docker-mailserver | ready fullstack but simple mail server | Continuous Deployment library

 by   docker-mailserver Shell Version: v12.1.0 License: MIT

kandi X-RAY | docker-mailserver Summary

kandi X-RAY | docker-mailserver Summary

docker-mailserver is a Shell library typically used in Devops, Continuous Deployment, Docker applications. docker-mailserver has no bugs, it has no vulnerabilities, it has a Permissive License and it has medium support. You can download it from GitHub.

A production-ready fullstack but simple mail server (SMTP, IMAP, LDAP, Antispam, Antivirus, etc.). Only configuration files, no SQL database. Keep it simple and versioned. Easy to deploy and upgrade. Documentation via MkDocs. Originally created by @tomav, docker-mailserver is now maintained by volunteers since January 2021. If you have issues, read the full README and the documentation for your version (default is edge) first before opening an issue. The issue tracker is for issues, not for personal support.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              docker-mailserver has a medium active ecosystem.
              It has 11209 star(s) with 1571 fork(s). There are 191 watchers for this library.
              There were 1 major release(s) in the last 12 months.
              There are 30 open issues and 1798 have been closed. On average issues are closed in 31 days. There are 4 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of docker-mailserver is v12.1.0

            kandi-Quality Quality

              docker-mailserver has 0 bugs and 0 code smells.

            kandi-Security Security

              docker-mailserver has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              docker-mailserver code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              docker-mailserver is licensed under the MIT License. This license is Permissive.
              Permissive licenses have the least restrictions, and you can use them in most projects.

            kandi-Reuse Reuse

              docker-mailserver releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.
              It has 47 lines of code, 0 functions and 4 files.
              It has low code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of docker-mailserver
            Get all kandi verified functions for this library.

            docker-mailserver Key Features

            No Key Features are available at this moment for docker-mailserver.

            docker-mailserver Examples and Code Snippets

            No Code Snippets are available at this moment for docker-mailserver.

            Community Discussions

            QUESTION

            how does docker map volume names in docker compose file to volumes on system
            Asked 2020-Jul-26 at 08:40

            I am migrating a tvial docker mail server from one system to another. I set this up some time ago, and vaguely remember the steps, but not every detail. I copied my mail data and mail state volumes to the new system, but when I went to run docker on the new system I was confused. The old system shows this in docker compose:

            ...

            ANSWER

            Answered 2020-Jul-26 at 08:40

            The resources are prefixed with the project(deployment) name.
            This can be specified using the -p flag when you run the docker-compose up command. If not specified, the project name defaults to the name of the directory to whom your docker-compose.yaml file belongs to.

            Official documentation here: https://docs.docker.com/compose/reference/envvars/#compose_project_name . Relevant extract for the question:

            COMPOSE_PROJECT_NAME:
            Sets the project name. This value is prepended along with the service name to the container on start up. For example, if your project name is myapp and it includes two services db and web, then Compose starts containers named myapp_db_1 and myapp_web_1 respectively.

            Source https://stackoverflow.com/questions/63093055

            QUESTION

            Which ports are used for which purpose specifically in email communication?
            Asked 2020-May-03 at 19:51

            I understand that there are several options to choose from when using an e-mail server. E.g. 25 and 587 for opt-in encryption and 465 for enforced encryption.

            docker-mailserver, a popular docker mailserver container describes ports 587, 465, 143 and 993 specifically as submission and retrieval ports. The actual server to server communication is apparently established using port 25 on both sides. Is this a common implementation?

            My understanding until now was, that the actual communication (for outgoing emails) is done over port 587 or 465.

            Encouraged by the exposed-port explanation of the above mentioned container I now figured that the whole retrival, submission and transfer process works (extremely simplified) like this:

            Use port 25,465 or 587 to send email from client to transmitting mailserver.

            The transmitting mailserver sends the email over port 25 to the recipients mailserver.

            The recipient then receives the email on port 143 or 993 from his/her mailserver (assumed IMAP/s is used) and shows it accordingly in his/her mail client.

            Is this correct? If so, is it even possible to send emails from a mailserver whose ISP blocked port 25 that users of common mail services like GMail, Yahoo etc. can receive?

            ...

            ANSWER

            Answered 2020-May-03 at 19:51

            This is more of a network administration question, than a programming question, so may be considered off topic. That being said:

            The SMTP protocol is used for two different, but similar purposes: Message Submission, and Message Transission.

            Message Submission is done by an MSA, Message Submission Agent, generally on behalf of an end user, but perhaps on perhaps of a script or process. Traditionally, these are clients like Thunderbird, Apple Mail, or the email client on your phone. In modern practice, this is generally done authenticated (with user credentials) and encrypted on ports 465 or 587.

            • Port 465, SMTPS (smtp-secure, by analogy with https) is technically deprecated, but widely used. It is used for SMTP over TLS, where the encryption is encrypted from connection until termination.
            • Port 587, submission is generally used with STARTTLS, where the connection is first made unencrypted, but upgraded shortly thereafter using a special command.

            Both these ports generally accept mail from a user with credentials, for any destination, and will hold and relay these for the user. For example, if you connect to smtp.gmail.com on port 465 or 587, and authenticate as user@gmail.com, it will allow you to submit email for anyone, as long as it is from user@gmail.com.

            Message Transmission is done by an MTA, Message Transmission Agent, generally on behalf of all the users of a site or service. Relaying is done between sites on port 25, with opt-in STARTTLS encryption. Authentication is not generally done, but there is a complicated system of reputation tracking, firewalls, and blacklists generally used behind the scenes. Usually only mail for a specific site is accepted on this port. For example, if you connect to one of gmail.com's MX servers (for example, gmail-smtp-in.l.google.com as of this writing) on port 25, and it thinks you are a trustworthy IP, it will accept mail from anyone to any gmail address (subject to further scanning). It will refuse to relay to anyone offsite.

            Message Retrieval is generally done by IMAP on ports 143 (with STARTTLS) or 993 (with TLS from connection). This is a pull service used by an end-user (generally) to retrieve emails being held by an MTA on their behalf. POP3 is also used (on 110 and 995) by some sites, but it is a much less capable protocol.

            Traditionally, submission and transmission were both done on port 25 without authentication, but that's a no go on the modern internet. It was split into transmission and submission so network resources could be better controlled. As you may have discovered, many ISPs and cloud services restrict port 25 so end-users cannot act as transmitters without their consent, and so relaying happens either through their servers or some other service that will take responsibility.

            This, through this model, gmail users can generally only submit via gmail's submission server, and other users must submit through their services server, and spammers can't just set up a server anywhere to transmit messages to gmail. If they do and their ISP hasn't firewalled it, their reputation will shortly be trashed and be placed on many blacklists.

            Additionally, a lot of this doesn't even happen over the traditional protocols anymore. If you use Google services and clients, you will likely be using a custom protocol tunneled over HTTPS, or the public GMAIL REST protocol. If you're using Microsoft, they have no less than 3 email protocols: Exchange ActiveSync, Exchange Web Services, and Microsoft Graph/Outlook MAIL Rest API, all using HTTPS.

            Source https://stackoverflow.com/questions/61579686

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install docker-mailserver

            Note There are currently no LDAP maintainers. If you encounter issues, please raise them in the issue tracker, but be aware that the core maintainers team will most likely not be able to help you. We would appreciate and we encourage everyone to actively participate in maintaining LDAP-related code by becoming a maintainer!.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/docker-mailserver/docker-mailserver.git

          • CLI

            gh repo clone docker-mailserver/docker-mailserver

          • sshUrl

            git@github.com:docker-mailserver/docker-mailserver.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link