98 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	Changelog
All notable changes to this project will be documented in this file. The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
Unreleased
Note
: Changes and additions listed here are contained in the
:edgeimage tag. These changes may not be as stable as released changes.
The most noteworthy change of this release is the update of the container's base image from Debian 11 ("Bullseye") to Debian 12 ("Bookworm"). This update alone involves breaking changes and requires a careful update!
Breaking
- Updated base image to Debian 12 (#3403)
- Changed the default of DOVECOT_COMMUNITY_REPOto0(disabled) - the Dovecot community repo will (for now) not be the default when building the DMS.- While Debian 12 (Bookworm) was released in June 2023 and the latest Dovecot 2.3.21in Sep 2023, as of Jan 2024 there is no Dovecot community repo available for Debian 12.
- This results in the Dovecot version being downgraded from 2.3.21(DMS v13.3) to2.3.19, which may affect functionality when you've explicitly configured for these features:- OAuth2 (mostly regarding JWT usage, or POST requests (introspection_mode = post) withclient_id+client_secret).
- Lua HTTP client (DNS related).
 
- OAuth2 (mostly regarding JWT usage, or POST requests (
 
- While Debian 12 (Bookworm) was released in June 2023 and the latest Dovecot 
- Updated packages. For an overview, we have a review comment on the PR that introduces Debian 12
- Notable major version bump: openssl 3,clamav 1,spamassassin 4,redis-server 7.
- Notable minor version bump: postfix 3.5.23 => 3.7.9
- Notable minor version bump + downgrade: dovecot 2.3.13 => 2.3.19(Previous release provided2.3.21via community repo,2.3.19is now the default)
 
- Notable major version bump: 
- Updates to packages.sh:- Removed custom installations of Fail2Ban, getmail6 and Rspamd
- Updated packages lists and added comments for maintainability
 
 
- Changed the default of 
- OpenDMARC upgrade: v1.4.0=>v1.4.2(#3841)- Previous versions of OpenDMARC would place incoming mail from domains announcing p=quarantaine(that fail the DMARC check) into the Postfix "hold" queue until administrative intervention.
- OpenDMARC v1.4.2 has disabled that feature by default, but it can be enabled again by adding the setting HoldQuarantinedMessages trueto/etc/opendmarc.conf(provided from DMS).- Our user-patches.shfeature provides a convenient approach to updating that config file.
- Please let us know if you disagree with the upstream default being carried with DMS, or the value of providing alternative configuration support within DMS.
 
- Our 
 
- Previous versions of OpenDMARC would place incoming mail from domains announcing 
- Postfix:
- Postfix upgrade from 3.5 to 3.7 (#3403)
- compatibility_levelwas raised from- 2to- 3.6
- Postfix has deprecated the usage of whitelist/blacklistin config parameters and logging in favor ofallowlist/denylistand similar variations. (#3403)- This may affect monitoring / analysis of logs output from Postfix that expects to match patterns on the prior terminology used.
- DMS main.cfhas renamedpostscreen_dnsbl_whitelist_thresholdtopostscreen_dnsbl_allowlist_thresholdas part of this change.
 
- smtpd_relay_restrictions(relay policy) is now evaluated after- smtpd_recipient_restrictions(spam policy). Previously it was evaluated before- smtpd_recipient_restrictions. Mail to be relayed via DMS must now pass through the spam policy first.
- The TLS fingerprint policy has changed the default from MD5 to SHA256 (DMS does not modify this Postfix parameter, but may affect any user customizations that do).
 
 
- Postfix upgrade from 3.5 to 3.7 (#3403)
- Dovecot
- The "Junk" mailbox (folder) is now referenced by it's special-use flag \Junkinstead of an explicit mailbox. (#3925)- This provides compatibility for the Junk mailbox when it's folder name differs (eg: Renamed to "Spam").
- Potential breakage if your deployment modifies our spam_to_junk.sievesieve script (which is created during container startup when ENVMOVE_SPAM_TO_JUNK=1) that handles storing spam mail into a users "Junk" mailbox folder.
 
 
- The "Junk" mailbox (folder) is now referenced by it's special-use flag 
- rsyslog:
- Debian 12 adjusted the rsyslogconfiguration for the default file template fromRSYSLOG_TraditionalFileFormattoRSYSLOG_FileFormat(upstream default since 2012). This change may affect you if you have any monitoring / analysis of log output (eg:mail.log/docker logs).- The two formats are roughly equivalent to RFC 3164) and RFC 5424 respectively.
- A notable difference is the change to RFC 3339 timestamps (a strict subset of ISO 8601). The previous non-standardized timestamp format was defined in RFC 3164 as Mmm dd hh:mm:ss.
- To revert this change you can add sedfile -i '1i module(load="builtin:omfile" template="RSYSLOG_TraditionalFileFormat")' /etc/rsyslog.confvia ouruser-patches.shfeature.
 
- Rsyslog now creates fewer log files:
- The files /var/log/mail/mail.{info,warn,err}are no longer created. These files represented/var/log/mail.logfiltered into separate priority levels. As/var/log/mail.logcontains all mail related messages, these files (and their rotated counterparts) can be deleted safely.
- /var/log/messages,- /var/log/debugand several other log files not relevant to DMS were configured by default by Debian previously. These are not part of the- /var/log/mail/volume mount, so should not impact anyone.
 
- The files 
 
- Debian 12 adjusted the 
- Features:
- The relay host feature was refactored (#3845)
- The only breaking change this should introduce is with the Change Detection service (check-for-changes.sh).
- When credentials are configured for relays, change events that trigger the relayhost logic now reapply the relevant Postfix settings:
- smtp_sasl_auth_enable = yes(SASL auth to outbound MTA connections is enabled)
- smtp_sasl_security_options = noanonymous(credentials are mandatory for outbound mail delivery)
- smtp_tls_security_level = encrypt(the outbound MTA connection must always be secure due to credentials sent)
 
 
- The only breaking change this should introduce is with the Change Detection service (
 
- The relay host feature was refactored (#3845)
- Environment Variables:
- SA_SPAM_SUBJECThas been renamed into- SPAM_SUBJECTto become anti-spam service agnostic. (#3820)- As this functionality is now handled in Dovecot via a Sieve script instead of the respective anti-spam service during Postfix processing, this feature will only apply to mail stored in Dovecot. If you have relied on this feature in a different context, it will no longer be available.
- Rspamd previously handled this functionality via the rewrite_subjectaction which as now been disabled by default in favor of the new approach withSPAM_SUBJECT.
- SA_SPAM_SUBJECTis now deprecated and will log a warning if used. The value is copied as a fallback to- SPAM_SUBJECT.
- The default has changed to not prepend any prefix to the subject unless configured to do so. If you relied on the implicit prefix, you will now need to provide one explicitly.
- undefwas previously supported as an opt-out with- SA_SPAM_SUBJECT. This is no longer valid, the equivalent opt-out value is now an empty value (or rather the omission of this ENV being configured).
- The feature to include _SCORE_tag in your value to be replaced by the associated spam score is no longer available.
 
 
- Supervisord:
- supervisor-app.confrenamed to- dms-services.conf
 
- Rspamd:
- the Redis history key has been changed in order to not incorporate the hostname of the container (which is desirable in Kubernetes environments) (#3927)
 
Added
- 
Docs: - A guide for configuring a public server to relay inbound and outbound mail from DMS on a private server (#3973)
 
- 
Environment Variables: 
- 
Internal: - Regular container restarts are now better supported. Setup scripts that ran previously will now be skipped (#3929)
 
Updates
- Environment Variables:
- ONE_DIRhas been removed (legacy ENV) (#3840)- It's only functionality remaining was to opt-out of run-time state consolidation with ONE_DIR=0(when a volume was already mounted to/var/mail-state).
 
- It's only functionality remaining was to opt-out of run-time state consolidation with 
 
- Internal:
- Changed the Postgrey whitelist retrieved during build to source directly from Github as the list is updated more frequently than the author publishes at their website (#3879)
- Enable spamassassin only, when amavis is enabled too. (#3943)
 
- Tests:
- Refactored helper methods for sending e-mails with specific Message-IDheaders and the helpers for retrieving + filtering logs, which together help isolate logs relevant to specific mail when multiple mails have been processed within a single test. (#3786)
 
- Refactored helper methods for sending e-mails with specific 
- Rspamd:
- The rewrite_subjectaction, is now disabled by default. It has been replaced with the newSPAM_SUBJECTenvironment variable, which implements the functionality via a Sieve script instead which is anti-spam service agnostic (#3820)
- RSPAMD_NEURALwas added and is disabled by default. If switched on it will enable the experimental Rspamd "Neural network" module to add a layer of analysis to spam detection (#3833)
- The symbol weights of SPF, DKIM and DMARC have been adjusted again. Fixes a bug and includes more appropriate combinations of symbols (#3913, #3923)
 
- The 
Fixes
- DMS config files that are parsed line by line are now more robust to parse by detecting and fixing line-endings (#3819)
- Variables related to Rspamd are declared as readonly, which would cause warnings in the log when being re-declared; we now guard against this issue (#3837)
- Relay host feature refactored (#3845)
- DEFAULT_RELAY_HOSTENV can now also use the- RELAY_USER+- RELAY_PASSWORDENV for supplying credentials.
- RELAY_HOSTENV no longer enforces configuring outbound SMTP to require credentials. Like- DEFAULT_RELAY_HOSTit can now configure a relay where credentials are optional.
- Restarting DMS should not be required when configuring relay hosts without these ENV, but solely via setup relay ..., as change detection events now apply relevant Postfix setting changes for supporting credentials too.
 
- Rspamd configuration: Add a missing comma in local_networksso that all internal IP addresses are actually considered as internal (#3862)
- Ensure correct SELinux security context labels for files and directories moved to the mail-state volume during setup (#3890)
- Use correct environment variable for fetchmail (#3901)
- Dovecot dummy accounts (virtual alias workaround for dovecot feature ENABLE_QUOTAS=1) now correctly matches the home location of the user for that alias (#3997)
v13.3.1
Fixes
- Dovecot:
- Restrict the auth mechanisms for PassDB configs we manage (oauth2, passwd-file, ldap) (#3812)
- Prevents misleading auth failures from attempting to authenticate against a PassDB with incompatible auth mechanisms.
- When the new OAuth2 feature was enabled, it introduced false-positives with logged auth failures which triggered Fail2Ban to ban the IP.
 
 
- Restrict the auth mechanisms for PassDB configs we manage (oauth2, passwd-file, ldap) (#3812)
- Rspamd:
- Ensure correct ownership (_rspamd:_rspamd) for the Rspamd DKIM directory + files/tmp/docker-mailserver/rspamd/dkim/(#3813)
 
- Ensure correct ownership (
v13.3.0
Features
- Authentication with OIDC / OAuth 2.0 🎉
- DMS now supports authentication via OAuth2 (via XOAUTH2orOAUTHBEARERSASL mechanisms) from capable services (like Roundcube).- This does not replace the need for an ACCOUNT_PROVISIONER(FILE/LDAP), which is required for an account to receive or send mail.
- Successful authentication (via Dovecot PassDB) still requires an existing account (lookup via Dovecot UserDB).
 
- This does not replace the need for an 
 
- DMS now supports authentication via OAuth2 (via 
- MTA-STS (Optional support for mandatory outgoing TLS encryption)
- If enabled and the outbound recipient has an MTA-STS policy set, TLS is mandatory for delivering to that recipient.
- Enable via the ENV ENABLE_MTA_STS=1
- Supported by major email service providers like Gmail, Yahoo and Outlook.
 
- Enable via the ENV 
 
- If enabled and the outbound recipient has an MTA-STS policy set, TLS is mandatory for delivering to that recipient.
Added
- Docs:
- An example for how to bind outbound SMTP connections to a specific network interface (#3465)
 
Updates
- Tests:
- Revised OAuth2 test (#3795)
- Replace wc -lwithgrep -c(#3752)
- Revised testing of service process management (supervisord) to be more robust (#3780)
- Refactored mail sending (#3747 & #3772):
- This change is a follow-up to #3732 from DMS v13.2.
- swaksversion is now the latest from Github releases instead of the Debian package.
- _nc_wrapper,- _send_mailand related helpers expect the- .txtfilepath extension again.
- sending.bashhelper methods were refactored to better integrate- swaksand accommodate different usage contexts.
- test/files/emails/existing/files were removed similar to previous removal of SMTP auth files as they became redundant with- swaks.
 
 
- Internal:
- Postfix is now configured with smtputf8_enable = noin our defaultmain.cfconfig (instead of during container startup). (#3750)
 
- Postfix is now configured with 
- Rspamd (#3726):
- Symbol scores for SPF, DKIM & DMARC were updated to more closely align with RFC7489. Please note that complete alignment is undesirable as other symbols may be added as well, which changes the overall score calculation again, see this issue
 
- Docs:
Fixes
- Setup:
- setupCLI -- setup dkim domainnow creates the keys files with the user owning the key directory (#3783)
 
- Dovecot:
- During container startup for Dovecot Sieve, .sievecsource files compiled to.svbinnow have theirmtimeadjusted post setup to ensure it is always older than the associated.svbinfile. This avoids superfluous error logs for sieve scripts that don't actually need to be compiled again (#3779)
 
- During container startup for Dovecot Sieve, 
- Internal:
v13.2.0
Security
DMS is now secured against the recently published spoofing attack "SMTP Smuggling" that affected Postfix (#3727):
- Postfix upgraded from 3.5.18to3.5.23which provides the long-term fix withsmtpd_forbid_bare_newline = yes
- If you are unable to upgrade to this release of DMS, you may follow these instructions for applying the short-term workaround.
- This change should not cause compatibility concerns for legitimate mail clients, however if you use software like netcatto send mail to DMS (like our test-suite previously did) it may now be rejected (especially with the the short-term workaroundsmtpd_data_restrictions = reject_unauth_pipelining).
- NOTE: This Postfix update also includes the new parameter smtpd_forbid_bare_newline_exclusionswhich defaults to$mynetworksfor excluding trusted mail clients excluded from the restriction.- With our default PERMIT_DOCKER=nonethis is not a concern.
- Presently the Docker daemon config has user-proxy: trueenabled by default.- On a host that can be reached by IPv6, this will route to a DMS IPv4 only container implicitly through the Docker network bridge gateway which rewrites the source address.
- If your PERMIT_DOCKERsetting allows that gateway IP, then it is part of$mynetworksand this attack would not be prevented from such connections.
- If this affects your deployment, refer to our IPv6 docs for advice on handling IPv6 correctly in Docker. Alternatively use our postfix-main.cfto setsmtpd_forbid_bare_newline_exclusions=as empty.
 
 
- With our default 
Updates
- The test suite now uses swaksinstead ofnc, which has multiple benefits (#3732):- swakshandles pipelining correctly, hence we can now use- reject_unauth_pipeliningin Postfix's configuration.
- swaksprovides better CLI options that make many files superflous.
- swakscan also replace- openssl s_clientand handles authentication on submission ports better.
 
- Postfix:
- We now defer rejection from unauthorized pipelining until the SMTP DATAcommand viasmtpd_data_restrictions(i.e. at the end of the mail transfer transaction) (#3744)- Prevously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at DATAwhere unauthorized pipelining would have been valid from this point.
- If you had the Amavis service enabled (default), this restriction was already in place. Otherwise the concerns expressed with smtpd_data_restrictions = reject_unauth_pipeliningfrom the security section above apply. We have permitted trusted clients ($mynetworksor authenticated) to bypass this restriction.
 
- Prevously our configuration only handled this during the client and recipient restriction stages. Postfix will flag this activity when encountered, but the rejection now is handled at 
 
- We now defer rejection from unauthorized pipelining until the SMTP 
v13.1.0
Added
- Dovecot:
- ENV ENABLE_IMAP(#3703)
 
- ENV 
- Tests:
- You can now use make run-local-instanceto run a DMS image that was built locally to test changes (#3663)
 
- You can now use 
- Internal:
- Log a warning when update-check is enabled, but no stable release image is used (#3684)
 
Updates
- Documentation:
- Internal:
- Postfix configures virtual_mailbox_mapsandvirtual_transportduring startup instead of using defaults (configured for Dovecot) via ourmain.cf(#3681)
 
- Postfix configures 
- Rspamd:
- Upgraded to version 3.7.5. This was previously inconsistent between our AMD64 (3.5) and ARM64 (3.4) images (#3686)
 
- Upgraded to version 
Fixed
- Internal:
- The container startup welcome log message now references DMS_RELEASE(#3676)
- VERSIONwas incremented for prior releases to be notified of the v13.0.1 patch release (#3676)
- VERSIONis no longer included in the image (#3711)
- Update-check: fix 'read' exit status (#3688)
- ENABLE_QUOTAS=0no longer tries to remove non-existent config (#3715)
- The postgreyservice now writes logs to the supervisor directory like all other services. Previously this was/var/log/mail/mail.log(#3724)
 
- The container startup welcome log message now references 
- Rspamd:
- Switch to official arm64 packages to avoid segfaults (#3686)
 
- CI / Automation:
- The lint workflow can now be manually triggered by maintainers ([#3714]https://github.com/docker-mailserver/docker-mailserver/pull/3714)
 
v13.0.1
This patch release fixes two bugs that Rspamd users encountered with the v13.0.0 release. Big thanks to the those that helped to identify these issues! ❤️
Fixed
- Internal:
- The update check service now queries the latest GH release for a version tag (instead of from a VERSIONfile at the GH repo). This should provide more reliable update notifications (#3666)
 
- The update check service now queries the latest GH release for a version tag (instead of from a 
- Rspamd:
- The check for correct permission on the private key when signing e-mails with DKIM was flawed. The result was that a false warning was emitted (#3669)
- When RSPAMD_CHECK_AUTHENTICATED=0, DKIM signing for outbound e-mail was disabled, which is undesirable (#3669). Make sure to check the documentation ofRSPAMD_CHECK_AUTHENTICATED!
 
v13.0.0
Breaking
- LDAP:
- Rspamd:
- The deprecated path for the Rspamd custom commands file (/tmp/docker-mailserver/rspamd-modules.conf) now prevents successful startup. The correct path is/tmp/docker-mailserver/rspamd/custom-commands.conf.
 
- The deprecated path for the Rspamd custom commands file (
- Dovecot:
- Dovecot mail storage per account in /var/mailpreviously shared the same path for the accounts home directory (#3335)- The home directory now is a subdirectory home/. This change better supports sieve scripts.
- NOTE: The change has not yet been implemented for ACCOUNT_PROVISIONER=LDAP.
 
- The home directory now is a subdirectory 
 
- Dovecot mail storage per account in 
- Postfix:
- /etc/postfix/master.cfhas renamed the "smtps" service to "submissions" (#3235)- This is the modern /etc/servicesname for port 465, aligning with the similar "submission" port 587.
- If you have configured Proxy Protocol support with a reverse proxy via postfix-master.cf(as per our docs guide), you will want to updatesmtpstosubmissionsthere.
 
- This is the modern 
- Postfix now defaults to supporting DSNs (Delivery Status Notifications) only for authenticated users (via ports 465 + 587). This is a security measure to reduce spammer abuse of your DMS instance as a backscatter source. (#3572)
- 
If you need to modify this change, please let us know by opening an issue / discussion. 
- 
You can opt out (enable DSNs) via the postfix-main.cfoverride support using the contents:smtpd_discard_ehlo_keywords =.
- 
Likewise for authenticated users, the submission(s) ports (465 + 587) are configured internally via master.cfto keep DSNs enabled (since authentication protects from abuse).If necessary, DSNs for authenticated users can be disabled via the postfix-master.cfoverride with the following contents:submission/inet/smtpd_discard_ehlo_keywords=silent-discard,dsn submissions/inet/smtpd_discard_ehlo_keywords=silent-discard,dsn
 
- 
 
Added
- Features:
- Environment Variables:
- MARK_SPAM_AS_READ. When set to- 1, marks incoming spam as "read" to avoid unwanted "new mail" notifications for junk mail (#3489)
- DMS_VMAIL_UIDand- DMS_VMAIL_GIDallow changing the default ID values (- 5000:5000) for the Dovecot vmail user and group (#3550)
- RSPAMD_CHECK_AUTHENTICATEDallows authenticated users to avoid additional security checks by Rspamd (#3440)
 
- Documentation:
- Use-case examples / tutorials:
- Debugging page:
- Better communicate distinction between DMS FQDN and DMS mail accounts (#3372)
- Traefik example now includes passthrough=trueon implicit ports (#3568)
- Rspamd docs have received a variety of revisions (#3318, #3325, #3329)
- IPv6 config examples with content tabs (#3436)
- Mention internet.nl as another testing service (#3445)
- setup alias add ...CLI help message now includes an example for aliasing to multiple recipients (#3600)
- SPAMASSASSIN_SPAM_TO_INBOX=1, now emits a debug log to raise awareness that- SA_KILLwill be ignored (#3360)
- CLAMAV_MESSAGE_SIZE_LIMITnow logs a warning when the value exceeds what ClamAV is capable of supporting (4GiB max scan size #3332, 2GiB max file size #3341)
- Added note to caution against changing mydestinationin Postfix'smain.cf(#3316)
 
- Internal:
- Tests:
- Additional linting check for BASH syntax (#3369)
 
Updates
- Misc:
- Changed setup config dkimdefault key size to2048(open-dkim) (#3508)
 
- Changed 
- Postfix:
- Dropped special bits from maildrop/andpublic/directory permissions (#3625)
 
- Dropped special bits from 
- Rspamd:
- Adjusted learning of ham (#3334)
- Adjusted antivirus.conf(#3331)
- logrotatesetup + Rspamd log path + tests log helper fallback path (#3576)
- Setup during container startup is now more resilient (#3578)
- Changed DKIM default config location (#3597)
- Removed the symlink for the override.d/directory in favor of usingcp, integrated into the changedetector service, added a--forceoption for the Rspamd DKIM management, and provided a dedicated helper script for common ENV variables (#3599)
- Required permissions are now verified for DKIM private key files (#3627)
 
- Documentation:
- Documentation aligned to Compose v2 conventions, docker-composecommand changed todocker compose,docker-compose.yamltocompose.yaml(#3295)
- Restored missing edit button (#3338)
- Complete rewrite of the IPv6 page (#3244, #3531)
- Complete rewrite of the "Update and Cleanup" maintenance page (#3539, #3583)
- Improved debugging page advice on working with logs (#3626, #3640)
- Clarified the default for ENV FETCHMAIL_PARALLEL(#3603)
- Removed port 25 from FAQ entry for mail client ports supporting authenticated submission (#3496)
- Updated home path in docs for Dovecot Sieve (#3370, #3650)
- Fixed path to rspamd.log(#3585)
- "Optional Config" page now uses consistent lowercase convention for directory names (#3629)
- CONTRIBUTORS.md: Removed redundant "All Contributors" section (#3638)
 
- Documentation aligned to Compose v2 conventions, 
- Internal:
- CI / Automation:
- .gitattributesnow ensures files are committed with- eol=lf(#3527)
- Revised the GitHub issue bug report template (#3317, #3381, #3435)
- Clarified that the issue tracker is not for personal support (#3498, #3502)
- Bumped versions of miscellaneous software (also shoutout to @dependabot) (#3371, #3584, #3504, #3516)
 
- Tests:
Fixed
- Security:
- Internal:
- CI:
- Scheduled build now have the correct permissions to run successfully (#3345)
 
- Documentation:
- Tests:
v12.1.0
Added
- Rspamd:
- make policyd-spfconfigurable (#3246)
- add 'log' command to set up for Fail2Ban (#3299)
- setupcommand now expects accounts and aliases to be mutually exclusive (#3270)
Updated
- update DKIM/DMARC/SPF docs (#3231)
- Fail2Ban:
- Rspamd:
- improve shutdown function by making PANIC_STRATEGY obsolete (#3265)
- update bug_report.yml(#3275)
- simplify bug_report.yml(#3276)
- revised the contributor workflow (#2227)
Changed
- default registry changed from DockerHub (docker.io) to GHCR (ghcr.io) (#3233)
- consistent namings in docs (#3242)
- get all policyd-spfsetup in one place (#3263)
- miscellaneous script improvements (#3281)
- update FAQ entries (#3294)
Fixed
- GitHub Actions docs update workflow (#3241)
- fix dovecot: ldap mail delivery works (#3252)
- shellcheck: do not check .git folder (#3267)
- add missing -E for extended regexes in smtpd_sender_restrictions(#3272)
- fix setting SRS_EXCLUDE_DOMAINSduring startup (#3271)
- remove superfluous EOFindmarc_dkim_spf.sh(#3266)
- apply fixes to helpers when using set -eE(#3285)
12.0.0
Notable changes are:
- Rspamd feature is promoted from preview status
- Services no longer use chroot
- Fail2Ban major version upgrade
- ARMv7 platform is no longer suppoted
- TLS 1.2 is the minimum supported protocol
- SMTP authentication on port 25 disabled
- The value of smtpd_sender_restrictionsfor Postfix has replaced the value (#3127):- In main.cfwith$dms_smtpd_sender_restrictions
- In master.cfinbound submissions ports 465 + 587 extend this inheritedsmtpdrestriction with$mua_sender_restrictions
 
- In 
Added
- security: Rspamd support:
- integration into scripts, provisioning of configuration & documentation (#2902,#3016,#3039)
- easily adjust options & modules (#3059)
- advanced documentation (#3104)
- make disabling Redis possible (#3132)
- persistence for Redis (#3143)
- integrate into MOVE_SPAM_TO_JUNK(#3159)
- make it possible to learn from user actions (#3159)
 
- heavily updated CI & tests:
- add information to Logwatch's mailer so Envelope Fromis properly set (#3081)
- add vulnerability scanning workflow & security policy (#3106)
- Add tools (ping & dig) to the image (2989)
Updates
- Fail2Ban major version updated to v1.0.2 (#2959)
- heavily updated CI & tests:
- we now run more tests in parallel bringing down overall time to build and test AMD64 to 6 minutes (#2938,#3038,#3018,#3062)
- remove CI ENV & disable fail-fast strategy (#3065)
- streamlined GH Actions runners (#3025)
- updated BATS & helper + minor updates to BATS variables (#2988)
- improved consistency and documentation for test helpers (#3012)
 
- improve the cleanrecipe (don't requiresudoanymore) (#3020)
- improve Amavis setup routine (#3079)
- completely refactor README & parts of docs (#3097)
- TLS setup (self-signed) error message now includes SS_CA_CERT(#3168)
- Better default value for SA_KILL variable (#3058)
Fixed
- restrict-accessavoid inserting duplicates (#3067)
- correct the casing for Mime vs. MIME (#3040)
- Dovecot:
- OpenDMARC - Change default policy to reject (#2933)
- Change Detection service - Use service reloadinstead of restarting process to minimize downtime (#2947)
- Slightly faster container startup via postconfworkaround (#2998)
- Better group ownership to /var/mail-state+ ClamAV inDockerfile(#3011)
- Dropping Postfix chrootmode:
- Fixed several typos (#2990) (#2993)
- SRS setup fixed (#3158)
- Postsrsd restart loop fixed (#3160)
- Order of DKIM/DMARC milters matters (#3082)
- Make logrotate state persistant (#3077)
Changed
- the Dovecot community repository is now the default (#2901)
- moved SASL authentication socket location (#3131)
- only add Amavis configuration to Postfix when enabled (#3046)
- improve bug report template (#3080)
- remove Postfix DNSBLs (#3069)
- bigger script updates:
- improve Postfix config for spoof protection (#3127)
- Change Detection service - Remove 10 sec start-up delay (#3064)
- Postfix:
- Fail2Ban - Added support packages + remove wrapper script (#3032)
- Replace path with variable in mail_state.sh (#3153)
Removed
- configomat (submodule) (#3045)
- Due to deprecation:
- Redundant:
11.3.1
Fixed
- build: Fix dovecot-fts-xapian dependency, when using dovecot community repository (#2937)
11.3.0
Added
- scripts: Fail2ban - Enable network bans (#2818)
- ci: run tests in parallel (#2857)
- docs: added note about Docker version to documentation (#2799)
Changed
- configuration: Run fetchmail not in verbose mode (#2859)
- build: cleaned up Makefileand its targets (#2833)
- configuration: adjust handling of DNSBL return codes (#2890)
Updates
- ci: change to new output format in GH actions (#2892)
- build: cleaned up Makefile (#2833)
- tests: miscellaneous enhancements (#2815)
Fixed
- scripts: ./setup.sh email listdid not display aliases correctly (#2877)
- scripts: Improve error handling, when parameters are missing (#2854)
- scripts: Fix unbound variable error (#2849, #2853)
- scripts: Make fetchmail data persistent (#2851)
- scripts: Run user-patches.shright before starting daemons (#2817)
- scripts: Run Amavis cron job only when Amavis is enabled (#2831)
- config: opendmarc.conf- Change the default OpenDMARC policy to reject (#2933)
Deprecation Notice
- 
Removing TLS 1.0 and TLS 1.1 ciphersuites from TLS_LEVEL=intermediateYou should not realistically need support for TLS 1.0 or TLS 1.1, except in niche scenarios such as an old printer/scanner device that refuses to negotiate a compatible non-vulnerable cipher. More details covered here.
- 
SASL_PASSWDENV An old ENVSASL_PASSWDhas been around for supporting relay-host authentication, but since superceded by thepostfix-sasl-password.cfconfig file. It will be removed in a future major release as detailed here.
- 
Platform Support - ARMv7 This is a very old platform, superceded by ARMv8 and newer with broad product availability around 2016 onwards. Support was introduced primarily for users of the older generations of Raspberry Pi. ARM64 is the modern target for ARM devices. If you require ARMv7 support, please let us know. 
11.2.0
Summary
This release features a lot of small and medium-sized changes, many related to how the image is build and tested during CI. The build now multi-stage based and requires Docker Buildkit, as the ClamAV Signatures are added via COPY --link ... during build-time.
Deprecated
- The environment variable ENABLE_LDAPis deprecated and will be removed in [13.0.0]. UseACCOUNT_PROVISIONER=LDAPnow.
Added
- documentation: improve cron tasks documentation and fix link in documentation
- documentation: added link to brakkee.org for setup of docker-mailserver on Kubernetes
- CI: better build caching for CI
- CI: improve GitHub Action CI with re-usable workflows
- tests: ensure excessive FD limits are avoided
- configuration: added reject_unknown_client_hostnameto main.cf
Changed
- documentation: update and improve K8s documentation
- scripts: set configomat output to loglevel debug
- scripts: refactor CLI commands for database management
- scripts: simplify Fail2Ban output
- tests: update submodules for BATS
- scripts: rework environment variables setup
- scripts: revised linting script
- scripts: addmailuser- remove delaying completion until/var/mailis ready
- configuration: remove unnecessary postconf switch '-e' and use single quotes where possible
- build: streamline COPY statements in Dockerfile
- scripts: improve helpers/log.sh
- build: adjust build arguments
- build: enhance build process
Removed
- configuration: remove unnecessary configuration files
Fixed
- documentation: update documentation to fix regression causing broken links
- scripts: _create_accounts()should run after waiting
- scripts: only calculate checksums, when there are files to monitor.
- tests: wait at least 30 seconds before checking the health state of the container
- CI: add outputstoworkflow_callongeneric_build
Security
There are no security-related changes in this release.
Note
: This part of the changelog was created before switching to the "Keep a Changelog"-format.
v11.1.0
In this release the relay-host support saw significant internal refactoring in preparation for a future breaking change. Similar extensive restructuring through the codebase also occurred, where each PR provides more details. Care was taken to avoid breakage, but there may be some risk affecting unsupported third-party customizations which our test suite is unaware of.
Features
- There is now support for Dovecot-Master accounts that provide admin access to all mail accounts (#2535)
Fixes
- Using Port 465 to authenticate with a relay-host no longer breaks the Amavis transport for Postfix (#2607)
- When mounting /var/mail-state, disabled services will no longer copy over data redundantly (#2608)
- Amavis is now aware of new domains detected during Change Detection, no longer skipping virus and spam filtering (#2616)
- setup.sh -c <container name>no longer ignores- <container name>when more than 1- docker-mailservercontainer is running (#2622)
Improvements
- The Change Detector service will now only process relevant changes (#2615), in addition to now monitoring postfix-sasl-password.cf,postfix-relaymap.cf, andpostfix-regexp.cf(#2623)
- For LDAP users that only need to support a single mail domain, setup config dkimshould now detect the domain implicitly (#2620)
- The container capability SYS_PTRACEis no longer necessary (#2624)
- Added an example for configuring a basic container healthcheckcommand (#2625)
- Postfix main.cfsettingcompatibility_levelwas set to2during our startup scripts. This is now part of our default shippedmain.cfconfig (#2597)
- The Postfix main.cfoverride/extension support viapostfix-main.cfhas been improved to support multi-line values, instead of the previous single-line only support (#2598)
Deprecation Notice
- 
SASL_PASSWDENV An old ENVSASL_PASSWDhas been around for supporting relay-host authentication, but since superceded by thepostfix-sasl-password.cfconfig file. It will be removed in a future major release as detailed here.
- 
Platform Support - ARMv7 This is a very old platform, superceded by ARMv8 and newer with broad product availability around 2016 onwards. Support was introduced primarily for users the older generations of Raspberry Pi. ARM64 is the modern target for ARM devices. If you require ARMv7 support, please let us know. 
v11.0.0
Major Changes
- Internal logging has been refactored. The environment variable DMS_DEBUGhas been replaced byLOG_LEVELto better control the verbosity of logs we output. The new logger is more structured and follows standard log conventions.LOG_LEVELcan be set to:error,warn,info(default),debugandtrace.
- iptableshas been replaced by- nftables. The Fail2Ban configuration was adjusted accordingly. If you use- iptablesyourself (e.g. in- user-patches.sh), make sure to update the scripts.
- PERMIT_DOCKERhas a new default value of- none. This change better secures Podman; to keep the old behaviour (adding the container IP address to Postfix's- mynetworks), use- PERMIT_DOCKER=container.
Minor Changes
- Many minor improvements were made (cleanup & refactoring). Please refer to the section below to get an overview over all improvements. Moreover, there was a lot of cleanup in the scripts and in the tests. The documentation was adjusted accordingly.
- New environment variables were added:
- SpamAssassin KAM was added with ENABLE_SPAMASSASSIN_KAM.
- The fail2bancommand was reworked and can now ban IP addresses as well.
- There were a few small fixes, especially when it comes to bugs in scripts and service restart loops (no functionality changes, only fixes of existing functionality). When building an image from the Dockerfile - Installation of Postfix on modern Linux distributions should now always succeed.
- Some default values for environment values changed: these are mostly non-critical, please refer to #2428 and #2487.
Merged Pull Requests
- [improvement] tests: remove legacy functions / tests #2434
- [improvement] PERMIT_DOCKER=noneas new default value #2424
- [improvement] Adjust environment variables to more sensible defaults #2428
- [fix] macOS linting support #2448
- [improvement] Rename config examples directory #2438
- [docs] FAQ - Update naked/bare domain section #2446
- [improvement] Remove obsolete setup.sh debug inspectcommand from usage description #2454
- [feature] Introduce CLAMAV_MESSAGE_SIZE_LIMITenv #2453
- [fix] remove SA reload for KAM #2456
- [docs] Enhance logrotate description #2469
- [improvement] Remove macOS specific code / support + shellcheck should avoid python, regardless of permissions #2466
- [docs] Update fail2ban.md #2484
- [fix] Makefile: Remove backup/restore of obsolete config directory #2479
- [improvement] scripts: small refactorings #2485
- [fix] Building on Ubuntu 21.10 failing to install postfix #2468
- [improvement] Use FQDN as REPORT_SENDERdefault value #2487
- [improvement] Improve test, get rid of sleep #2492
- [feature] scripts: new log #2493
- [fix] Restart supervisord early #2494
- [improvement] scripts: renamed function _errex->_exit_with_error#2497
- [improvement] Remove invalid URL from SPF message #2503
- [improvement] scripts: refactored scripts located under target/bin/#2500
- [improvement] scripts: refactoring & miscellaneous small changes #2499
- [improvement] scripts: refactored daemon-stack.sh#2496
- [fix] add compatibility for Bash 4 to setup.sh #2519
- [fix] tests: disabled "quota exceeded" test #2511
- [fix] typo in setup-stack.sh #2521
- [improvement] scripts: introduce _logtosedfile#2507
- [feature] create .github/FUNDING.yml#2512
- [improvement] scripts: refactored check-for-changes.sh#2498
- [improvement] scripts: remove DMS_DEBUG#2523
- [feature] firewall: replace iptableswithnftables#2505
- [improvement] log: adjust level and message(s) slightly for four messages #2532
- [improvement] log: introduce proper log level fallback and env getter function #2506
- [feature] scripts: added TZenvironment variable to set timezone #2530
- [improvement] setup: added grace period for account creation #2531
- [improvement] refactor: letsencrypt implicit location discovery #2525
- [improvement] setup.sh/setup: show usage when no argument is given #2540
- [improvement] Dockerfile: Remove not needed ENVs and add comment #2541
- [improvement] chore: (setup-stack.sh) Fix a small typo #2552
- [feature] Add ban feature to fail2ban script #2538
- [fix] Fix changedetector restart loop #2548
- [improvement] chore: Drop setup.shDATABASE fallback ENV #2556
v10.5.0
Critical Changes
- This release fixes a critical issue for LDAP users, installing a needed package on Debian 11 on build-time. Moreover, a race-condition was eliminated (#2341).
- A resource leak in check-for-changes.shwas fixed (#2401)
Other Minor Changes
- SPAMASSASSIN_SPAM_TO_INBOX's default changed to- 1. (#2361)
- Changedetector functionality was added to SSL_TYPE=manual-setups. (#2404)
- Four new environment variables were introduced: LOGWATCH_SENDER,ENABLE_DNSBL,DOVECOT_INET_PROTOCOLSandENABLE_SPAMASSASSIN_KAM. (#2362, #2342, #2358, #2418)
- There are plenty of bug fixes and documentation enhancements with this release.
Merged Pull Requests
- [fix] added libldap-commonto packages in Dockerfile in #2341
- [fix] Prevent race condition on supervisorctl reload in #2343
- [docs] Update links to dovecot docs in #2351
- [fix] tests(fix): Align with upstream testsslfield name change in #2353
- [improvement] Make TLS tests more reliable in #2354
- [feature] Introduce ENABLE_DNSBL env in #2342
- [feature] Introduce DOVECOT_INET_PROTOCOLS env in #2358
- [fix] Fix harmless startup errors in #2357
- [improvement] Add tests for sedfile wrapper in #2363
- [feature] add env var LOGWATCH_SENDERin #2362
- [fix] Fixed non-number-argument in listmailuserin #2382
- [fix] docs: Fail2Ban - Fix links for rootless podman in #2384
- [fix] docs(kubernetes): fix image name in example in #2385
- [fix] SSL documentation contains a small bug #2381 #2383
- [fix] get rid of subshell + execinhelper-functions.shin #2401
- [docs] Rootless Podman security update #2393
- [fix] fix: double occurrence of /etc/postfix/regexpin #2397
- [improvement] consistently make 1 the default value for SPAMASSASSIN_SPAM_TO_INBOXin #2361
- [docs] added sieve example for subaddress sorting in #2410
- [feature] Add changedetector functionality for ${SSL_TYPE} == manualin #2404
- [docs] docs(deps): bump mkdocs-material to v8.2.1 in #2422
- [feature] Add SpamAssassin KAM in #2418
- [improvement] refactoring: split helper functions into smaller scripts in #2420
- [fix] fix: do not add accounts that already exists to account files in #2419
v10.4.0
This release upgrades our base image from Debian 10 to Debian 11.
There is also an important regression fixed for SSL_TYPE=letsencrypt users.
- [fix] A regression with check-for-changes.shintroduced inv10.3.0affectedSSL_TYPE=letsencrypt, preventing detection of cert renewals to restart services (unless usingacme.json) #2326
- [improvement] Base image upgraded from Debian 10 Buster to Debian 11 Bullseye #2116
- Postfix upgraded from 3.4to3.5. Dovecot upgraded from2.3.4to2.3.13. Python 2 is no longer included in the image, Python 3 remains (more information).
- yescryptis now supported upstream as a password hash algorithm,- docker-mailservercontinues to use- SHA512-CRYPT(more information).
 
- Postfix upgraded from 
- [chore] Dovecot statistics service disabled #2292
v10.3.0
WARNING: This release had a small regression affecting the detection of changes for certificates provisioned in /etc/letsencrypt with the config ENV SSL_TYPE=letsencrypt, unless you use Traefik's acme.json. If you rely on this functionality to restart Postfix and Dovecot when updating your cert files, this will not work and it is advised to upgrade to v10.4.0 or newer prior to renewal of your certificates.
- [fix] The Dovecot userdbwill now additionally create "dummy" accounts for basic alias maps (alias maps to a single real account managed by Dovecot, relaying to external providers aren't affected) whenENABLE_QUOTAS=1(default) as a workaround for Postfixquota-statusplugin querying Dovecot with inbound mail for a user, which Postfix uses to reject mail if quota has been exceeded (to avoid risk of blacklisting from spammers abusing backscatter) #2248- NOTE: If using aliases that map to another alias or multiple addresses, this remains a risk.
 
- [fix] setup email listcommand will no longer attempt to query Dovecot quota status whenENABLE_QUOTASis disabled #2264
- [fix] SSL_DOMAINENV should now work much more reliably #2274, #2278, #2279
- [fix] DKIM - Removed refile:(regex type) from KeyTable entry inopendkim.conf, fixes validation error output fromopendkim-testkey#2249
- [fix] DMARC - Removed quotes around the hostname value in opendmarc.conf. This avoids an authentication failure where an OpenDKIM header was previously ignored #2291
- [fix] When using ONE_DIR=1(default), thespool-postfixfolder now has the correct permissions carried over. This resolves some failures notably with sieve filters #2273
- [improvement] Warnings are now logged for ClamAV and SpamAssassin if they are enabled but Amavis is disabled (which is required for them to work correctly) #2251
- [improvement] user-patches.shis now invoked viabashto assist Kubernetes deployments withConfigMap#2295
Internal
These changes are primarily internal and are only likely relevant to users that maintain their own modifications related to the changed files.
- [chore] Redundant config from Postfix master.cfhas been removed, it should not affect any users as our images have not included any of the related processes #2272
- [refactor] check-for-changes.shwas carrying some duplicate code fromsetup-stack.shthat was falling out of sync, they now share common code #2260
- [refactor] acme.jsonextraction was refactored into a CLI utility and updated to Python 3 (required for future upgrade to Debian 11 Bullseye base image) #2274
- [refactor] As part of the Traefik acme.jsonandSSL_DOMAINwork, logic forSSL_TYPE=letsencryptwas also revised #2278
- [improvement] Some minor tweaks to how we derive the internal HOSTNAMEandDOMAINNAMEfrom user configuredhostnameanddomainnamesettings #2280
v10.2.0
- You no longer need to maintain a copy of setup.shmatching your version release from v10.2 ofdocker-mailserveronwards. Version specific functionality ofsetup.shhas moved into the container itself, whilesetup.shremains as a convenient wrapper to:docker exec -it <container name> setup <command>.
- ONE_DIRnow defaults to enabled (- 1).
- For anyone relying on internal location of certificates (internal copy of mounted files at startup), the Postfix and Dovecot location of /etc/postfix/sslhas changed to/etc/dms/tls. This may affect any third-partyuser-patches.shscripts that depended on this path to update certs.
- The Let's Encrypt section of our SSL / TLS docs has been brought up to date.
Bigger scripts-related improvements
- [scripts] update setup.shto now use a running container first if one exists #2134
- [scripts] included setup.shfunctionality inside the container to be version independent again #2174
- [scripts] HOSTNAMEandDOMAINNAMEsetup improved #2175
- [scripts] delmailusercan now delete mailboxed without TLD #2172
- [scripts] properly exit on failure (#2199 in conjunction with #2196)
- [scripts] make setup.shcompletely non-interactive for Podman users #2201
Security
Some internal refactoring and fixes happened this release cycle in #2196:
- [improve] The Postfix and Dovecot location of /etc/postfix/sslhas changed to/etc/dms/tls
- [improve] An invalid SSL_TYPEor a valid value with an invalid configuration will now panic, exiting the container and emitting a fatal error to the logs
- [fix] An unconfigured/empty SSL_TYPEENV now correctly disables SSL support for Dovecot and general Postfix configurations. A reminder that this is unsupported officially, and is only intended for tests and troubleshooting. Use only a validSSL_TYPE(letsencryptandmanualare recommended) for production deployments
- [fix] TLS_LEVEL=intermediatenow modifies the system (container)openssl.cnfconfig to set the minimum protocol to TLS 1.0 (from 1.2) and cipher-suite support toDEFAULT@SECLEVEL=1(from2). This change is required for Dovecot in upcoming Debian Bullseye upgrade, to be compatible with theTLS_LEVEL=intermediatecipher-suite profile. It may affect other software within the container that relies on this openssl config, should you extend the Docker image #2193
- [fix] Provide DH parameters (default: RFC 7919 group ffdhe406.pem) at build-time, instead of during startup. Custom DH parameters regardless ofONE_DIRare now only detected when mounted to/tmp/docker-mailserver/dhparams.pem#2192
- [docs] Revise the Let's Encrypt section of our SSL / TLS docs #2209
Miscellaneous small additions and changes
- [ci] improved caching #2197
- [ci] refactored spam tests and introduced common container setup template #2198
- [fix] update Fail2Ban wrapper to propagate errors to user #2170
- [fix] Dockerfile sed's are now checked #2158
- [general] Updated default value of ONE_DIRto1#2148
- [docs] updated Kubernetes documentation #2111
- [docs] introduced dedicated Podman documentation #2179
- [docs] miscellaneous documentation improvements
- [misc] introduced GitHub issue forms for issue templates #2160
- [misc] Removed the internal mkcert.shscript for Dovecot as it is no longer needed #2196
v10.1.2
This is bug fix release. It reverts a regression introduced with #2104.
v10.1.1
This release mainly improves on v10.1.0 with small bugfixes/improvements and dependency updates
- [feat] Add logwatch maillog.conf file to support /var/log/mail/ (#2112)
- [docs] CONTRIBUTORS.mdnow also shows every code contributor from the past (#2143)
- [improve] Avoid chmod +x when not needed (#2127)
- [improve] check-for-changes: performance improvements (#2104)
- [dependency] Update various dependencies through docs and base image
- [security] This release contains also security fixes for OpenSSL
v10.1.0
This release mainly improves on v10.0.0 with many bugfixes.
- [docs] Various documentation updates (#2105, #2045, #2043, #2035, #2001)
- [misc] Fixed a lot of small bugs, updated dependencies and improved functionality (#2095, #2047, #2046, #2041, #1980, #2030, #2024, #2001, #2000, #2059)
- [feat] Added dovecot-fts-xapian (#2064)
- [security] Switch GPG keyserver (#2051)
v10.0.0
This release improves on 9.1.0 in many aspect, including general fixes, Fail2Ban, LDAP and documentation. This release contains breaking changes.
- [general] Fixed many prose errors (spelling, grammar, indentation).
- [general] Documentation is better integrated into the development process and it's visibility within the project increased (#1878).
- [general] Added stop_grace_period:to example Compose file and supervisord (#1896 #1945)
- [general] ./setup.sh email listwas enhanced, now showing information neatly (#1898)
- [general] Added update check and notification (#1976, #1951)
- [general] Moved environment variables to the documentation and improvements (#1948, #1947, #1931)
- [security] Major Fail2Ban improvements (cleanup, update and breaking changes, see below)
- [fix] ./setup.sh email del ...now works properly
- [code] Added color variables to setup.shand improved the script as a whole (#1879, #1886)
- [ldap] Added LDAP_QUERY_FILTER_SENDERS(#1902)
- [ldap] Use dovecots LDAP urisconnect option instead ofhosts(#1901)
- [ldap] Complete rework of LDAP documentation (#1921)
- [docs] PRs that contain changes to docs will now be commented with a preview link (#1988)
Breaking Changes
- [security] Fail2Ban adjustments:
- Fail2ban v0.11.2 is now used (#1965).
- The previous F2B config (from an old Debian release) has been replaced with the latest default config for F2B shipped by Debian 10.
- The new default blocktype is now DROP, notREJECT(#1914).
- A ban now applies to all ports (iptables-allports), not just the ones that were "attacked" (#1914).
- Fail2ban 0.11 is totally compatible to 0.10, but the database got some new tables and fields (auto-converted during the first start), so once updated to DMS 10.0.0, you have to remove the database mailstate:/lib-fail2ban/fail2ban.sqlite3if you would need to downgrade to DMS 9.1.0 for some reason.
 
- [ldap] Removed SASLAUTHD_LDAP_SSL. Instead provide a protocol inSASLAUTHD_LDAP_SERVERand adjustSASLAUTHD_LDAP_default values (#1989).
- [general] Removed stablerelease tag (#1975):- Scheduled builds are now based off edge.
- Instead of stable, please use the latest version tag available (or thelatesttag).
- The stableimage tag will be removed from DockerHub in the near future.
 
- Scheduled builds are now based off 
- [setup] Removed ./setup config sslcommand (deprecated since v9).SSL_TYPE=self-signedremains supported however. (dc8f49de, #2021)
v9.1.0
This release marks the breakpoint where the wiki was transferred to a reworked documentation
- [feat] Introduce ENABLE_AMAVIS env (#1866)
- [docs] Move wiki to gh-pages (#1826) - Special thanks to @polarathene 👨🏻💻
- You can edit the docs now directly with your code changes
- Documentation is now versioned related to docker image versions and viewable here: https://docker-mailserver.github.io/docker-mailserver/latest/
 
v9.0.1
A small update on the notification function which was made more stable as well as minor fixes.
- [fix] _notifycannot fail anymore - non-zero returns lead to unintended behavior in the past whenDMS_DEBUGwas not set or0
- [refactor] check-for-changes.shnow uses_notify
v9.0.0
- [feat] Support extra user_attributesin accounts configuration (#1792)
- [feat] Add possibility to use a custom dkim selector (#1811)
- [feat] TLS: Dual (aka hybrid) certificate support! (eg ECDSA certificate with an RSA fallback for broader compatibility) (#1801).
- This feature is presently only for SSL_TYPE=manual, all you need to do is provide your fallback certificate to theSSL_ALT_CERT_PATHandSSL_ALT_KEY_PATHENV vars, just like your primary certificate would be setup for manual mode.
 
- This feature is presently only for 
- [security] TLS: You can now use ECDSA certificates! (#1802)
- Warning: ECDSA may not be supported by legacy systems (most pre-2014). You can provide an RSA certificate as a fallback.
 
- [fix] TLS: For some docker-compose setups when restarting the docker-mailserver container, internal config state may have been persisted despite making changes that should reconfigure TLS (eg changing SSL_TYPEor replacing the certificate file) (#1801).
- [refactor] Split start-mailserver.sh(#1820)
- [fix] Linting now uses local path to remove the sudo dependency (#1831).
Breaking Changes
- [security] TLS: TLS_LEVEL=modernhas changed the server-side preference order to 128-bit before 256-bit encryption (#1802).- NOTE: This is still very secure but may result in misleading lower scores/grades from security audit websites.
 
- [security] TLS: TLS_LEVEL=modernremoved support for AES-CBC cipher suites and follows best practices by supporting only AEAD cipher suites (#1802).- NOTE: As TLS 1.2 is the minimum required for modern already, AEAD cipher suites should already be supported and preferred.
 
- [security] TLS: TLS_LEVEL=intermediatehas removed support for cipher suites using RSA for key exchange (only available with an RSA certificate) (#1802).- NOTE: This only affects Dovecot which supported 5 extra cipher suites using AES-CBC and AES-GCM. Your users MUA clients should be unaffected, preferring ECDHE or DHE for key exchange.
 
- [refactor] Complete refactoring of opendkim script (#1812).
- NOTE: Use ./setup.sh config dkim helpto see the new syntax.
 
- NOTE: Use 
v8.0.1
This release is a hotfix for #1781.
- [spam] bl.spamcop.netwas removed from the list of spam lists since the domain expired and became unusable
v8.0.0
The transfer of the old repository to the new organization has completed. This release marks the new starting point for docker-mailserver in the docker-mailserver organization. Various improvements were made, small bugs fixed and the complete CI was transferred.
- [general] transferred the whole repository to docker-mailserver/docker-mailserver
- [general] adjusted README.mdand split offENVIRONMENT.md
- [ci] usage of the GitHub Container Registry
- [ci] switched from TravisCI to GitHub Actions for CI/CD
- now building images for amd64andarm/v7andarm/64
- integrated stale issues action to automatically close stale issues
- adjusted issue templates
 
- now building images for 
- [build] completely refactored and improved the Dockerfile
- [build] improved the Makefile
- [image improvement] added a proper init process
- [image improvement] improved logging significantly
- [image improvement] major LDAP improvements
- [bugfixes] miscellaneous bug fixes and improvements
Breaking changes of release 8.0.0
- [image improvement] log-level now defaults to warn
- [image improvement] DKIM default key size now 4096
- [general] the :latesttag is now the latest release and:edgerepresents the latest push onmaster
- [general] URL changed from tomav/...todocker-mailserver/...
v7.2.0
- [scripts] refactored target/bin/
- [scripts] redesigned environment variable use
- [general] added Code of Conduct
- [general] added missing Dovecot descriptions
- [tests] enhanced and refactored all tests
v7.1.0
- [scripts] use of default variables has changed slightly (consult environment variables)
- [scripts] Added coherent coding style and linting
- [scripts] Added option to use non-default network interface
- [general] new contributing guidelines were added
- [general] SELinux is now supported