email:install_a_full_secure_mail_server
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
email:install_a_full_secure_mail_server [2020/07/25 16:26] – old revision restored (2016/11/28 14:45) 92.220.10.100 | email:install_a_full_secure_mail_server [2020/07/26 11:22] (current) – old revision restored (2016/11/28 17:09) 158.69.243.115 | ||
---|---|---|---|
Line 3: | Line 3: | ||
===== Prerequisites ===== | ===== Prerequisites ===== | ||
- | 1) A Linux server, preferably Debian or Ubuntu to follow this tutorial step by step, on other distributions the software packages and file paths can be different. | + | * A Linux server, preferably Debian or Ubuntu to follow this tutorial step by step, on other distributions the software packages and file paths can be different. |
- | 2) Public IP address preferably directly on the server (+ if you are not directly owning the IP in RIPE database, | + | * A Public IP address preferably directly on the server (If you do not have an IP in the RIPE database, |
- | 3) A publicly registered domain name either with some DNS hosting company or you can do yourself a small DNS server. | + | * A publicly registered domain name either with some DNS hosting company or you can do yourself a small DNS server. |
===== My example users and domain used in this tutorial ===== | ===== My example users and domain used in this tutorial ===== | ||
- | In this tutorial, I will be using " | + | This tutorial will be using " |
- | Also the demouser account | + | An example |
- | The target | + | The target |
- | * En email system with email in the form of @example.com. | + | * An email system with email in the form of xxxx@example.com. |
- | * IMAP secured with SSL for access to your emails | + | * IMAP secured with SSL for access to your emails. |
- | * All standard protection mechanisms on the emails so that other email systems do not classify | + | * All standard protection mechanisms on the emails so that other email systems do not classify |
===== Step 1: Configure local hostname and domain on linux server ===== | ===== Step 1: Configure local hostname and domain on linux server ===== | ||
- | How we will call our systems. | + | This uses " |
- | The DNS server will be 8.8.8.8 (**NOTE**: This is a gmail DNS system). | + | The DNS server will be 8.8.8.8 (which is the gmail DNS system, but adjust to any other DNS server as required). |
<code bash> | <code bash> | ||
Line 35: | Line 35: | ||
</ | </ | ||
- | Verification is easy, just use these commands and you should get the answers | + | Verification is easy, just use these commands and you should get the answers. |
<code bash> | <code bash> | ||
Line 54: | Line 54: | ||
===== Step 2: Install email system exim4 and supporting packages ===== | ===== Step 2: Install email system exim4 and supporting packages ===== | ||
- | To get all the software in debian for our little tutorial, we need three main pieces of software: | + | The following |
- **Exim4** – the SMTP daemon. | - **Exim4** – the SMTP daemon. | ||
- | - **Courier** – communication extension for Exim4 to have IMAP and POP access to emails. | + | - **Courier** – communication extension for Exim4 to have IMAP and POP access to emails; or |
+ | - **Dovecot** - communication extension for Exim4 to have IMAP and POP access to emails. | ||
- **Swaks** – Swiss army knife for SMTP troubleshooting. | - **Swaks** – Swiss army knife for SMTP troubleshooting. | ||
- **SSL-cert packages** – for easy work with generating certificates in later parts of the tutorial. | - **SSL-cert packages** – for easy work with generating certificates in later parts of the tutorial. | ||
- | If you are using Debian or Ubuntu, then you can simply follow | + | <WRAP todo> |
+ | **TODO**: Update to use alternatives to Courier, such as Dovecot. | ||
+ | </ | ||
+ | |||
+ | Issue these commands: | ||
<code bash> | <code bash> | ||
apt-get update | apt-get update | ||
- | apt-get install exim4-daemon-heavy courier-authdaemon courier-imap courier-imap-ssl courier-pop courier-pop-ssl | + | apt-get install exim4-daemon-heavy |
+ | </ | ||
+ | |||
+ | Decide on using Courier or Dovecot. | ||
+ | |||
+ | ==== For Courier ==== | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install | ||
</ | </ | ||
<WRAP warning> | <WRAP warning> | ||
- | **Note/ | + | **WARNING**: Courier will by default use a self-signed certificates. |
< | < | ||
Line 86: | Line 99: | ||
</ | </ | ||
- | Verification of the installation can be afterwards | + | |
+ | ==== For Dovecot ==== | ||
+ | |||
+ | <code bash> | ||
+ | apt-get install dovecot-imapd dovecot-pop3d | ||
+ | </ | ||
+ | |||
+ | Edit the file / | ||
+ | |||
+ | < | ||
+ | protocols = pop3 pop3s imap imaps | ||
+ | </ | ||
+ | |||
+ | In addition, add the following line in the " | ||
+ | |||
+ | < | ||
+ | pop3_uidl_format = %08Xu%08Xv | ||
+ | </ | ||
+ | |||
+ | Configure Dovecot to use the maildir mailbox format. | ||
+ | |||
+ | < | ||
+ | mail_location = maildir: | ||
+ | </ | ||
+ | |||
+ | <WRAP info> | ||
+ | **NOTE**: | ||
+ | </ | ||
+ | |||
+ | or alternatively change to: | ||
+ | |||
+ | < | ||
+ | mail_location = maildir:/ | ||
+ | </ | ||
+ | |||
+ | <WRAP note> | ||
+ | If !include conf.d/ | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | mail_location = maildir: | ||
+ | </ | ||
+ | |||
+ | For SSL add or amend the following to the / | ||
+ | |||
+ | < | ||
+ | disable_plaintext_auth = no | ||
+ | ssl = yes | ||
+ | ssl_cert_file = </ | ||
+ | ssl_key_file = </ | ||
+ | </ | ||
+ | |||
+ | Uncomment following line in / | ||
+ | |||
+ | < | ||
+ | listen = * | ||
+ | </ | ||
+ | |||
+ | However, this method may cause conflicts with other servers already listening on other ports. The alternative (and probably more desirable) method, then, is to enable the specific listening ports for the protocols that are intended to be used. For example, for IMAP/IMAPS and POP3/POP3S, add to the correct protocol imap and protocol pop3 sections: | ||
+ | |||
+ | < | ||
+ | protocol imap { | ||
+ | | ||
+ | | ||
+ | ... | ||
+ | } | ||
+ | |||
+ | protocol pop3 { | ||
+ | | ||
+ | | ||
+ | ... | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | If you want to see the config Dovecot is currently using (including the mail_location), | ||
+ | |||
+ | <code bash> | ||
+ | dovecot -n | ||
+ | </ | ||
+ | |||
+ | Start dovecot: | ||
+ | |||
+ | <code bash> | ||
+ | / | ||
+ | </ | ||
+ | |||
+ | See https:// | ||
+ | |||
+ | |||
+ | ==== Verify the setup ==== | ||
+ | |||
+ | Verification of the installation can be done by checking the running ports with a netstat command. Ensure that all the pop3, imap, smtp, pop3s and imaps ports are present | ||
<code bash> | <code bash> | ||
Line 98: | Line 202: | ||
tcp6 | tcp6 | ||
</ | </ | ||
+ | |||
===== Step 3: Preparing local users for mail system (Maildir) ===== | ===== Step 3: Preparing local users for mail system (Maildir) ===== | ||
- | In this example, | + | In this example, each user will have their email inside |
+ | |||
+ | It's a good idea to pre-create the Maildir for future users: | ||
+ | |||
+ | <code bash> | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | sudo maildirmake.dovecot / | ||
+ | </ | ||
+ | |||
+ | Then, for an existing user: | ||
<code bash> | <code bash> | ||
- | maildirmake | + | sudo cp -r /etc/skel/Maildir / |
+ | sudo chown -R myuser: | ||
+ | sudo chmod -R 700 / | ||
</ | </ | ||
- | For existing users, you have to do this manually (or do a script | + | or for the example test user " |
<code bash> | <code bash> | ||
Line 121: | Line 240: | ||
</ | </ | ||
- | Give this user a password when prompted. | + | Give this user a password when prompted. |
===== Step 5: Configure exim4 ===== | ===== Step 5: Configure exim4 ===== | ||
- | Now, first step here is to use the debian | + | Now, first step here is to use the Debian and Ubuntu |
<code bash> | <code bash> | ||
Line 132: | Line 251: | ||
</ | </ | ||
- | It will give you several options in a wizard, this is how I configured my answers for a small and independent server: | + | It will give you several options in a wizard. Here are suggested |
* General type of mail configuration: | * General type of mail configuration: | ||
Line 148: | Line 267: | ||
===== Step 6: X.509 certificate for exim4 TLS support ===== | ===== Step 6: X.509 certificate for exim4 TLS support ===== | ||
- | First run this small command to generate | + | Generate |
<code bash> | <code bash> | ||
Line 219: | Line 338: | ||
===== Step 7: Verification of emails delivery ===== | ===== Step 7: Verification of emails delivery ===== | ||
- | Ok, so the basic email system should now be running, lets test it with the most basic test and that is sending an email locally (either between two users of the local system or to yourself). | + | The basic email system should now be running. Test this with a basic test of sending an email locally (either between two users of the local system or to yourself). |
This test will send email to testuser from testuser. | This test will send email to testuser from testuser. | ||
Line 236: | Line 355: | ||
</ | </ | ||
- | Ok, all looks good, now lets try sending | + | All looks good. Now try sending |
<code bash> | <code bash> | ||
Line 242: | Line 361: | ||
</ | </ | ||
- | Now the good and the bad part, the email arrived, but it ended most probably in spam folder because technically this is a " | + | Now the good and the bad part, the email arrived, but it ended most probably in the spam folder because technically this is a " |
===== Step 8-9: First problem with PAM not enabled in courier ===== | ===== Step 8-9: First problem with PAM not enabled in courier ===== | ||
- | As immediate step after my emails got working was that Thunderbird was unable to connect to the courier with IMAPS (with TLS enabled) despite the basic certificates existed from the installation (during apt-get install a default set was generated). | + | An immediate step after my emails got working was that Thunderbird was unable to connect to the courier with IMAPS (with TLS enabled) despite the basic certificates existed from the installation (during apt-get install a default set was generated). |
- | To verify what is going one, this is the best test to see the problem, we will use SWAKS to troubleshoot | + | To verify what is going on, run a simple |
<code bash> | <code bash> | ||
Line 290: | Line 409: | ||
</ | </ | ||
- | Install SASLAUTH daemon that will do the authentication | + | Install |
- | **NOTE**: If you want some other method of authentication, | + | **NOTE**: If you want some other method of authentication, |
<code bash> | <code bash> | ||
Line 378: | Line 497: | ||
===== Step 10: Configure courier for IMAP ===== | ===== Step 10: Configure courier for IMAP ===== | ||
- | You want this because it is most useful for your smartphone access | + | Ensure |
<code bash> | <code bash> | ||
Line 746: | Line 865: | ||
The next step is to check how well SPF/DKIM and other functions are filtering out incoming spam! | The next step is to check how well SPF/DKIM and other functions are filtering out incoming spam! | ||
+ | |||
+ | |||
+ | ===== References ===== | ||
+ | |||
+ | https:// | ||
+ | |||
+ | http:// | ||
email/install_a_full_secure_mail_server.1595694392.txt.gz · Last modified: 2020/07/25 16:26 by 92.220.10.100