Today's Deep-Dive: E-MailRelay
Ep. 372

Today's Deep-Dive: E-MailRelay

Episode description

What happens when legacy hardware can no longer send email because modern cloud providers have tightened security? In this episode, we dive into Email Relay, a lightweight open-source mail proxy that helps old devices like scanners, switches, and monitoring systems continue to send alerts securely in a modern infrastructure.

Email Relay acts as a local middleman between legacy equipment and strict upstream providers such as Microsoft 365 or Google Workspace. Older devices can send simple, unauthenticated messages to Email Relay on the local network, and it then upgrades those messages with modern authentication, encryption, and routing before forwarding them onward. This makes it possible to preserve expensive hardware investments without replacing perfectly functional equipment just because email standards have changed.

We explore how Email Relay achieves this with a remarkably efficient architecture. Built in C++ and using a non-blocking I/O model, it can handle large volumes of mail traffic with minimal system resources - making it practical even on modest hardware. Its policy-free design also gives administrators full control over routing and filtering logic, rather than forcing them to work around hard-coded assumptions.

The episode also examines the platform’s flexible filter system, built-in tools for routing and splitting traffic, and integrations with SpamAssassin and address verifiers to protect against spam and abuse. Security features like TLS encryption, PAM authentication, and optional proxy or Tor routing make it suitable even for sensitive environments.

Finally, we look at real-world user reports that validate its stability and scale - including deployments that have run for years without crashing and others that process hundreds of thousands of emails per day.

If you’ve ever wondered whether a small, open-source tool can replace bloated proprietary mail infrastructure, this deep dive into Email Relay shows just how powerful a focused, efficient design can be.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

This deep dive is supported by Safe Server.

0:02

And expensive proprietary email and cloud services

0:07

from vendors like Microsoft or Google,

0:10

they can really, really eat into an organization's budget.

0:12

Oh, absolutely.

0:13

It's a massive line item for most places.

0:16

Right.

0:16

But it turns out many of these expensive services

0:19

can actually be replaced by open source solutions,

0:21

like the one we're discussing today,

0:23

which can result in just massive cost savings.

0:26

Yeah, and cost isn't even the only factor here, right?

0:29

Exactly.

0:29

When you're dealing with legal, regulatory, or compliance

0:33

requirements, things like strict email retention, data

0:37

protection, financial records, audit trails, data sovereignty

0:40

is just absolutely critical.

0:42

Right.

0:42

You need total control over your data.

0:44

You do.

0:44

You need to know exactly where it lives.

0:46

Not just cross your fingers and hope

0:48

it's safe on some tech giant server farm out

0:50

in the desert somewhere.

0:52

Yeah, hoping is exactly a great security strategy.

0:54

No, it's really not.

0:55

And that's where Safe Server comes in.

0:57

They help organizations find and implement

0:59

the right open source solution for their exact needs,

1:03

taking you from initial consulting

1:07

all the way through to operation on highly secure German

1:10

servers.

1:10

Which is a huge piece of mind.

1:12

Totally.

1:13

So you can find more information and get started

1:15

at www.safeserver.de.

1:18

Highly recommend checking them out.

1:19

So OK, let's unpack a scenario that

1:22

is probably happening in an office building near you

1:24

right this very second.

1:25

Oh, I bet I know where this is going.

1:27

Right.

1:27

So picture this.

1:29

Deep in a server closet, there's this reliable, incredibly

1:33

expensive piece of hardware.

1:35

Maybe it's a heavy duty legacy scanner or a massive APC

1:39

network switch.

1:40

Built like a tank, right?

1:41

Exactly.

1:42

And for a decade, it has worked flawlessly.

1:44

Just silently doing its job, shooting off

1:47

an automated email alert to the IT department

1:49

whenever something needs attention.

1:51

A low tone or warning for a temperature spike, yeah.

1:53

Yeah, exactly.

1:54

Then today, it just goes dark.

1:57

The email's completely stopped.

1:59

Just out of nowhere.

2:00

Yeah, right.

2:00

And the machine isn't broken.

2:02

The network isn't down.

2:03

It has simply been locked out of the modern internet.

2:07

Yeah, and I mean, we see this exact frustration playing out

2:11

all over the user reviews we pulled from SourceForge

2:13

for today's Deep Dive.

2:14

It's everywhere.

2:15

It really is.

2:16

People are just pulling their hair out

2:18

because a $10,000 piece of infrastructure

2:21

suddenly can't send a simple PDF or a basic warning message.

2:25

And the culprit is usually just a policy change

2:28

at a major cloud provider, right?

2:29

Exactly, which is exactly what our mission is today.

2:33

We are taking a stack of sources,

2:35

a highly detailed technical user guide,

2:37

and those real-world SourceForge reviews

2:39

to basically demystify a tool called Email Relay.

2:43

Email Relay, OK.

2:44

Yeah, the documentation calls it a lightweight store

2:46

and forward mail server and proxy.

2:48

Store and forward.

2:50

OK, so our goal today is to translate that

2:52

into plain English to explain why you might desperately need it

2:55

without even realizing it and explore how it actually

2:59

works under the hood.

2:59

Right, because if we look at why that scanner in the closet

3:02

went dark, it really comes down to how email fundamentally

3:05

works.

3:06

OK, break that down for us.

3:08

So in the old days, devices used a protocol

3:10

called Simple Mail Transfer Protocol, SMTP.

3:14

Right, SMTT.

3:16

Still hear that a lot.

3:17

Yeah, and back then, they would just

3:19

shoot an unauthenticated message onto the network.

3:22

It was basically like dropping a postcard in a mailbox

3:24

without a return address.

3:26

Just trusting the system to deliver it.

3:28

Exactly.

3:29

But today, because of the massive volume of spam

3:32

and security threats out there, big providers

3:34

like Microsoft 365 or Google Workspace,

3:37

they're actively blocking that kind of traffic.

3:39

Oh, wow.

3:40

So they just reject the postcard entirely.

3:42

Yep, they demand modern authentication.

3:44

They demand secure encrypted connections.

3:47

OK, so the legacy device is standing there

3:48

trying to hand over a plain, handwritten postcard.

3:51

And Microsoft 365 is just standing like a bouncer,

3:54

demanding a government ID and a retina scan.

3:56

That's a great way to put it, yeah.

3:58

The old hardware just doesn't speak

3:59

that modern security language.

4:00

It literally cannot provide the credentials

4:03

the cloud provider is asking for.

4:04

Which leaves IT departments with a pretty terrible choice,

4:07

right?

4:07

Oh, the worst.

4:09

You either replace perfectly good, incredibly expensive

4:12

hardware just to get email alerts working again,

4:15

or you somehow bridge the gap.

4:17

Bridge the gap.

4:18

Yeah, and that is where Email Relay comes in

4:21

as the sort of middleman.

4:22

You just install it quietly on a local Windows or Linux machine

4:27

inside your own network.

4:28

I like to think of it as a highly

4:29

efficient bilingual courier.

4:32

Oh, I like that.

4:32

Right, because you tell your old scanner, hey,

4:34

don't try to talk to Microsoft anymore.

4:36

You're just going to confuse them.

4:37

Just hand your simple, unauthenticated postcard

4:40

to Email Relay right here on the local network.

4:43

Exactly.

4:44

And then Email Relay takes that basic message,

4:46

packages it up into a highly secure envelope,

4:49

stamps it with all the proper modern credentials.

4:52

Applies the right encryption.

4:53

Yes, applies the encryption, and then it turns around

4:55

and hands it off to the strict upstream provider.

4:58

And because it sits locally, your legacy device

5:01

never even has to navigate the open internet.

5:04

Never.

5:05

Email Relay catches those local emails,

5:07

holds onto them, or spools them, as they

5:09

say if the internet happens to be down,

5:11

and securely relays them when the connection is open.

5:13

It just completely solves the authentication problem.

5:15

It really does.

5:16

It's so elegant.

5:17

But here is where it gets really interesting for me, though.

5:21

If you're running a busy office, or like a hospital,

5:25

or a massive warehouse, you might

5:27

have hundreds of these legacy devices sending

5:31

thousands of alerts a day.

5:33

Oh, easily.

5:33

Thousands.

5:34

So if Email Relay is the sole middleman for all that traffic,

5:38

you'd probably assume it has to be this loaded, resource heavy

5:41

monster of a program.

5:43

You'd need a dedicated server just to keep up.

5:45

Right.

5:46

That would be the assumption.

5:47

But the manual spends a lot of time

5:49

emphasizing how incredibly lightweight it is.

5:51

So how is it moving all this traffic

5:53

without just melting the RAM on whatever computer is running it?

5:57

Well, it all comes down to the architecture.

5:59

The documentation details that Email Relay

6:01

runs as a single process using what's

6:03

called a non-blocking I slash O model.

6:06

OK, wait.

6:06

Non-blocking IO.

6:08

That is exactly one of those phrases

6:10

that makes beginners want to run for the hills.

6:13

I know.

6:14

I know.

6:14

It sounds super technical.

6:15

What does that actually look like in practice?

6:17

OK, think of a traditional blocking server,

6:20

like a cashier at a grocery store.

6:21

OK, cashier.

6:22

The cashier takes one customer, scans their items,

6:26

waits for them to pay, and hands them their receipt.

6:30

The entire line behind them is blocked,

6:32

waiting for that single transaction to finish.

6:34

Right.

6:35

And if that customer takes five minutes

6:36

to dig around for their credit card,

6:38

everyone else just stands there glaring.

6:40

Exactly, which is incredibly inefficient

6:43

if you have 1,000 people trying to check out at once.

6:45

OK, so that's a blocking model.

6:47

Right.

6:47

A non-blocking model is more like a master chess player

6:51

walking down a line of 50 different games.

6:52

Oh, like a grandmaster doing a simultaneous exhibition.

6:56

Yes.

6:57

They look at board one, make a move,

7:00

and instantly walk to board two.

7:02

They don't stand there waiting for the first opponent to think.

7:05

Right, they just keep moving.

7:06

They continuously cycle through, handling

7:09

whichever connection is ready for the next step.

7:11

An email relay uses this exact same architecture.

7:15

That makes so much sense.

7:16

And it's actually the same model used

7:18

by massive enterprise-grade web tools like Nginx,

7:24

which handle millions of simultaneous website visitors.

7:26

Wow.

7:27

So it's juggling all these incoming alerts

7:29

and outgoing cloud connections concurrently

7:32

without ever pausing the whole system

7:34

to wait for one slow email to send.

7:36

Exactly.

7:37

And to make it even more efficient,

7:39

it's written entirely in C++.

7:41

OK, and for anyone unfamiliar, C++

7:43

is a programming language that's famous for its speed, right?

7:46

Its speed and its incredibly low memory footprint.

7:50

It interacts very, very closely with the computer's hardware.

7:52

Which translates to a massive human benefit here.

7:55

You don't need to go out and buy a $5,000 server

7:58

to run this middleman.

7:59

Oh, not at all.

8:00

You could probably run it on a dusty 10-year-old laptop

8:03

sitting in the corner of the office,

8:04

and it wouldn't even break a sweat.

8:05

Yeah.

8:06

You absolutely could.

8:07

It's that efficient.

8:08

But that minimalist approach also

8:12

leads to a design philosophy that catches

8:14

a lot of new users off guard.

8:15

Yes.

8:16

OK, I want to push back on this, because it honestly

8:18

threw me for a loop when I was reading the user guide.

8:21

The policy-free thing.

8:22

Yes.

8:23

The manual proudly states that email relay is entirely

8:26

policy-free.

8:28

And to a beginner setting up network infrastructure,

8:30

policy-free sounds like a very polite way of saying,

8:34

we built an empty shell that does absolutely nothing out

8:37

of the box, good luck.

8:38

It really does sound like that, doesn't it?

8:40

Downloading a blank slate, actually a good thing.

8:43

I completely understand why that sounds daunting.

8:46

We're so used to software holding our hands these days.

8:48

Very true.

8:49

But think about your typical experience

8:51

with heavy enterprise software.

8:53

Or honestly, even just setting up a new smart TV.

8:57

Don't get me started.

8:58

Right.

8:58

You spend the first three hours digging through menus,

9:01

trying to turn off the motion smoothing,

9:03

disabling all the pop-up notifications.

9:05

Fighting the built-in hard-coded rules

9:08

that the developer just assumed you wanted.

9:10

Exactly.

9:11

You are always fighting the default settings

9:13

just to get the tool to do the one specific task you bought

9:16

it for.

9:17

That is painfully relatable.

9:20

Well, with email relay, you don't

9:21

have to fight the defaults, because there are no defaults.

9:25

That policy-free design is actually its superpower.

9:28

It handles the core mechanics, the secure receiving

9:32

and sending of data flawlessly.

9:34

But you dictate the logic.

9:36

You decide how many times a failed message

9:38

should retry before giving up.

9:40

You decide how balanced emails are handled,

9:43

how local deliveries are routed.

9:44

So it adapts to you.

9:46

Yes.

9:46

It is designed to adapt to the unique quirks

9:49

of your specific network, rather than forcing you

9:51

to change your network to accommodate the software.

9:54

OK, I see the appeal of not having to fight the developer's

9:56

assumptions.

9:57

But I mean, if it's truly a blank slate just sitting there

10:00

waiting for me to tell it what to do,

10:02

how do we actually give it instructions?

10:03

Right, you need a way to interface with it.

10:04

Yeah, we have to tell the software how to route

10:06

these messages somehow.

10:08

And that brings us to the core mechanism

10:09

of the software, the filter system.

10:12

The filters.

10:13

OK, when I was reading the section

10:14

on how these filters operate via the command line,

10:17

I kept picturing the email relay spool directory,

10:21

where it holds all the messages, as this massive factory

10:24

conveyor belt.

10:25

I love that visual.

10:26

Yeah, the emails are the packages.

10:28

And they are just moving steadily

10:30

along this belt, from the incoming dock to the outgoing

10:33

dock.

10:34

And the filters act as the workers along that line.

10:36

Better yet, robotic arms.

10:38

Robotic arms.

10:39

You can just plug these robotic arms

10:41

into the side of the conveyor belt.

10:43

You tell the arm to watch the packages pass by.

10:45

And you program it to intercept specific ones.

10:48

It can stamp a package with a new label,

10:51

reroute it to a completely different belt,

10:53

open it up, and edit the contents.

10:54

Or if it recognizes a dangerous package,

10:57

just pick it up and throw it in the incinerator.

10:59

That captures the mechanics of the hyphen filter command

11:02

perfectly.

11:03

Oh, awesome.

11:04

And the beauty of this system is its flexibility.

11:07

If you want to build a highly complex robotic arm,

11:10

you don't need to learn C++ or modify the core software.

11:15

Oh, thank goodness.

11:16

Right.

11:16

Email Relay allows you to use simple external scripts.

11:20

So if you're running it on a Windows machine,

11:21

you can write a filter using standard JavaScript.

11:24

Just normal JavaScript.

11:25

Yep.

11:26

Or if you're on a Linux server, a basic shell script

11:29

works perfectly.

11:30

Wait, what actually happens between the software

11:32

and the script, practically speaking?

11:34

So as the email moves down the conveyor belt,

11:36

Email Relay pauses it and passes the file

11:40

to your external script.

11:41

OK.

11:42

Your script wakes up, examines the email headers or the body,

11:45

makes whatever changes it needs to make,

11:47

and then passes an exit code back to Email Relay.

11:50

Oh, I see.

11:51

And that exit code is the instruction.

11:53

It tells Email Relay to, for the message, drop it or bounce it

11:56

back.

11:57

But let's say I don't want to write my own scripts.

11:59

I'm a beginner.

12:00

I just want to route some mail.

12:01

Are there pre-built robotic arms ready to go in the box?

12:04

Absolutely.

12:05

The manual outlines several really powerful built-in

12:08

filters that require zero programming.

12:11

Nice.

12:11

There's the copy filter, which just duplicates messages,

12:14

which is great for creating an audit trail.

12:16

Very useful for compliance.

12:18

Exactly.

12:19

There's the deliver filter, which routes specific messages

12:23

to local mailboxes on the machine.

12:25

And I noticed the split filter, which seems incredibly

12:28

powerful for businesses.

12:29

Oh, the split filter is fantastic.

12:31

If I understand it correctly, you can tell the system, hey,

12:33

if an outgoing email is addressed to our billing

12:36

department's domain, route it through this highly

12:39

secure specialized server.

12:41

But if it's just a general email to a public domain,

12:44

send it out the normal way.

12:46

Precisely.

12:47

It physically divides the traffic flow based

12:49

on the rules you set.

12:50

That's so smart.

12:51

It is.

12:52

But any time we talk about a blank slate mail server

12:54

that automatically routes traffic,

12:57

we really have to address the elephant in the room.

12:59

Spam.

13:00

Spam.

13:00

Yeah, because if you aren't careful,

13:02

an open middleman server sounds like a spammers absolute dream.

13:05

Oh, a botnet would love it.

13:07

Right.

13:08

If a botnet finds your email relay server

13:10

and realizes it will forward literally anything you hand it,

13:13

they could pump millions of junk emails

13:15

through your IP address.

13:16

Which gets your company blacklisted from the internet.

13:18

Exactly.

13:19

So how does a policy-free tool protect against that?

13:22

It tackles this by integrating seamlessly

13:25

with existing industry standard tools.

13:28

Specifically, Spam Assassin.

13:30

Oh, OK.

13:30

Spam Assassin is huge.

13:32

Yeah.

13:32

You can plug in the built-in spam or spam edit filters.

13:36

So as the messages come down the conveyor belt,

13:39

Spam Assassin scans them for malicious patterns.

13:42

And if it catches something?

13:43

If it flags a message as junk, the filter intercepts it

13:47

and drops it before it ever gets relayed to the cloud.

13:49

Nice.

13:50

And it also has a mechanism to stop bad emails before they

13:53

even get on the conveyor belt in the first place, right?

13:55

Using address verifiers?

13:57

Yes.

13:58

The address verifier is a crucial first line of defense.

14:01

Think of it like a bouncer standing

14:02

outside the factory doors.

14:03

Checking the guest list.

14:04

Exactly.

14:05

The manual outlines the account built-in verifier.

14:08

How does that one work?

14:10

Well, if a botnet tries to send an email

14:12

to a fake or randomized address on your system,

14:15

just trying to guess employee names.

14:17

Which they do constantly.

14:18

Constantly.

14:19

The verifier checks that incoming address

14:21

against the actual system account.

14:23

And if the user doesn't exist, the bouncer

14:26

rejects the connection right at the door.

14:28

The email is never accepted, it never

14:30

enters the school directory, and it never

14:32

wastes your server's processing power.

14:34

OK, so we've covered how it routes the mail,

14:36

how it filters the mail, and how it keeps the spam out.

14:39

Yep.

14:39

But let's bring this back to the bigger picture for a second.

14:42

If an organization is pulling away from proprietary vendors

14:45

to take sovereignty over their own data,

14:48

they need to know the underlying infrastructure is rock solid.

14:52

Absolutely.

14:52

Security is everything.

14:53

Right.

14:54

If a business owner is relying on email relay

14:57

to handle sensitive automated reports or financial audit

15:00

trails, how secure is this data while it's actually moving?

15:05

Well, the documentation is very rigorous regarding security

15:07

protocols.

15:09

To ensure data isn't moving across the network in plain text,

15:12

email relay fully supports negotiated TLS encryption

15:16

for both incoming and outgoing connections.

15:18

OK, let's break TLS down for a second for our beginners.

15:20

Transport layer security.

15:22

Think of it as an armored truck.

15:23

An armored truck.

15:24

Yeah.

15:25

Even if someone intercepts the truck

15:27

while it's driving down the highway,

15:28

they can't see or access what's inside.

15:31

The data is locked in the cryptographic vault

15:33

while in transit.

15:34

That's a great visual.

15:35

And what about controlling who actually gets

15:37

to access the server itself?

15:39

So if you're running email relay on a Linux machine,

15:42

it integrates with PAM authentication.

15:45

PAM.

15:46

PAM stands for Plugable Authentication Modules.

15:49

Essentially, instead of email relay

15:51

trying to manage its own list of passwords,

15:54

it hands that job off to the core operating system.

15:56

Oh, so the Linux VIP list decides who gets in.

15:59

Exactly.

16:00

I also noticed a fascinating feature

16:02

in the manual regarding extreme privacy.

16:04

It mentioned connection tunneling.

16:06

Yes.

16:07

This is a standout feature for organizations

16:09

with high security or anonymity requirements.

16:12

Like who?

16:13

Maybe a journalistic outfit protecting sources,

16:15

or like a corporate whistleblower system.

16:17

Email relay can be configured to route your mail traffic

16:20

through a SOKS proxy, or even directly

16:23

through the Tor network.

16:24

Wait.

16:24

Tor?

16:25

Really?

16:26

Yeah.

16:26

It completely cloaks the origin of the traffic,

16:29

adding a massive layer of operational security.

16:31

That is wild for such a small program.

16:34

And just to add one more layer of utility,

16:36

it doesn't just push mail out.

16:38

It can actually function as a PMC server.

16:41

Which means it acts like a secure post office box.

16:43

Right.

16:44

End users can open up their standard email

16:46

client on their laptop, securely connect the email relay,

16:50

and retrieve their spooled messages directly.

16:53

OK, the manual clearly proves it has the technical chops.

16:56

But, you know, manuals are written by the developer.

16:59

Of course.

16:59

They always sound great on paper.

17:01

What happens when this hits the real world?

17:03

Can you actually trust a lightweight, free piece

17:07

of software to run your business infrastructure?

17:10

This is where we have to look at those SourceForge reviews.

17:12

Right, the real users.

17:14

And the validation there is incredibly compelling.

17:17

Out of all the users rating it, email relay

17:19

holds a 4.9 out of 5 star rating.

17:22

That's great.

17:23

That is almost unheard of for network infrastructure

17:26

software.

17:26

I know.

17:27

Usually this stuff just makes IT professionals miserable.

17:30

The reviews were genuinely surprising to read.

17:31

People aren't just using this for a weekend hobby

17:35

project in their basement.

17:36

It's not at all.

17:37

There's one review from a user named Sean2k

17:39

that really highlights the stability.

17:41

He calls the software absolutely bulletproof.

17:44

Bulletproof.

17:45

Yeah.

17:45

He explains that his organization has relied on it

17:48

to relay mail from various devices across their network.

17:51

And email relay has run continuously

17:54

for over six years without a single crash or incident.

17:57

Six years without a crash.

18:00

I guarantee every person listening to this deep dive

18:03

right now can think of an enterprise tool

18:05

their company pays thousands of dollars a month for

18:08

that can't boast six months of uptime, let alone six years.

18:11

Oh, 100%.

18:13

And it's not just stable under light loads, either.

18:15

Another user, Unusual Ildoram, reported

18:18

that they use email relay in a Windows environment,

18:20

and it successfully pushes over 300,000 emails a day.

18:23

300,000 emails a day.

18:25

A day.

18:26

That is not just a few scanner alerts.

18:27

That is a massive volume of automated receipts,

18:30

notifications, or system logs.

18:32

It really proves the fundamental philosophy of the software.

18:35

By keeping the core program incredibly lightweight,

18:38

relying on the speed of C++ Sare,

18:41

and using that non-blocking architecture we talked about.

18:43

The grandmaster playing chess.

18:45

Exactly.

18:46

A tool built by a single developer

18:48

can absolutely rival massive enterprise systems

18:52

in both stability and sheer volume.

18:54

It just does exactly what it's designed to do,

18:56

without the bloat.

18:57

Which, you know, brings us full circle

18:59

to exactly why we started this deep dive with Safe Server.

19:02

Right.

19:02

When you realize that an open source tool like Email Relay

19:05

can flawlessly process 300,000 emails a day

19:10

and just sit quietly on a local server for six years

19:13

without a single crash,

19:15

the business case becomes glaringly obvious.

19:18

Why pay for the bloat?

19:18

Exactly.

19:19

Why are organizations paying exorbitant monthly fees

19:23

to proprietary vendors like Microsoft or Google

19:25

for basic routing setups?

19:27

The cost savings of switching to an open source solution

19:29

are just immense.

19:30

And beyond the budget, it's about data control.

19:33

Your infrastructure stays inside your walls.

19:35

Your data remains yours.

19:37

It's about removing dependencies on external platforms

19:40

that can change their policies on a whim

19:43

and break your legacy hardware.

19:45

Break your $1,000 scanner.

19:47

Yeah.

19:47

And remember, you don't have to figure all this out alone.

19:50

Safe Server can be commissioned for consulting

19:52

to help you make this exact transition.

19:55

They are great at this.

19:56

Whether the absolute perfect fit for your specific network

19:59

is email relay or a comparable open source alternative,

20:03

they will guide you from planning to operation.

20:05

You can learn how to take control of your infrastructure

20:08

at www.safeserver.de.

20:11

Definitely go check them out.

20:13

Well, we've covered a lot of ground today,

20:14

from the frustration of broken legacy scanners

20:16

to the elegance of a non-blocking architecture.

20:19

It's been a fun one.

20:20

It is a fascinating look at the hidden mechanics

20:23

of how our data actually moves from point A to point B.

20:27

But before we sign off,

20:28

I wanna leave you with a final thought to ponder

20:30

as you log into your work computer tomorrow.

20:33

Ooh, all right.

20:34

If a free, lightweight, policy-free tool

20:36

built by a single developer can flawlessly

20:38

route 300,000 emails a day for a business

20:41

without crashing for six years,

20:43

in your current tech stack is completely unnecessary?

20:43

in your current tech stack is completely unnecessary?