workaround.org Open in urlscan Pro
49.13.89.249  Public Scan

Submitted URL: http://workaround.org/
Effective URL: https://workaround.org/
Submission: On May 22 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://workaround.org/

<form role="search" method="get" class="search-form" action="https://workaround.org/">
  <label for="search-field">
    <span class="screen-reader-text">Search for:</span>
    <input type="search" id="search-field" class="search-field" placeholder="Search..." value="" name="s" tabindex="-1">
    <button class="search-submit ast-search-submit" aria-label="Search Submit">
      <span hidden="">Search</span>
      <i><span class="ast-icon icon-search"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" x="0px" y="0px" viewBox="-893 488 142 142" enable-background="new -888 480 142 142" xml:space="preserve">
						  <path d="M-787.4,568.7h-6.3l-2.4-2.4c7.9-8.7,12.6-20.5,12.6-33.1c0-28.4-22.9-51.3-51.3-51.3  c-28.4,0-51.3,22.9-51.3,51.3c0,28.4,22.9,51.3,51.3,51.3c12.6,0,24.4-4.7,33.1-12.6l2.4,2.4v6.3l39.4,39.4l11.8-11.8L-787.4,568.7  L-787.4,568.7z M-834.7,568.7c-19.7,0-35.5-15.8-35.5-35.5c0-19.7,15.8-35.5,35.5-35.5c19.7,0,35.5,15.8,35.5,35.5  C-799.3,553-815,568.7-834.7,568.7L-834.7,568.7z"></path>
						  </svg></span></i>
    </button>
  </label>
</form>

Text Content

Skip to content
workaround.org
 * ISPmail for Debian Bookworm
 * News
 * Articles
 * About

Search for: Search
Search
workaround.org
Main Menu
 * Main Home
 * Miscellaneous Articles
 * News
 * Understanding the Logical Volume Manager (LVM)
 * ISPmail guide for Debian 11 “Bullseye” Menu Toggle
   * What’s new in the Bullseye guide?
   * Migrating from a Buster to a Bullseye server
   * Big picture
   * Types of email domains
   * Install Debian Bullseye on your server
   * Install the software packages
   * Creating a TLS encryption key and certificate
   * Prepare the database
   * Making Postfix get its information from the MariaDB database
   * Setting up Dovecot
   * Let Postfix send emails to Dovecot
   * Quotas
   * Testing IMAP
   * Webmail using Roundcube
   * Testing email delivery
   * Allow users to send outgoing email through Postfix
   * Filtering out spam with rspamd
   * DNS records
   * Mail client auto-configuration
   * Prevent spoofing using DKIM
   * Managing users, aliases and domains
   * Firewalling and brute force mitigation
   * FAQ (frequently asked questions)
   * Ansible playbook
   * Monitoring and backup
   * Success stories
 * ISPmail guide for Debian 12 “Bookworm” Menu Toggle
   * What’s new?
   * Migrating from your old (Bullseye) server
   * Big picture
   * Types of email domains
   * Installing Debian
   * Install packages
   * TLS certificate
   * Preparing the database
   * Let Postfix access MariaDB
   * Setting up Dovecot
   * Let Postfix send emails to Dovecot
   * Quotas
   * Testing IMAP
   * Webmail using Roundcube
   * Testing email delivery
   * Relaying outgoing emails through Postfix
   * Catching spam with rspamd
   * Setting DNS records
   * Prevent spoofing using DKIM
   * Managing users, aliases and domains
   * Monitoring and backup
   * Automatic installation with Ansible
   * Success stories
   * FAQ (frequently asked questions)
 * ISPmail guide for Debian Jessie Menu Toggle
   * What’s new in the Jessie guide?
   * Migrating from a Wheezy to a Jessie mail server
   * The big picture
   * Types of email domains
   * Install Debian Jessie on your server
   * Install the software packages
   * Creating a TLS encryption key and certificate
   * Setting up the Apache web server
   * Preparing the database
   * Making Postfix get its information from the MySQL database
   * Making Postfix send emails to Dovecot
   * Setting up Dovecot
   * Setting up Roundcube webmail
   * Testing email delivery
   * Relaying with SMTP authentication
   * Filtering out spam with SpamAssassin
   * DNS MX records
   * ISPmail Jessie – Postfix SMTPd restrictions
   * Managing users, aliases and domains
   * Success stories
   * Deploying a mail server with Ansible
   * Troubleshooting your mail server
 * ISPmail guide for Debian Stretch Menu Toggle
   * What’s new in the Stretch guide?
   * Migrating from a Jessie to a Stretch mail server
   * The big picture
   * Types of email domains
   * Install Debian Stretch on your server
   * Install the software packages
   * Creating a TLS encryption key and certificate
   * Preparing the database
   * Making Postfix get its information from the MySQL database
   * Setting up Dovecot
   * Making Postfix send emails to Dovecot
   * Testing IMAP and setting up Roundcube webmail
   * Testing email delivery
   * Relaying with SMTP authentication
   * Filtering out spam with rspamd
   * Filtering out viruses and malware
   * DNS MX records
   * Prevent spoofing with DKIM
   * Managing users, aliases and domains
   * Fighting brute force attacks
   * Troubleshooting your mail server
   * Success stories
 * ISPmail tutorial for Debian Wheezy Menu Toggle
   * Migrating from the Squeeze tutorial
   * Big picture
   * Virtual domains
   * Installing Debian
   * Installing packages
   * TLS’ifying your server
   * Preparing the database
   * Connecting Postfix to the database
   * Setting up Dovecot
   * Connecting Postfix to Dovecot
   * Testing email delivery
   * Authenticated SMTP
   * DNS – make your mail server known on the internet
   * Managing your mail server
   * Malware scanning using AMaViSd
   * SMTPd restrictions, SPF, DKIM and greylisting
   * Webmail access using Roundcube
   * Sending email from a dynamic IP address
   * Troubleshooting
   * Sysadmin niceties
   * Tracking last logins with Dovecot
 * Debian packages are so old
 * Paypal donation
 * Backups with rsnaphot to external USB drives
 * IRC
 * Zabbix: How escalations work
 * screenshots.debian.net – debshots
 * Trust over security in today’s internet
 * Reverse social engineering
 * Sequel model pagination with Padrino
 * 
 * Limiting your childrens’ internet access effectively using OpenDNS
 * Using FactoryGirl to test Padrino web applications using Padrino and Sequel
 * Updating the BIOS on Lenovo laptops from Linux using a USB flash stick
 * How to use user authentication in your Padrino apps with padrino-warden
 * Clearing RSpec test databases with Padrino and Sequel
 * Your privacy checklist for the post-cloud era
 * Making the best of Zabbix maps
 * Docking and undocking Linux laptops with nVidia GPUs using disper
 * MySQL to PostgreSQL – a Bacula conversion odyssey
 * Getting help on IRC
 * How do I create my own Certificate Authority (CA)
 * Christoph’s OpenVPN Mini-FAQ
 * Writing Squid authenticators
 * Nagios plugin for checking Squid
 * Squid log reader
 * Using LDAP to authenticate Squid proxy users
 * How to keep your users from bypassing your proxy
 * Controlling how your users surf the internet with Squid
 * How Squid ACLs work
 * Prüfungsprotokoll – Praktische Informatik
 * Imprints/Privacy
 * Why you should not use Python’s easy_install carelessly on Debian
 * How to create a favicon for your web site
 * Using tcpdump and Wireshark to sniff and analyse your network traffic
 * Mounting flash sticks or memory cards on Debian
 * Bareos/Bacula Cheat Sheet
 * Thanks for your support
 * Renaming multiple files
 * Pipes and redirection
 * ISPmail on Debian Buster – your mail server workshop
 * What’s new in the Buster guide?
 * Debian packages are just so old
 * Migrating from a Stretch to a Buster server
 * Big picture
 * Types of email domains
 * Install Debian Buster on your server
 * Install the software packages
 * Creating a TLS encryption key and certificate
 * Prepare the database
 * Making Postfix get its information from the MariaDB database
 * Setting up Dovecot
 * Let Postfix send emails to Dovecot
 * Quotas
 * Testing IMAP
 * Webmail using Roundcube
 * Testing email delivery
 * Allow user to send outoing email through Postfix
 * Filtering out spam with rspamd
 * Blocking malware
 * DNS records
 * Mail client auto-configuration
 * Prevent spoofing using DKIM
 * Managing users, aliases and domains
 * Firewalling and brute force mitigation
 * Monitoring and backup
 * Success stories
 * Optional: Server-based mailbox encryption

 * Home


WELCOME TO ISPMAIL – A GUIDE TO YOUR OWN MAIL SERVER

ISPmail is a free but extensive do-it-yourself guide to help you build a
fully-functional mail server from 100% open-source components. It is based on
Debian GNU/Linux. Light enough for your friends and family. Or powerful enough
for professional use.

Start with
Debian 11
Bullseye

(Legacy.)

Start with
Debian 12
Bookworm

(Recommended.)




WHY WOULD YOU FOLLOW THIS GUIDE?


EDUCATIONAL

This is not a simple copy/paste walkthrough. You will learn the technical
details of email exchange on the internet. And you will understand how the
different pieces of software work and interact.


FREE

This guide is a not-for-profit fun project. You only need to get an internet
domain and a cheap virtual server (~5€/$ per month). Powered by the desire to
make the internet a bit more decentralized.


SINCE 2003

This guide has been maintained for over 20 years. Made for nerds who want a
boring stable mail server that just works with little maintenance. But with all
the features that make it fun.


YOU’RE NOT ALONE

You won’t get stuck. Every page of this guide has a comment section to ask
questions and discuss the topic. For real-time help you can join our support
chat on Matrix.


OPEN SOURCE

All software that is used is completely open-source. No costs. Your new friends
are Debian, Postfix, Dovecot, Roundcube, MariaDB, Apache and rspamd.


OPEN STANDARDS

Only standard protocols are used. IMAP, POP3, SMTP and HTTPS. No proprietary
protocols. No vendor lock-in. No public cloud.


WHAT WOULD YOUR MAIL SERVER DO?


RECEIVE

Your mail server can receive emails for an unlimited number of domains and
users. The only limit is your disk space.


RELAY

The server will accept and forward emails from your users to any other mail
server on the internet. It will use encrypted connections whenever possible.


SERVE

Power users will prefer to use a full-fledged mail programm like Thunderbird to
read their emails. So your server will provide access through IMAP and POP3.


WEBMAIL

Your users just want a simple way to access their emails? With Roundcube they
will need nothing but a web browser to access their inbox.


FILTER

Keep most of the spam and phishing emails out of your inbox. And let your users
configure their own mail filtering rules for mailing lists, auto-responders or
to file common emails automatically on the server.


AUTOMATIC SIGNING

All outgoing email can be signed by the server using DKIM (domain keys). This
will improve the deliverability and allow others to detect spoofing attempts.

If you feel you want to give back something then help others use open-source
software, donate to an animal shelter/rescue or just send a small donation.

Copyright © 2024 Christoph Haas. All content on workaround.org can be used under
the terms of the Creative Commons BY-NC-SA license. Penguin images based on AI
art because I suck at drawing.

Scroll to Top