Files
chasquid/docs/howto.md
Alberto Bertogli 5f58b942f4 docs: Update how-to with new links and fix mda-lmtp path
This patch adds a new link to the RBL checking suggestion, since the
existing one doesn't work with IPv6, and it's important to get good
coverage.

While at it, it also fixes the path to mda-lmtp, which was wrong before.
2021-03-15 18:32:22 +00:00

229 lines
7.1 KiB
Markdown

# chasquid how-to guide
This is a practical guide for setting up an email server for personal or small
groups use. It does not contain many explanations, but includes links to more
detailed references where possible.
While a lot of the contents are generic, for simplicity it will use:
- [Debian] as base operating system ([Ubuntu] also works)
- [Dovecot] for [POP3]+[IMAP]
- [chasquid] for [SMTP]
- [Let's Encrypt] for [TLS] certificates
[Debian]: https://debian.org
[Ubuntu]: https://ubuntu.com
[Dovecot]: https://dovecot.org
[chasquid]: https://blitiri.com.ar/p/chasquid
[Let's Encrypt]: https://letsencrypt.org
[POP3]: https://en.wikipedia.org/wiki/Post_Office_Protocol
[IMAP]: https://en.wikipedia.org/wiki/Internet_Message_Access_Protocol
[SMTP]: https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
[TLS]: https://en.wikipedia.org/wiki/Transport_Layer_Security
## Example data
This guide will use the following data for illustration purposes, replace them
with your own where appropriate.
- Domain name: `example.com`.
- IPv4 address of your mail server: `198.51.100.7`.
- IPv6 address of your mail server: `2001:db8::7`.
Note IPv6 is optional but highly encouraged, and supported by most providers.
## Getting a server
You first need to have a server to use. This could be an existing one (for
example, if you already have one where you host HTTP), doesn't have to be
exclusive for email.
In this guide we will use a separate server, mostly for clarity.
For small groups the size of the server does not matter, any small VPS
(virtual private server) will do just fine.
Specifically for hosting email servers, there are some things to check when
selecting a provider:
- Make sure they allow traffic on TCP port 25 (SMTP). While almost all VPS
and dedicated server providers are fine, some "cloud" providers (like
Google Cloud) block port 25, which is used for sending and receiving mails.
- Once you get a server, make sure the IP addresses are not listed in any
[blackhole lists].
There are many services to check them, for example [the
Anti-Abuse project] or [multirbl.valli.org].
Remember to update your server regularly, setting up [unattended upgrades] is
highly recommended.
[the Anti-Abuse project]: http://www.anti-abuse.org/multi-rbl-check/
[blackhole lists]: https://en.wikipedia.org/wiki/DNSBL
[unattended upgrades]: https://wiki.debian.org/UnattendedUpgrades
[multirbl.valli.org]: http://multirbl.valli.org/
## DNS
Set up the following DNS records for `example.com`. This is usually done
either in your DNS server, or in the user interface of your DNS provider.
```
; Assign "mail.example.com" to the server's IP addresses.
; Replace these with the ones for your server.
mail A 198.51.100.7
mail AAAA 2001:db8::7
; The mail server for example.com is mail.example.com.
@ MX 10 mail
; Use SPF to say that the servers in "MX" above are allowed to send email
; for this domain, and nobody else.
@ TXT "v=spf1 mx -all"
```
Finally, you should go to your server provider and configure the "reverse DNS"
(also known as "PTR") for the IP addresses to be to "mail.example.com". This
is important, as some spam checkers will consider it a factor.
*References:
[A record](https://en.wikipedia.org/wiki/A_record),
[MX record](https://en.wikipedia.org/wiki/MX_record),
[Sender Policy Framework (SPF)](https://en.wikipedia.org/wiki/Sender_Policy_Framework).*
## TLS certificate
[TLS] certificates are needed to send and receive email securely.
[letsencrypt] will provide us with a free certificate, which needs to be
renewed every 90 days, so the following relies on automatic renewal.
Note `certbot` is the recommended letsencrypt command line client.
```shell
sudo apt install certbot acl
# Obtain a TLS certificate for mail.example.com.
sudo certbot certonly --standalone -d mail.example.com
# Give chasquid access to the certificates.
# Dovecot does not need this as it reads them as root.
sudo setfacl -R -m u:chasquid:rX /etc/letsencrypt/{live,archive}
# Automatically restart the daemons after each certificate renewal.
sudo mkdir -p /etc/letsencrypt/renewal-hooks/post
cat <<EOF | sudo tee /etc/letsencrypt/renewal-hooks/post/restart
#!/bin/bash
systemctl restart chasquid
systemctl restart dovecot
EOF
sudo chmod +x /etc/letsencrypt/renewal-hooks/post/restart
```
[TLS]: https://en.wikipedia.org/wiki/Transport_Layer_Security
[letsencrypt]: https://letsencrypt.org
## Configure dovecot
First, install dovecot, and let chasquid use it for authorizing users. That
way, you will only use a single system for managing users (dovecot).
```shell
sudo apt install dovecot-imapd dovecot-pop3d dovecot-lmtpd
cat <<EOF | sudo tee /etc/dovecot/conf.d/11-chasquid.conf
# Allow chasquid to authorize users via dovecot.
service auth {
unix_listener auth-chasquid-userdb {
mode = 0660
user = chasquid
}
unix_listener auth-chasquid-client {
mode = 0660
user = chasquid
}
}
EOF
```
You will need to configure dovecot authentication depending on your needs.
For example, if you want to use only system users, or virtual users.
See the `/etc/dovecot/conf.d/10-auth.conf` file, and the [dovecot
documentation](https://wiki.dovecot.org/HowTo/SimpleVirtualInstall) for more
details.
## Configure chasquid
```shell
sudo apt install chasquid
sudo setfacl -R -m u:chasquid:rX /etc/chasquid/
# Use the certificates obtained from certbot.
sudo mv /etc/chasquid/certs/ /etc/chasquid/certs-orig
sudo ln -s /etc/letsencrypt/live/ /etc/chasquid/certs
# Make chasquid accept mail for "example.com".
sudo mkdir -p /etc/chasquid/domains/example.com
# Tell chasquid to deliver local mails to dovecot, and use it for
# authentication.
cat <<EOF | sudo tee -a /etc/chasquid/chasquid.conf
# Deliver email via lmtp to dovecot.
mail_delivery_agent_bin: "/usr/bin/mda-lmtp"
mail_delivery_agent_args: "--addr"
mail_delivery_agent_args: "/run/dovecot/lmtp"
mail_delivery_agent_args: "-f"
mail_delivery_agent_args: "%from%"
mail_delivery_agent_args: "-d"
mail_delivery_agent_args: "%to_user%"
# Use dovecot authentication.
dovecot_auth: true
EOF
```
## Add users
With this configuration, chasquid will use dovecot to manage users, so refer
to the [dovecot documentation](https://wiki.dovecot.org/BasicConfiguration)
for the details.
You can also add chasquid-specific users with `chasquid-util user-add`.
## Additional domains
To make chasquid manage an additional domain `otherdomain.com`, first add the
following records to `otherdomain.com`:
```
@ MX 10 mail.example.com
@ TXT "v=spf1 mx -all"
```
Then, tell chasquid about it by running `mkdir
/etc/chasquid/domains/otherdomain.com`. Don't forget to restart it afterwards.
Alternatively, you can use a different MX record, as long as you can get
chasquid a certificate for it.
## Optional software
- To use [SpamAssassin] to filter spam, run `apt install spamassassin spamc`.
- To use [ClamAV] to filter viruses, run `apt install clamdscan`.
That's all it takes. chasquid default hooks will pass incoming mail through
both if (and only if) they are installed.
[SpamAssassin]: https://spamassassin.apache.org/
[ClamAV]: https://www.clamav.net/