Skip to content

🐳 Simple mail server docker image with TLS and OpenDKIM/DMARC support and includes IMAP, antivirus, spam filtering, greylisting, sieve rules, supporting multiple virtual domains over MySQL backend (Postfixadmin scheme)

License

Notifications You must be signed in to change notification settings

systemdevs/mailserver

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

86 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

⚠️ 24/09/2016 : Postfixadmin and Rainloop reverse proxy ports have changed, it's now 8888. Please, update your nginx vhost files before pulling the latest images from dockerhub. For more information : https://github.com/hardware/mailserver/wiki/Reverse-proxy-configuration

hardware/mailserver

Mailserver

Components

  • Postfix 2.11.3
  • Dovecot 2.2.13
  • OpenDKIM 2.9.2
  • OpenDMARC 1.3.0
  • Spamassassin 3.4.0
  • Postgrey 1.35
  • ClamAV 0.98.7
  • Amavisd-new 2.10.1
  • Amavisd-milter 1.5.0
  • Supervisor 3.0r1
  • Rsyslog 8.4.2
  • ManageSieve server

How to use

1 - Get latest image

# Pull from hub.docker.com :
docker pull hardware/mailserver

# or build it manually :
docker build -t hardware/mailserver https://github.com/hardware/mailserver.git#master

2 - Get latest docker-compose.yml

See docker-compose.sample.yml

Note : Change your hostname / domain name, and adapt to your needs

3 - Reverse proxy setup

See Reverse proxy configuration

Start the mailstack :

docker-compose up -d

4 - Control panel setup / virtual domains and mailboxes creation

See Postfixadmin initial configuration

5 - Webmail setup (optional)

See Rainloop initial configuration

6 - DNS records

HOSTNAME            CLASS             RECORD TYPE          VALUE
------------------------------------------------------------------------------------------------
mail                IN                A                    SERVER_IPV4
@                   IN                MX          10       mail.domain.tld.
@                   IN                TXT                  "v=spf1 a mx ip4:SERVER_IPV4 ~all"
mail._domainkey     IN                TXT                  "v=DKIM1; k=rsa; p=DKIM Public Key"
_dmarc              IN                TXT                  "v=DMARC1; p=reject; rua=mailto:[email protected]; ruf=mailto:[email protected]; fo=0; adkim=s; aspf=s; pct=100; rf=afrf; sp=reject"

The DKIM public key is available on host here :

/mnt/docker/mail/opendkim/domain.tld/mail.txt

Test your configuration with this website : https://www.mail-tester.com/

7 - Done, congratulation ! πŸŽ‰

At first launch, the container takes few minutes to generate SSL certificates (if needed), Diffie-Hellman parameters, DKIM keypair and update clamav database, all of this takes some time, be patient...

You can check startup logs with this command :

docker logs -f mailserver

Once it's over (5/10 minutes approximately), you can check with telnet and openssl s_client commands :

# SMTP - 25 port (MTA <-> MTA)
telnet mail.domain.tld 25

# IMAP STARTTLS - 143 port (IMAP)
openssl s_client -connect mail.domain.tld:143 -starttls imap -tlsextdebug

# SMTP SSL/TLS - 465 port (SMTPS)
openssl s_client -connect mail.domain.tld:465 -tlsextdebug

# SMTP STARTTLS - 587 port (Submission)
openssl s_client -connect mail.domain.tld:587 -starttls smtp -tlsextdebug

# IMAP SSL/TLS - 993 port (IMAPS)
openssl s_client -connect mail.domain.tld:993 -tlsextdebug

Environment variables

Variable Description Type Default value
VMAILUID vmail user id optional 1024
VMAILGID vmail group id optional 1024
OPENDKIM_KEY_LENGTH Size of your DKIM RSA key pair optional 2048
DBHOST MariaDB instance ip/hostname optional mariadb
DBUSER MariaDB database username optional postfix
DBNAME MariaDB database name optional postfix
DBPASS MariaDB database password required null
ADD_DOMAINS Add additional domains to the mailserver separated by commas (needed for dkim keys etc.) optional null
DISABLE_CLAMAV Disable virus scanning optional false
DISABLE_SPAMASSASSIN Disable SPAM checking optional false
DISABLE_SIEVE Disable ManageSieve protocol optional false
ENABLE_POSTGREY Enable Postgrey greylisting policy server optional false
ENABLE_POP3 Enable POP3 protocol optional false

If DISABLE_CLAMAV and DISABLE_SPAMASSASSIN are both set to true, Amavis is also completely disabled.

###Β Files/Folders tree

/mnt/docker
└──mail
   β”œβ”€β”€postfix
   β”‚     custom.conf
   β”œβ”€β”€postgrey
   β”‚     postgrey.db
   β”‚     ...
   β”œβ”€β”€sieve
   β”‚     default.sieve
   β”‚     default.svbin
   β”œβ”€β”€opendkim
   β”‚  β”œβ”€β”€domain.tld
   β”‚  β”‚     mail.private
   β”‚  β”‚     mail.txt
   β”œβ”€β”€ssl
   β”‚  β”œβ”€β”€dhparams
   β”‚  β”‚     dh512.pem
   β”‚  β”‚     dh2048.pem
   β”‚  β”œβ”€β”€live (Let's Encrypt or other CA)
   β”‚  β”‚  β”œβ”€β”€mail.domain.tld
   β”‚  β”‚  β”‚     privkey.pem
   β”‚  β”‚  β”‚     cert.pem
   β”‚  β”‚  β”‚     chain.pem
   β”‚  β”‚  β”‚     fullchain.pem
   β”‚  β”œβ”€β”€selfsigned (Auto-generated if no certificate found)
   β”‚  β”‚     cert.pem
   β”‚  β”‚     privkey.pem
   β”œβ”€β”€vhosts
   β”‚  β”œβ”€β”€domain.tld
   β”‚  β”‚  β”œβ”€β”€user
   β”‚  β”‚  β”‚     .dovecot.sieve -> sieve/rainloop.user.sieve
   β”‚  β”‚  β”‚     .dovecot.svbin
   β”‚  β”‚  β”‚  β”œβ”€β”€mail
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€.Archive
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€.Drafts
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€.Sent
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€.Spam
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€.Trash
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€cur
   β”‚  β”‚  β”‚  β”‚  β”œβ”€β”€new
   β”‚  β”‚  β”‚  β”‚     ...
   β”‚  β”‚  β”‚  β”œβ”€β”€sieve
   β”‚  β”‚  β”‚  β”‚     rainloop.user.sieve (if using rainloop webmail)

Let's Encrypt certificate authority

To use Let's Encrypt certificates, setup your docker-compose.yml file like this :

mailserver:
  image: hardware/mailserver
  volumes:
    - /mnt/docker/nginx/certs:/etc/letsencrypt
    ...

nginx: wonderfall/nginx
  volumes:
    - /mnt/docker/nginx/certs:/certs
    ...

Then generate Let's Encrypt certificates with xataz/letsencrypt, you can use other tools like lego if you want.

docker-compose stop nginx

docker run -it --rm \
  -v /mnt/docker/nginx/certs:/etc/letsencrypt \
  -p 80:80 -p 443:443 \
  xataz/letsencrypt \
    certonly --standalone \
    --rsa-key-size 4096 \
    --agree-tos \
    -m [email protected] \
    -d mail.domain.tld \ #Β <--- Mail FQDN is the first domain name, very important !
    -d webmail.domain.tld \
    -d postfixadmin.domain.tld

docker-compose up -d
  • ⚠️ The common name of your ssl certifcate MUST be the same as your server's FQDN (for exemple, let's encrypt live subfolder name must be egual to domainname & hostname values of docker-compose file). Don't forget to add your FQDN in command above in first position.

  • If you do not use let's encrypt, a default self-signed certificate (RSA 4096 bits SHA2) is generated here : /mnt/docker/mail/ssl/selfsigned/{cert.pem, privkey.pem}.

Another certificate authority (other than Let's Encrypt)

Put your certificates in /mnt/docker/nginx/certs/live/mail.domain.tld

⚠️ Required files in this folder :

  • privkey.pem : Private key for the certificate
  • cert.pem : Server certificate only
  • chain.pem : Root and intermediate certificates only, excluding server certificate
  • fullchain.pem : All certificates, including server certificate. This is concatenation of cert.pem and chain.pem

Then mount the volume like this :

mailserver:
  image: hardware/mailserver
  volumes:
    - /mnt/docker/nginx/certs:/etc/letsencrypt
    ...

Override postfix configuration

Postfix default configuration can be overrided providing a custom configuration file at postfix format. This can be used to also add configuration that are not in default configuration. Postfix documentation remains the best place to find configuration options.

Each line in the provided file will be loaded into Postfix. Create a new file here /mnt/docker/mail/postfix/custom.conf and add your custom options inside.

Example :

# /mnt/docker/mail/postfix/custom.conf

smtpd_banner = $myhostname ESMTP MyGreatMailServer
inet_protocols = ipv4
delay_notice_recipient = [email protected]
delay_warning_time = 2h
docker logs -f mailserver

[INFO] Override : smtpd_banner = $myhostname ESMTP MyGreatMailServer
[INFO] Override : inet_protocols = ipv4
[INFO] Override : delay_notice_recipient = [email protected]
[INFO] Override : delay_warning_time = 2h
[INFO] Custom Postfix configuration file loaded

Email client settings :

  • IMAP/SMTP username : [email protected]
  • Incoming IMAP server : mail.domain.tld (your FQDN)
  • Outgoing SMTP server : mail.domain.tld (your FQDN)
  • IMAP port : 993
  • SMTP port : 587
  • IMAP Encryption protocol : SSL/TLS
  • SMTP Encryption protocol : STARTTLS

Roadmap

  • Quota support

Contribute

  • Fork this repository
  • Create a new feature branch for a new functionality or bugfix
  • Commit your changes
  • Push your code and open a new pull request
  • Use issues for any questions

Support

https://github.com/hardware/mailserver/issues

Contact

License

The MIT License (MIT)

Copyright (c) 2016 Hardware, [email protected]

About

🐳 Simple mail server docker image with TLS and OpenDKIM/DMARC support and includes IMAP, antivirus, spam filtering, greylisting, sieve rules, supporting multiple virtual domains over MySQL backend (Postfixadmin scheme)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%