What does everyone use for self hosted email? Running iRedmail on a server but want to scan the field before I transfer to a new machine.
Got this list for reference: https://github.com/Kickball/awesome-selfhosted#email
I used to run postfix + dovecot + mysql with dmarc before ascending to ProtonMail.
>>59945995
>ProtonMail
>not self hosting
>>59946079
>not ascending
>>59946096
>trusting strangers
>>59946108
Speaking of trusting strangers.
>not personally auditing your hardware, kernel, firmware, and software completely
>>59946166
>you don't audit X, Y and Z so why be suspicious at all!
>>59946096
Trusting jews
I don't because it's a waste of fucking time unless you relay your shit through a larger service, and you might as well have a gmail or shit at that point.
I'm a dovecot/postfix fag here.
that would be nothing because you'll just get blacklisted. you don't "communicate" with anyone, you are a degenerate piece of shit
I don't. I'm not obsessed with avoiding botnets like most of /g/. If it's not an issue in my day to day life, it likely doesn't matter to me.
>>59945569
Postfix+Dovecot+Spamassassin+ClamAV+OpenDKIM.
Pay attention to use a sane postfix configuration and to avoid your mails looping indefinitely among all the softwares
>>59948583
Anything good all in one?
>>59945569
exchange. i hate myself for it. at least all my windows vms are firewalled to fuck.
why must setting up a decent linux mail server be so complicated and time consuming?
>>59947819
do you even know how blacklisting works?
>>59948583
any decent guides you can recommend?
>>59945569
SquirrelMail mustard pace
>>59947819
nah.. there are chances...
checklist for your own email server with a successful reverse...
- make sure your IP (IPv6) is clean and not listed in any RBL, use e.g. http://multirbl.valli.org/ to check
- make sure you have a correct reverse dns (ptr) entry for said IP and that ptr/hostname's A record is also valid
- make sure your MTA does not append to the message headers your client's IP (ie x-originating-ip), messages can be blocked based only on "dodgy" x-originating-ip (see eg https://major.io/2013/04/14/remove-sensitive-information-fro... )
- set up SSL properly in your MTA, there are so many providers giving away free certs nowadays
- SPF, DKIM, DMARC - set them up, properly, this site can come in handy for checking yourself https://www.mail-tester.com/
- do not share the IP of your email server with a web server running any sort of scripting engine - if it gets exploited in any way usually sending spam is what the abusers will do
- last but not least - and while I loved qmail and vpopmail - use Postfix or Exim, they are both more fit for 2016, more configurable and with much, much larger user bases and as such bigger community and documentation.
>>59945569
>>59948583
This. Also Amavisd and anything else that included in ISPConfig. Roundcube for a web interface.