Jump to content

Support Our Free and Open Source Software

Please support us financially so we may continue to keep our software free and best in class


Search the Community

Showing results for tags 'mail server'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type

Community Boards

  • Information
    • News &Updates
    • Posting Guidelines
  • Member Area
    • Introductions
    • Suggestion Box
    • Q & A
  • Development
    • devCU Projects
    • Member Dev
    • Mods and Plug-in
  • Data Centers
    • OVH
    • RedStation
    • PlusServer
    • Server Specials
  • Administration
    • OS & Server Admin
  • Commercial Clients
    • Pre-Sales Support
    • Cloud Hosting
    • Dedicated Servers
    • Shared Hosting
    • Domains
    • ES Affilates
    • Web Design
  • Resources & Education
    • Articles
    • Tutorials
    • Member Marketplace
  • Off Topic
    • Yeah Sure!
    • cHIT cHAT
  • Trash
    • Trash Can


  • Community Software
  • IPS 4.3x BitTracker
  • IPS 4.4x BitTracker
  • Auto Server Admin Script [ASAS]
  • SugarTWIG
  • LaraBit
  • LaraJax
  • LaraPM
  • LaraToastr


  • Daily Dev

Product Groups

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 1 result

  1. [Updated as of 22 AUG 2018] There are many email server install tutorials out there but none tell you how to configure the server for blocking all Spam and malicious users, while running a very secure, reliable and smooth server.. They also don't tell you how to get all aspects up and running like DCC, Pyzor, postgrey, etc.. Just running apt or yum to install these programs is not installing or configuring a mail server. The following is a culmination of 20 years of installing and configuring these servers to the point that they are 100% spam free and 100% secure from spammers and hackers. If you are not using forced TLS or your mail carrier doesn't support it than find a new carrier. 100% SSL encryption is standard and necessary in todays internet climate. This will take anywhere from 5 to as much as 10 hours to complete, test, and put into production. Depending on your skill at the command line will determine the total time. Don't have the time and want a secure and smoothly running mail server? Need an evaluation for a current server? Hire Us Using Ubuntu 18.04 but should work on any Debian based OS, You can use this to reconfigure currently installed mail servers as well that aren't doing the job. Ruining latest Bind9 for mail server DNS, Nginx 1.15.2, Percona MySQL 5.7, and PHP 7.2 (For Postifx Admin) We will be installing and configuring the following: Postfix Postfix Admin with allowed nets security Dovecot Dovecot-sieve Postgrey Amavis Spamassassin Bayes Database Pyzor Razor2 DCC OpenDKIM Letsencrypt SSL Configure UFW Firewall Custom Sieve Scripts Configure DNS for SPF | DMARC | DKIM Configure DNS Reverse for Mail Server Configure CRON jobs for bayes and rcDCC SSL First Security is first and foremost; generate your SSL with letsencrypt via certbot or have your premium cert ready. We are using the sub domain mail.domain.com for this example. Make sure to adjust all files and configurations for your SSL paths as well as domain name, directory/file paths, IP address and users where applicable. Generate a strong 2048bit dhparam.pem ( We will link to it later in Postfix / Dovecot, and Nginx ) # openssl dhparam 2048 -out /etc/ssl/certs/dhparam.pem Step one: Install Change to root user # sudo su Run an update # apt update && apt upgrade Install the required applications and dependencies. I am assuming php 7.2 [recommended] (Update the application list accordingly if other version) # apt install postfix postfix-mysql getmail4 dovecot-antispam rkhunter binutils dovecot-imapd dovecot-pop3d dovecot-mysql dovecot-sieve sudo postgrey pyzor razor amavisd-new spamassassin clamav clamav-daemon unzip bzip2 arj nomarch lzop cabextract libnet-ldap-perl libauthen-sasl-perl clamav-docs daemon libio-string-perl libio-socket-ssl-perl libnet-ident-perl zip libnet-dns-perl php7.2-fpm php7.2-mysql php7.2-curl php7.2-gd php7.2-intl php-pear php-imagick php7.2-imap php7.2-mbstring php-memcache php-sqlite3 php-apcu php7.2-tidy php7.2-xmlrpc php7.2-xml dovecot-managesieved postfix-ldap postfix-pcre sasl2-bin arj p7zip-full ripole rpm2cpio tnef unrar-free libmysqlclient-dev opendkim opendkim-tools rblcheck postfix-policyd-spf-python During install you will prompted by Postfix to choose your setup Internet Site And hostname mail.domain.com (Obviously your domain and your mail servers hostname) If you see this during install don't worry, we never set a home path so its a postgrey error and we will deal with it later. The most important part of this entire install is proper permissions for functionality as well as security, 99% of mail server issues are improper permissions,. Make sure php imap is enabled (Issues on random systems, most are good but just to make sure) # phpenmod imap Now we must install our PERL modules Enter CPAN Shell perl -MCPAN -e shell # install DBI # install DBD::mysql # install Geo::IP # install Net::CIDR::Lite # install Encode::Detect::Detector # install Net::Patricia # install NetAddr::IP # install Mail::SpamAssassin::Bayes # install Mail::SpamAssassin::Plugin::SPF # install Mail::SpamAssassin::Plugin::Shortcircuit # install Mail::SpamAssassin::CompiledRegexps::body_0 # install Mail::DKIM::Verifier # install Mail::DKIM # install Mail::SpamAssassin::Plugin::DCC Install postfix-policyd-spf-perl # sudo apt install postfix-policyd-spf-perl Enabling the Policy Service In /etc/postfix/main.cf policy-spf_time_limit = 3600s This changed the ups the policy time limit so the policy server won't time out while a message is still being processed. Add this section to /etc/postfix/master.cf for the Python script policy-spf unix - n n - - spawn user=nobody argv=/usr/sbin/postfix-policyd-spf-perl Finally, you need to add the policy service to your smtpd_recipient_restrictions in file /etc/postfix/main.cf: smtpd_recipient_restrictions = ... permit_sasl_authenticated permit_mynetworks reject_unauth_destination check_policy_service unix:private/policy-spf ...
  • Create New...