summaryrefslogtreecommitdiff
path: root/Omni/Cloud/Mail.nix
blob: 728ec094dc2951d718ecf226ccf6594f96b8c412 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
{...}:
/*
Known issues:

- when the acme cert gets refreshed, you need to manually restart dovecot
- when restarting dovecot, it might hang, in that case do:
      systemctl --job-mode=ignore-dependencies restart dovecot2 postfix
*/
{
  mailserver = {
    enable = true;
    monitoring = {
      enable = false;
      alertAddress = "bsima@me.com";
    };
    fqdn = "simatime.com";
    domains = ["simatime.com" "bsima.me"];
    certificateScheme = "acme-nginx"; # let's encrypt, using named scheme instead of number
    enableImap = true;
    enablePop3 = true;
    enableImapSsl = true;
    enablePop3Ssl = true;
    enableManageSieve = true;
    virusScanning = false; # ur on ur own
    localDnsResolver = true;

    # Define proper virtual aliases instead of placeholder
    extraVirtualAliases = {
      "blocked@simatime.com" = "ben@simatime.com";
    };

    loginAccounts = {
      "ben@simatime.com" = {
        hashedPasswordFile = "/home/ben/hashed-mail-password";
        aliases = [
          # my default email
          "ben@bsima.me"
          # admin stuff
          "postmaster@simatime.com"
          "abuse@simatime.com"
        ];
        catchAll = ["simatime.com" "bsima.me"];
        quota = "10G";
      };
      "dev@simatime.com" = {
        hashedPasswordFile = "/home/ben/hashed-mail-password";
        aliases = ["dev@bsima.me"];
        quota = "10G";
      };
      "nick@simatime.com" = {
        hashedPassword = "$6$31P/Mg8k8Pezy1e$Fn1tDyssf.1EgxmLYFsQpSq6RP4wbEvP/UlBlXQhyKA9FnmFtJteXsbJM1naa8Kyylo8vZM9zmeoSthHS1slA1";
        aliases = ["nicolai@simatime.com"];
        quota = "1G";
      };
      "monica@simatime.com" = {
        hashedPasswordFile = "/home/ben/hashed-mail-password";
        quota = "1G";
      };
    };
  };

  # Configure Postfix to block unwanted domains using the NixOS services.postfix.headerChecks option
  services.postfix.headerChecks = [
    # Block perfora.net
    {
      pattern = "/^Received:.*perfora\\.net/";
      action = "REJECT Domain perfora.net is blocked";
    }
    {
      pattern = "/^From:.*perfora\\.net/";
      action = "REJECT Domain perfora.net is blocked";
    }
    
    # Block novastells.com.es domain
    {
      pattern = "/^Received:.*novastells\\.com\\.es/";
      action = "REJECT Domain novastells.com.es is blocked";
    }
    {
      pattern = "/^From:.*novastells\\.com\\.es/";
      action = "REJECT Domain novastells.com.es is blocked";
    }
    {
      pattern = "/^Return-Path:.*novastells\\.com\\.es/";
      action = "REJECT Domain novastells.com.es is blocked";
    }
    {
      pattern = "/^Sender:.*novastells\\.com\\.es/";
      action = "REJECT Domain novastells.com.es is blocked";
    }
  ];
}