Release notes
Mailu 2024.06 - 2024-06
Mailu 2024.06 is available. This release contains new features and many bug fixes. Please at least read the section upgrading before attempting to upgrade to the new release.
To make clear you can only go forward with upgrades, we have changed the version naming scheme to Year.Month.Minor. It is only possible to downgrade between minor versions (e.g. 2024.06.3 to 2024.06.1).
Highlights
Managesieve sieve support
It is now also possible to use an external sieve client for managing sieve rules using port 4190. Previously sieve filters could only be edited through webmails.
RESTful API enhancements
The User interface is enhanced with the quota bytes used (quota_bytes_used) attribute. This attribute states the usage (in bytes) of the mailbox. In combination with the attribute quota_bytes, it is possible to check how much storage an user has left via the RESTful API.
The new token endpoint allows the management of authentication tokens. It is strongly recommended to create authentication tokens for all users and to configure email clients to use these authentication tokens for connecting to Mailu instead of user passwords. Tokens are not subject to rate-limiting and are verified server-side in a less resource intensive way. Their usage can be enforced using the newly introduced AUTH_REQUIRE_TOKENS setting.
Force password change
This new feature has been introduced to coerce a user into changing his password. When a password is changed, all associated sessions are invalidated.
This setting can be configured via:
Admin webui
Mailu cli command config-import
RESTful API via the User endpoint and attribute change_pw_next_login
Translations
The following translations for the Admin webui have been added:
Persion - (a.k.a Farsi) hosni
Ukrainian - thanks to Prosta4okua
Belarusian - thanks to spoooyders
All language translations are handled by the community. If you see a translation error for your native language, consider submitting a pull request to address this.
Download zonefile on domain details page
On the domain details page a download option is added for downloading the zone file. This zone file can be used to easily import all Mailu DNS settings.
Roundcube spellchecker
The roundcube spellchecker can be configured to support languages other than English. To configure alternative languages, please refer to the FAQ entry: How can I add more languages to roundcube’s spellchecker.
Improved mailbox indexer and full attachment indexing
Full Text Search has now been improved and server-side search has been enabled by default on webmails. Other email clients may need to be reconfigured to ensure searches are performed server-side.
The dovecot indexer has been switched from fts-xapian to fts-flatcurve. In the future this will be the new default indexer for dovecot. This indexer is quicker and results in smaller index files.
Apache Tika has been added to Mailu to add support for attachments indexing. The server-side search functionality now crawls through both emails and their attachments (including office documents, PDFs, images via OCR).
Refer to FULL_TEXT_SEARCH in the configuration reference to enable indexing for non-English languages.
After upgrading, the new indexes are not automatically created. To create these after upgrading Mailu:
From bash run:
find /mailu/mail -type d -name xapian-indexes -prune -exec rm -r {} \+
Via docker compose run (to force reindexing):
docker compose exec imap doveadm fts rescan -A
docker compose exec imap doveadm user '*'|while read u; do echo "re-indexing $u";docker compose exec -T imap doveadm index -u $u '*'; done
Introduction AUTH_REQUIRE_TOKENS
The environment variable AUTH_REQUIRE_TOKENS has been introduced. This setting can be enabled to force email clients to use authentication tokens (instead of passwords) for authenticating to Mailu. Note that authentication tokens can now also be generated via the RESTful API.
It is recommended to use authentication tokens instead of passwords for connecting email clients to Mailu as verifying them is less resource intensive server-side and they are not subject to rate limits (since they cannot be brute-forced online by a potential attacker).
Improved PROXY PROTOCOL and open ports settings
It is now possible to explicitly configure what ports must use the PROXY PROTOCOL. Refer to PROXY_PROTOCOL in the configuration reference for more information.
The newly introduced PORTS variable can be used to configure what service should be enabled. efer to PORTS in the configuration reference for more information.
Change in behaviour
POSTFIX_LOG_FILE removed
The setting POSTFIX_LOG_FILE and its functionality has been removed from Mailu. To log to file (for any container) it is possible to use journald and rsyslogd.
The new FAQ entry How can I view and export the logs of a Mailu container? describes how log files can be viewed via journald. It also provides instructions for how to install and configure rsyslogd for saving container logs to file system (including log rotation).
Emails marked by clamav are rejected now. These used to be silently dropped
In the past emails marked by clamav (the virusscanner) were dropped. Now these emails are rejected. That means that the person who sent the email receives a reply that the email was rejected due to the email being flagged by clamav.
STARTTLS ports disabled by default
By default the STARTTLS ports are disabled. That means that the ports for the following protocols are closed:
IMAP (143)
POP3 (110)
Submission (587)
For more information why only enabled implicit TLS is safer than also allowing opportunistic TLS, please refer to https://nostarttls.secvuln.info . To re-enable these ports, use the PORTS variable. For more information refer to the configuration reference.
Upgrading
Before upgrading
Via setup.mailu.io generate the new docker-compose.yml file and mailu.env file. If tika is enabled (enabling searching through attachments), then 1 to 2GB of extra RAM memory is required. Re-add any customizations in mailu.env. Before making changes to mailu.env, check the configuration reference page on mailu.io. Check if the setting is still in use before adding it to the new mailu.env file.
If POSTFIX_LOG_FILE was used, refer to the new FAQ entry How can I view and export the logs of a Mailu container? on how to configure similar functionality. POSTFIX_LOG_FILE is deprecated. Mailu will ignore this setting.
If a reverse proxy is used on the same host, consider switching to traefik using the updated instructions. Refer to Using an external reverse proxy on mailu.io. With these updated instructions Mailu will handle requesting all certificates. It is not required anymore to copy certificates from the reverse proxy to Mailu.
After upgrading
After upgrading Mailu, perform the followings tasks.
Recreate the dovecot indexes:
From bash run:
find /mailu/mail -type d -name xapian-indexes -prune -exec rm -r {} \+
Via docker compose run (to force reindexing):
docker compose exec imap doveadm fts rescan -A
docker compose exec imap doveadm user '*'|while read u; do echo "re-indexing $u";docker compose exec -T imap doveadm index -u $u '*'; done
Enabled the hardened memory allocator
View the admin container logs via docker compose logs admin
WARNING:root:Your CPU has Advanced Vector Extensions available, we recommend you enable hardened-malloc earlier in the boot process by adding LD_PRELOAD=/usr/lib/libhardened_malloc.so to your mailu.env
Only if the above message is logged, then the hardened malloc can be enabled by adding the following line to mailu.env.
LD_PRELOAD=/usr/lib/libhardened_malloc.so
Recreate all docker containers (docker compose up -d) for the changes to be propagated.
Mailu 2.0 - 2023-04-03
Mailu 2.0 is finally available. It is vital to read the Upgrading section before upgrading to Mailu 2.0 as it introduces major features and breaking changes from 1.9.
The Helm Chart project will be updated soon after this release.
The Mailu project has moved to ghcr.io for hosting the docker images. The images on docker.io will be taken down after this release.
Highlights
This is an overview of the major features introduced in Mailu 2.0.
Multi-arch images (ARM support)
The Mailu project now ships multi-arch images for the architectures:
linux/amd64.
linux/arm64/v8.
linux/arm/v7.
It is now possible to run Mailu on most ARM hardware such as the Raspberry Pi.
Auto-configuration for client
On the domain details page, there are new DNS records for enabling DNS auto-client configuration. Provided they are configured, email clients will make use of them to auto-configure.
If a reverse proxy is in use, settings might have to be tweaked.
For Apple users, the client setup page now offers an autoconfiguration link to automatically configure their device.
RESTFul API
Mailu offers a RESTful API for changing the Mailu configuration. Now, anything that can be configured via the Mailu web administration interface can also be configured via the Mailu RESTful API.
Configuring a new domain or add new users can be fully automated now.
The current API makes use of a single API token for authentication. In a future release this will likely be re-visited.
For more information refer to the Mailu RESTful API page.
Header authentication support (use external identity providers)
It is now possible to use different authentication systems (such as keycloak, authentik, vouch-proxy) to handle the authentication of Mailu users. This can be used to enable Single Sign On from other IDentity Providers via protocols such as OIDC or SAML2.
For more information see Header authentication using an external proxy in the configuration reference.
Better anti-spoofing protection
Previously Mailu would reject emails where an attacker spoofs the envelope-From. Now Mailu also checks the header-From for any hosted domain. It won’t let any email which pretends to be for any of the local domains through unless they pass DMARC. This means that if you intend on sending emails for a domain hosted on the Mailu instance to the Mailu instance from somwhere else, you must setup DMARC.
Implement a password policy
In line with security best practices from NIST (Special Publication 800-63B), we have introduced a password policy.
Passwords now need to:
be at least 8 characters long.
not be listed on HaveIBeenPwned.
Significant improvements to the Rate-limiter
Now the rate limiter will only take distinct attempts into account. We have two different types of checks:
to prevent crendential bruteforce (an attacker trying to guess a password), we limit the maximal amount of attempts an attacker has for a given account (from any IP address).
to prevent password spraying (an attacker trying the same common password on all accounts he can enumerate), we limit the maximal number of non-existing accounts an attacker can attempt to authenticate against from a given network subnet.
We have also implemented state-of-the-art features such as Device Cookies and IP-whitelisting post-authentication to ensure we don’t lock genuine users out.
Rate-limiters have a bad name because they are often misunderstood. If you have used Mailu’s rate-limiter in the past and had a bad experience please consider giving it another try after upgrading.
Remember the login URL
Mailu will now remember which URL was requested and redirect you to it post-authentication.
This functionality can be used by visiting a “deep” URL E.g.
This results in a login page with a single login button. To access the normal login page, visit the root url.
Users who only use the /admin endpoint can now bookmark https://test.mailu.io/admin. When logging in, it is possible to use the Enter key again to login (this will not login the webmail but admin).
Introduction of SnappyMail
The Rainloop webmail client has been replaced with SnappyMail. The Rainloop project has multiple long outstanding security bugs. For this reason the Mailu project looked for alternatives. SnappyMail is a fork of Rainloop focussed on performance and security. It offers a similar experience as Rainloop.
Do not mark spam as read
In the user settings it is now possible to configure if a received spam email must be marked as read. It is possible to see if you received spam now.
OLETools
OLETools is introduced to block bad macros in Microsoft Office documents. OLETools is able to scan Microsoft Office documents and determine if a macro is malicous.
By default attachments with know bad/executable file extensions (such as .exe
) are blocked. See the FAQ for more information on updating the list of blocked file extensions.
New override system for Rspamd
The override system for Rspamd has been overhauled. While the config files were first completely overridden, they are now merged. Now overrides are placed in the location (in the Rspamd/Antispam container) /overrides.
If you use your own map files, change the location to /overrides/myMapFile.map
in the corresponding conf file.
For example when overriding multimap.conf that use a custom .map
file:
#multimap.conf
LOCAL_BL_DOMAIN {
type = "from";
filter = "email:domain";
map = "/overrides/blacklist.map";
score = 15;
description = "Senders domain part is on the local blacklist";
group = "local_bl";
}
It works as following.
If the override file overrides a Mailu defined config file, it will be included in the Mailu config file with lowest priority. This means it will merge with existing sections.
If the override file does not override a Mailu defined config file, then the file will be placed in the rspamd local.d folder. It will merge with existing sections.
For more information, see the description of the local.d folder on the rspamd website: https://www.rspamd.com/doc/faq.html#what-are-the-locald-and-overrided-directories
PROXY PROTOCOL Support
Reverse proxies can connect to Mailu with the proxy protocol for HTTP and Mail. Below is a small example for Traefik connecting via proxy protocol to Mailu
# Static configuration
providers:
file:
directory: "/opt/traefik/conf"
entryPoints:
mailu-web:
# Listen on port 8081 for incoming requests
address: :443
mailu-smtp:
address: :25
mailu-imaps:
address: :993
mailu-smtps:
address: :465
mailu-starttls:
address: :587
# From dynamic configuration /opt/traefik/conf
tls:
certificates:
- certFile: /etc/letsencrypt/live/mydomain.com/fullchain.pem
keyFile: /etc/letsencrypt/live/mydomain.com/privkey.pem
tcp:
routers:
mailu-web:
entryPoints:
- mailu-web
rule: "HostSNI(`*`)"
service: "mailu-web"
mailu-smtp:
entryPoints:
- mailu-smtp
rule: "HostSNI(`*`)"
service: "mailu-smtp"
mailu-imaps:
entryPoints:
- mailu-imaps
rule: "HostSNI(`*`)"
service: "mailu-imaps"
mailu-smtps:
entryPoints:
- mailu-smtps
rule: "HostSNI(`*`)"
service: "mailu-smtps"
mailu-starttls:
entryPoints:
- mailu-starttls
rule: "HostSNI(`*`)"
service: "mailu-starttls"
services:
mailu-web:
loadBalancer:
proxyProtocol:
version: 2
servers:
- address: "MailuServer:443"
mailu-smtp:
loadBalancer:
proxyProtocol:
version: 2
servers:
- address: "MailuServer:25"
mailu-smtps:
loadBalancer:
proxyProtocol:
version: 2
servers:
- address: "MailuServer:465"
mailu-starttls:
loadBalancer:
proxyProtocol:
version: 2
servers:
- address: "MailuServer:587"
mailu-imaps:
loadBalancer:
proxyProtocol:
version: 2
servers:
- address: "MailuServer:993"
Security hardening
We have gone further than ever. Now Mailu containers drop their privileges and communicate on separate networks. They also share the same base image where on x86 a Hardened memory allocator is configured.
Webmails relying on PHP now make use of Snuffleupagus.
New Functionality & Improvements
For a list of all the changes (including bug fixes) refer to CHANGELOG.md in the root folder of the Mailu github project.
A short summary of the other new features:
Features: Allow other folders to be synced by fetchmail.
Features: Update the webmail images. Roundcube:
Switch to base image (alpine).
Switch to php-fpm.
SnappyMail:
Switch to base image.
Upgrade php7 to php8.
Features: Add FETCHMAIL_ENABLED to toggle the fetchmail functionality in the admin interface.
Features: Create a polite and turtle delivery queue to accommodate destinations that expect emails to be sent slowly.
Features: Add support for custom NGINX config in /etc/nginx/conf.d.
Features: Configurable default spam threshold used for new users.
Features: Create a GUI for WILDCARD_SENDERS.
Features: Prevent signups with accounts for which an SQL-LIKE alias exists.
Features: Introduce TLS_PERMISSIVE, a new advanced setting to harden cipher configuration on port 25. Changing the default is strongly discouraged, please read the documentation before doing so.
Features: Implement the required glue to make “doveadm -A” work.
Features: Drop postfix rsyslog localhost messages with IPv6 address.
Features: Improved IPv6 support.
Features: Provide a changelog for minor releases. The github release will now:
Provide the changelog message from the newsfragment of the PR that triggered the backport.
Provide a github link to the PR/issue of the PR that was backported.
Enhance CI/CD workflow with retry functionality. All steps for building images are now automatically retried. If a build temporarily fails due to a network error, the retried step will still succeed.
Features: Add Czech translation for web administration interface.
Upgrading
Upgrade should run fine as long as you generate a new compose & mailu.env and then reapply custom config settings to mailu.env. Carefully read the configuration page to check what old settings have been removed. If a setting is not listed anymore on the configuration page, then this setting has been removed.
If you use Fail2Ban, then the Fail2Ban intructions have been improved. It is mandatory to remove your Fail2Ban config and re-apply it using the instructions from updated Fail2Ban documentation.
If you use overrides for Rspamd, then please note that overrides are now placed in the location /overrides
in the rspamd container.
If you use your own map files, change the location to /overrides/myMapFile.map
in the corresponding rspamd conf file.
To use the new autoconfig endpoint and Mailu RESTFul API, you may need to update your reverse proxy config.
If you use TLS_FLAVOR=letsencrypt
, add autoconfig.myhostname.com to the setting HOSTNAMES=
in mailu.env to generate a certificate for the autoconfig endpoint as well.
After starting your Mailu deployment, please refer to the section DNS client auto-configuration entries on the domain details page
in the web administration interface for the exact name of the autoconfig endpoint (https://test.mailu.io/admin/domain/details/test.mailu.io).
It is also recommended to have a look at mta-sts. When mta-sts is enabled, modern email servers will immediately use TLS for delivering emails to Mailu.
Mailu 1.9 - 2021-12-29
Mailu 1.9 is available now. Please see the section Upgrading for important information in regard to upgrading to Mailu 1.9.
Highlights
Quite a lot of new features have been implemented. Of these new features we’d like to highlight these:
Security
A fair amount of work went in this release; In no particular order:
outbound SMTP connections from Mailu are now enjoying some protection against active attackers thanks to DANE and MTA-STS support. Specific policies can be configured for specific destinations thanks to
tls_policy_maps
and configuring your system to publish a policy has been documented in the FAQ.outbound emails can now be rate-limited (to mitigate SPAM in case an account is taken over)
long term storage of passwords has been rethought to enable stronger protection against offline attackers (switch to iterated and salted SHA+bcrypt) while enabling much better performance (credential cache). Please encourage your users to use tokens where appropriate and keep in mind that existing hashes will be converted on first use to the new format.
session handling has been reworked from the grounds up: they have been switched from client side (cookies) to server-side, unified (SSO, expiry, lifetime) across all web-facing applications and some mitigations against session fixation have been implemented.
rate limiting has seen many improvements: It is now deployed on all entry points (SMTP/IMAP/POP3/WEB/WEBMAIL) and configured to defeat both password bruteforces (thanks to a limit against total number of failed attempts against an account over a period) and password spraying (thanks to a limit for each client on the total number of non-existing accounts that can be queried). Exemption mechanisms have been put in place (device tokens, dynamic IP whitelists) to ensure that genuine clients and users won’t be affected by default and the default configuration thought to fit most use-cases.
if you use letsencrypt, Mailu is now configured to offer both RSA and ECC certificates to clients; It will OSCP staple its replies where appropriate
Updated Admin interface
The Web Administration interface makes use of AdminLTE. The AdminLTE2 technology has been upgraded to AdminLTE3. This cost a lot of effort due to the changes between AdminLTE2 and AdminLTE3. As a result the webpage looks more modern. All tables now have a filter and columns that can be sorted. If you have many users or domains, this will be a very welcome new feature!
A language selector has been added. On the login page and in the Web Admin Interface, the language selector can be accessed in the top right.
Import/Export command on steroids
The Mailu command line has been enhanced with the new config-export and config-import command. Everything that can be configured in the Mailu Web Administration Interface can now be exported and imported via yaml files. So via YAML files, you can now bulk configure a complete new installation, without the need to access the Mailu Web Administration Interface.
It is also possible to create new users or import new users (with password hashes) using the config-import.
With this new command it is very easy to switch to a different database management system for the Mailu database. Simply dump your configuration to yaml file. After setting up your new Mailu system with the different DBMS, you can import the yaml file with all Mailu configuration.
For more information, see the Mailu command line page.
New SSO login page
A new single sign on login page is introduced which handles logins for the Mailu Web Administration Interface and webmail. It has enabled a drastic attack-surface reduction and will enable us to add support for two factor authentication in the future.
All failed login attempts are now logged to the Admin service, significantly simplifying the deployment of solutions such as Fail2ban.
See the updated Fail2Ban documentation for more information.
Semantic versioning
From Mailu 1.9, we will use semantic versioning. First we only had x.y (e.g. 1.9) releases. For every update to an existing version, we will create an additional x.y.z (e.g. 1.9.1) release.
The X.Y (1.9) tag will always feature the latest version.
The X.Y.Z (1.9.1) tag is a pinned version. This release is not updated. You can use this to update in a controlled manner. At a convenient time, you can choose to switch to a newer version (e.g 1.9.2). The X.Y.Z tag is incremented automatically when an update is pushed for the X.Y release.
The images now also contain the release it was built for.
Every docker image will have a docker label with the version.
Every docker image will have the file /version with the same version information.
Master images will contain the commit hash that initiated the built of the image.
X.Y and X.Y.Z images will have the X.Y.Z version that triggered the built.
On the github project we will automatically create releases for each X.Y.Z release. Via this release you can check what commit hash the tag is assigned to.
With this improvement in our CI/CD workflow, it is possible to be notified when an update is released via github releases. It is also possible to use pinned versions to update in a controlled manner.
New Functionality & Improvements
For a list of all the changes (including bug fixes) refer to CHANGELOG.md in the root folder of the Mailu github project.
A short summary of the new features:
Roundcube and Rainloop have been updated.
All dependencies have been updated to the latest security update
AdminLTE (used by Admin service) is updated to AdminLTE3.
Much improved rate limiting.
Rate limiting small subnets instead of single IP addresses.
Rate limiting for accounts that do not exist.
Rate limiting for existing accounts (failed logon attempts).
Device-tokens are introduced to ensure genuine users are not locked out
Domain details page is enhanced with DNS client auto-configuration (RFC6186) entries.
Centralize the authentication of webmails behind the admin interface.
The new single sign on page opens up the possibility to introduce 2 factor authentication in the future.
Add sending quotas per user (configured in mailu.env). This determines how many emails each user can send every day.
Allow specific users to send emails from any address using the WILDCARD_SENDERS setting (mailu.env.).
Use semantic versioning for building releases.
Internal improvements to improve performance of authentication requests.
Introduced a language selector for the Admin interface.
Add cli commands config-import and config-export for importing/exporting Mailu config via YAML.
Enable support of all hash types passlib supports.
Switch to bcrypt_sha256 (stronger hashing of passwords in Mailu database)/
Introduce MTA-STS and DANE validation.
Added Hebrew translation.
Log authentication attempts on the admin portal. Fail2ban can now be used to monitor login attempts on Admin/Webmail.
Remove Mailu PostgreSQL.
Admin/Webmail sessions expire now. This can be tweakers via mailu.env.
Upgrading
Upgrade should run fine as long as you generate a new compose or stack configuration and upgrade your mailu.env. Please note that once you have upgraded to 1.9 you won’t be able to roll-back to earlier versions without resetting user passwords.
If you use a reverse proxy in front of Mailu, it is vital to configure the newly introduced environment variables REAL_IP_HEADER` and REAL_IP_FROM. These settings tell Mailu that the HTTP header with the remote client IP address from the reverse proxy can be trusted. For more information see the configuration reference.
If you use Fail2Ban, you configure Fail2Ban to monitor failed logon attempts for the web-facing frontend (Admin/Webmail). See the updated Fail2Ban documentation for more information.
Please note that the shipped image for the PostgreSQL database is fully deprecated now. To migrate to the official PostgreSQL image, you can follow our migration guide.
Mailu 1.8 - 2021-08-7
The full 1.8 release is finally ready. There have been some changes in the contributors team. Many people from the contributors team have stepped back due to changed priorities in their life. We are very grateful for all their contributions and hope we will see them back again in the future. This is the main reason why it took so long for 1.8 to be fully released.
Fortunately more people have decided to join the project. Some very nice contributions have been made which will become part of the next 1.9 release. We hope that future Mailu releases will be released more quickly now we have more active contributors again.
For a list of all changes refer to CHANGELOG.md in the root folder of the Mailu github project. Please read the ‘Override location changes’ section further on this page. It contains important information for the people who use the overrides folder.
New Functionality & Improvements
Here’s a short summary of new features:
Roundcube and Rainloop have been updated.
All dependencies have been updated to the latest security update.
Fail2ban documentation has been improved.
Switch from client side (cookie) sessions to server side sessions and protect against session-fixation attacks. We recommend that you change your SECRET_KEY after upgrading.
Full-text-search is back after having been disabled for a while due to nasty bugs. It can still be disabled via the mailu.env file.
Tons of documentation improvements, especially geared towards new users.
(Experimental) support for different architectures, such as ARM.
Improvements around webmails, such as CardDAV, GPG and a new skin for an updated roundcube, and support for MySQL for it. Updated Rainloop, too.
Improvements around relaying, such as AUTH LOGIN and non-standard port support.
Update to alpine:3.14 as baseimage for most containers.
Setup warns users about compose-IPv6 deployments which have caused open relays in the past.
Improved handling of upper-vs-lowercase aliases and user-addresses.
Improved rate-limiting system.
Support for SRS.
Japanese localisation is now available.
Upgrading
Upgrade should run fine as long as you generate a new compose or stack configuration and upgrade your mailu.env.
Please note that the shipped image for PostgreSQL database is deprecated. The shipped image for PostgreSQL is not maintained anymore from release 1.8. We recommend switching to an external PostgreSQL image as soon as possible.
Override location changes
If you have regenerated the Docker compose and environment files, there are some changes to the configuration overrides.
Override files are now mounted read-only into the containers. The Dovecot and Postfix overrides are moved in their own sub-directory. If there are local override files, they will need to be moved from overrides/
to overrides/dovecot
and overrides/postfix/
.
Recreate SECRET_KEY after upgrading
Improvements have been made to protect again session-fixation attacks. To be fully protected, it is required to change your SECRET_KEY in Mailu.env after upgrading. A new SECRET_KEY is generated when you recreate your docker-compose.yml & mailu.env file via setup.mailu.io.
The SECRET_KEY is an uppercase alphanumeric string of length 16. You can manually create such a string via
`cat /dev/urandom | tr -dc 'A-Z0-9' | fold -w ${1:-16} | head -n 1`
After changing mailu.env, it is required to recreate all containers for the changes to be propagated.
Update your DNS SPF Records
It has become known that the SPF DNS records generated by the admin interface are not completely standard compliant anymore. Please check the DNS records for your domains and compare them to what the new admin-interface instructs you to use. In most cases, this should be a simple copy-paste operation for you ….
Fixed hostname for antispam service
For history to be retained in Rspamd, the antispam container requires a static hostname. When you re-generate your docker-compose.yml file (or helm-chart), this will be covered.
Mailu 1.8rc - 2020-10-02
Release 1.8 has come a long way again. Due to corona the project slowed down to a crawl. Fortunately new contributors have joined the team what enabled us to still release Mailu 1.8 this year.
Please note that the current 1.8 is what we call a “soft release”: It’s there for everyone to see and use, but to limit possible user-impact of this very big release, it’s not yet the default in the setup-utility for new users. When upgrading, please treat it with some care, and be sure to always have backups!
For a list of all changes refer to CHANGELOG.md in the root folder of the Mailu github project. Please read the ‘Override location changes’ section. It contains important information for the people who use the overrides folder.
New Functionality & Improvements
Here’s a short summary of new features:
Full-text-search is back after having been disabled for a while due to nasty bugs. It can still be disabled via the mailu.env file.
Tons of documentation improvements, especially geared towards new users.
(Experimental) support for different architectures, such as ARM.
Improvements around webmails, such as CardDAV, GPG and a new skin for an updated roundcube, and support for MySQL for it. Updated Rainloop, too.
Improvements around relaying, such as AUTH LOGIN and non-standard port support.
Update to alpine:3.12 as baseimage for most containers.
Setup warns users about compose-IPv6 deployments which have caused open relays in the past.
Improved handling of upper-vs-lowercase aliases and user-addresses.
Improved rate-limiting system.
Support for SRS.
Japanese localisation is now available.
Upgrading
Upgrade should run fine as long as you generate a new compose or stack configuration and upgrade your mailu.env.
Please note that the shipped image for PostgreSQL database is deprecated. The shipped image for PostgreSQL is not maintained anymore from release 1.8. We recommend switching to an external PostgreSQL database as soon as possible.
Override location changes
If you have regenerated the Docker compose and environment files, there are some changes to the configuration overrides.
Override files are now mounted read-only into the containers. The Dovecot and Postfix overrides are moved in their own sub-directory. If there are local override files, they will need to be moved from overrides/
to overrides/dovecot
and overrides/postfix/
.
Update your DNS SPF Records
It has become known that the SPF DNS records generated by the admin interface are not completely standard compliant anymore. Please check the DNS records for your domains and compare them to what the new admin-interface instructs you to use. In most cases, this should be a simple copy-paste operation for you ….
Mailu 1.7 - 2019-08-22
Release 1.7 has come a long way and was really expected after the project first saw a slowdown in contributions around january then a wave of new contributors and contributions.
New functionality
Most changes are internal, main features include:
the admin UI now properly displaying on mobile
relays supporting authentication thanks to new settings
ability to create an initial admin user using environment variables
Other changes include software updates with some new features in Rainloop 1.30.0.
Back-end
One of the big tasks was upgrading to latest Alpine (3.10), which is now finished. Also, a lot was improved about the environment variables meant to provide specific hosts in custom setups.
Finally, among many bug fixes and discrete enhancements, we removed most static assets from the repository and now build the admin UI dynamically using Webpack.
Localization
The localization effort move to a hosted Weblate, that you can access at the following uri: https://translate.tedomum.net/projects/mailu/admin/
Please have a look and help translate Mailu into your home tongue.
Upgrading
Upgrade should run fine as long as you generate a new compose or stack configuration and upgrade your mailu.env.
If you run the PostgreSQL server, the database was upgrade, so you will need to dump the database before upgrading and load the dump after the upgrade is complete. Please note that the shipped image for PostgreSQL database will be deprecated before 1.8.0, you can switch to an external database server by then.
Mailu 1.6 - 2019-01-18
Its been more than a year since the release of 1.5! And what a year it has been… More then 800 commits are done since 1.5, containing thousands of additions. We had the honor of welcoming more and more contributors and we actually established a dedicated team of trusted contributors.
With new review guidelines we now allow the project to grow without dependence on any single person. And thus merging pull requests at much shorter time. On top of that we finally got around to creating a simple test suite on TravisCI, which is doing some e-mail sending and receiving. This greatly helps the reviewing process.
For a complete overview of changes, see our changelog. Here we’ll try to give you the highlights.
New functionality
We offer a lot new functions in the user experience. Some of the highlights would be quota support from the admin interface, optional user sign up with recaptcha, auto-reply start date, and a client setup page.
Mailu now also offers a setup utility. This utility helps users to generate a docker-compose.yml and mailu.env through guided steps.
Documentation
Quite some efforts were done in expanding the documentation of Mailu. We’ve added support for Kubernetes setup, Docker Swarm and a Frequently asked questions section. There is now also a section on running the Mailu web interfaces behind Traefik as reverse proxy.
We now also Dockerized the documentation, allowing for easy local running and versions management on our web server.
Back-end
Lots and lots of hours went in to the back-end. Work on numerous bugs, increased the general performance and allowing for better maintainability.
We’ve reworked the complete interface with the database. All queries are now done through the Admin container, with that being the single point of contact with the database. Now we also support the usage of MySQL and PostgreSQL databases and Mailu comes with its own PostgreSQL image! This allows for Mailu to be used in larger scaled operations.
Main software versions
Alpine 3.8.2
Python 3.6.6
SQLite 3.25.3
Postfix 3.3.0
Dovecot 2.3.2.1
Radicale 2.1.10
Rspamd 1.7.6
ClamAV 0.100.2
Nginx 1.14.2
Rainloop 1.12.1
Roundcube 1.3.8
Fetchmail 6.3.26
Unbound 1.7.3
Postgresql 10.5
Upgrading
We’ve done some pretty intrusive works on the DB migrations scripts. Although thoroughly
tested, we would recommend users to create a backup copy of /mailu/data/main.db
somewhere.
Use the setup utility to obtain new docker-compose.yml
and mailu.env
files.
For this upgrade it is necessary to bring the project down and up, due to network definition changes:
docker compose pull
docker compose down --remove-orphans
docker compose up -d
After everything runs successfully, /mailu/certs/dhparam.pem
is no longer needed and can be deleted.
It’s included in the Mailu distribution by default now. Also the old .env
can be deleted.
Mailu 1.5 - 2017-11-05
It has been two years since this project started, one year since it was renamed to Mailu and took a more serious path toward building a proper email server distribution. The experience has been extremely interesting and we as contributors should be quite proud of what was accomplished in that time.
Mailu started as a random project of administration interface for Postfix, it is now running thousands of mail servers, has reached over half a million pulls on Docker hub and contributions from very different and frankly interesting people.
Version 1.5 is about bringing the features that were intended for the late version 2.0. It includes many new concepts like:
alternative domains, a way to configure a domain that is semantically equivalent to another;
domain relays, a way to relay emails to a separate server;
authentication tokens, a way to let users generate passwords for their various clients and restrict authentication per IP address.
The release also includes some structural changes to the project. Nginx is now the main frontend container and terminates all connections, performing TLS and authentication directly. Letsencrypt support is now more complete, with various TLS “flavors” for all kinds of setup.
Finally, a big change about how versions are managed: the stable
branch
will be deprecated with the end of branch 1.4
. Mailu will now only publish
branches per version, as any version jump requires manual updates anyway. This
will avoid confusion about which branch is currently considered the stable
one. End of support for branches will happen after 2 version changes (e.g.
end of support for branch 1.4
will happen when branch 1.6
is released).
Finally, intermediary versions backporting some important features will be
branched as subversions first (branch 1.5.1
for instance), then merge in
the branch version once enough testing has happened.
More details about the changes are available in the changelog, and this release will be followed by a short-term upgrade including some more features and bug fixes.
If you are upgrading, please go through the setup guide and download the
latest docker-compose.yml
and .env
, then update them with your
specific settings, because more than 50% of these templates was rewritten.
You should then be able to pull and start your new e-mail stack with
no issue, simply remove orphaned container, since some were renamed and others
were removed (e.g. rmilter):
docker compose pull
docker compose up -d --remove-orphans
If you experience problems when upgrading, feel free to post issues and contact us on our chat channel for emergency support.
Regarding statistics, Mailu has gone from “no tracker at all” to a tracker that
we find is designed to preserve privacy and security as much as possible. Your
admin container will now perform DNS requests for a domain that we hold,
including information about your “instance id” (a unique and random string)
and Mailu version. If your mail server performs direct DNS queries instead
of going through a DNS recursor, you might want to opt-out of statistics if
you would prefer the server IP address not be included anywhere (we do not log
it, but our hosting provider might). This can be accomplished in the .env
file directly.
Mailu 1.3 - 2016-11-06
First a warning as TL;DR. Following the project rename, please read the migration guide carefully if you were already running Freeposte.
Renaming the project was a critical step in its life and we certainly hope that it will help gain even more traction and collaborate every day to add new features and improve Mailu.
This new release introduces mostly bugfixes and a couple of enhancements. It was however the most complicated to prepare and publish because we had to deal for the first time with multiple active contributors, sometimes diverging points of view, a solid user base that would prefer their production not break, and some major upstream issues.
The release itself was delayed a month, partly due to these changes, partly due to upstream issues. One of them for instance, a bug in Dovecot, took us a couple of long nights debugging low-level memory management code in Dovecot in order to fix the vacation message in Mailu! This lead to humble contributions to Dovecot and Alpine Linux and we are still proud to be contributing to a larger software environment.
Among the major changes that we introduced, Rainloop is now officially supported as a Webmail and we are open to contributions to add even more alternatives to the next release.
Also, Mailu admin interface now has built-in internationalization and we will initiate a localization campaign to add at least French and German to the list of supported languages. Please contact us if you would like to contribute another translation.
Finally, we hardened Postfix configuration both for security reasons (preventing address usurpation upon existing SPF) and to prevent spam. We found that the already effective antispam filter now blocks more that 99% of junk messages on our test servers.
A more detailed list of changes is available in the project changelog.
Please read the Setup Guide if you plan on setting up a new mail server. Mailu is free software, you are more than welcome to report issues, ask for features or enhancements, or contribute your own modifications!
Freeposte.io 1.2 - 2016-08-28
The past few weeks have been very productive thanks to multiple contributors and reporters. A hundred commits later, Freeposte.io release 1.2 is ready.
Most changes in the release are security-related: we eventually added CSRF checks, applied most security best practices including TLS hardening based on the great documentation by BetterCrypto, and started a discussion about how the mail server stack should be secure-by-default while maintaining as many features as possible.
Additional great change is the new ability to declare catch-all aliases and wildcard aliases in general.
When creating an alias, one may now enable the “SQL LIKE” syntax then use
standard SQL wildcards %
and _
to specify matches for a given alias.
For instance :
%@domain.tld
will match any uncaught email sent to that domain (catch-all)support-%@domain.tld
will match any email sent to an address starting withsupport-
_@domain.tld
will match any email sent to a one-character addressco_tact@domain.tld
will match bothcontact@domain.tld
andcomtact@domain.tld
along will all other combinations to make up for any usual typing mistake.
Finally, the update process changed with Freeposte.io 1.2: you do not have to
manually setup an installed branch anymore. Instead, you may simply use the
default docker-compose.yml
file and the :latest
tag that will now
point to the latest stable version. Those who know what they are doing and
still want to use continuous builds from the Git repository may switch to the
:testing
Docker images.
A more detailed list of changes is available in the project changelog.
Please read the Setup Guide if you plan on setting up a new mail server. Freeposte.io is free software, you are more than welcome to report issues, ask for features or enhancements, or contribute your own modifications!
Freeposte.io 1.1 - 2016-07-31
When we started the Freeposte.io adventure back in December, we weren’t quite sure the project would lead to anything but a bunch of scripts to manage our mail server at TeDomum.
About 6 month later, we have got word from a dozen individuals and half a dozen nonprofits that have started setting up Freeposte.io or are using it for production emails. All mailboxes at TeDomum have been running on top of Freeposte.io for the past 5 months and happily received thousands of emails.
Release 1.0 was definitely not ready for production: the anti-spam services were unstable, lots of junk messages still got through, there was still no support for outgoing DKIM and thus no way to properly setup DMARC. These have been addressed and we are really enthusiastic about releasing 1.1 and expecting some feedback and contributions.
Please read the Setup Guide if you plan on setting up a new mail server. Freeposte.io is free software, you are more than welcome to report issues, ask for features or enhancements, or even contribute your own modifications!