aboutsummaryrefslogtreecommitdiff
path: root/modules/mailserver/default.nix
blob: 3d0360ed9b68ec1a58a5ca909e83bc261490f8ad (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
{
  config,
  lib,
  pkgs,
  ...
}:

{
  # disabledModules = [ "services/mail/stalwart-mail.nix" ];
  # imports = [ "${nixpkgs-unstable}/nixos/modules/services/mail/stalwart-mail.nix" ];

  services.stalwart-mail = {
    enable = true;
    package = pkgs.unstable.stalwart-mail.override { stalwartEnterprise = true; };
    openFirewall = true;

    settings = {
      config = {
        local-keys = [
          "store.*"
          "directory.*"
          "tracer.*"
          "!server.blocked-ip.*"
          "!server.allowed-ip.*"
          "server.*"
          "authentication.fallback-admin.*"
          "cluster.*"
          "config.local-keys.*"
          "storage.data"
          "storage.blob"
          "storage.lookup"
          "storage.fts"
          "storage.directory"
          "certificate.*"
          "webadmin.*"
          "metrics.prometheus.*"
          "resolver.*"
          "http.hsts"
        ];
      };

      certificate."mail-vapor-systems" = {
        cert = "%{file:/var/lib/acme/mail.vapor.systems/fullchain.pem}%";
        private-key = "%{file:/var/lib/acme/mail.vapor.systems/key.pem}%";
      };

      spam-filter = lib.mkForce {};

      http = {
        hsts = true;
      };

      metrics.prometheus = {
        enable = true;
        auth = {
          username = "prometheus";
          secret = "%{file:/etc/secrets/prometheus}%";
        };
      };

      server = {
        hostname = "mail.vapor.systems";

        tls = {
          enable = true;
          implicit = true;
          timeout = "1m";
          disable-protocols = [ "TLSv1.2" ];
          disable-ciphers = [
            "TLS13_AES_256_GCM_SHA384"
            "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
          ];
          ignore-client-order = true;
        };

        listener = {
          smtp = {
            bind = [
              "0.0.0.0:25"
              "[2a01:4f8:1c1c:3ce7::1]:25"
            ];
            protocol = "smtp";
          };
          submission = {
            bind = [
              "0.0.0.0:587"
              "[2a01:4f8:1c1c:3ce7::1]:587"
            ];
            protocol = "smtp";
          };
          submissions = {
            bind = [
              "0.0.0.0:465"
              "[2a01:4f8:1c1c:3ce7::1]:465"
            ];
            protocol = "smtp";
            tls = {
              enable = true;
              implicit = true;
            };
          };

          imap = {
            bind = [
              "0.0.0.0:993"
              "[2a01:4f8:1c1c:3ce7::1]:993"
            ];
            protocol = "imap";
            tls = {
              enable = true;
              implicit = true;
            };
          };

          management_plain = {
            bind = [
              "0.0.0.0:80"
              "[2a01:4f8:1c1c:3ce7::1]:80"
            ];
            protocol = "http";
          };
          management = {
            bind = [
              "0.0.0.0:443"
              "[2a01:4f8:1c1c:3ce7::1]:443"
            ];
            protocol = "http";
            tls = {
              enable = true;
              implicit = true;
            };
          };
        };

      };

      storage.directory = "internal";

      directory = {
        ldap = {
          type = "ldap";
          url = "ldap://10.10.0.1:389";
          timeout = "30s";
          tls.enable = false;

          base-dn = "dc=mail,dc=vapor,dc=systems";

          bind = {
            dn = "cn=mail,ou=users,dc=mail,dc=vapor,dc=systems";
            secret = "%{file:/etc/secrets/ldap}%";
            auth = {
              method = "template";
              template = "cn={local},ou=users,dc=mail,dc=vapor,dc=systems";
              search = true;
            };
          };

          filter = {
            name = "(&(|(objectClass=person)(objectClass=group))(sAMAccountName=?))";
            email = "(&(|(objectClass=person)(objectClass=group))(|(mail=?)(mailAlias=?)))";
          };

          attributes = {
            name = "sAMAccountName";
            class = "objectClass";
            description = [
              "displayName"
            ];
            secret = "userPassword";
            groups = [ "memberOf" ];
            email = "mail";
            email-alias = "mailAlias";
            quota = "diskQuota";
          };
        };
      };

      authentication = {
        fallback-admin = {
          user = "admin";
          secret = "$6$W2nCPyf1a./fdBxp$yLaBwQDxQqj00UnH9hR3XN8NIXGd.X/ts.dKVKjSWsd8DPJbn/YUnFGUAaoTX5jbeRi76qeFnCVLARdDJKLgA/";
        };
      };
    };
  };

  secrets = {
    ldap = {
      source = ../../secrets/authentik/mail;
      dest = "/etc/secrets/ldap";
      owner = config.users.users.stalwart-mail.name;
    };
    prometheus = {
      source = ../../secrets/prometheus;
      dest = "/etc/secrets/prometheus";
      owner = config.users.users.stalwart-mail.name;
    };
  };

  users.users.stalwart-mail.extraGroups = [ "acme" ];

  security.acme.certs = {
    "mail.vapor.systems" = { };
  };
}