All notable changes to this project will be documented in this file. The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
Note: Changes and additions listed here are contained in the
:edge
image tag. These changes may not be as stable as released changes.
The most noteworthy change of this release is the update of the container's base image from Debian 11 ("Bullseye") to Debian 12 ("Bookworm"). This update alone involves breaking changes and requires a careful update!
- Updated base image to Debian 12 (#3403)
- Changed the default of
DOVECOT_COMMUNITY_REPO
to0
(disabled) - the Dovecot community repo will (for now) not be the default when building the DMS.- While Debian 12 (Bookworm) was released in June 2023 and the latest Dovecot
2.3.21
in Sep 2023, as of Jan 2024 there is no Dovecot community repo available for Debian 12. - This results in the Dovecot version being downgraded from
2.3.21
(DMS v13.3) to2.3.19
, which may affect functionality when you've explicitly configured for these features:- OAuth2 (mostly regarding JWT usage, or POST requests (
introspection_mode = post
) withclient_id
+client_secret
). - Lua HTTP client (DNS related).
- OAuth2 (mostly regarding JWT usage, or POST requests (
- While Debian 12 (Bookworm) was released in June 2023 and the latest Dovecot
- Updated packages. For an overview, we have a review comment on the PR that introduces Debian 12
- Notable major version bump:
openssl 3
,clamav 1
,spamassassin 4
,redis-server 7
. - Notable minor version bump:
postfix 3.5.23 => 3.7.9
- Notable minor version bump + downgrade:
dovecot 2.3.13 => 2.3.19
(Previous release provided2.3.21
via community repo,2.3.19
is now the default)
- Notable major version bump:
- Updates to
packages.sh
:- Removed custom installations of Fail2Ban, getmail6 and Rspamd
- Updated packages lists and added comments for maintainability
- Changed the default of
- OpenDMARC upgrade:
v1.4.0
=>v1.4.2
(#3841)- Previous versions of OpenDMARC would place incoming mail from domains announcing
p=quarantaine
(that fail the DMARC check) into the Postfix "hold" queue until administrative intervention. - OpenDMARC v1.4.2 has disabled that feature by default, but it can be enabled again by adding the setting
HoldQuarantinedMessages true
to/etc/opendmarc.conf
(provided from DMS).- Our
user-patches.sh
feature provides a convenient approach to updating that config file. - Please let us know if you disagree with the upstream default being carried with DMS, or the value of providing alternative configuration support within DMS.
- Our
- Previous versions of OpenDMARC would place incoming mail from domains announcing
- Postfix:
- Postfix upgrade from 3.5 to 3.7 (#3403)
compatibility_level
was raised from2
to3.6
- Postfix has deprecated the usage of
whitelist
/blacklist
in config parameters and logging in favor ofallowlist
/denylist
and similar variations. (#3403)- This may affect monitoring / analysis of logs output from Postfix that expects to match patterns on the prior terminology used.
- DMS
main.cf
has renamedpostscreen_dnsbl_whitelist_threshold
topostscreen_dnsbl_allowlist_threshold
as part of this change.
smtpd_relay_restrictions
(relay policy) is now evaluated aftersmtpd_recipient_restrictions
(spam policy). Previously it was evaluated beforesmtpd_recipient_restrictions
. Mail to be relayed via DMS must now pass through the spam policy first.- The TLS fingerprint policy has changed the default from MD5 to SHA256 (DMS does not modify this Postfix parameter, but may affect any user customizations that do).
- Postfix upgrade from 3.5 to 3.7 (#3403)
- Dovecot
- The "Junk" mailbox (folder) is now referenced by it's special-use flag
\Junk
instead of an explicit mailbox. (#3925)- This provides compatibility for the Junk mailbox when it's folder name differs (eg: Renamed to "Spam").
- Potential breakage if your deployment modifies our
spam_to_junk.sieve
sieve script (which is created during container startup when ENVMOVE_SPAM_TO_JUNK=1
) that handles storing spam mail into a users "Junk" mailbox folder.
- The "Junk" mailbox (folder) is now referenced by it's special-use flag
- rsyslog:
- Debian 12 adjusted the
rsyslog
configuration for the default file template fromRSYSLOG_TraditionalFileFormat
toRSYSLOG_FileFormat
(upstream default since 2012). This change may affect you if you have any monitoring / analysis of log output (eg:mail.log
/docker logs
).- The two formats are roughly equivalent to RFC 3164) and RFC 5424 respectively.
- A notable difference is the change to RFC 3339 timestamps (a strict subset of ISO 8601). The previous non-standardized timestamp format was defined in RFC 3164 as
Mmm dd hh:mm:ss
. - To revert this change you can add
sedfile -i '1i module(load="builtin:omfile" template="RSYSLOG_TraditionalFileFormat")' /etc/rsyslog.conf
via ouruser-patches.sh
feature.
- Rsyslog now creates fewer log files:
- The files
/var/log/mail/mail.{info,warn,err}
are no longer created. These files represented/var/log/mail.log
filtered into separate priority levels. As/var/log/mail.log
contains all mail related messages, these files (and their rotated counterparts) can be deleted safely. /var/log/messages
,/var/log/debug
and several other log files not relevant to DMS were configured by default by Debian previously. These are not part of the/var/log/mail/
volume mount, so should not impact anyone.
- The files
- Debian 12 adjusted the
- Features:
- The relay host feature was refactored (#3845)
- The only breaking change this should introduce is with the Change Detection service (
check-for-changes.sh
). - When credentials are configured for relays, change events that trigger the relayhost logic now reapply the relevant Postfix settings:
smtp_sasl_auth_enable = yes
(SASL auth to outbound MTA connections is enabled)smtp_sasl_security_options = noanonymous
(credentials are mandatory for outbound mail delivery)smtp_tls_security_level = encrypt
(the outbound MTA connection must always be secure due to credentials sent)
- The only breaking change this should introduce is with the Change Detection service (
- The relay host feature was refactored (#3845)
- Environment Variables:
SA_SPAM_SUBJECT
has been renamed intoSPAM_SUBJECT
to become anti-spam service agnostic. (#3820)- As this functionality is now handled in Dovecot via a Sieve script instead of the respective anti-spam service during Postfix processing, this feature will only apply to mail stored in Dovecot. If you have relied on this feature in a different context, it will no longer be available.
- Rspamd previously handled this functionality via the
rewrite_subject
action which as now been disabled by default in favor of the new approach withSPAM_SUBJECT
. SA_SPAM_SUBJECT
is now deprecated and will log a warning if used. The value is copied as a fallback toSPAM_SUBJECT
.- The default has changed to not prepend any prefix to the subject unless configured to do so. If you relied on the implicit prefix, you will now need to provide one explicitly.
undef
was previously supported as an opt-out withSA_SPAM_SUBJECT
. This is no longer valid, the equivalent opt-out value is now an empty value (or rather the omission of this ENV being configured).- The feature to include
_SCORE_
tag in your value to be replaced by the associated spam score is no longer available.
- Supervisord:
supervisor-app.conf
renamed todms-services.conf
- Rspamd:
- the Redis history key has been changed in order to not incorporate the hostname of the container (which is desirable in Kubernetes environments) (#3927)
-
Docs:
- A guide for configuring a public server to relay inbound and outbound mail from DMS on a private server (#3973)
-
Environment Variables:
-
Internal:
- Regular container restarts are now better supported. Setup scripts that ran previously will now be skipped (#3929)
- Environment Variables:
ONE_DIR
has been removed (legacy ENV) (#3840)- It's only functionality remaining was to opt-out of run-time state consolidation with
ONE_DIR=0
(when a volume was already mounted to/var/mail-state
).
- It's only functionality remaining was to opt-out of run-time state consolidation with
- Internal:
- Changed the Postgrey whitelist retrieved during build to source directly from Github as the list is updated more frequently than the author publishes at their website (#3879)
- Enable spamassassin only, when amavis is enabled too. (#3943)
- Tests:
- Refactored helper methods for sending e-mails with specific
Message-ID
headers and the helpers for retrieving + filtering logs, which together help isolate logs relevant to specific mail when multiple mails have been processed within a single test. (#3786)
- Refactored helper methods for sending e-mails with specific
- Rspamd:
- The
rewrite_subject
action, is now disabled by default. It has been replaced with the newSPAM_SUBJECT
environment variable, which implements the functionality via a Sieve script instead which is anti-spam service agnostic (#3820) RSPAMD_NEURAL
was added and is disabled by default. If switched on it will enable the experimental Rspamd "Neural network" module to add a layer of analysis to spam detection (#3833)- The symbol weights of SPF, DKIM and DMARC have been adjusted again. Fixes a bug and includes more appropriate combinations of symbols (#3913, #3923)
- The
- DMS config:
- Variables related to Rspamd are declared as
readonly
, which would cause warnings in the log when being re-declared; we now guard against this issue (#3837) - Relay host feature refactored (#3845)
DEFAULT_RELAY_HOST
ENV can now also use theRELAY_USER
+RELAY_PASSWORD
ENV for supplying credentials.RELAY_HOST
ENV no longer enforces configuring outbound SMTP to require credentials. LikeDEFAULT_RELAY_HOST
it can now configure a relay where credentials are optional.- Restarting DMS should not be required when configuring relay hosts without these ENV, but solely via
setup relay ...
, as change detection events now apply relevant Postfix setting changes for supporting credentials too.
- Rspamd configuration: Add a missing comma in
local_networks
so that all internal IP addresses are actually considered as internal (#3862) - Ensure correct SELinux security context labels for files and directories moved to the mail-state volume during setup (#3890)
- Use correct environment variable for fetchmail (#3901)
- Dovecot dummy accounts (virtual alias workaround for dovecot feature
ENABLE_QUOTAS=1
) now correctly matches the home location of the user for that alias (#3997)
- Dovecot:
- Restrict the auth mechanisms for PassDB configs we manage (oauth2, passwd-file, ldap) (#3812)
- Prevents misleading auth failures from attempting to authenticate against a PassDB with incompatible auth mechanisms.
- When the new OAuth2 feature was enabled, it introduced false-positives with logged auth failures which triggered Fail2Ban to ban the IP.
- Restrict the auth mechanisms for PassDB configs we manage (oauth2, passwd-file, ldap) (#3812)
- Rspamd:
- Ensure correct ownership (
_rspamd:_rspamd
) for the Rspamd DKIM directory + files/tmp/docker-mailserver/rspamd/dkim/
(#3813)
- Ensure correct ownership (
- Authentication with OIDC / OAuth 2.0 🎉
- DMS now supports authentication via OAuth2 (via
XOAUTH2
orOAUTHBEARER
SASL mechanisms) from capable services (like Roundcube).- This does not replace the need for an
ACCOUNT_PROVISIONER
(FILE
/LDAP
), which is required for an account to receive or send mail. - Successful authentication (via Dovecot PassDB) still requires an existing account (lookup via Dovecot UserDB).
- This does not replace the need for an
- DMS now supports authentication via OAuth2 (via
- MTA-STS (Optional support for mandatory outgoing TLS encryption)
- If enabled and the outbound recipient has an MTA-STS policy set, TLS is mandatory for delivering to that recipient.
- Enable via the ENV
ENABLE_MTA_STS=1
- Supported by major email service providers like Gmail, Yahoo and Outlook.
- Enable via the ENV
- If enabled and the outbound recipient has an MTA-STS policy set, TLS is mandatory for delivering to that recipient.
- Docs:
- An example for how to bind outbound SMTP connections to a specific network interface (#3465)
- Tests:
- Revised OAuth2 test (#3795)
- Replace
wc -l
withgrep -c
(#3752) - Revised testing of service process management (supervisord) to be more robust (#3780)
- Refactored mail sending (#3747 & #3772):
- This change is a follow-up to #3732 from DMS v13.2.
swaks
version is now the latest from Github releases instead of the Debian package._nc_wrapper
,_send_mail
and related helpers expect the.txt
filepath extension again.sending.bash
helper methods were refactored to better integrateswaks
and accommodate different usage contexts.test/files/emails/existing/
files were removed similar to previous removal of SMTP auth files as they became redundant withswaks
.
- Internal:
- Postfix is now configured with
smtputf8_enable = no
in our defaultmain.cf
config (instead of during container startup). (#3750)
- Postfix is now configured with
- Rspamd (#3726):
- Symbol scores for SPF, DKIM & DMARC were updated to more closely align with RFC7489. Please note that complete alignment is undesirable as other symbols may be added as well, which changes the overall score calculation again, see this issue
- Docs:
- Setup:
setup
CLI -setup dkim domain
now creates the keys files with the user owning the key directory (#3783)
- Dovecot:
- During container startup for Dovecot Sieve,
.sievec
source files compiled to.svbin
now have theirmtime
adjusted post setup to ensure it is always older than the associated.svbin
file. This avoids superfluous error logs for sieve scripts that don't actually need to be compiled again (#3779)
- During container startup for Dovecot Sieve,
- Internal:
DMS is now secured against the recently published spoofing attack "SMTP Smuggling" that affected Postfix (#3727):
- Postfix upgraded from
3.5.18
to3.5.23
which provides the long-term fix withsmtpd_forbid_bare_newline = yes
- If you are unable to upgrade to this release of DMS, you may follow these instructions for applying the short-term workaround.
- This change should not cause compatibility concerns for legitimate mail clients, however if you use software like
netcat
to send mail to DMS (like our test-suite previously did) it may now be rejected (especially with the the short-term workaroundsmtpd_data_restrictions = reject_unauth_pipelining
). - NOTE: This Postfix update also includes the new parameter
smtpd_forbid_bare_newline_exclusions
which defaults to$mynetworks
for excluding trusted mail clients excluded from the restriction.- With our default
PERMIT_DOCKER=none
this is not a concern. - Presently the Docker daemon config has
user-proxy: true
enabled by default.- On a host that can be reached by IPv6, this will route to a DMS IPv4 only container implicitly through the Docker network bridge gateway which rewrites the source address.
- If your
PERMIT_DOCKER
setting allows that gateway IP, then it is part of$mynetworks
and this attack would not be prevented from such connections. - If this affects your deployment, refer to our IPv6 docs for advice on handling IPv6 correctly in Docker. Alternatively use our
postfix-main.cf
to setsmtpd_forbid_bare_newline_exclusions=
as empty.
- With our default
- The test suite now uses
swaks
instead ofnc
, which has multiple benefits (#3732):swaks
handles pipelining correctly, hence we can now usereject_unauth_pipelining
in Postfix's configuration.swaks
provides better CLI options that make many files superflous.swaks
can also replaceopenssl s_client
and handles authentication on submission ports better.
- Postfix:
- We now defer rejection from unauthorized pipelining until the SMTP
DATA
command viasmtpd_data_restrictions
(i.e. at the end of the mail transfer transaction) (#3744)- Prevously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at
DATA
where unauthorized pipelining would have been valid from this point. - If you had the Amavis service enabled (default), this restriction was already in place. Otherwise the concerns expressed with
smtpd_data_restrictions = reject_unauth_pipelining
from the security section above apply. We have permitted trusted clients ($mynetworks
or authenticated) to bypass this restriction.
- Prevously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at
- We now defer rejection from unauthorized pipelining until the SMTP
- Dovecot:
- ENV
ENABLE_IMAP
(#3703)
- ENV
- Tests:
- You can now use
make run-local-instance
to run a DMS image that was built locally to test changes (#3663)
- You can now use
- Internal:
- Log a warning when update-check is enabled, but no stable release image is used (#3684)
- Documentation:
- Internal:
- Postfix configures
virtual_mailbox_maps
andvirtual_transport
during startup instead of using defaults (configured for Dovecot) via ourmain.cf
(#3681)
- Postfix configures
- Rspamd:
- Upgraded to version
3.7.5
. This was previously inconsistent between our AMD64 (3.5
) and ARM64 (3.4
) images (#3686)
- Upgraded to version
- Internal:
- The container startup welcome log message now references
DMS_RELEASE
(#3676) VERSION
was incremented for prior releases to be notified of the v13.0.1 patch release (#3676)VERSION
is no longer included in the image (#3711)- Update-check: fix 'read' exit status (#3688)
ENABLE_QUOTAS=0
no longer tries to remove non-existent config (#3715)- The
postgrey
service now writes logs to the supervisor directory like all other services. Previously this was/var/log/mail/mail.log
(#3724)
- The container startup welcome log message now references
- Rspamd:
- Switch to official arm64 packages to avoid segfaults (#3686)
- CI / Automation:
- The lint workflow can now be manually triggered by maintainers ([#3714]docker-mailserver#3714)
This patch release fixes two bugs that Rspamd users encountered with the v13.0.0
release. Big thanks to the those that helped to identify these issues! ❤️
- Internal:
- The update check service now queries the latest GH release for a version tag (instead of from a
VERSION
file at the GH repo). This should provide more reliable update notifications (#3666)
- The update check service now queries the latest GH release for a version tag (instead of from a
- Rspamd:
- The check for correct permission on the private key when signing e-mails with DKIM was flawed. The result was that a false warning was emitted (#3669)
- When
RSPAMD_CHECK_AUTHENTICATED=0
, DKIM signing for outbound e-mail was disabled, which is undesirable (#3669). Make sure to check the documentation ofRSPAMD_CHECK_AUTHENTICATED
!
- LDAP:
- Rspamd:
- The deprecated path for the Rspamd custom commands file (
/tmp/docker-mailserver/rspamd-modules.conf
) now prevents successful startup. The correct path is/tmp/docker-mailserver/rspamd/custom-commands.conf
.
- The deprecated path for the Rspamd custom commands file (
- Dovecot:
- Dovecot mail storage per account in
/var/mail
previously shared the same path for the accounts home directory (#3335)- The home directory now is a subdirectory
home/
. This change better supports sieve scripts. - NOTE: The change has not yet been implemented for
ACCOUNT_PROVISIONER=LDAP
.
- The home directory now is a subdirectory
- Dovecot mail storage per account in
- Postfix:
/etc/postfix/master.cf
has renamed the "smtps" service to "submissions" (#3235)- This is the modern
/etc/services
name for port 465, aligning with the similar "submission" port 587. - If you have configured Proxy Protocol support with a reverse proxy via
postfix-master.cf
(as per our docs guide), you will want to updatesmtps
tosubmissions
there.
- This is the modern
- Postfix now defaults to supporting DSNs (Delivery Status Notifications) only for authenticated users (via ports 465 + 587). This is a security measure to reduce spammer abuse of your DMS instance as a backscatter source. (#3572)
-
If you need to modify this change, please let us know by opening an issue / discussion.
-
You can opt out (enable DSNs) via the
postfix-main.cf
override support using the contents:smtpd_discard_ehlo_keywords =
. -
Likewise for authenticated users, the submission(s) ports (465 + 587) are configured internally via
master.cf
to keep DSNs enabled (since authentication protects from abuse).If necessary, DSNs for authenticated users can be disabled via the
postfix-master.cf
override with the following contents:submission/inet/smtpd_discard_ehlo_keywords=silent-discard,dsn submissions/inet/smtpd_discard_ehlo_keywords=silent-discard,dsn
-
- Features:
- Environment Variables:
MARK_SPAM_AS_READ
. When set to1
, marks incoming spam as "read" to avoid unwanted "new mail" notifications for junk mail (#3489)DMS_VMAIL_UID
andDMS_VMAIL_GID
allow changing the default ID values (5000:5000
) for the Dovecot vmail user and group (#3550)RSPAMD_CHECK_AUTHENTICATED
allows authenticated users to avoid additional security checks by Rspamd (#3440)
- Documentation:
- Use-case examples / tutorials:
- Debugging page:
- Better communicate distinction between DMS FQDN and DMS mail accounts (#3372)
- Traefik example now includes
passthrough=true
on implicit ports (#3568) - Rspamd docs have received a variety of revisions (#3318, #3325, #3329)
- IPv6 config examples with content tabs (#3436)
- Mention internet.nl as another testing service (#3445)
setup alias add ...
CLI help message now includes an example for aliasing to multiple recipients (#3600)SPAMASSASSIN_SPAM_TO_INBOX=1
, now emits a debug log to raise awareness thatSA_KILL
will be ignored (#3360)CLAMAV_MESSAGE_SIZE_LIMIT
now logs a warning when the value exceeds what ClamAV is capable of supporting (4GiB max scan size #3332, 2GiB max file size #3341)- Added note to caution against changing
mydestination
in Postfix'smain.cf
(#3316)
- Internal:
- Tests:
- Additional linting check for BASH syntax (#3369)
- Misc:
- Changed
setup config dkim
default key size to2048
(open-dkim
) (#3508)
- Changed
- Postfix:
- Dropped special bits from
maildrop/
andpublic/
directory permissions (#3625)
- Dropped special bits from
- Rspamd:
- Adjusted learning of ham (#3334)
- Adjusted
antivirus.conf
(#3331) logrotate
setup + Rspamd log path + tests log helper fallback path (#3576)- Setup during container startup is now more resilient (#3578)
- Changed DKIM default config location (#3597)
- Removed the symlink for the
override.d/
directory in favor of usingcp
, integrated into the changedetector service, added a--force
option for the Rspamd DKIM management, and provided a dedicated helper script for common ENV variables (#3599) - Required permissions are now verified for DKIM private key files (#3627)
- Documentation:
- Documentation aligned to Compose v2 conventions,
docker-compose
command changed todocker compose
,docker-compose.yaml
tocompose.yaml
(#3295) - Restored missing edit button (#3338)
- Complete rewrite of the IPv6 page (#3244, #3531)
- Complete rewrite of the "Update and Cleanup" maintenance page (#3539, #3583)
- Improved debugging page advice on working with logs (#3626, #3640)
- Clarified the default for ENV
FETCHMAIL_PARALLEL
(#3603) - Removed port 25 from FAQ entry for mail client ports supporting authenticated submission (#3496)
- Updated home path in docs for Dovecot Sieve (#3370, #3650)
- Fixed path to
rspamd.log
(#3585) - "Optional Config" page now uses consistent lowercase convention for directory names (#3629)
CONTRIBUTORS.md
: Removed redundant "All Contributors" section (#3638)
- Documentation aligned to Compose v2 conventions,
- Internal:
- CI / Automation:
.gitattributes
now ensures files are committed witheol=lf
(#3527)- Revised the GitHub issue bug report template (#3317, #3381, #3435)
- Clarified that the issue tracker is not for personal support (#3498, #3502)
- Bumped versions of miscellaneous software (also shoutout to @dependabot) (#3371, #3584, #3504, #3516)
- Tests:
- Security:
- Internal:
- CI:
- Scheduled build now have the correct permissions to run successfully (#3345)
- Documentation:
- Tests:
- Rspamd:
- make
policyd-spf
configurable (#3246) - add 'log' command to set up for Fail2Ban (#3299)
setup
command now expects accounts and aliases to be mutually exclusive (#3270)
- update DKIM/DMARC/SPF docs (#3231)
- Fail2Ban:
- Rspamd:
- improve shutdown function by making PANIC_STRATEGY obsolete (#3265)
- update
bug_report.yml
(#3275) - simplify
bug_report.yml
(#3276) - revised the contributor workflow (#2227)
- default registry changed from DockerHub (
docker.io
) to GHCR (ghcr.io
) (#3233) - consistent namings in docs (#3242)
- get all
policyd-spf
setup in one place (#3263) - miscellaneous script improvements (#3281)
- update FAQ entries (#3294)
- GitHub Actions docs update workflow (#3241)
- fix dovecot: ldap mail delivery works (#3252)
- shellcheck: do not check .git folder (#3267)
- add missing -E for extended regexes in
smtpd_sender_restrictions
(#3272) - fix setting
SRS_EXCLUDE_DOMAINS
during startup (#3271) - remove superfluous
EOF
indmarc_dkim_spf.sh
(#3266) - apply fixes to helpers when using
set -eE
(#3285)
Notable changes are:
- Rspamd feature is promoted from preview status
- Services no longer use
chroot
- Fail2Ban major version upgrade
- ARMv7 platform is no longer suppoted
- TLS 1.2 is the minimum supported protocol
- SMTP authentication on port 25 disabled
- The value of
smtpd_sender_restrictions
for Postfix has replaced the value (#3127):- In
main.cf
with$dms_smtpd_sender_restrictions
- In
master.cf
inbound submissions ports 465 + 587 extend this inheritedsmtpd
restriction with$mua_sender_restrictions
- In
- security: Rspamd support:
- integration into scripts, provisioning of configuration & documentation (#2902,#3016,#3039)
- easily adjust options & modules (#3059)
- advanced documentation (#3104)
- make disabling Redis possible (#3132)
- persistence for Redis (#3143)
- integrate into
MOVE_SPAM_TO_JUNK
(#3159) - make it possible to learn from user actions (#3159)
- heavily updated CI & tests:
- add information to Logwatch's mailer so
Envelope From
is properly set (#3081) - add vulnerability scanning workflow & security policy (#3106)
- Add tools (ping & dig) to the image (2989)
- Fail2Ban major version updated to v1.0.2 (#2959)
- heavily updated CI & tests:
- we now run more tests in parallel bringing down overall time to build and test AMD64 to 6 minutes (#2938,#3038,#3018,#3062)
- remove CI ENV & disable fail-fast strategy (#3065)
- streamlined GH Actions runners (#3025)
- updated BATS & helper + minor updates to BATS variables (#2988)
- improved consistency and documentation for test helpers (#3012)
- improve the
clean
recipe (don't requiresudo
anymore) (#3020) - improve Amavis setup routine (#3079)
- completely refactor README & parts of docs (#3097)
- TLS setup (self-signed) error message now includes
SS_CA_CERT
(#3168) - Better default value for SA_KILL variable (#3058)
restrict-access
avoid inserting duplicates (#3067)- correct the casing for Mime vs. MIME (#3040)
- Dovecot:
- OpenDMARC - Change default policy to reject (#2933)
- Change Detection service - Use service
reload
instead of restarting process to minimize downtime (#2947) - Slightly faster container startup via
postconf
workaround (#2998) - Better group ownership to
/var/mail-state
+ ClamAV inDockerfile
(#3011) - Dropping Postfix
chroot
mode: - Fixed several typos (#2990) (#2993)
- SRS setup fixed (#3158)
- Postsrsd restart loop fixed (#3160)
- Order of DKIM/DMARC milters matters (#3082)
- Make logrotate state persistant (#3077)
- the Dovecot community repository is now the default (#2901)
- moved SASL authentication socket location (#3131)
- only add Amavis configuration to Postfix when enabled (#3046)
- improve bug report template (#3080)
- remove Postfix DNSBLs (#3069)
- bigger script updates:
- improve Postfix config for spoof protection (#3127)
- Change Detection service - Remove 10 sec start-up delay (#3064)
- Postfix:
- Fail2Ban - Added support packages + remove wrapper script (#3032)
- Replace path with variable in mail_state.sh (#3153)
- configomat (submodule) (#3045)
- Due to deprecation:
- Redundant:
- build: Fix dovecot-fts-xapian dependency, when using dovecot community repository (#2937)
- scripts: Fail2ban - Enable network bans (#2818)
- ci: run tests in parallel (#2857)
- docs: added note about Docker version to documentation (#2799)
- configuration: Run fetchmail not in verbose mode (#2859)
- build: cleaned up
Makefile
and its targets (#2833) - configuration: adjust handling of DNSBL return codes (#2890)
- ci: change to new output format in GH actions (#2892)
- build: cleaned up Makefile (#2833)
- tests: miscellaneous enhancements (#2815)
- scripts:
./setup.sh email list
did not display aliases correctly (#2877) - scripts: Improve error handling, when parameters are missing (#2854)
- scripts: Fix unbound variable error (#2849, #2853)
- scripts: Make fetchmail data persistent (#2851)
- scripts: Run
user-patches.sh
right before starting daemons (#2817) - scripts: Run Amavis cron job only when Amavis is enabled (#2831)
- config:
opendmarc.conf
- Change the default OpenDMARC policy to reject (#2933)
-
Removing TLS 1.0 and TLS 1.1 ciphersuites from
TLS_LEVEL=intermediate
You should not realistically need support for TLS 1.0 or TLS 1.1, except in niche scenarios such as an old printer/scanner device that refuses to negotiate a compatible non-vulnerable cipher. More details covered here. -
SASL_PASSWD
ENV An old ENVSASL_PASSWD
has been around for supporting relay-host authentication, but since superceded by thepostfix-sasl-password.cf
config file. It will be removed in a future major release as detailed here. -
Platform Support - ARMv7 This is a very old platform, superceded by ARMv8 and newer with broad product availability around 2016 onwards. Support was introduced primarily for users of the older generations of Raspberry Pi. ARM64 is the modern target for ARM devices.
If you require ARMv7 support, please let us know.
This release features a lot of small and medium-sized changes, many related to how the image is build and tested during CI. The build now multi-stage based and requires Docker Buildkit, as the ClamAV Signatures are added via COPY --link ...
during build-time.
- The environment variable
ENABLE_LDAP
is deprecated and will be removed in [13.0.0]. UseACCOUNT_PROVISIONER=LDAP
now.
- documentation: improve cron tasks documentation and fix link in documentation
- documentation: added link to brakkee.org for setup of docker-mailserver on Kubernetes
- CI: better build caching for CI
- CI: improve GitHub Action CI with re-usable workflows
- tests: ensure excessive FD limits are avoided
- configuration: added
reject_unknown_client_hostname
to main.cf
- documentation: update and improve K8s documentation
- scripts: set configomat output to loglevel debug
- scripts: refactor CLI commands for database management
- scripts: simplify Fail2Ban output
- tests: update submodules for BATS
- scripts: rework environment variables setup
- scripts: revised linting script
- scripts:
addmailuser
- remove delaying completion until/var/mail
is ready - configuration: remove unnecessary postconf switch '-e' and use single quotes where possible
- build: streamline COPY statements in Dockerfile
- scripts: improve
helpers/log.sh
- build: adjust build arguments
- build: enhance build process
- configuration: remove unnecessary configuration files
- documentation: update documentation to fix regression causing broken links
- scripts:
_create_accounts()
should run after waiting - scripts: only calculate checksums, when there are files to monitor.
- tests: wait at least 30 seconds before checking the health state of the container
- CI: add
outputs
toworkflow_call
ongeneric_build
There are no security-related changes in this release.
Note: This part of the changelog was created before switching to the "Keep a Changelog"-format.
In this release the relay-host support saw significant internal refactoring in preparation for a future breaking change. Similar extensive restructuring through the codebase also occurred, where each PR provides more details. Care was taken to avoid breakage, but there may be some risk affecting unsupported third-party customizations which our test suite is unaware of.
- There is now support for Dovecot-Master accounts that provide admin access to all mail accounts (#2535)
- Using Port 465 to authenticate with a relay-host no longer breaks the Amavis transport for Postfix (#2607)
- When mounting
/var/mail-state
, disabled services will no longer copy over data redundantly (#2608) - Amavis is now aware of new domains detected during Change Detection, no longer skipping virus and spam filtering (#2616)
setup.sh -c <container name>
no longer ignores<container name>
when more than 1docker-mailserver
container is running (#2622)
- The Change Detector service will now only process relevant changes (#2615), in addition to now monitoring
postfix-sasl-password.cf
,postfix-relaymap.cf
, andpostfix-regexp.cf
(#2623) - For LDAP users that only need to support a single mail domain,
setup config dkim
should now detect the domain implicitly (#2620) - The container capability
SYS_PTRACE
is no longer necessary (#2624) - Added an example for configuring a basic container
healthcheck
command (#2625) - Postfix
main.cf
settingcompatibility_level
was set to2
during our startup scripts. This is now part of our default shippedmain.cf
config (#2597) - The Postfix
main.cf
override/extension support viapostfix-main.cf
has been improved to support multi-line values, instead of the previous single-line only support (#2598)
-
SASL_PASSWD
ENV An old ENVSASL_PASSWD
has been around for supporting relay-host authentication, but since superceded by thepostfix-sasl-password.cf
config file. It will be removed in a future major release as detailed here. -
Platform Support - ARMv7 This is a very old platform, superceded by ARMv8 and newer with broad product availability around 2016 onwards. Support was introduced primarily for users the older generations of Raspberry Pi. ARM64 is the modern target for ARM devices.
If you require ARMv7 support, please let us know.
- Internal logging has been refactored. The environment variable
DMS_DEBUG
has been replaced byLOG_LEVEL
to better control the verbosity of logs we output. The new logger is more structured and follows standard log conventions.LOG_LEVEL
can be set to:error
,warn
,info
(default),debug
andtrace
. iptables
has been replaced bynftables
. The Fail2Ban configuration was adjusted accordingly. If you useiptables
yourself (e.g. inuser-patches.sh
), make sure to update the scripts.PERMIT_DOCKER
has a new default value ofnone
. This change better secures Podman; to keep the old behaviour (adding the container IP address to Postfix'smynetworks
), usePERMIT_DOCKER=container
.
- Many minor improvements were made (cleanup & refactoring). Please refer to the section below to get an overview over all improvements. Moreover, there was a lot of cleanup in the scripts and in the tests. The documentation was adjusted accordingly.
- New environment variables were added:
- SpamAssassin KAM was added with
ENABLE_SPAMASSASSIN_KAM
. - The
fail2ban
command was reworked and can now ban IP addresses as well. - There were a few small fixes, especially when it comes to bugs in scripts and service restart loops (no functionality changes, only fixes of existing functionality). When building an image from the Dockerfile - Installation of Postfix on modern Linux distributions should now always succeed.
- Some default values for environment values changed: these are mostly non-critical, please refer to #2428 and #2487.
- [improvement] tests: remove legacy functions / tests #2434
- [improvement]
PERMIT_DOCKER=none
as new default value #2424 - [improvement] Adjust environment variables to more sensible defaults #2428
- [fix] macOS linting support #2448
- [improvement] Rename config examples directory #2438
- [docs] FAQ - Update naked/bare domain section #2446
- [improvement] Remove obsolete
setup.sh debug inspect
command from usage description #2454 - [feature] Introduce
CLAMAV_MESSAGE_SIZE_LIMIT
env #2453 - [fix] remove SA reload for KAM #2456
- [docs] Enhance logrotate description #2469
- [improvement] Remove macOS specific code / support + shellcheck should avoid python, regardless of permissions #2466
- [docs] Update fail2ban.md #2484
- [fix] Makefile: Remove backup/restore of obsolete config directory #2479
- [improvement] scripts: small refactorings #2485
- [fix] Building on Ubuntu 21.10 failing to install postfix #2468
- [improvement] Use FQDN as
REPORT_SENDER
default value #2487 - [improvement] Improve test, get rid of sleep #2492
- [feature] scripts: new log #2493
- [fix] Restart supervisord early #2494
- [improvement] scripts: renamed function
_errex
->_exit_with_error
#2497 - [improvement] Remove invalid URL from SPF message #2503
- [improvement] scripts: refactored scripts located under
target/bin/
#2500 - [improvement] scripts: refactoring & miscellaneous small changes #2499
- [improvement] scripts: refactored
daemon-stack.sh
#2496 - [fix] add compatibility for Bash 4 to setup.sh #2519
- [fix] tests: disabled "quota exceeded" test #2511
- [fix] typo in setup-stack.sh #2521
- [improvement] scripts: introduce
_log
tosedfile
#2507 - [feature] create
.github/FUNDING.yml
#2512 - [improvement] scripts: refactored
check-for-changes.sh
#2498 - [improvement] scripts: remove
DMS_DEBUG
#2523 - [feature] firewall: replace
iptables
withnftables
#2505 - [improvement] log: adjust level and message(s) slightly for four messages #2532
- [improvement] log: introduce proper log level fallback and env getter function #2506
- [feature] scripts: added
TZ
environment variable to set timezone #2530 - [improvement] setup: added grace period for account creation #2531
- [improvement] refactor: letsencrypt implicit location discovery #2525
- [improvement] setup.sh/setup: show usage when no argument is given #2540
- [improvement] Dockerfile: Remove not needed ENVs and add comment #2541
- [improvement] chore: (setup-stack.sh) Fix a small typo #2552
- [feature] Add ban feature to fail2ban script #2538
- [fix] Fix changedetector restart loop #2548
- [improvement] chore: Drop
setup.sh
DATABASE fallback ENV #2556
- This release fixes a critical issue for LDAP users, installing a needed package on Debian 11 on build-time. Moreover, a race-condition was eliminated (#2341).
- A resource leak in
check-for-changes.sh
was fixed (#2401)
SPAMASSASSIN_SPAM_TO_INBOX
's default changed to1
. (#2361)- Changedetector functionality was added to
SSL_TYPE=manual
-setups. (#2404) - Four new environment variables were introduced:
LOGWATCH_SENDER
,ENABLE_DNSBL
,DOVECOT_INET_PROTOCOLS
andENABLE_SPAMASSASSIN_KAM
. (#2362, #2342, #2358, #2418) - There are plenty of bug fixes and documentation enhancements with this release.
- [fix] added
libldap-common
to packages in Dockerfile in #2341 - [fix] Prevent race condition on supervisorctl reload in #2343
- [docs] Update links to dovecot docs in #2351
- [fix] tests(fix): Align with upstream
testssl
field name change in #2353 - [improvement] Make TLS tests more reliable in #2354
- [feature] Introduce ENABLE_DNSBL env in #2342
- [feature] Introduce DOVECOT_INET_PROTOCOLS env in #2358
- [fix] Fix harmless startup errors in #2357
- [improvement] Add tests for sedfile wrapper in #2363
- [feature] add env var
LOGWATCH_SENDER
in #2362 - [fix] Fixed non-number-argument in
listmailuser
in #2382 - [fix] docs: Fail2Ban - Fix links for rootless podman in #2384
- [fix] docs(kubernetes): fix image name in example in #2385
- [fix] SSL documentation contains a small bug #2381 #2383
- [fix] get rid of subshell +
exec
inhelper-functions.sh
in #2401 - [docs] Rootless Podman security update #2393
- [fix] fix: double occurrence of
/etc/postfix/regexp
in #2397 - [improvement] consistently make 1 the default value for
SPAMASSASSIN_SPAM_TO_INBOX
in #2361 - [docs] added sieve example for subaddress sorting in #2410
- [feature] Add changedetector functionality for
${SSL_TYPE} == manual
in #2404 - [docs] docs(deps): bump mkdocs-material to v8.2.1 in #2422
- [feature] Add SpamAssassin KAM in #2418
- [improvement] refactoring: split helper functions into smaller scripts in #2420
- [fix] fix: do not add accounts that already exists to account files in #2419
This release upgrades our base image from Debian 10 to Debian 11.
There is also an important regression fixed for SSL_TYPE=letsencrypt
users.
- [fix] A regression with
check-for-changes.sh
introduced inv10.3.0
affectedSSL_TYPE=letsencrypt
, preventing detection of cert renewals to restart services (unless usingacme.json
) #2326 - [improvement] Base image upgraded from Debian 10 Buster to Debian 11 Bullseye #2116
- Postfix upgraded from
3.4
to3.5
. Dovecot upgraded from2.3.4
to2.3.13
. Python 2 is no longer included in the image, Python 3 remains (more information). yescrypt
is now supported upstream as a password hash algorithm,docker-mailserver
continues to useSHA512-CRYPT
(more information).
- Postfix upgraded from
- [chore] Dovecot statistics service disabled #2292
WARNING: This release had a small regression affecting the detection of changes for certificates provisioned in /etc/letsencrypt
with the config ENV SSL_TYPE=letsencrypt
, unless you use Traefik's acme.json
. If you rely on this functionality to restart Postfix and Dovecot when updating your cert files, this will not work and it is advised to upgrade to v10.4.0
or newer prior to renewal of your certificates.
- [fix] The Dovecot
userdb
will now additionally create "dummy" accounts for basic alias maps (alias maps to a single real account managed by Dovecot, relaying to external providers aren't affected) whenENABLE_QUOTAS=1
(default) as a workaround for Postfixquota-status
plugin querying Dovecot with inbound mail for a user, which Postfix uses to reject mail if quota has been exceeded (to avoid risk of blacklisting from spammers abusing backscatter) #2248- NOTE: If using aliases that map to another alias or multiple addresses, this remains a risk.
- [fix]
setup email list
command will no longer attempt to query Dovecot quota status whenENABLE_QUOTAS
is disabled #2264 - [fix]
SSL_DOMAIN
ENV should now work much more reliably #2274, #2278, #2279 - [fix] DKIM - Removed
refile:
(regex type) from KeyTable entry inopendkim.conf
, fixes validation error output fromopendkim-testkey
#2249 - [fix] DMARC - Removed quotes around the hostname value in
opendmarc.conf
. This avoids an authentication failure where an OpenDKIM header was previously ignored #2291 - [fix] When using
ONE_DIR=1
(default), thespool-postfix
folder now has the correct permissions carried over. This resolves some failures notably with sieve filters #2273 - [improvement] Warnings are now logged for ClamAV and SpamAssassin if they are enabled but Amavis is disabled (which is required for them to work correctly) #2251
- [improvement]
user-patches.sh
is now invoked viabash
to assist Kubernetes deployments withConfigMap
#2295
These changes are primarily internal and are only likely relevant to users that maintain their own modifications related to the changed files.
- [chore] Redundant config from Postfix
master.cf
has been removed, it should not affect any users as our images have not included any of the related processes #2272 - [refactor]
check-for-changes.sh
was carrying some duplicate code fromsetup-stack.sh
that was falling out of sync, they now share common code #2260 - [refactor]
acme.json
extraction was refactored into a CLI utility and updated to Python 3 (required for future upgrade to Debian 11 Bullseye base image) #2274 - [refactor] As part of the Traefik
acme.json
andSSL_DOMAIN
work, logic forSSL_TYPE=letsencrypt
was also revised #2278 - [improvement] Some minor tweaks to how we derive the internal
HOSTNAME
andDOMAINNAME
from user configuredhostname
anddomainname
settings #2280
- You no longer need to maintain a copy of
setup.sh
matching your version release from v10.2 ofdocker-mailserver
onwards. Version specific functionality ofsetup.sh
has moved into the container itself, whilesetup.sh
remains as a convenient wrapper to:docker exec -it <container name> setup <command>
. ONE_DIR
now defaults to enabled (1
).- For anyone relying on internal location of certificates (internal copy of mounted files at startup), the Postfix and Dovecot location of
/etc/postfix/ssl
has changed to/etc/dms/tls
. This may affect any third-partyuser-patches.sh
scripts that depended on this path to update certs. - The Let's Encrypt section of our SSL / TLS docs has been brought up to date.
- [scripts] update
setup.sh
to now use a running container first if one exists #2134 - [scripts] included
setup.sh
functionality inside the container to be version independent again #2174 - [scripts]
HOSTNAME
andDOMAINNAME
setup improved #2175 - [scripts]
delmailuser
can now delete mailboxed without TLD #2172 - [scripts] properly exit on failure (#2199 in conjunction with #2196)
- [scripts] make
setup.sh
completely non-interactive for Podman users #2201
Some internal refactoring and fixes happened this release cycle in #2196:
- [improve] The Postfix and Dovecot location of
/etc/postfix/ssl
has changed to/etc/dms/tls
- [improve] An invalid
SSL_TYPE
or a valid value with an invalid configuration will now panic, exiting the container and emitting a fatal error to the logs - [fix] An unconfigured/empty
SSL_TYPE
ENV now correctly disables SSL support for Dovecot and general Postfix configurations. A reminder that this is unsupported officially, and is only intended for tests and troubleshooting. Use only a validSSL_TYPE
(letsencrypt
andmanual
are recommended) for production deployments - [fix]
TLS_LEVEL=intermediate
now modifies the system (container)openssl.cnf
config to set the minimum protocol to TLS 1.0 (from 1.2) and cipher-suite support toDEFAULT@SECLEVEL=1
(from2
). This change is required for Dovecot in upcoming Debian Bullseye upgrade, to be compatible with theTLS_LEVEL=intermediate
cipher-suite profile. It may affect other software within the container that relies on this openssl config, should you extend the Docker image #2193 - [fix] Provide DH parameters (default: RFC 7919 group
ffdhe406.pem
) at build-time, instead of during startup. Custom DH parameters regardless ofONE_DIR
are now only detected when mounted to/tmp/docker-mailserver/dhparams.pem
#2192 - [docs] Revise the Let's Encrypt section of our SSL / TLS docs #2209
- [ci] improved caching #2197
- [ci] refactored spam tests and introduced common container setup template #2198
- [fix] update Fail2Ban wrapper to propagate errors to user #2170
- [fix] Dockerfile
sed
's are now checked #2158 - [general] Updated default value of
ONE_DIR
to1
#2148 - [docs] updated Kubernetes documentation #2111
- [docs] introduced dedicated Podman documentation #2179
- [docs] miscellaneous documentation improvements
- [misc] introduced GitHub issue forms for issue templates #2160
- [misc] Removed the internal
mkcert.sh
script for Dovecot as it is no longer needed #2196
This is bug fix release. It reverts a regression introduced with #2104.
This release mainly improves on v10.1.0
with small bugfixes/improvements and dependency updates
- [feat] Add logwatch maillog.conf file to support /var/log/mail/ (#2112)
- [docs]
CONTRIBUTORS.md
now also shows every code contributor from the past (#2143) - [improve] Avoid chmod +x when not needed (#2127)
- [improve] check-for-changes: performance improvements (#2104)
- [dependency] Update various dependencies through docs and base image
- [security] This release contains also security fixes for OpenSSL
This release mainly improves on v10.0.0
with many bugfixes.
- [docs] Various documentation updates (#2105, #2045, #2043, #2035, #2001)
- [misc] Fixed a lot of small bugs, updated dependencies and improved functionality (#2095, #2047, #2046, #2041, #1980, #2030, #2024, #2001, #2000, #2059)
- [feat] Added dovecot-fts-xapian (#2064)
- [security] Switch GPG keyserver (#2051)
This release improves on 9.1.0
in many aspect, including general fixes, Fail2Ban, LDAP and documentation. This release contains breaking changes.
- [general] Fixed many prose errors (spelling, grammar, indentation).
- [general] Documentation is better integrated into the development process and it's visibility within the project increased (#1878).
- [general] Added
stop_grace_period:
to example Compose file and supervisord (#1896 #1945) - [general]
./setup.sh email list
was enhanced, now showing information neatly (#1898) - [general] Added update check and notification (#1976, #1951)
- [general] Moved environment variables to the documentation and improvements (#1948, #1947, #1931)
- [security] Major Fail2Ban improvements (cleanup, update and breaking changes, see below)
- [fix]
./setup.sh email del ...
now works properly - [code] Added color variables to
setup.sh
and improved the script as a whole (#1879, #1886) - [ldap] Added
LDAP_QUERY_FILTER_SENDERS
(#1902) - [ldap] Use dovecots LDAP
uris
connect option instead ofhosts
(#1901) - [ldap] Complete rework of LDAP documentation (#1921)
- [docs] PRs that contain changes to docs will now be commented with a preview link (#1988)
- [security] Fail2Ban adjustments:
- Fail2ban v0.11.2 is now used (#1965).
- The previous F2B config (from an old Debian release) has been replaced with the latest default config for F2B shipped by Debian 10.
- The new default blocktype is now
DROP
, notREJECT
(#1914). - A ban now applies to all ports (
iptables-allports
), not just the ones that were "attacked" (#1914). - Fail2ban 0.11 is totally compatible to 0.10, but the database got some new tables and fields (auto-converted during the first start), so once updated to DMS 10.0.0, you have to remove the database
mailstate:/lib-fail2ban/fail2ban.sqlite3
if you would need to downgrade to DMS 9.1.0 for some reason.
- [ldap] Removed
SASLAUTHD_LDAP_SSL
. Instead provide a protocol inSASLAUTHD_LDAP_SERVER
and adjustSASLAUTHD_LDAP_
default values (#1989). - [general] Removed
stable
release tag (#1975):- Scheduled builds are now based off
edge
. - Instead of
stable
, please use the latest version tag available (or thelatest
tag). - The
stable
image tag will be removed from DockerHub in the near future.
- Scheduled builds are now based off
- [setup] Removed
./setup config ssl
command (deprecated since v9).SSL_TYPE=self-signed
remains supported however. (dc8f49de
, #2021)
This release marks the breakpoint where the wiki was transferred to a reworked documentation
- [feat] Introduce ENABLE_AMAVIS env (#1866)
- [docs] Move wiki to gh-pages (#1826) - Special thanks to @polarathene 👨🏻💻
- You can edit the docs now directly with your code changes
- Documentation is now versioned related to docker image versions and viewable here: https://docker-mailserver.github.io/docker-mailserver/latest/
A small update on the notification function which was made more stable as well as minor fixes.
- [fix]
_notify
cannot fail anymore - non-zero returns lead to unintended behavior in the past whenDMS_DEBUG
was not set or0
- [refactor]
check-for-changes.sh
now uses_notify
- [feat] Support extra
user_attributes
in accounts configuration (#1792) - [feat] Add possibility to use a custom dkim selector (#1811)
- [feat] TLS: Dual (aka hybrid) certificate support! (eg ECDSA certificate with an RSA fallback for broader compatibility) (#1801).
- This feature is presently only for
SSL_TYPE=manual
, all you need to do is provide your fallback certificate to theSSL_ALT_CERT_PATH
andSSL_ALT_KEY_PATH
ENV vars, just like your primary certificate would be setup for manual mode.
- This feature is presently only for
- [security] TLS: You can now use ECDSA certificates! (#1802)
- Warning: ECDSA may not be supported by legacy systems (most pre-2014). You can provide an RSA certificate as a fallback.
- [fix] TLS: For some docker-compose setups when restarting the docker-mailserver container, internal config state may have been persisted despite making changes that should reconfigure TLS (eg changing
SSL_TYPE
or replacing the certificate file) (#1801). - [refactor] Split
start-mailserver.sh
(#1820) - [fix] Linting now uses local path to remove the sudo dependency (#1831).
- [security] TLS:
TLS_LEVEL=modern
has changed the server-side preference order to 128-bit before 256-bit encryption (#1802).- NOTE: This is still very secure but may result in misleading lower scores/grades from security audit websites.
- [security] TLS:
TLS_LEVEL=modern
removed support for AES-CBC cipher suites and follows best practices by supporting only AEAD cipher suites (#1802).- NOTE: As TLS 1.2 is the minimum required for modern already, AEAD cipher suites should already be supported and preferred.
- [security] TLS:
TLS_LEVEL=intermediate
has removed support for cipher suites using RSA for key exchange (only available with an RSA certificate) (#1802).- NOTE: This only affects Dovecot which supported 5 extra cipher suites using AES-CBC and AES-GCM. Your users MUA clients should be unaffected, preferring ECDHE or DHE for key exchange.
- [refactor] Complete refactoring of opendkim script (#1812).
- NOTE: Use
./setup.sh config dkim help
to see the new syntax.
- NOTE: Use
This release is a hotfix for #1781.
- [spam]
bl.spamcop.net
was removed from the list of spam lists since the domain expired and became unusable
The transfer of the old repository to the new organization has completed. This release marks the new starting point for docker-mailserver
in the docker-mailserver
organization. Various improvements were made, small bugs fixed and the complete CI was transferred.
- [general] transferred the whole repository to
docker-mailserver/docker-mailserver
- [general] adjusted
README.md
and split offENVIRONMENT.md
- [ci] usage of the GitHub Container Registry
- [ci] switched from TravisCI to GitHub Actions for CI/CD
- now building images for
amd64
andarm/v7
andarm/64
- integrated stale issues action to automatically close stale issues
- adjusted issue templates
- now building images for
- [build] completely refactored and improved the
Dockerfile
- [build] improved the
Makefile
- [image improvement] added a proper init process
- [image improvement] improved logging significantly
- [image improvement] major LDAP improvements
- [bugfixes] miscellaneous bug fixes and improvements
- [image improvement] log-level now defaults to
warn
- [image improvement] DKIM default key size now 4096
- [general] the
:latest
tag is now the latest release and:edge
represents the latest push onmaster
- [general] URL changed from
tomav/...
todocker-mailserver/...
- [scripts] refactored
target/bin/
- [scripts] redesigned environment variable use
- [general] added Code of Conduct
- [general] added missing Dovecot descriptions
- [tests] enhanced and refactored all tests
- [scripts] use of default variables has changed slightly (consult environment variables)
- [scripts] Added coherent coding style and linting
- [scripts] Added option to use non-default network interface
- [general] new contributing guidelines were added
- [general] SELinux is now supported