workaround.org
Open in
urlscan Pro
49.13.89.249
Public Scan
Submitted URL: http://workaround.org/
Effective URL: https://workaround.org/
Submission: On September 24 via api from US — Scanned from DE
Effective URL: https://workaround.org/
Submission: On September 24 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://workaround.org/
<form role="search" method="get" class="search-form" action="https://workaround.org/">
<label for="search-field">
<span class="screen-reader-text">Search for:</span>
<input type="search" id="search-field" class="search-field" placeholder="Search..." value="" name="s" tabindex="-1">
<button class="search-submit ast-search-submit" aria-label="Search Submit">
<span hidden="">Search</span>
<i><span class="ast-icon icon-search"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" x="0px" y="0px" viewBox="-893 488 142 142" enable-background="new -888 480 142 142" xml:space="preserve">
<path d="M-787.4,568.7h-6.3l-2.4-2.4c7.9-8.7,12.6-20.5,12.6-33.1c0-28.4-22.9-51.3-51.3-51.3 c-28.4,0-51.3,22.9-51.3,51.3c0,28.4,22.9,51.3,51.3,51.3c12.6,0,24.4-4.7,33.1-12.6l2.4,2.4v6.3l39.4,39.4l11.8-11.8L-787.4,568.7 L-787.4,568.7z M-834.7,568.7c-19.7,0-35.5-15.8-35.5-35.5c0-19.7,15.8-35.5,35.5-35.5c19.7,0,35.5,15.8,35.5,35.5 C-799.3,553-815,568.7-834.7,568.7L-834.7,568.7z"></path>
</svg></span></i>
</button>
</label>
</form>
Text Content
Skip to content workaround.org * ISPmail for Debian Bookworm * News * Articles * About Search for: Search Search workaround.org Main Menu * Main Home * Miscellaneous Articles * News * Understanding the Logical Volume Manager (LVM) * ISPmail guide for Debian 11 “Bullseye” Menu Toggle * What’s new in the Bullseye guide? * Migrating from a Buster to a Bullseye server * Big picture * Types of email domains * Install Debian Bullseye on your server * Install the software packages * Creating a TLS encryption key and certificate * Prepare the database * Making Postfix get its information from the MariaDB database * Setting up Dovecot * Let Postfix send emails to Dovecot * Quotas * Testing IMAP * Webmail using Roundcube * Testing email delivery * Allow users to send outgoing email through Postfix * Filtering out spam with rspamd * DNS records * Mail client auto-configuration * Prevent spoofing using DKIM * Managing users, aliases and domains * Firewalling and brute force mitigation * FAQ (frequently asked questions) * Ansible playbook * Monitoring and backup * Success stories * ISPmail guide for Debian 12 “Bookworm” Menu Toggle * What’s new? * Migrating from your old (Bullseye) server * Big picture * Types of email domains * Installing Debian * Install packages * TLS certificate * Preparing the database * Let Postfix access MariaDB * Setting up Dovecot * Let Postfix send emails to Dovecot * Quotas * Testing IMAP * Webmail using Roundcube * Testing email delivery * Relaying outgoing emails through Postfix * Catching spam with rspamd * Setting DNS records * Prevent spoofing using DKIM * Managing users, aliases and domains * Monitoring and backup * Automatic installation with Ansible * Success stories * FAQ (frequently asked questions) * ISPmail guide for Debian Jessie Menu Toggle * What’s new in the Jessie guide? * Migrating from a Wheezy to a Jessie mail server * The big picture * Types of email domains * Install Debian Jessie on your server * Install the software packages * Creating a TLS encryption key and certificate * Setting up the Apache web server * Preparing the database * Making Postfix get its information from the MySQL database * Making Postfix send emails to Dovecot * Setting up Dovecot * Setting up Roundcube webmail * Testing email delivery * Relaying with SMTP authentication * Filtering out spam with SpamAssassin * DNS MX records * ISPmail Jessie – Postfix SMTPd restrictions * Managing users, aliases and domains * Success stories * Deploying a mail server with Ansible * Troubleshooting your mail server * ISPmail guide for Debian Stretch Menu Toggle * What’s new in the Stretch guide? * Migrating from a Jessie to a Stretch mail server * The big picture * Types of email domains * Install Debian Stretch on your server * Install the software packages * Creating a TLS encryption key and certificate * Preparing the database * Making Postfix get its information from the MySQL database * Setting up Dovecot * Making Postfix send emails to Dovecot * Testing IMAP and setting up Roundcube webmail * Testing email delivery * Relaying with SMTP authentication * Filtering out spam with rspamd * Filtering out viruses and malware * DNS MX records * Prevent spoofing with DKIM * Managing users, aliases and domains * Fighting brute force attacks * Troubleshooting your mail server * Success stories * ISPmail tutorial for Debian Wheezy Menu Toggle * Migrating from the Squeeze tutorial * Big picture * Virtual domains * Installing Debian * Installing packages * TLS’ifying your server * Preparing the database * Connecting Postfix to the database * Setting up Dovecot * Connecting Postfix to Dovecot * Testing email delivery * Authenticated SMTP * DNS – make your mail server known on the internet * Managing your mail server * Malware scanning using AMaViSd * SMTPd restrictions, SPF, DKIM and greylisting * Webmail access using Roundcube * Sending email from a dynamic IP address * Troubleshooting * Sysadmin niceties * Tracking last logins with Dovecot * Debian packages are so old * Paypal donation * Backups with rsnaphot to external USB drives * IRC * Zabbix: How escalations work * screenshots.debian.net – debshots * Trust over security in today’s internet * Reverse social engineering * Sequel model pagination with Padrino * * Limiting your childrens’ internet access effectively using OpenDNS * Using FactoryGirl to test Padrino web applications using Padrino and Sequel * Updating the BIOS on Lenovo laptops from Linux using a USB flash stick * How to use user authentication in your Padrino apps with padrino-warden * Clearing RSpec test databases with Padrino and Sequel * Your privacy checklist for the post-cloud era * Making the best of Zabbix maps * Docking and undocking Linux laptops with nVidia GPUs using disper * MySQL to PostgreSQL – a Bacula conversion odyssey * Getting help on IRC * How do I create my own Certificate Authority (CA) * Christoph’s OpenVPN Mini-FAQ * Writing Squid authenticators * Nagios plugin for checking Squid * Squid log reader * Using LDAP to authenticate Squid proxy users * How to keep your users from bypassing your proxy * Controlling how your users surf the internet with Squid * How Squid ACLs work * Prüfungsprotokoll – Praktische Informatik * Imprints/Privacy * Why you should not use Python’s easy_install carelessly on Debian * How to create a favicon for your web site * Using tcpdump and Wireshark to sniff and analyse your network traffic * Mounting flash sticks or memory cards on Debian * Bareos/Bacula Cheat Sheet * Thanks for your support * Renaming multiple files * Pipes and redirection * ISPmail on Debian Buster – your mail server workshop * What’s new in the Buster guide? * Debian packages are just so old * Migrating from a Stretch to a Buster server * Big picture * Types of email domains * Install Debian Buster on your server * Install the software packages * Creating a TLS encryption key and certificate * Prepare the database * Making Postfix get its information from the MariaDB database * Setting up Dovecot * Let Postfix send emails to Dovecot * Quotas * Testing IMAP * Webmail using Roundcube * Testing email delivery * Allow user to send outoing email through Postfix * Filtering out spam with rspamd * Blocking malware * DNS records * Mail client auto-configuration * Prevent spoofing using DKIM * Managing users, aliases and domains * Firewalling and brute force mitigation * Monitoring and backup * Success stories * Optional: Server-based mailbox encryption * Home WELCOME TO ISPMAIL – A GUIDE TO YOUR OWN MAIL SERVER ISPmail is a free but extensive do-it-yourself guide to help you build a fully-functional mail server from 100% open-source components. It is based on Debian GNU/Linux. Light enough for your friends and family. Or powerful enough for professional use. Start with Debian 11 Bullseye (Legacy.) Start with Debian 12 Bookworm (Recommended.) WHY WOULD YOU FOLLOW THIS GUIDE? EDUCATIONAL This is not a simple copy/paste walkthrough. You will learn the technical details of email exchange on the internet. And you will understand how the different pieces of software work and interact. FREE This guide is a not-for-profit fun project. You only need to get an internet domain and a cheap virtual server (~5€/$ per month). Powered by the desire to make the internet a bit more decentralized. SINCE 2003 This guide has been maintained for over 20 years. Made for nerds who want a boring stable mail server that just works with little maintenance. But with all the features that make it fun. YOU’RE NOT ALONE You won’t get stuck. Every page of this guide has a comment section to ask questions and discuss the topic. For real-time help you can join our support chat on Matrix. OPEN SOURCE All software that is used is completely open-source. No costs. Your new friends are Debian, Postfix, Dovecot, Roundcube, MariaDB, Apache and rspamd. OPEN STANDARDS Only standard protocols are used. IMAP, POP3, SMTP and HTTPS. No proprietary protocols. No vendor lock-in. No public cloud. WHAT WOULD YOUR MAIL SERVER DO? RECEIVE Your mail server can receive emails for an unlimited number of domains and users. The only limit is your disk space. RELAY The server will accept and forward emails from your users to any other mail server on the internet. It will use encrypted connections whenever possible. SERVE Power users will prefer to use a full-fledged mail programm like Thunderbird to read their emails. So your server will provide access through IMAP and POP3. WEBMAIL Your users just want a simple way to access their emails? With Roundcube they will need nothing but a web browser to access their inbox. FILTER Keep most of the spam and phishing emails out of your inbox. And let your users configure their own mail filtering rules for mailing lists, auto-responders or to file common emails automatically on the server. AUTOMATIC SIGNING All outgoing email can be signed by the server using DKIM (domain keys). This will improve the deliverability and allow others to detect spoofing attempts. If you feel you want to give back something then help others use open-source software, donate to an animal shelter/rescue or just send a small donation. Copyright © 2024 Christoph Haas. All content on workaround.org can be used under the terms of the Creative Commons BY-NC-SA license. Penguin images based on AI art because I suck at drawing. Scroll to Top