mirror of
https://github.com/docker-mailserver/docker-mailserver.git
synced 2024-01-19 02:48:50 +00:00
Merge branch 'master' into release/v13.3
This commit is contained in:
commit
cc86765917
|
@ -19,6 +19,11 @@ All notable changes to this project will be documented in this file. The format
|
||||||
- Enable via the ENV `ENABLE_MTA_STS=1`
|
- Enable via the ENV `ENABLE_MTA_STS=1`
|
||||||
- Supported by major email service providers like Gmail, Yahoo and Outlook.
|
- Supported by major email service providers like Gmail, Yahoo and Outlook.
|
||||||
|
|
||||||
|
### Added
|
||||||
|
|
||||||
|
- **Docs:**
|
||||||
|
- An example for how to bind outbound SMTP connections to a specific network interface ([#3465](https://github.com/docker-mailserver/docker-mailserver/pull/3465))
|
||||||
|
|
||||||
### Updates
|
### Updates
|
||||||
|
|
||||||
- **Tests**:
|
- **Tests**:
|
||||||
|
@ -40,6 +45,8 @@ All notable changes to this project will be documented in this file. The format
|
||||||
|
|
||||||
### Fixes
|
### Fixes
|
||||||
|
|
||||||
|
- **Setup:**
|
||||||
|
- `setup` CLI - `setup dkim domain` now creates the keys files with the user owning the key directory ([#3783](https://github.com/docker-mailserver/docker-mailserver/pull/3783))
|
||||||
- **Dovecot:**
|
- **Dovecot:**
|
||||||
- During container startup for Dovecot Sieve, `.sievec` source files compiled to `.svbin` now have their `mtime` adjusted post setup to ensure it is always older than the associated `.svbin` file. This avoids superfluous error logs for sieve scripts that don't actually need to be compiled again ([#3779](https://github.com/docker-mailserver/docker-mailserver/pull/3779))
|
- During container startup for Dovecot Sieve, `.sievec` source files compiled to `.svbin` now have their `mtime` adjusted post setup to ensure it is always older than the associated `.svbin` file. This avoids superfluous error logs for sieve scripts that don't actually need to be compiled again ([#3779](https://github.com/docker-mailserver/docker-mailserver/pull/3779))
|
||||||
- **Internal:**
|
- **Internal:**
|
||||||
|
|
|
@ -0,0 +1,68 @@
|
||||||
|
---
|
||||||
|
title: 'Use Cases | Binding outbound SMTP to a specific network'
|
||||||
|
hide:
|
||||||
|
- toc
|
||||||
|
---
|
||||||
|
|
||||||
|
!!! warning "Advice not extensively tested"
|
||||||
|
|
||||||
|
This configuration advice is a community contribution which has only been verified as a solution when using `network: host`, where you have direct access to the host interfaces.
|
||||||
|
|
||||||
|
It may be applicable in other network modes if the container has control of the outbound IPs to bind to. This is not the case with bridge networks that typically bind to a private range network for containers which are bridged to a public interface via Docker.
|
||||||
|
|
||||||
|
If your Docker host is running multiple IPv4 and IPv6 IP-addresses, it may be beneficial to bind outgoing SMTP connections to specific IP-address / interface.
|
||||||
|
|
||||||
|
- When a mail is sent outbound from DMS, it greets the MTA it is connecting to with a EHLO (DMS FQDN) which might be verified against the IP resolved, and that a `PTR` record for that IP resolves an address back to the same IP.
|
||||||
|
- A similar check with SPF can be against the envelope-sender address which may verify a DNS record like MX / A is valid (_or a similar restriction check from an MTA like [Postfix has with `reject_unknown_sender`][gh-pr::3465::comment-restrictions]_).
|
||||||
|
- If the IP address is inconsistent for those connections from DMS, these DNS checks are likely to fail.
|
||||||
|
|
||||||
|
This can be configured by [overriding the default Postfix configurations][docs::overrides-postfix] DMS provides. Create `postfix-master.cf` and `postfix-main.cf` files for your config volume (`docker-data/dms/config`).
|
||||||
|
|
||||||
|
In `postfix-main.cf` you'll have to set the [`smtp_bind_address`][postfix-docs::smtp-bind-address-ipv4] and [`smtp_bind_address6`][postfix-docs::smtp-bind-address-ipv6]
|
||||||
|
to the respective IP-address on the server you want to use.
|
||||||
|
|
||||||
|
[docs::overrides-postfix]: ../../config/advanced/override-defaults/postfix.md
|
||||||
|
[postfix-docs::smtp-bind-address-ipv4]: https://www.postfix.org/postconf.5.html#smtp_bind_address
|
||||||
|
[postfix-docs::smtp-bind-address-ipv6]: https://www.postfix.org/postconf.5.html#smtp_bind_address6
|
||||||
|
|
||||||
|
!!! example
|
||||||
|
|
||||||
|
=== "Contributed solution"
|
||||||
|
|
||||||
|
```title="postfix-main.cf"
|
||||||
|
smtp_bind_address = 198.51.100.42
|
||||||
|
smtp_bind_address6 = 2001:DB8::42
|
||||||
|
```
|
||||||
|
|
||||||
|
!!! bug "Inheriting the bind from `main.cf` can misconfigure services"
|
||||||
|
|
||||||
|
One problem when setting `smtp_bind_address` in `main.cf` is that it will be inherited by any services in `master.cf` that extend the `smtp` transport. One of these is `smtp-amavis`, which is explicitly configured to listen / connect via loopback (localhost / `127.0.0.1`).
|
||||||
|
|
||||||
|
A `postfix-master.cf` override can workaround that issue by ensuring `smtp-amavis` binds to the expected internal IP:
|
||||||
|
|
||||||
|
```title="postfix-master.cf"
|
||||||
|
smtp-amavis/unix/smtp_bind_address=127.0.0.1
|
||||||
|
smtp-amavis/unix/smtp_bind_address6=::1
|
||||||
|
```
|
||||||
|
|
||||||
|
=== "Alternative (unverified)"
|
||||||
|
|
||||||
|
A potentially better solution might be to instead [explicitly set the `smtp_bind_address` override on the `smtp` transport service][gh-pr::3465::alternative-solution]:
|
||||||
|
|
||||||
|
```title="postfix-master.cf"
|
||||||
|
smtp/inet/smtp_bind_address = 198.51.100.42
|
||||||
|
smtp/inet/smtp_bind_address6 = 2001:DB8::42
|
||||||
|
```
|
||||||
|
|
||||||
|
If that avoids the concern with `smtp-amavis`, you may still need to additionally override for the [`relay` transport][gh-src::postfix-master-cf::relay-transport] as well if you have configured DMS to relay mail.
|
||||||
|
|
||||||
|
!!! note "IP addresses for documentation"
|
||||||
|
|
||||||
|
IP addresses shown in above examples are placeholders, they are IP addresses reserved for documentation by IANA (_[RFC-5737 (IPv4)][rfc-5737] and [RFC-3849 (IPv6)][rfc-3849]_). Replace them with the IP addresses you want DMS to send mail through.
|
||||||
|
|
||||||
|
[rfc-5737]: https://datatracker.ietf.org/doc/html/rfc5737
|
||||||
|
[rfc-3849]: https://datatracker.ietf.org/doc/html/rfc3849
|
||||||
|
|
||||||
|
[gh-pr::3465::comment-restrictions]: https://github.com/docker-mailserver/docker-mailserver/pull/3465#discussion_r1458114528
|
||||||
|
[gh-pr::3465::alternative-solution]: https://github.com/docker-mailserver/docker-mailserver/pull/3465#issuecomment-1678107233
|
||||||
|
[gh-src::postfix-master-cf::relay-transport]: https://github.com/docker-mailserver/docker-mailserver/blob/9cdbef2b369fb4fb0f1b4e534da8703daf92abc9/target/postfix/master.cf#L65
|
|
@ -167,6 +167,7 @@ nav:
|
||||||
- 'Customize IMAP Folders': examples/use-cases/imap-folders.md
|
- 'Customize IMAP Folders': examples/use-cases/imap-folders.md
|
||||||
- 'iOS Mail Push Support': examples/use-cases/ios-mail-push-support.md
|
- 'iOS Mail Push Support': examples/use-cases/ios-mail-push-support.md
|
||||||
- 'Lua Authentication': examples/use-cases/auth-lua.md
|
- 'Lua Authentication': examples/use-cases/auth-lua.md
|
||||||
|
- 'Bind outbound SMTP to a specific network': examples/use-cases/bind-smtp-network-interface.md
|
||||||
- 'FAQ' : faq.md
|
- 'FAQ' : faq.md
|
||||||
- 'Contributing':
|
- 'Contributing':
|
||||||
- 'General Information': contributing/general.md
|
- 'General Information': contributing/general.md
|
||||||
|
|
|
@ -144,6 +144,9 @@ while read -r DKIM_DOMAIN; do
|
||||||
--directory="/tmp/docker-mailserver/opendkim/keys/${DKIM_DOMAIN}"
|
--directory="/tmp/docker-mailserver/opendkim/keys/${DKIM_DOMAIN}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# fix permissions to use the same user:group as /tmp/docker-mailserver/opendkim/keys
|
||||||
|
chown -R "$(stat -c '%U:%G' /tmp/docker-mailserver/opendkim/keys)" "/tmp/docker-mailserver/opendkim/keys/${DKIM_DOMAIN}"
|
||||||
|
|
||||||
# write to KeyTable if necessary
|
# write to KeyTable if necessary
|
||||||
KEYTABLEENTRY="${SELECTOR}._domainkey.${DKIM_DOMAIN} ${DKIM_DOMAIN}:${SELECTOR}:/etc/opendkim/keys/${DKIM_DOMAIN}/${SELECTOR}.private"
|
KEYTABLEENTRY="${SELECTOR}._domainkey.${DKIM_DOMAIN} ${DKIM_DOMAIN}:${SELECTOR}:/etc/opendkim/keys/${DKIM_DOMAIN}/${SELECTOR}.private"
|
||||||
if [[ ! -f "/tmp/docker-mailserver/opendkim/KeyTable" ]]; then
|
if [[ ! -f "/tmp/docker-mailserver/opendkim/KeyTable" ]]; then
|
||||||
|
|
Loading…
Reference in a new issue