diff --git a/src/content/docs/ispmail-bookworm/100-postfix-access-mariadb.mdx b/src/content/docs/ispmail-bookworm/100-postfix-access-mariadb.mdx new file mode 100644 index 0000000..24cb994 --- /dev/null +++ b/src/content/docs/ispmail-bookworm/100-postfix-access-mariadb.mdx @@ -0,0 +1,47 @@ +--- +title: Let Postfix access MariaDB +lastUpdated: 2023-10-04 +slug: ispmail-bookworm/making-postfix-get-its-information-from-the-mariadb-database +sidebar: + order: 100 +--- + +import { Aside } from "@astrojs/starlight/components"; + +In the previous chapter you have created the SQL database schema and inserted some data to play with. Let’s start with the entry point for all email on your system: Postfix. So we need to tell Postfix how to get the information from the database. First let’s tell it how to find out if a certain domain is a valid email domain. + +## virtual\_mailbox\_domains + +As described earlier a mapping in Postfix is just a table that contains a left-hand side (LHS) and a right-hand side (RHS). To make Postfix get information about virtual domains from the database we need to create a ‘cf’ file (_configuration file_). Start by creating a file called `/etc/postfix/mysql-virtual-mailbox-domains.cf` for the virtual\_mailbox\_domains mapping. Make it contain: + +
+user = mailserver +password = **x893dNj4stkHy1MKQq0USWBaX4ZZdq** +hosts = 127.0.0.1 +dbname = mailserver +query = SELECT 1 FROM virtual_domains WHERE name='%s' ++ +Please enter your own password for the _mailserver_ database user here. It is the first one you created before. + +Imagine that Postfix receives an email for `somebody@example.org` and wants to find out if example.org is a virtual mailbox domain. It will run the above SQL query and replace ‘%s’ by ‘example.org’. If it finds such a row in the virtual\_domains table it will return a ‘1’. Actually it does not matter what exactly is returns as long as there is a result. Remember the puppies and kittens? + +Now you need to make Postfix use this database mapping: + +
+postconf virtual_mailbox_domains=mysql:/etc/postfix/mysql-virtual-mailbox-domains.cf ++ +The “postconf” command conveniently adds configuration lines to your `/etc/postfix/main.cf` file. It also activates the new setting instantly so you do not have to reload the Postfix process. + +The test data you created earlier added the domain “example.org” as one of your mailbox domains. Let’s ask Postfix if it recognizes that domain: + +
+postmap -q example.org mysql:/etc/postfix/mysql-virtual-mailbox-domains.cf ++ + + +You should get ‘1’ as a result. That means your first mapping is working. Feel free to try that with other domains after the `-q` in that line. You should not get a response. \ No newline at end of file diff --git a/src/content/docs/ispmail-bookworm/80-tls-certificates.mdx b/src/content/docs/ispmail-bookworm/80-tls-certificates.mdx index c041643..7960891 100644 --- a/src/content/docs/ispmail-bookworm/80-tls-certificates.mdx +++ b/src/content/docs/ispmail-bookworm/80-tls-certificates.mdx @@ -194,3 +194,64 @@ SSLCertificateKeyFile /etc/letsencrypt/live/**webmail.example.org**/privkey.pem This virtual host configuration looks suspiciously similar to the HTTP virtual host above. It just listens on port 443 (standard port for HTTPS) instead of port 80. And it uses the “SSLEngine” that handles encryption and gets information about the certificate for your web server (that is shown to your users) and the private key (that the web servers uses to decrypt the user’s communication). + +Enable the SSL module in Apache: + +
+a2enmod ssl ++Then enable the virtual host for HTTPS: +
+a2ensite **webmail.example.org**-https ++And _restart_ the web server. A _reload_ is not sufficient this time because you added a module. + +systemctl restart apache2 + +Now when you point your web browser to +**webmail.example.org**, your browser should tell you that it trusts the web site’s certificate: + + + +(Yes, sorry, this is not **webmail.example.org**. But I do not own the example.org domain and thus cannot get a valid certificate for it. This is my own site.) + +So should you keep the HTTP virtual host? Yes. First for the HTTP->HTTPS redirection. And second to keep _certbot_ working. + +## Redirect HTTP to HTTPS +Sometimes users forget to enter https://… when accessing your webmail service. So they access the HTTP web site. We obviously don’t want them to send their password over HTTP. So we should redirect all HTTP connections to HTTPS. + +One exception though. Let’s Encrypt will use HTTP to verify your challenge token. So we need to serve files at http://**webmail.example.org**/.well-known/acme-challenge/… directly while redirecting all other requests to HTTPS. You can accomplish that by putting these lines inside the <VirtualHost> section of your `/etc/apache2/sites-available/webmail.example.org-http.conf` file: + +``` +RewriteEngine On +RewriteCond %{REQUEST_URI} !.well-known/acme-challenge +RewriteRule ^(.*)$ https://%{SERVER_NAME}$1 \[R=301,L\] +``` +This requires the _rewrite_ module to be enabled in Apache. That is simple though: +``` +a2enmod rewrite +systemctl restart apache2 +``` +So now entering http://**webmail.example.org** will redirect you to https://**webmail.example.org**. + +## Automatic certificate renewal + +The _certbot_ package automatically adds a timed job that runs twice a day at random times. The random part is important to avoid millions of server hammering the LetsEncrypt service at the same second. + + + +So the renewal already happens automatically. Should it fail then LetsEncrypt start sending you reminder emails that your certificate should be renewed. That’s a clear sign that something went wrong with the automatic renewal. + +There is one puzzle piece missing though. Even if the renewal worked it will only update the certificate files. But the software components – Postfix, Dovecot and Apache – will not notice the change. So we need to add a so called _post-hook_ to certbot that triggers a restart of all processes thereafter. + +For that purpose edit the /etc/letsencrypt/cli.ini file and add: +``` +post-hook = systemctl restart postfix dovecot apache2 +``` +Well done. You have implemented Let’s Encrypt for all your services now. Let’s go on. diff --git a/src/content/docs/ispmail-bookworm/90-prepare-database.mdx b/src/content/docs/ispmail-bookworm/90-prepare-database.mdx new file mode 100644 index 0000000..426c105 --- /dev/null +++ b/src/content/docs/ispmail-bookworm/90-prepare-database.mdx @@ -0,0 +1,219 @@ +--- +title: Preparing the database +lastUpdated: 2023-10-03 +slug: ispmail-bookworm/prepare-the-database +sidebar: + order: 90 +--- + +import { Aside } from "@astrojs/starlight/components"; +import { Tabs, TabItem } from '@astrojs/starlight/components'; + +Now it’s time to prepare the MariaDB database that stores the information that controls your mail server. In the process you will have to enter [SQL](http://en.wikipedia.org/wiki/SQL) queries – the language of relational database servers. You may enter them in a terminal window using the ‘mysql’ command. But if you are less experienced with SQL you may prefer using a web interface. That’s what you installed _[Adminer](https://www.adminer.org/)_ for. + + + + +## Setting up Adminer + +Basically Adminer is just a couple of PHP files served from your Apache web server. The setup is simple. Edit your /etc/apache2/sites-available/**webmail.example.org**-https.conf file and put this line anywhere between the <VirtualHost> and the </VirtualHost> tags: +``` +Alias /adminer /usr/share/adminer/adminer +``` +Reload the Apache process: +``` +systemctl reload apache2 +``` + + + +You will not be able to login yet. The only available database user is ‘root’, but it is only usable from the shell by default – not over a network. + + +## Generate two random passwords + +In this section you will create the basic database “mailserver” and two users. One user (“mailadmin”) will be able to change the data in the database and is meant for you. The other user (“mailserver”) can only read from the database and is meant for the server processes. + +Use the _pwgen_ tool to create two random passwords for these users: +``` +pwgen -s1 30 2 +``` +Take a note of the passwords or store them somewhere safe. + + +## Create the ‘mailserver’ database + +This step is simple. Connect to the database using the ‘mysql’ command: +``` +mysql +``` +You should see the MariaDB prompt that allows you to enter further SQL commands: +``` +MariaDB [(none)]> +``` + +Now you are expected to speak SQL. To create a new database for our needs enter: + +``` +CREATE DATABASE mailserver; +``` +You will be told that your query was OK and that one new row was added. + + +## Create the database users + +Now you have an empty database. Let us give the “mailadmin” database user the required privileges to manage it. + +You are still connected to the database, right? To create a user with full permissions enter this SQL command. Please use the **first** password you just generated instead of mine: +
+grant all on mailserver.* to 'mailadmin'@'localhost' identified by '**gefk6lA2brMOeb8eR5WYaMEdKDQfnF**'; ++ +Also create the read-only user that will grant Postfix and Dovecot database access later (use your **second** random password here). + +
+grant select on mailserver.* to 'mailserver'@'127.0.0.1' identified by '**x893dNj4stkHy1MKQq0USWBaX4ZZdq**'; ++ + + +Now you can use _Adminer_ to log in using the _mailadmin_ account and the **first** password: + + + +You should get logged in and see the “mailserver” database: + + + +## Creating the database tables + +Do you remember that I introduced three Postfix _mappings_ earlier? One for _virtual domains_, one for _virtual aliases_ and another for _virtual users_? Each of the mappings needs a database table that you will create now. Feel free to use _Adminer_. I will however also show the SQL statement to create the tables that you can enter on the ‘mysql’ command-line tool. Below you can click on either \[Adminer\] or \[SQL\] to choose. + +The first table to create is… + +## virtual\_domains + +This table just holds the list of domains that you will use as _virtual\_mailbox\_domains_ in Postfix. + +