Today's Deep-Dive: Docker Mailserver
Ep. 392

Today's Deep-Dive: Docker Mailserver

Episode description

In this episode, we take a deep dive into Docker Mail Server, an open-source project designed to make one of the most intimidating areas of self-hosting far more approachable: running your own secure email infrastructure. Starting with the idea that your inbox is the front door to your digital life, we explore why relying on big providers means surrendering control, and how Docker Mail Server repackages the traditionally painful process of building a mail server into a containerized, production-ready system that is simpler to deploy, back up, and manage.

Along the way, we unpack what makes the software so powerful: a full stack of integrated mail components including Postfix, Dovecot, spam and virus filtering, DKIM signing, DMARC support, Let’s Encrypt certificates, and fail2ban, all pre-wired to work together inside Docker. We also look at the project’s philosophy of “keep it simple and versioned,” its unusual decision to avoid SQL databases in favor of text-based configuration, and the tools it provides to lower the barrier to entry, from the setup.sh management script to advanced customization hooks for power users. More than a technical walkthrough, this episode is about data sovereignty, self-hosted resilience, and what it means to reclaim the keys to your own communications infrastructure.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

You know, usually when you run an apartment,

0:02

there's this underlying understanding

0:03

about the front door key.

0:05

Like, you hold a copy, sure.

0:06

But the property manager definitely

0:08

has a master key sitting in a lockbox

0:10

somewhere in their office.

0:11

Right, which you just kind of accept.

0:12

Yeah, you accept it because, well, it's their building.

0:16

But then you look at your digital life, your banking

0:18

password resets, your private conversations,

0:22

your medical communications, just your entire online identity.

0:26

Oh, absolutely.

0:26

All of it is locked behind an email address.

0:29

That inbox is essentially your digital front door.

0:32

And yet almost all of us are just

0:34

renting that space from a massive tech giant.

0:37

We're using their building.

0:38

Exactly, we're using their building,

0:39

which means they hold the master key.

0:42

So today we're figuring out how to take the key back.

0:44

We are jumping into a wildly popular open source project

0:48

called Docker Mail Server, or DMS for short.

0:51

It's a fantastic project.

0:53

It really is.

0:54

And our mission for this deep dive

0:56

is taking what's historically been one of the most

0:59

intimidating, just frustrating projects in the IT world,

1:02

which is running your own secure email server

1:05

and exploring how this project breaks it down

1:08

into an accessible containerized system for you.

1:11

And before we get into the exact mechanics

1:14

of how this software actually pulls that off,

1:16

we should really mention the supporter of today's deep dive,

1:18

which is Safe Server.

1:20

Because this whole idea of owning your infrastructure,

1:23

it isn't just some, I don't know,

1:24

philosophical talking point for weekend tinkerers.

1:27

Oh, definitely not.

1:28

Right, for a lot of organizations,

1:29

it's a strict legal operational requirement.

1:32

I mean, Docker Mail Server acts as a highly capable

1:36

open source replacement for proprietary tools.

1:39

Think of things like Microsoft Exchange or Google Workspace.

1:43

Which is huge.

1:44

Yeah, and that matters immensely

1:46

when you're dealing with strict regulatory compliance,

1:49

like email retention, financial records, or audit trails.

1:52

Right, because if you're handling financial records

1:54

or dealing with strict data protection laws,

1:57

data sovereignty becomes absolutely paramount.

2:00

I mean, you can't just hand your corporate data over

2:03

to a third-party cloud provider and cross your fingers

2:07

that they don't change their terms of service or get breached.

2:10

Exactly.

2:11

You need to know exactly where that data lives,

2:13

which is where Safe Server comes into play.

2:16

They handle the hosting of this exact software

2:19

on highly secure German servers, which guarantees

2:22

that strict data sovereignty.

2:24

That's a massive relief for businesses.

2:26

It really is.

2:27

They advise organizations on the implementation

2:29

and can actually be commissioned for consulting

2:31

on this specific Docker Mail Server solution,

2:33

as well as comparable alternatives.

2:36

It's basically about getting all the benefits of open source

2:39

independence without the operational headache

2:41

of maintaining the infrastructure yourself.

2:43

Which is always the dream, right?

2:45

Absolutely.

2:46

And you can find more information

2:47

on how they help organizations secure their data

2:49

at safeserver.de.

2:51

And you know, that operational headache you just mentioned

2:53

is the perfect springboard into our sources today,

2:57

because the desire for independent email

2:59

has always been there.

3:00

It's the execution that usually makes IT professionals wake up

3:03

in a cold sweat.

3:04

Oh, for sure.

3:05

The configuration alone is a nightmare.

3:07

Yeah.

3:08

OK, let's unpack this.

3:09

Historically, building a mail server

3:11

wasn't like buying a car.

3:13

It was like buying a transmission from one factory,

3:17

a steering column from another, and somehow trying

3:19

to weld them together on your driveway

3:22

without the whole thing exploding on the highway.

3:24

That is a very accurate, albeit terrifying, mental image.

3:28

Right.

3:28

You are compiling software from source,

3:30

fighting dependency hell on your Linux box.

3:33

So is Docker Mail Server essentially

3:35

a prefabricated shipping container

3:37

where all that machinery is already bolted to the floor

3:40

and wired together for you?

3:41

What's fascinating here is how well that shipping container

3:44

analogy captures the sheer architectural elegance

3:47

of this project.

3:48

Yes, the developers explicitly designed DMS

3:50

to be a production-ready, full-stack, but simple mail

3:54

server that runs entirely inside a Docker container.

3:56

So it's all just self-contained.

3:58

Exactly.

3:59

In the past, if you wanted to build an email server,

4:01

you were installing a dozen different, heavily integrated

4:05

services directly onto your host operating system.

4:08

And if, say, one library updated and broke compatibility

4:12

with another.

4:12

Boom, your email went down.

4:14

Your email went down.

4:15

By isolating everything inside a containerized environment,

4:18

the developers have pre-configured all those moving parts

4:20

to work together flawlessly.

4:22

You just download the container image,

4:24

provide a few environmental variables, and boot it up.

4:27

That sounds almost too easy.

4:28

Well, the core philosophy driving this entire project

4:31

is explicitly spelled out in their documentation.

4:34

They just say, keep it simple and versioned.

4:36

Keep it simple and versioned, which, I mean,

4:39

sounds fantastic on a bumper sticker,

4:41

but how does that actually manifest in the architecture?

4:43

Because email is inherently complex.

4:46

It manifests through a rather radical design choice

4:49

that genuinely sets DMS apart from heavier enterprise

4:52

solutions.

4:53

The sources highlight that Docker Mail Server uses

4:55

absolutely zero SQL databases, like none.

5:00

Wait, hold on.

5:00

Let me challenge that, no database at all.

5:02

But, I mean, if I'm running an organization with, say,

5:05

hundreds or thousands of users, lots of aliases,

5:09

complex routing rules, text files

5:11

are inherently slow to search, right?

5:14

Doesn't parsing plain text files to figure out

5:16

where an email goes create a massive bottleneck compared

5:19

to a perfectly indexed SQL database?

5:21

Yeah, that's a great technical pushback.

5:23

And it's exactly what a system admin would worry about.

5:26

But the developers thought of that, the source of truth

5:29

for your configuration, so the user accounts,

5:32

the domain aliases, those are plain text files.

5:35

But when the container boots up, services like Postfix

5:39

don't just awkwardly scan those text files line by line

5:42

for every incoming email.

5:43

Postfix actually compiles those plain text configurations

5:47

into highly optimized binary hash maps.

5:49

Oh, like Berkeley DB files.

5:50

Exactly like that.

5:51

In memory for lightning fast lookups.

5:53

Ah, OK.

5:54

So you get the speed of an index but the stability of a text

5:56

file.

5:57

Precisely.

5:58

And from a system administration standpoint,

6:00

relying on text files as the source of truth

6:02

is a massive relief.

6:04

SQL databases introduce a whole new layer

6:06

of stateful fragility.

6:07

Oh, tell me about it.

6:08

They get corrupted if you look at them wrong.

6:10

Right.

6:10

They can become corrupted during a sudden power loss.

6:13

They require specialized backup routines.

6:16

And upgrading them can break your system

6:19

if the database schemas don't perfectly

6:20

match the new software version.

6:22

That makes total sense.

6:23

By using only configuration files,

6:25

DMS makes deploying, backing up, and migrating

6:28

incredibly straightforward.

6:30

If your server hardware physically catches fire,

6:33

you just copy your folder of text files to a new machine,

6:36

pull the Docker container, and you're instantly back online.

6:40

There's no complex database restoration or schema

6:42

migration to sweat over.

6:44

OK.

6:44

Here's where it gets really interesting, though.

6:46

If we're relying on a bunch of simple text files running

6:49

in an ephemeral container, are we

6:51

sacrificing the heavy-hitting security features?

6:54

Not at all.

6:55

Because when the documentation calls this a full stack mail

6:58

server, what exactly makes it full stack?

7:01

Honestly, sometimes simple is just polite marketing

7:04

speak for underpowered.

7:05

It's a natural assumption.

7:07

But underpowered is the absolute last word

7:09

you'd use once you look under the hood.

7:11

The sheer volume of enterprise-grade tools

7:14

packed into this single container is staggering.

7:16

OK, so what's in the box?

7:18

Well, the real magic isn't just that they're included.

7:20

It's that you don't have to manually wire them together.

7:23

Let's break down the stack.

7:24

First, you have the core foundation.

7:26

Postfix handles the SMTP side sober,

7:30

talking to other servers and sending mail out.

7:32

Got it.

7:32

And DoveCot handles IMP and POP3,

7:35

which is how your phone or desktop mail client

7:38

authenticates and actually reads the messages.

7:40

But assuming our listeners are somewhat familiar with those

7:43

core delivery agents, the real conversation

7:45

is about the security perimeter.

7:46

Right.

7:47

Because standing up an SMTP server on the open internet

7:50

today is basically inviting a siege.

7:53

It's not just about receiving mail.

7:55

It's about fighting off a relentless barrage

7:57

of malicious actors, botnets, and spam campaigns.

8:00

Exactly.

8:00

And that's where the anti-spam and anti-virus suite inside DMS

8:04

shines.

8:04

You have rspammed and Amavis acting as the primary filters,

8:08

analyzing the headers and content of incoming traffic.

8:11

You have spam assassin running alongside them.

8:13

That's a lot of filtering.

8:14

It is.

8:15

And crucially, you have ClamAV, which

8:17

is a robust open source anti-virus engine

8:21

integrated directly into the mail flow

8:23

to scan attachments for malware before they ever

8:25

reach a user's inbox.

8:26

But wait, how does an anti-virus scanner

8:28

work effectively inside a Docker container?

8:31

Containers are supposed to be ephemeral.

8:34

If the container restarts, doesn't ClamAV

8:36

lose all its downloaded virus definitions

8:38

and have to start from scratch?

8:39

That's where Docker volumes come in.

8:41

The documentation specifically instructs

8:43

you to map persistent storage volumes from your host machine

8:46

into the container.

8:48

OK, so the data lives outside the container.

8:50

Exactly.

8:51

So Fresh Clam, which is the updater service,

8:53

downloads the latest virus signatures

8:55

and saves them to that persistent volume.

8:57

When the container restarts, or even

8:59

if you upgrade the entire Docker mail server image

9:01

to a newer version, ClamAV just checks the volume,

9:05

sees the updated definitions, and picks up

9:07

exactly where it left off.

9:09

That's incredibly elegant.

9:11

But filtering incoming junk is only half the battle, right?

9:14

Because if you're hosting an email server for a business,

9:16

your biggest nightmare isn't receiving spam.

9:19

It's being marked a spam by the big players like Gmail or Yahoo.

9:23

You have to prove your server is legitimate.

9:25

And DMS automates the cryptographic heavy lifting

9:28

to prove your legitimacy.

9:29

The container comes pre-wired with OpenDKIM and OpenDMR.

9:33

Let's break that down a bit for the listener, because DKIM

9:36

and DMRC are the acronyms that usually make people give up

9:39

on self-hosting entirely.

9:41

DKIM is essentially a cryptographic WAC seal, right?

9:44

That is a perfect way to visualize it.

9:46

When you send an email, DMS uses a private key

9:49

to mathematically sign the headers of your message.

9:51

That's the WAC seal.

9:52

You then publish the corresponding public key

9:54

in your domain's DNS records.

9:56

So anyone can check the seal.

9:57

Right.

9:58

When Gmail receives your message, looks up your DNS,

10:01

grabs the public key, and verifies the signature.

10:03

If it matches, Gmail knows the email genuinely

10:06

originated from your server and wasn't spoofed by a spammer.

10:11

DMRC is simply the policy record that

10:13

tells Gmail what to do if that signature fails.

10:15

Like, hey, if the seal is broken,

10:17

throw this email in the spam folder.

10:19

And the brilliance here is that Docker Mail Server actually

10:22

generates those cryptographic keys for you, right?

10:24

You don't have to figure out the math.

10:25

Yes.

10:26

You run a simple command, and the container

10:28

generates the private key, stirs it securely,

10:31

and spits out the exact public key string

10:33

you need to copy and paste into your DNS provider.

10:35

Wow.

10:36

It takes a process that used to require

10:38

reading three different cryptography manuals,

10:41

and turns it into a one-line command.

10:43

Add to that the built-in support for Let's Encrypt,

10:46

which automatically provisions and renews free SSL certificates

10:49

so your IMAC connections are encrypted,

10:51

and tools like Fail-to-Ban.

10:53

Oh, I love Fail-to-Ban.

10:55

The way it's integrated here is just so smart.

10:57

If a botnet is trying to brute force a user's password,

11:00

DovCot logs the failed login attempt.

11:03

Fail-to-Ban is sitting there, tailing that exact log file

11:06

inside the container.

11:07

Always watching.

11:08

Always watching.

11:09

It spots the repeated failures, instantly communicates

11:12

with the host's firewall rules, and drops the attacker's IP

11:15

address entirely.

11:16

It's automated self-defense.

11:18

And that's the full stack promise.

11:20

You aren't manually writing the regular expressions

11:22

to make fail-to-Ban understand DovCot's specific log format.

11:27

The Docker mail server maintainers

11:29

have already written and tested all of that glue logic for you.

11:32

So what does this all mean for the person who actually

11:35

wants to deploy this?

11:36

We've just fired off a massive list of technologies.

11:39

Postfix, DovCot, SpemAssassin, ClammaMay, OpenD Kim.

11:42

Let's encrypt.

11:43

It is a lot of acronym.

11:44

It is.

11:45

Even with the container doing the heavy lifting,

11:47

it's easy to hear that list and feel that old intimidation

11:49

creeping right back in.

11:51

How does someone interact with this beast

11:53

without getting crushed by the complexity?

11:55

This raises an important question.

11:57

Because a complex tool with a terrible user interface

12:00

is practically useless.

12:02

The developers understood that, which

12:04

is why they created a dedicated command line interface

12:07

tool prominently featured in their documentation.

12:10

It's a setup script, simply named setup.sh.

12:13

So this script is how you actually drive the server.

12:16

Exactly.

12:17

You don't have to SSH into the container

12:19

and use a text editor to manually hack away

12:22

at those 50 different text files to add a new employee's email

12:25

address.

12:25

Oh, thank goodness.

12:26

Right.

12:27

You just run .-slash setup.sh email at user.example.com,

12:32

type in a password.

12:33

And the script safely injects the correct hash configuration

12:36

into the underlying text files for you.

12:38

That's so clean.

12:38

It handles clean aliases, generating those decam keys

12:41

we talked about, configuring quotas, managing user access.

12:45

It acts as an abstraction layer, so you

12:47

can focus on managing your organization

12:49

rather than remembering post-fix syntax.

12:51

That's brilliant.

12:52

It lowers the barrier to entry significantly.

12:56

But I imagine, even with a helper script

12:58

and pre-configured containers, things still go wrong.

13:01

What's the biggest trap users fall into when

13:04

they start spinning this up?

13:05

The documentation actually includes

13:07

a very bold, explicit warning about this exact trap.

13:11

The absolute most common mistake is a version mismatch

13:14

between the software and the manual.

13:17

Because Docker Mail Server is actively developed

13:20

and constantly patching new security threats,

13:22

there are many different versions

13:24

of the software out there.

13:25

Right.

13:25

Because in the Docker world, if you just pull the image,

13:27

you're usually pulling the latest tag by default.

13:30

Precisely.

13:31

And if you're pulling the latest bleeding edge image

13:33

but you accidentally stumbled onto a tutorial or documentation

13:36

page for version 11 from two years ago,

13:38

things are going to break.

13:39

Because the commands have moved on.

13:40

Commands will have changed.

13:42

Configuration variables will be deprecated,

13:44

and you'll end up incredibly frustrated.

13:46

The maintainers fiercely warn users

13:48

to ensure the version of the documentation they're reading

13:51

perfectly matches the semantic version of the Docker image

13:54

they've actually deployed.

13:55

And I saw in the sources that they're

13:57

pretty strict about community boundaries

13:59

and how you ask for help, too.

14:00

Yes, and rightfully so.

14:02

The documentation explicitly states,

14:05

the issue tracker is for issues, not for personal support.

14:09

You have to remember the context here.

14:11

This is an open source project.

14:12

These are volunteers.

14:14

Highly skilled engineers doing this voluntarily

14:17

in their free time.

14:18

They want to track reproducible bugs in the code base,

14:21

not troubleshoot a typo in one individual user's DNS record.

14:25

So checking the FAQ, reading the correct version of the manual,

14:28

and verifying your own configuration

14:30

are mandatory steps before opening a ticket.

14:32

Respect the volunteers' time.

14:34

If you want enterprise handholding,

14:35

you pay an enterprise consultant.

14:36

You don't spam a GitHub repository.

14:38

OK, so the setup.s script gets you in the door

14:42

and handles the day-to-day.

14:43

But what if I'm a power user?

14:45

OK, now we're talking.

14:46

What if my organization has a highly specific edge case?

14:49

Think of it like a kitchen.

14:51

The container is a fully prepped commercial kitchen,

14:53

which is great.

14:54

But what if I need to swap out an ingredient in the recipe

14:57

before the head chef starts cooking?

14:59

Does a rigid container lock me out

15:01

of making advanced foundational changes?

15:04

If we connect this to the bigger picture of how

15:07

Docker fundamentally works, the answer is a resounding no.

15:11

The developer's built in a wonderfully elegant mechanism

15:15

to intercept that boot process for custom renovations.

15:19

It's a script called userpatches.esh.

15:21

How does that work in practice, though?

15:23

How do you patch a container that basically rebuilds itself

15:25

from scratch every time it starts?

15:27

It's all about the execution entry point.

15:29

When a Docker container starts, it doesn't just instantly

15:32

launch all the mail services at once.

15:34

It runs an initialization script first.

15:36

OK, makes sense.

15:36

The DMS initialization process is

15:38

designed to look inside a specific configuration directory

15:41

that you, the host, control.

15:44

If it finds a bash script named user-door- sitting there,

15:49

the container pauses its normal boot sequence,

15:51

executes your custom script, and then hands control

15:54

over to the main supervisor daemon

15:56

to launch Postfix and DovCon.

15:58

Oh, that's incredibly powerful.

15:59

It's literally a sous chef intercepting the recipe.

16:02

Because that script runs before the services start,

16:05

you can use basic Linux commands to rewrite configuration files

16:09

on the fly, right?

16:10

Exactly.

16:11

You can use it to inject a highly specific custom spam

16:14

scoring rule into Spam Assassin.

16:16

You can use it to alter a low level routing

16:18

protocol in Postfix.

16:20

You can even use it to app get install an extra Linux

16:23

package you might need for monitoring that isn't included

16:25

in the base image.

16:26

That is wild.

16:27

It gives you the total unrestrained freedom

16:29

of a custom build bare metal server,

16:31

but applied cleanly and automatically

16:33

on top of their stable foundation

16:35

every single time the container boots.

16:37

It's a brilliant architectural choice,

16:39

because it means the software scales seamlessly

16:41

with your expertise.

16:43

When you're a beginner, you rely entirely

16:45

on the setup.sh script to keep you safe.

16:48

When you become a system admin power user,

16:51

that user-patches.shook is waiting there

16:54

to give you absolute control.

16:56

It grows with you.

16:57

Exactly.

16:58

And speaking of the people architecting

17:00

these clever solutions, we really

17:02

need to highlight who is actually building and maintaining

17:05

this infrastructure.

17:06

Because relying on a single developer for something

17:09

as mission critical as your organization's email

17:11

is deeply terrifying.

17:13

Oh, it's out of doubt.

17:13

What happens if they get bored, get a new job,

17:16

and just abandon the project?

17:17

That's the beauty of how this specific project has matured.

17:21

The sources note that it was originally created

17:22

by a single user named Tamav.

17:25

But since January 2021, the original creator stepped back.

17:28

And it's been maintained entirely

17:30

by a dedicated, organized group of volunteers.

17:33

So it survived the transition.

17:34

And it hasn't just survived it.

17:36

It's grown into an absolute juggernaut

17:38

in the open source ecosystem.

17:39

It currently boasts over 17,000 to 700 stars on GitHub.

17:43

Almost 18,000 stars for a mail server project.

17:46

I mean, that's not just a niche hobbyist tool.

17:49

That is a massive flashing indicator of trust

17:52

and enterprise adoption.

17:53

Absolutely.

17:54

It proves a massive pent-up demand for data sovereignty.

17:57

And it's not just a few people maintaining it.

17:59

There are over 300 individual contributors

18:02

who have submitted code, refined the security protocols,

18:05

and updated the documentation.

18:07

That's a real community.

18:08

It is.

18:09

And because email is so complex, they

18:11

enforce stability using extensive automated test suites

18:15

via GitHub Actions.

18:16

Every time someone submits a change to the code,

18:18

automated systems spin up test containers,

18:20

send test emails, verify cryptographic signatures,

18:23

and ensure that the new code doesn't break any existing

18:26

features before it's ever merged into the project.

18:28

Wow.

18:29

Yeah, it's a living, breathing ecosystem with enterprise-grade

18:32

quality control, maintained by a community that

18:35

genuinely cares about privacy.

18:36

It really is incredible what a community

18:39

can build when they rally around a shared architectural problem,

18:43

which brings us to a broader, arguably more critical

18:47

realization about why projects like this matter.

18:50

We started this deep dive talking

18:51

about taking back the keys to your digital front door.

18:54

But there's an even bigger picture here.

18:57

Think about the fundamental architecture of the internet.

18:59

Email was designed to be decentralized, right?

19:02

A federated network where anyone could

19:04

talk to anyone anywhere on equal footing.

19:07

But over the last decade, we've allowed that federated network

19:10

to consolidate into essentially three massive tech monopolies.

19:14

Right.

19:15

If almost every email sent globally

19:17

is just bouncing between servers owned by Microsoft, Google,

19:20

and Apple, it's no longer a decentralized protocol.

19:22

It's an oligopoly.

19:23

Exactly.

19:24

And that consolidation creates a single terrifying point

19:27

of failure for global communication, for privacy,

19:31

and for corporate security.

19:32

By using open source tools to run your own infrastructure,

19:36

you aren't just protecting your own data.

19:37

You're actively participating in keeping the internet federated,

19:41

resilient, and independent.

19:42

It's a quiet, incredibly powerful act

19:45

of technological rebellion.

19:46

It really is a profound shift in perspective.

19:49

You're moving from being a passive tenant on the internet

19:52

to an active owner of your own infrastructure,

19:55

contributing to the health of the decentralized web.

19:58

And for organizations looking to make that exact shift,

20:01

this brings us right back to the supporter of today's deep dive,

20:04

Safe Server.

20:05

We've spent this time unpacking the immense technical power

20:08

of Docker Mail Server, how it orchestrates

20:11

complex anti-spam protocols, integrates DMRC cryptography

20:15

effortlessly, and gives you ultimate control

20:17

over your routing.

20:18

But what do organizations, whether they're

20:21

businesses, legal associations, or health care groups,

20:24

actually gain by switching to this specific open source

20:27

solution?

20:28

They gain absolute uncompromising data sovereignty.

20:32

By moving away from proprietary tech giants,

20:34

an organization gains the ability

20:36

to state unequivocally exactly where their data physically

20:39

resides and who has the legal authority to access it.

20:41

There's no ambiguity about international data transfers

20:44

or shifting privacy policies.

20:46

But the reality is, running it yourself is daunting.

20:49

Why does professionally managed hosting

20:51

make so much more sense than self-operation

20:53

for these groups?

20:54

Because even with the brilliance of Docker

20:56

and automated scripts, ensuring that your server's IP address

20:59

maintains a pristine reputation,

21:01

avoiding spam blacklists, and keeping Clamma V

21:04

and Postfix running flawlessly 24-7

21:06

without becoming a daily operational nightmare,

21:09

it still requires dedicated expertise.

21:12

Exactly.

21:13

And that is precisely the burden SafeServer removes.

21:16

They host this powerful open-source software

21:18

on highly secure, compliant German servers.

21:21

They handle the complex deployment,

21:23

the network security, and the ongoing maintenance.

21:25

So you don't have to worry about the infrastructure at all.

21:27

Right, they ensure that your organization

21:29

reaps every single benefit of open-source independence,

21:31

privacy, and compliance without the stress

21:34

of managing the underlying container infrastructure.

21:37

SafeServer is available right now

21:38

for consulting on Docker Mail Server

21:40

and similar powerful open-source alternatives

21:43

tailored to your organization's specific needs.

21:46

You can find out exactly how they can help you

21:48

reclaim your digital sovereignty

21:49

by visiting safeserver.de.

21:52

Thank you so much for joining us on this deep dive.

21:55

We hope you walk away seeing your email infrastructure

21:57

and the federated potential of the internet

21:59

in a whole new light.

22:00

and we'll see you next time.

22:00

and we'll see you next time.