How to Build Your Own E Mail Server using Ubuntu Server 14.04

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hey everyone Robert with odd random thoughts and today we're doing something a little different as you can see I have my ugly mug there on the screen I thought it would be kind of nice to get a little more personal so we could or at least y'all could take a look at who's talking to you got my good old cup of joe here and ready to dive into another tutorial as I talked about in one of my previous videos I wanted to go over how to create your email server using a boon to Linux and so that's what we're going to do today now I would like to mention that well actually I had started making a video on this before and I actually went all the way through it and after I was going through the editing process and listening to it I kind of realized that I did a little too much rambling and I'm starting to do it again already but it's it's only because creating mail server is not just the simplest of tasks because there are so many variations of configurations that you can use so what we're going to do first is get the mail server up and running and we're going to get it running with all available ports so we can have all s MTP will have the 25 587 995 993 all the IMAP ports everything is going to be available to you so at that point that's probably where we'll leave off when we get to that point and you can choose what to open on your firewall as far as what protocols which ports you want to use on your mail server say you want to use TLS and but you don't want to use a standard 25 port for submission say you want to use 587 then you can open the appropriate ports to do just that and if you don't want to be running an IMAP server and a pop3 server then you can kind of take your pick on on how you want to do that and so let's let's go ahead and kind of get started here I have the terminal up here on the screen and we're going to be using postfix we're going to be using that for sending mail and we're going to be using dovecot for receiving mail now we're going we're not going to set up a webmail client of any kind but when you get through with this you will be able to create an account in let's say Thunderbird or Outlook and it should connect right up to your server as long as your firewalls configured properly and all that good stuff now keep in mind if you're going to make a I know I'm rambling but I need to tell you all this if you're going to make a production mail server that you can actually use outside of your home network outside of the local LAN then you're going to need to own your domain name so like in this this video here we'll probably make a like Robert comm will be our email domain so I would need to own that domain and in my registrar control panel I would need to set up MX records and pointer records for my public IP address to point to my server just like we did in the web server videos and then also in your your local DNS settings in bind you would also need to configure your MX records and your a records pointers all that stuff as well as you'd want to to configure a tax file for SPF record and that just helps secure your mail server a little bit more so let's go ahead and get started first of all first thing let's take a look at our our hostname so let's just do a hostname - f ok so right now we see it's test server good times dot-com I did that special for y'all by the way anyway if we want to make a change to that let's say that this is going to be our server name that we're going to use to configure our email client with so if we're going to use Robert calm or if I'm going to use Robert calm for my sending and receiving domain then a good mail server would be male Robert calm so let's go into let's go into that file we'll do a sudo nano at C hosts and hit enter ok so here we would need to change our host name here so let's take this out and we'll put mail dot Robert calm and then here we would just put our host name which would be male okay so we'll go ahead and write this file and exit and then let's also take a look in that same directory at host name file and here it's has test server so we'll change that as well to our host name which is mail write that file and exit okay now we can force these changes to occur only during the session we're working with but I recommend going ahead and doing a reboot at this time so we'll we'll reboot the server and then we'll come right back after its backup okay so our server has been rebooted it's back up now this such as check will do another host name - F okay so now our host name is set to mail dot Robert calm or whatever you chose you can use that same one if you want to but I'd be flattered but pick whatever you'd like to do that step so now that we've got that configured let's go ahead and update our repositories so we'll we'll do this if I can get my password right I don't think I did know okay and this was actually of course y'all know this is I do all of this in a virtual environment and I don't think I have even updated this server because I actually moved a clone over and like what I do is I keep a clone of a a boon to fourteen point oh four server that already has all of the hardening performed on it and everything so it's nice and secure and it has nothing on it it just has SSH configured and I have public and private keys that I keep for for this and then when I get ready and I want a fresh server I just copy that clone in and add the hard disk to the virtual machine settings that are already there and I just and I've got a fresh server so this one I haven't done any updates or anything on I don't think I may have before handle let's let's go ahead and do let's go ahead and do an upgrade - why and just see what all's in there I don't think it's yeah that's not bad I think the clone was recently updated so that's good let's see if there's a dist upgrade yeah it looks like there is the update in the kernel here hopefully this won't take too long I'll take a drink of my coffee and I'm hoping I don't have to auto remove any old unused packages I really should probably reboot after this but I don't think I will since this is just test machine but you may want to go ahead and reboot yours if you're following along and doing this same same thing here okay so that's done let's clear that out so let's go ahead and install postfix so we'll do a sudo apt-get install postfix and we'll do a dash Y now this is going to pop up on us during this install and ask a few questions we're just going to hit enter to get through all these questions on this initial install because we're going to do a reconfigure package on it and we'll we'll put our answers in the appropriate ones at that time so let's just go ahead and get this going and we'll just hit enter twice and it'll go ahead and finish up okay so now we'll go ahead and do a proper we'll do a sudo package reconfigure post fix we'll go ahead and take that off so we'll just type that command in okay so we're going to want to pick internet site here this means that we can send and receive mail inside and outside of our network so we'll pick internet site okay this is going to be our fully qualified domain name which mail actually is one but we want to use the root domain of our mail server so we'll back this out and just put Robert calm or or you can put good times calm or whatever you use there and go ahead and hit enter now here this needs to be a user with root access okay that's going to be used as a relay basically for mail coming through the server which we don't really want to use root but but whenever you setup your your server for the first time you create a user that has root access and on my cert which really you can use the same one that you use to log into your server with so that's what I'm going to do I'm going to use Robert since that's the user I login with we'll hit OK now here you want to be sure any domain name that is associated with this server is in this list so mail dot Robert calm that's the actual host name of the server so we'll leave that and then we'll also put Robert calm because that's going to be the one that's used for sending and receiving mail localhost you want to leave both of those entries very important that you have those and on my production mail server my actual server the server itself has a host name as defined on the local network and that host name for DNS is actually different than the machines host name for the mail server I don't know if that makes sense or not but so if your machine has another domain that can access that machine another domain name running on the local network for instance if this was called mail server Robert calm as far as my local DNS server is concerned then within the server itself postfix configuration is using mail Robert calm well you would also want to put mail server dot Robert calm this machine here is not set up that way so we'll go ahead and but just be sure you at least have these your mail dot domain comm and your domain list it along with the local host so we'll hit OK for synchronous updates we can say no to that here this is going to be now this is you're going to this is where you're going to run into problems as far as sending mail if you you can leave this just as your 1 to 7 0.0 Network just as the the loopback when you start going to send mail now there's some other settings that can affect that as well but it's best to go ahead and define your local network in there as well because you're going to have some issues when it comes to sending and receiving as far as this initial configuration that we're doing here goes so here we'll want to go ahead and put in my land network here on this subnet is 10.10 10.0 / 24 and we'll just add a space between the last entry and add our subnet now yours may be 192.168.0 / 24.1 or dot 0 dot 0 dot 1.0 whatever your sudden that is you know what it is so you can put that there and hit OK we'll leave this to zero for no-limit and plus is fine for the extension character internet protocols you can set it to all I'm not using ipv6 on this network so I will leave it at I P V for only and hit OK and it will go ahead and go through the rest of the configuration ok now what we're going to do is we're going to configure postfix 4 SMTP auth and that'll be using dovecot SASL and so we need to edit the postfix the main CF so we'll do a sudo nano and that's in Etsy postfix main dot cf okay so let's just take a look at some of these settings here okay so relay restrictions that's good you want to permit your networks and permit any SASL authenticated users and defer an auth there's some settings that say you can use relay restrictions for everything but I prefer to also have the client restrictions and sending sender restrictions let me take a look here at yeah because your syndra restrictions you can actually set a a file that will verify user names and you can do a hash check on the sender access and I like to set the hello restrictions as well as client and recipient restrictions separately from the relay restrictions so it just works out a little better that way there's some complications you can run into so but these are the three main ones that we want to have set here for our relay restrictions okay and then we want to make sure our host name is correct which it is and then we'll look for our come down here we'll add some lines here we're going to set our home mailbox and that's going to be equal to mail dir slash which is going to put a mail dir directory in the home users folders which would actually allow you to to enter mail command if you have mail utils installed to receive your mail actually through the terminal if you want to but this is the way that that this this set up is going to access the mail mailbox so we need to do a smtp d SASL type is going to be equal to dovecot okay and then the smtp d SASL path is going to be equal to private slash auth okay will do SMTP D sasl local domain and I believe believe I'll leave that blank let me D I'm looking here it actually yeah actually your local domain you can define in whatever your domain is here so like we would put Robert calm or you can put whatever whatever you're using for your your mail domain and then we'll SMTP D SASL security options is going to be equal to no anonymous okay so no anonymous users through SASL and then we'll do broken SASL off clients I believe this is for legacy type clients we're going to allow that if it's just you and you know what your client is then you can set that to know if it's not a legacy type software I think that's I'm pretty sure that's what that's for so now we'll do a SMTP D and let's see we got our off clients will do sasl off and we want to enable that for our sasl authentication and here our smtp d recipient restrictions this is we want to permit our networks okay and then also this helps secure your server a little bit as far as sending receiving and relay access and all that kind of stuff especially if you're sitting and receiving outside your local network so we will also want to permit any SASL authenticated users and then we're going to reject uh nought and that's no S on the end it's just reject an auth I kind of went out of the line there but you can see the setting there so okay now we can also do client restrictions okay so allowing those that can access from an external client so SMTP D client restrictions and those are going to be very similar we're going to permit networks permit sasl authenticated and then we're going to reject unknown client host names no s again sorry I were rejecting the host names but the command is only reject unknown client host name no s okay host name and that's going to be it for our client restrictions now here for the SMTP and SMTP DTLS security level you can set it to May which means can or cannot basically but aiya set mine to encrypt it's kind of up to you there's some settings in master dot C F as well that you can alter for for this kind of thing but for the sake of this video let's just go ahead and and set it to May so we'll do SMTP underscore TLS security level and we'll let it be equal to May and we'll I'm going to do some follow-up videos on the mail server in baby steps because there's a lot of things that you can go through especially when you start testing your mail server through like MX toolbox and email security greater you're going to you're going to see some stuff and you're going to be like oh man you know I got a lot of work to do on this and it's true and before you open it up to the world as far as having it accessible like like I have it my mail server entered into my iPhone and I can send and receive mail through it just like I could Gmail or my ISP and email or anything else from anywhere I don't have to be connected to my my home network so and that's the ultimate goal is to get it to that level but mmm but we got to take this in steps so first thing we want to get this all working properly first so and we can fine tune it later and and one of the big things I can tell you is read the postfix documentation I know that nobody likes to read or not nobody excuse me for saying that but I know it's easy to sit down and watch a video and I think okay well it's all fixable there you know you need to do a little research to on your own because there's a lot of stuff you can learn in fact all this stuff all the videos I've made everything I've spent hours of reading and research and study in years and years of practice with this kind of stuff so it's it's not something that that you can just do in a snap or in a pinch I mean it can take a little bit of studying especially if you want to get real serious about it so I urge you to read the post fix documentation is kind of grueling and there's a ton of it but read it to get a little better understanding of what these commands are and what they mean and the configuration you'll really be glad you did but anyway this is kind of a long process so we're going to kind of breeze through some of this stuff but we'll go ahead and define our smtp DTLS security level now so we'll do SMTP D TLS security level and that is all so we'll go ahead and set it to May and then we'll do SMTP TLS note start TLS underscore offer and we're going to set that equal to yes and we're going to set our log level to one smtp DTLS log level and that will be equal to 1 and then SMTP DTLS received header and we'll set that equal to yes as well okay so that's all we need to do in here for now so we'll write this file and exit now comes the fun part we need to generate our certificates for TLS we get a drink my coffee before we start this okay so we'll do an open SSL we're going to generate RSA des 3 - out server key and you can do 2048 encryption or let's do 4096 we'll hit enter ok so here we want to enter a passphrase we're going to need that passphrase again here in a second so remember that so we'll enter it and we'll verify ok now let's open ssl RSA - n and we'll do our server dot key out to the server dot k dot insecure and now we need to enter the passphrase we entered a minute ago okay so that wrote our RSA key now we're going to move the server key or basically copy it into our server key secure file we're basically creating a security certificate that can be used without a passphrase so we'll do move server key server key dot secure ok and then we will move our server key in secure and to the server key ok and then open SSL request a new key server key - out server dot CSR okay now here you're going to be asked all the goody-goody questions we'll say us just for giggles Missouri City Kansas City organization name don't need that organizational unit common name this needs to be your fully qualified domain name which is Robert calm for this server here you would put whatever your your fqdn is for your server this is very important that this matches this common name needs to be the same as your fully qualified domain name not the mail dot domain.com but just the domain calm okay and then we'll hit enter you can you can fill out any of these sections that you want it's up to you a challenge password we are not going to add one or company name so that's good there okay now this is kind of a long one so we'll do open SSL let me clear this and I'm going to come down about to the middle here so y'all can see a little better will do open SSL x.509 - request - days this will be for 365 days in our server that's CSR and we're going to sign the key server key out - server dot cert and hit enter ok so that got our private key and then we're just going to copy our server dot cert into our at C SSL certs directory and our server key into our at C SSL private directory and we should be good to go so we'll do sudo copy server dot cert and we'll put that in at C SSL search directory and they will also copy our server key in the etsy SSL private directory okay now we're going to use what's called in the post comp command to insert two paths to our key into our main CF file so we'll do sudo post go oh I'm sorry about that sue do post comp - e and just put an apostrophe there and we'll put SMTP D underscore TLS underscore key underscore file space equals space and we're just define our directory here where we just moved our files to so SSL whoop SSL private server key and don't forget the closing apostrophe okay and then we'll do the same thing for our server dot cert sudo post comp - e ' SMTP D underscore TLS cert file that will be equal to our Etsy SSL certs and server dot cert and the closing apostrophe and hit enter okay so now we can go back into our our main CF and we can see that we can do sudo nano @c postfix main CF and you can see here under the TLS parameters it added those lines for us so that's that's directing actually change them because before it was the weird snake pinwheel or whatever certificates so it changed those to the proper path to our files so we don't need to do anything in there I was just taking a look to show you so now we need to make some changes to the master dot CF so let's do instead of nano Etsy postfix we'll do master dot CF okay so we're going to uncomment some lines here we'll come down here to submission we want to uncomment that this is going to be for our submission ports we're going to uncomment the name postfix submission our security level this will be an encrypted connection for submission we're going to enable the SSL off and we're going to come down here and uncomment our relay restrictions and our macro daemon as well and I I believe I believe whatever is in the main CF will override these settings so any relay restrictions or anything like that that we of course this is for submission but a lot of those were for SMTP D and SMTP which we have SMTP enabled but some of those will override the others depending on what the protocol is but we also want to uncomment our smtps now remember in the beginning of the video I said that we're going to be setting this up to where all mail ports will be available to you and you can do a little research on these and see which which you want to use which you don't TLS is course the newest standard so that's what I recommend using but if you want to use just SSL you can do that there's it's really up to you and course only what you open on your firewall is what's what's going to actually work so but here under smtps we're going to uncomment the top two they're the wrapper mode and the postfix smtps and also to enable the SASL authentication and will uncomment our relay restrictions and our daemon on this as well okay so that's all we need to do in here okay so we'll write this file and exit okay now we're going to install DEFCON SASL which is different from the dovecot common but we'll go ahead and install this first we need it so we'll do sudo apt-get install dovecot common we'll do a - why okay this is going to ask if we want to create a self-signed certificate we will say yes okay now here the common name this is where we want to put in our domain for the mail server or mail server so we'll do mail Robert calm not our fully qualified domain name but our sub domain for our mail server we'll put that in and hit OK and now we're going to need to edit a few files in dovecot so let's open the tin - master com first so we'll do at C dovecot and that's in comp dot d directory tin - master Kampf okay so in here we need to find postfix SMTP auth down here there we go okay so we want to uncomment the UNIX listener actually all three of these lines we need to uncomment because we're going to change the mode to O 660 and we're going to add a user here that's going to be postfix and we're going to add a group as well post fix okay so that's all we need to do in here so we'll go ahead and write this file and exit boy what a mess let me clear that out okay so now we need to edit our 10 bash off it's going to be in that same directory our 10 - auth and we're going to look for our off mechanisms it's not too far down here okay there's our auth mechanisms we're going to change this from plane to plane login okay and that's all we need to do in this file so we'll go ahead and write it and exit now let's go ahead and restart both postfix and dovecot so we'll do sudo service postfix restart and okay I was going to say hopefully we didn't have any errors but we do it's the notes that TLS so let's see what our problem is we'll do sudo native @ c postfix and that's in the main dot c f where's the note I misspelled it it's supposed to be start TLS offer yeah you can't can't get away with misspellings around here they'll get you for it so okay we got that fixed let's go ahead and write the file and exit and then let's go ahead and try to restart again okay so post fix restarted and then we'll do the same to dovecot okay and dovecot restarted okay now we're going to test it so we're going to test our SMTP auth and our SMTP pop3 port access first so we're going to tell that directly to our mail server so we'll do we'll do a telnet to our mail dot Robert calm and we'll just put in SMTP here and that should connect us up okay so we connected now let's send a Hello command eh-heh low to our mail server mail Robert calm okay so this is what we want to look for here is the start TLS so it did did initiate start TLS with plain login as authentication so everything is good there so we can type quit to get out of that so now let's try port 587 so we'll telnet in there and we'll do the same eh ello to mail Robert calm okay so everything checks out on port 587 for submission will type in quit okay okay now I guess all we need to do is install dovecot okay so we'll do sudo apt-get install dovecot - IMAP D and dovecot - pop 3d okay so these are going to be for our I didn't oh boy my spelling is pretty rough today okay so we're going to install these these two packages okay so that's done so now we need to configure our mailbox for dovecot so we'll do sudo nano @c dovecot and that's also in the comp D directory and that's going to be 10 - mail dot scomp and we'll hit enter and we couldn't come down here to our mail location I just page down once and you can see here the different options we have the mail directory at home / mail dir and we have a couple of other options but if you remember in the beginning we set it up to use the mail dir directory within the users home so that's what we want to set it to so let's take all this out and we'll say the mail dir : and the Tildy slash mail dir okay so that's that's all we need to do in there so we'll write that file and exit and then we're going to edit for our pop3 so we'll do 20 - pop3 com and what did I do I did say 20 but I didn't type 20 20 - pop three Kampf okay that's what we need to edit and we're going to find our pop 3 UI DL format there it is okay and we just need to uncomment this line okay so that should work so we'll write that file and exit okay so now we want to enable SSL so we can use SSL if we want to do that and that's going to be in the 10 - SSL comp and all we need to do is uncomment here to enable SSL and TLS support so we'll uncomment that right the file and exit and then we'll restart dovecot okay so everything everything restarted no errors so now we're going to we're going to test our pop3 and our IMAP access for receiving mail the first part we set up our submission and sending mail processes so now we're we're going to test out our receiving see if we can connect so we'll do a telnet to our mail and whatever your domain is calm and we'll start off with port 110 okay so it connected to our mail server so everything good there so we'll type quit so let's also try our ports 995 okay we connected we'll hit quit okay and then we'll try 993 as well it's another pop3 1985 and 93 ones SSL and one is TLS so and then we'll try 143 for IMAP as well so we connected to mail dot Robert comm on 993 so we'll quit so now let's try our 143 for IMAP this is okay logon refers how do you enable to start TLS okay everything looks good we connected it doesn't understand quit okay so everything looks like it connected so if we want to take a look real quick at what serve reports we have running there's a netstat command for that we can do a net stat - n l4 and this is just going to just going to show all of our servers that are running here we have 1011 that's my SSH server that's one that we set up in a few videos back there we have 25 that's regular SMTP port and I will tell you that in setting up your mail server if you're running a Linux router or if you're running a DHCP router you want to forward port 25 has to be forwarded to your server in order to send and receive mail through your server either one if you if you do not have port 25 forwarded to your server you're going to have problems that is a must 25 no matter what other ports you're using for submission or for downloading your email from the server doesn't matter but you have to have 25 open now as far as receiving your mail from the server okay sorry about that you all I had to take a break for just a second kind of cut things off right there in the middle of what I was saying but anyway we were talking about the port's that you can use for your mail server port 25 is is just a normal it's the default SMTP non-encrypted port you don't necessarily have to send or use that port for sending and receiving it's actually mainly for like external servers from the internet they need that port open in order to send and receive mail to your server so very important that that that that stays open now as far as pop3 access goes port 110 that's the non-encrypted port for pop3 access if you want to connect securely with if you want to use start TLS or SSL TLS then you want to use port 995 so that would be the port that you would need to open on your firewall 110 or 995 either one I wouldn't recommend opening all the ports unless you just have a ton of clients using your email server and you want them to be able to to have the choice of how they choose to connect to it otherwise I would restrict it to certain ports and just tell your users these are the ports this is how you need to set it up this is the porch you can use so as far as IMAP I map 143 would be the non-encrypted unsecured port where as 995 would be the the secure I'm at port so if you're using IMAP which is basically giving you the option you leave the mail on the server and then you can access the folders and whatever you have stored on the server through IMAP personally I prefer pop3 because I don't want all my mail stacked up on the server of course you can set it to delete from the server when you delete it from your client and stuff like that but it's just up to you however you want to do it and then of course we have port 465 that's for sending mail through SMTP securely you can also use submission port 587 which is what I use but you can you can set that up however you want like I said where we're at right now in the video you have the option the world is your oyster you can set it up however you want as you can see here we have all the ports and all the servers for each port is running so you can you can take your pick on on what you what you want to use and there's no harm in those those running this is where your firewall is going to come in you want to set up your firewall too however whatever access you want to allow so let's say you're using port 995 for secure pop3 and port 587 for submission then you would want to come in here and in your firewall you want to open up port 25 open up port 995 and open up port 587 the others you don't have to open those so you know they're not vulnerable as long as there's a service running which requires the authentication to get into that service you should be good unless there's some kind of vulnerability in the in the software itself and postfix has been tried and tested for a long time and it is very very secure as long as you set it up properly and I mean these people really know what they're doing and it's used all around the globe by very big clients so this is not just a little homegrown software this is this is the real deal so I wouldn't worry too much about vulnerabilities as long as you let keep your server updated with security updates and all that kind of stuff one thing I'll tell you here we can go into our very long directory and we can see here we have a mail log and we can we can take a look at that there's all our errors we're having we're testing stuff but it will show up in here and in fact let me give you an example here I'll show you one in action let me increase the font here so you can see better ooh it's almost too big but yeah I'm going to bring this back down because it's the font being that big you can't see everything that you need to I'll increase it just a tad but okay so here is my actual production mail server log and this is this is a production server I use it daily as you can see here all these regular pop3 logins Robert blah blah blah that's regular from client access but right here where you see postfix smtp d connect from unknown lost connection after ello from unknown and disconnected and all that happened in a matter of a couple of seconds actually yeah just one second so they were unable to connect and then the anvil service is one that keeps track of connection rates and stuff to your server but you can see that was an attempt to connect now that's probably a relay attempt you know somebody trying to try to relay mail through my server or see if they can connect see if they can use it as relay but we defined all that before like if we go back here and look and our main CF you know we put in our our client restrictions to permit SASL authenticated only so that's you know that's protecting us from from anybody trying to to get into our server there's also other things to that that can protect your server let's see let me look here at a couple things that I have set up the did we do recipient yeah we did recipient and client restrictions trying to see here what else we might could put that yacht now another thing that that we could do here let me make sure that that it's not in there okay so we could come down here and we could even put in smtp d underscore hello required which means they're going to have to answer to our server when they try to connect they can't just blindly connect okay and then we can go a step further by doing s in TPD hello restrictions and here we can permit my networks we can permit sasl authenticated we can reject non fully qualified domain names fully qualified domain name host name and then we can reject underscore invalid underscore hostname so this is going to do a check on these host names it'll make sure that you know IP is resolved a host named host names result two IPS that that it's coming from actual fully qualified domain name any legitimate email server is going to pass these tests so if you got some scammer out there trying to relay through a relay and trying to try it will also help with spam and stuff like that so you know these are checks that will that will make sure everything stays kosher now depending on your environment depending on how you're using this you know you may not want to use all these settings that's why I say read the postfix documentation it's a lifesaver so there's just a ton of things you can do like I've said error sleep time soft error limits hard error limits SMTP D delay reject disabled you can disable the verify command another thing is process limits client connection count limits connection rate limits you can set header size limits or message size limits I mean it just goes on and on with the type of stuff that you can do now I will tell you this too that if you're on a if you're doing this from home your ISP whoever your internet service provider is if you try to send mail to someone within that same domain or on that same ISP it may not make it to its destination and the reason is is because your IP is not set up as a your IP is not considered a legitimate mail server as far as someone who's qualified to be serving mail so a lot of times the ISP it may have local IPS it offers to clients set as basically as spam that way it gets rejected when it tries to come through because the only way that you can fix that is to talk to your ISP and have them set your DNS record for if you have a static IP this won't work if it's dynamic but they would have to set the DNS record too to where that IP resolves back to your actual mail server domain name now it's easy enough to set it up through your registrar and all that to where the IP will resolve to the host name but or the host name to resolve to your your external IP but to get it to to work in Reverse that would have to be done through your ISP so which is probably not a very easy thing to do one way that I have gotten around that as far as sending mail to someone within my own ISP is to use a mail relay which you if you have a hosting company or something like that that you use you can set up a relay host and you can read up on this in the internet you can set the relay host and you can man a password file and set the port and all that to where it'll actually connect and send mail through that other mail server which is a legitimate mail server that's considered you know authentic as far as sending mail or you could actually set it up to send from your own ISP possibly but anyway there's there are some things to consider but right now I just enjoy using it I don't really the only people that I send mail too much that are on my the same ISP our family and I have a hundred email addresses a bunch of different one it's not a hundred but so you know and and the one that I have running here is not my main mail address I use it for stuff for the server and it sends local mail a lot I use it mainly for local mail here for my my home but anyway you know that's not the point of this video I'll try to cut this off now but anyway that will get you started that'll get you set up with all ports working and then from that and which really is is one of the hardest tasks is just to get it installed and working properly and then once you do that you can fine-tune it read the post fix documentation figure out you know what you want to do a little searching on the internet goes a long way so anyway I hope this has been a helpful video for y'all and give me a thumbs up if it helped in any way if you have any questions or comments leave them below I will do my best to help you out and until next time don't forget to subscribe too if you haven't done that already I work a lot so I don't get videos up as often as I would like to but I'm trying to to get more up lately so there's more great things to come and like I said if I think of anything else or if I get enough comments on something that deserves follow-up video I'll do that for you guys anyway you all have a good one and enjoy the mail server' hope it all works out great for you until next time
Info
Channel: Odd Random Thoughts
Views: 116,233
Rating: undefined out of 5
Keywords: E-mail (Software Genre), Ubuntu (Operating System), mail server, ubuntu server, linux server, Postfix (Software), dovecot (Software)
Id: 2pMC-6LVLLg
Channel Id: undefined
Length: 68min 34sec (4114 seconds)
Published: Tue Oct 06 2015
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.