Fix the typo in path mentioned in System authentication section. It is /usr/lib/maddy, not /var/lib/maddy. |
||
---|---|---|
.github | ||
address | ||
atomicbool | ||
auth | ||
buffer | ||
check | ||
cmd | ||
config | ||
dispatcher | ||
dist | ||
dns | ||
dsn | ||
endpoint | ||
future | ||
log | ||
modify | ||
module | ||
mtasts | ||
storage/sql | ||
target | ||
testutils | ||
.build.yml | ||
.gitignore | ||
config.go | ||
dummy.go | ||
go.mod | ||
go.sum | ||
LICENSE | ||
maddy.1.scd | ||
maddy.conf | ||
maddy.conf.5.scd | ||
maddy.go | ||
README.md |
maddy
Simple, fast, secure all-in-one mail server.
⚠️ Disclaimer: maddy is in early development, many planned features are missing and bugs are waiting to eat your messages
Join ##maddy on irc.freenode.net, if you have any questions or just want to talk about maddy.
Table of contents
- Features
- Installation
- Building from source
- Quick start
- SQL-based database
- System authentication helper binaries
- Documentation
- Contributing
- License
Features
- Single binary for easy deployment
- Minimal configuration changes required to get almost complete email stack running
- MTA-STS support
- DNS sanity checks for incoming deliveries
- Built-in DKIM verification support
- Subaddressing (aka plus-addressing) support
Planned features:
- Built-in DKIM signing
- DMRAC policy support
- Built-in backscatter mitigation
- Address aliases support
- DANE support
- Storage encryption
- Automatic TLS certificates configuration using Let's Encrypt
- JMAP
Installation
Pre-built binaries for releases are available here.
Building from source
Dependencies
-
Go toolchain (1.11.4 or newer)
If your distribution ships an outdated Go version, you can use following commands to get a newer version:
go get golang.org/dl/go1.13 go1.13 download
Obviously, you need to have $GOPATH/bin ($HOME/go/bin by default) in $PATH. Then use
go1.13
instead ofgo
in commands below. -
C compiler (optional, set CGO_ENABLED env. variable to 0 to disable)
Required for SQLite3-based storage (default configuration) and PAM authentication. SQLite3 support can be disabled using nosqlite3 build tag:
GO111MODULE=on go get github.com/foxcpp/maddy/cmd/maddy@master -tags 'nosqlite3'
-
libpam (optional, not needed by default)
Used for PAM auth helper binary or direct PAM use, later is disabled by default and can be enabled using 'libpam' build tag (e.g.
go get ... -tags 'libpam nosqlite3'
)
Note: Main executable built with CGO_ENABLED=0 does not depend on any system library and can be moved freely between systems. Executable built without libpam but with CGO_ENABLED=1 (default) depends only on libc. Executable built with libpam depends on system libpam, obviously.
Building
First, make sure Go Modules support is enabled:
export GO111MODULE=on
Command to build latest commit from master branch:
go get github.com/foxcpp/maddy/cmd/maddy@master
Command to build release X.Y.Z:
go get github.com/foxcpp/maddy/cmd/maddy@vX.Y.Z
There is no need to clone this repo, go get
command will take care of it.
maddy
executable will be placed in $GOPATH/bin directory (defaults to
$HOME/go/bin).
Quick start
You need to make sure configuration is placed in /etc/maddy/maddy.conf (copy maddy.conf from this repo) and also /var/lib/maddy and /run/maddy exist and writable.
Then, simply run the executable:
maddy
You can specify custom locations for all directories and config file, so here is no need to mess with directories in your system:
maddy -config /maddy.conf -state /state -runtime /tmp
maddy will create specified directories for you.
systemd unit
Alternatively, you can use the systemd unit file from dist/ directory in this repo. It will automatically set-up user account and directories. Additionally, it will apply strict sandbox to maddy to ensure additional security.
You need a relatively new systemd version (235+) both of these things to work properly. Otherwise, you still have to manually create a user account and the state + runtime directories with read-write permissions for the maddy user.
Configuration
Start by copying contents of the maddy.conf to
/etc/maddy/maddy.conf
(default configuration location).
You need to change the following directives to your values:
tls cert_file key_file
Change to paths to TLS certificate and key.hostname
Server identifier. Put your domain here if you have only one server.$(primary_domain)
Put the "main" domain you are handling messages for here.$(local_domains)
If you have additional domains you want to accept mail for - put them here.
With that configuration you will get the following:
- SQLite-based storage for messages
- Authentication using SQLite-based virtual users DB (use imapsql-ctl to create user accounts)
- SMTP endpoint for incoming messages on 25 port.
- SMTP Submission endpoint for messages from your users, on both 587 (STARTTLS) and 465 (TLS) ports.
- IMAP endpoint for access to user mailboxes, on both 143 (STARTTLS) and 993 (TLS) ports.
- Two basic DNS checks for incoming messages
- DKIM signatures verification
- Subaddressing (aka plus-addressing) support
Configuration syntax, high-level structure, and all implemented options are documented in maddy.conf(5) man page.
Mailboxes namespacing
By default, all configured domains will share the same set of mailboxes. This means, if you use
$(local_domains) = example.com example.org
admin@example.com and admin@example.org will refer to the same mailbox.
If you want to make them separate - add auth_perdomain
and storage_perdomain
directives
below.
Note that it will require users to specify full address as username when logging in.
SQL-based database
Currently, the only supported storage and authentication DB implementation is SQL-based go-imap-sql library.
Use the following commands to install the imapsql-ctl
utility:
export GO111MODULE=on
go get github.com/foxcpp/go-imap-sql/cmd/imapsql-ctl@dev
It can be used to create/delete virtual users as well as mailboxes and messages in them.
Here is the command to use to create a new virtual user NAME
:
imapsql-ctl --driver DRIVER --dsn DSN users create NAME
Replace DRIVER and DSN with your values from maddy config.
For default configuration it is --driver sqlite3 --dsn /var/lib/maddy/all.db
.
PostgreSQL instead of SQLite
If you want to use PostgreSQL instead of SQLite 3 (e.g. you want better access concurrency), here is what you need to do:
- Install, configure and start PostgreSQL server
There is plenty of tutorials on the web. Note that you need PostgreSQL 9.6 or newer.
- Create the database and user role for maddy
psql -U postgres -c 'CREATE USER maddy'
psql -U postgres -c 'CREATE DATABASE maddy'
- Update maddy.conf to use PostgreSQL and that database
sql {
driver postgres
dsn user=maddy dbname=maddy sslmode=disable
}
Add host=
option is server is running on the different machine
(configure TLS and remove sslmode=disable
then!).
See https://godoc.org/github.com/lib/pq for driver options documentation.
- Consider using fsstore
By default, maddy will store messages in table rows. This requires lesser amount of internal bookkeeping and works fine in most cases.
However, you may want to make maddy store message in a filesystem directory instead.
To do so add fsstore
directive to the sql
config block.
You may optionally specify the directory to use instead of default (/var/lib/maddy/sql-sql-fsstore):
sql {
...
fsstore /var/lib/maddy/s3-messages
}
Documentation
Configuration reference is maintained as a single man page in the scdoc format. You can view page source here (it is readable).
Tutorials and misc articles will be added to the project wiki.
System authentication helper binaries
By default maddy is running as a unprivileged user, meaning it can't read system account passwords. There are two options:
- Run maddy as a privileged user instead (not recommended)
This way you can use maddy without messing with helper binaries, but that will also give maddy a little bit too many permissions.
- Let maddy start privileged (setuid) helper binary to perform authentication
Compile cmd/maddy-pam-helper and/or cmd/maddy-shadow-helper.
Put them into /usr/lib/maddy
and make them setuid root (there are also other
more restrictive options, check README in the executable directories).
Add use_helper
to pam
or shadow
configuration block in your config.
Modify systemd unit to use less strict sandbox and disable DynamicUser.
Contributing
License
MIT. Just do whatever you want.