Finished migrating the last service to my us-east openbsd hetzner vps from the previous finland freebsd vps (for much better latency). All that's left is setting up spamd. I previously used rspamd, but I wanted to try using what was already in base.
I completely forgot to post about the OpenSMTPD 7.6 release! I'm so late that we also did 7.6.0p1 in the meantime, but that's only because I forgot a few files in the tarball
Among a few goodies, please remember to update the external tables if you're using any. The OpenSMTPD-extras package was split into per-tables repositories, and the communication protocol was changed. Once the executables are updated, no further changes are needed!
On OpenBSD, that means a `pkg_delete opensmtpd-extra` and then install right table, for example `pkg_add opensmtpd-table-passwd` for table-passwd.
Does anyone know of a good DMARC verifier for #OpenSMTPD? Or should I continue writing my own.
OK #opensmtpd aficionados. I've read the docs, but can' figure this out. Help!
I send a colleague and email the other day, but he didn't get it due to some DNS-related breakage on his side.
On my side this triggered an immediate:
```
... result="PermFail" stat="Domain does not exist"
```
But I didn't get any bounce email telling me that the email had been dropped.
Is there a way to have opensmtpd send me an email informing me of the permfail?
OpenSMTPD table protocol changes, now with the backstory https://www.undeadly.org/cgi?action=article;sid=20240503110540 #openbsd #opensmtpd #smtp #email #tables #protocol
It's official: the new email hosting service I'll be launching will run on OpenBSD as well. The two OpenSMTPD SMTP servers will operate on two OpenBSD installations.
Sharing some technical details about how I'm setting up the hosted email service. It will not be a service of BSD Cafe but tied to my own business. It will run entirely on BSD systems and on bare metal, NOT on "cloud" VPS. It will use FreeBSD jails or OpenBSD or NetBSD VMs (but on bhyve, on a leased server - I do not want user data to be stored on disks managed by others). The services (opensmtpd and rspamd, dovecot, redis, mysql, etc.) will run on separate jails/VMs, so compromising one service will NOT put the others at risk. Emails will be stored on encrypted ZFS datasets - so all emails are encrypted at rest - and only dovecot will have access to the mail datasets. I'm also considering the possibility of encrypting individual emails with the user's login password - but I still have to thoroughly test this. The setup will be fully redundant (double mx for SMTP, a domain for external IMAP access that will be managed through smart DNS - which will distribute the connections on the DNS side and, in case of a server down, will stop resolving its IP, sending all the connections to the other. Obviously, everything will be accessible in both ipv4 and ipv6 and in two different European countries, on two different providers. Synchronization will occur through dovecot's native sync (extremely stable and tested). All technical choices will be clearly explained - the goal of this service is to provide maximum transparency to users on how things will be handled.
#OpenSMTPD test patch for #SMTP Smuggling - Spoofing E-Mails Worldwide