouser@example.com; | ||
+ | Message-ID: < | ||
+ | Date: Wed, 24 Dec 2014 02:57:53 +0100 | ||
+ | From: " | ||
+ | User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/ | ||
+ | MIME-Version: | ||
+ | To: demouser@example.com | ||
+ | Subject: Test | ||
+ | Content-Type: | ||
+ | Content-Transfer-Encoding: | ||
+ | |||
+ | Hello World | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 12: Testing sending mail to an external system ===== | ||
+ | |||
+ | Use Thunderbird, | ||
+ | |||
+ | HINT: To check if your email left your system, check all the mail logs in the / | ||
+ | |||
+ | |||
+ | ===== Step 13: Making the email system appear as a valid domain owner for passing spam filters ===== | ||
+ | |||
+ | There are three basic things every email system should do to get anti-spam protection permitting emails received from your new systems to remote systems inboxes without ending in spam folders. | ||
+ | |||
+ | - rDNS (or reverse DNS) to have reverse DNS lookup on the public IP pointing back to your domain. | ||
+ | - SPF (Sender Policy Framework) that let’s the receiving system know which systems are allowed to send emails for your domain. | ||
+ | - DKIM (DocumentKeys Identified Mails) a public/ | ||
+ | |||
+ | |||
+ | ==== Step 13A: Reverse DNS entry ==== | ||
+ | |||
+ | This part is between you and your provider, but you must ask the owner of the public IP you are using to create a reverse DNS entry for you. | ||
+ | |||
+ | Most providers of servers have this option as part of their control panel so the work is a few clicks, but it is imperative to do. | ||
+ | |||
+ | **DISCLAIMER**: | ||
+ | |||
+ | A quick view on one such system: | ||
+ | |||
+ | <WRAP box cyan> | ||
+ | ^IP^Netmark^Gateway^Custom reverse DNS^ | ||
+ | |123.123.123.123|255.255.254.0|123.123.123.254|example.com| | ||
+ | </ | ||
+ | |||
+ | To verify, either use the " | ||
+ | |||
+ | <code bash> | ||
+ | nslookup -r 123.123.123.123 | ||
+ | *** Invalid option: r | ||
+ | Server: | ||
+ | Address: | ||
+ | |||
+ | Non-authoritative answer: | ||
+ | 123.123.123.123.in-addr.arpa | ||
+ | </ | ||
+ | |||
+ | |||
+ | ==== Step 13B: SPF ==== | ||
+ | |||
+ | To summarizze what we will be doing here with SPF is basically that you need to interact either with your own DNS system, or contact your DNS hosting company (or do this via their control panel if they have this) and ask them to enter some special TXT records to your domain. | ||
+ | |||
+ | Read this page to understand SFP to avoid generating something incorrectly and hurting you email system from the very beginning! | ||
+ | |||
+ | This example will allow my main server " | ||
+ | |||
+ | < | ||
+ | v=spf1 a include: | ||
+ | spf2.0/pra a include: | ||
+ | </ | ||
+ | |||
+ | === Quick legend: === | ||
+ | |||
+ | * The **" | ||
+ | * The **" | ||
+ | * **" | ||
+ | |||
+ | You can then apply them to the DNS record and test it with an online tool such as http:// | ||
+ | |||
+ | <WRAP note> | ||
+ | At the very end of this guide, we will be sending a test email to a testing service that will verify SPF and other useful things for us, so if you have trouble with this tool, wait for that testing. | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 13c: DKIM public keypair to sign emails leaving your system ===== | ||
+ | |||
+ | This is a little more tricky as we are again going to play with certificates, | ||
+ | |||
+ | Generate an RSA public and private keys with openssl | ||
+ | |||
+ | <code bash> | ||
+ | sudo openssl genrsa -out / | ||
+ | sudo openssl rsa -in / | ||
+ | sudo chown Debian-exim: | ||
+ | </ | ||
+ | |||
+ | Read your new public key | ||
+ | |||
+ | <code bash> | ||
+ | cat / | ||
+ | -----BEGIN PUBLIC KEY----- | ||
+ | MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDA+WiFmhUpuOav+3oB77E0j06p | ||
+ | DAr5cw9NKkcf9tcDbn7nIpBqAIFP8PVTn4tzO3I6LL+o5A9dCGQFPZlzqW8cXPDc | ||
+ | Zd/ | ||
+ | V72GKjSR2+ql8wM4cQIDAQAB | ||
+ | -----END PUBLIC KEY----- | ||
+ | </ | ||
+ | |||
+ | Construct a DNS TXT record with the public key using this formula : | ||
+ | |||
+ | * Domain name: key1._domainkey.< | ||
+ | * TXT record: v=DKIM1; k=rsa; p=<your public key string> For the domain example.com. | ||
+ | |||
+ | < | ||
+ | key1._domainkey.example.com.example.com | ||
+ | </ | ||
+ | |||
+ | TXT record itself: | ||
+ | |||
+ | < | ||
+ | v=DKIM1; | ||
+ | </ | ||
+ | |||
+ | <WRAP info> | ||
+ | The ' | ||
+ | </ | ||
+ | |||
+ | |||
+ | Create a file dkim_senders to tell exim what source domains the DKIM should be used for: | ||
+ | |||
+ | <code bash> | ||
+ | echo " | ||
+ | </ | ||
+ | |||
+ | Edit / | ||
+ | |||
+ | < | ||
+ | # | ||
+ | dnslookup_dkim: | ||
+ | debug_print = "R: dnslookup_dkim for $local_part@$domain" | ||
+ | driver = dnslookup | ||
+ | domains = ! +local_domains | ||
+ | senders = lsearch*@;/ | ||
+ | transport = remote_smtp_dkim | ||
+ | same_domain_copy_routing = yes | ||
+ | # ignore private rfc1918 and APIPA addresses | ||
+ | ignore_target_hosts = 0.0.0.0 : 127.0.0.0/8 : 192.168.0.0/ | ||
+ | 172.16.0.0/ | ||
+ | 255.255.255.255 | ||
+ | no_more | ||
+ | </ | ||
+ | |||
+ | Again inside the / | ||
+ | |||
+ | < | ||
+ | remote_smtp_dkim: | ||
+ | debug_print = "T: remote_smtp_dkim for $local_part@$domain" | ||
+ | driver = smtp | ||
+ | dkim_domain = ${lookup{$sender_address}lsearch*@{/ | ||
+ | dkim_selector = key1 | ||
+ | dkim_private_key = / | ||
+ | dkim_canon = relaxed | ||
+ | dkim_strict = false | ||
+ | # | ||
+ | </ | ||
+ | | ||
+ | Restart exim | ||
+ | |||
+ | <code bash> | ||
+ | update-exim4.conf | ||
+ | service exim4 restart | ||
+ | </ | ||
+ | |||
+ | Now you should have everything very nicely prepared, to get a report about how successfully you were, send a test email to (any content) : | ||
+ | |||
+ | < | ||
+ | check-auth@verifier.port25.com | ||
+ | </ | ||
+ | |||
+ | You will get back an email with a very nice and complete summary of the SPF/DKIM and some other checks. | ||
+ | |||
+ | < | ||
+ | ========================================================== | ||
+ | Summary of Results | ||
+ | ========================================================== | ||
+ | SPF check: | ||
+ | DomainKeys check: | ||
+ | DKIM check: | ||
+ | Sender-ID check: | ||
+ | SpamAssassin check: ham | ||
+ | |||
+ | ========================================================== | ||
+ | Details: | ||
+ | ========================================================== | ||
+ | |||
+ | HELO hostname: | ||
+ | Source IP: 123.123.123.123 | ||
+ | mail-from: | ||
+ | |||
+ | ---------------------------------------------------------- | ||
+ | SPF check details: | ||
+ | ---------------------------------------------------------- | ||
+ | Result: | ||
+ | ID(s) verified: smtp.mailfrom=demouser@example.com | ||
+ | DNS record(s): | ||
+ | example.com. SPF (no records) | ||
+ | example.com. 600 IN TXT " | ||
+ | example.com. 600 IN TXT " | ||
+ | example.com. 600 IN A 123.123.123.123 | ||
+ | |||
+ | ---------------------------------------------------------- | ||
+ | DKIM check details: | ||
+ | ---------------------------------------------------------- | ||
+ | Result: | ||
+ | ID(s) verified: header.d=example.com | ||
+ | Canonicalized Headers: | ||
+ | content-transfer-encoding: | ||
+ | content-type: | ||
+ | in-reply-to:< | ||
+ | references:< | ||
+ | subject: | ||
+ | to: | ||
+ | mime-version: | ||
+ | from:" | ||
+ | date: | ||
+ | message-id:< | ||
+ | dkim-signature: | ||
+ | |||
+ | Canonicalized Body: | ||
+ | Test' | ||
+ | | ||
+ | |||
+ | DNS record(s): | ||
+ | key1._domainkey.example.com. 600 IN TXT " | ||
+ | |||
+ | Public key used for verification: | ||
+ | |||
+ | NOTE: DKIM checking has been performed based on the latest DKIM specs | ||
+ | (RFC 4871 or draft-ietf-dkim-base-10) and verification may fail for | ||
+ | older versions. | ||
+ | version 3.2r11 or later to get a compatible version of DKIM. | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Step 14: SpamAssassin header attachment ===== | ||
+ | |||
+ | SpamAssassin is mainly used for incoming emails. | ||
+ | |||
+ | So this is a super quick how-to to enable very basic spam-assassin checks on your emails. | ||
+ | |||
+ | See https:// | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install spamassassin | ||
+ | </ | ||
+ | |||
+ | |||
+ | Set " | ||
+ | |||
+ | Start the spamassassin daemon: | ||
+ | |||
+ | <code bash> | ||
+ | / | ||
+ | </ | ||
+ | |||
+ | Uncomment this line in / | ||
+ | |||
+ | < | ||
+ | spamd_address = 127.0.0.1 783 | ||
+ | </ | ||
+ | |||
+ | Edit / | ||
+ | |||
+ | < | ||
+ | # put headers in all messages (no matter if spam or not) | ||
+ | | ||
+ | | ||
+ | | ||
+ | |||
+ | # add second subject line with *SPAM* marker when message | ||
+ | # is over threshold | ||
+ | warn spam = nobody | ||
+ | add_header = Subject: ***SPAM (score: | ||
+ | </ | ||
+ | | ||
+ | Rebuild exim config and restart exim | ||
+ | |||
+ | <code bash> | ||
+ | update-exim4.conf | ||
+ | service exim4 restart | ||
+ | </ | ||
+ | |||
+ | |||
+ | Test by either sending again to check-auth@verifier.port25.com | ||
+ | |||
+ | < | ||
+ | X-Spam-Score: | ||
+ | X-Spam-Report: | ||
+ | | ||
+ | has been attached to this so you can view it (if it isn't spam) or label | ||
+ | | ||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | | ||
+ | |||
+ | pts rule name description | ||
+ | ---- ---------------------- -------------------------------------------------- | ||
+ | -1.0 ALL_TRUSTED | ||
+ | </ | ||
+ | |||
+ | |||
+ | ===== Summary ===== | ||
+ | |||
+ | The email system should be running. | ||
+ | |||
+ | The next step is to check how well SPF/DKIM and other functions are filtering out incoming spam! | ||
+ | |||
+ | |||
+ | ===== References ===== | ||
+ | |||
+ | https:// | ||
+ | |||
+ | http:// | ||
+ | |||
email/install_a_full_secure_mail_server.1574892342.txt.gz · Last modified: 2020/07/15 09:30 (external edit)