Today's Deep-Dive: chasquid
Ep. 377

Today's Deep-Dive: chasquid

Episode description

Running your own email server has long felt like one of the most intimidating tasks in IT—fragile, overcomplicated, and dangerously easy to misconfigure. In this episode, we explore Chasquid, an open-source mail transfer agent built to challenge that reputation by making secure self-hosted email practical for individuals and small organizations.

Chasquid takes a radically different approach from older mail servers like Sendmail, Postfix, or Exim. Instead of decades of layered complexity, it is built in Go with a philosophy of security through simplicity. Its developers intentionally narrowed the scope so it can serve small teams well, while eliminating many of the configuration traps that have historically made email hosting such a nightmare.

We break down the key guardrails that make this possible: hard-coded protection against open relays, mandatory encrypted authentication, built-in TLS support with Let’s Encrypt, and defenses against downgrade attacks by tracking per-domain encryption history. We also look at native support for standards like SPF and DKIM, which help prove your mail is legitimate and protect your domain’s reputation.

Beyond security, Chasquid includes practical features that make it genuinely usable: support for multiple domains, internationalized email addresses, suffix dropping for tagged inboxes, and extensibility through hooks for spam filtering, antivirus, and greylisting. Its built-in tracing and monitoring tools also make troubleshooting far more transparent than with traditional mail servers.

This deep dive shows how Chasquid transforms self-hosted email from a fragile legacy nightmare into a modern, approachable system—one that gives smaller organizations a realistic path toward independent, secure communication infrastructure.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

Imagine trying to fly a 747 commercial jet, right?

0:04

But the cockpit has a million unlabeled switches.

0:09

Oh, boy.

0:10

And if you flip the wrong one, you don't just crash.

0:12

You get, like, permanently banned

0:14

from every airport on Earth.

0:16

That sounds incredibly stressful.

0:18

It is.

0:18

And for decades, that is exactly

0:20

what running your own email server has felt like.

0:22

Welcome to the Deep Dive.

0:23

Glad to be here.

0:24

Today, we are dismantling that nightmare.

0:27

But first, speaking of taking back control

0:29

of your infrastructure, we are thrilled to have SafeService

0:32

supporting this Deep Dive.

0:34

Because every organization wrestles

0:37

with how to manage their communication tools.

0:40

And so often, the default is to just surrender

0:42

to these incredibly expensive proprietary services.

0:46

Right, like Microsoft Exchange or Google Workspace.

0:48

Exactly.

0:49

We just accept those heavy subscription costs as a given.

0:52

But open source solutions can actually

0:54

replace those massive ecosystems

0:56

at a fraction of the cost.

0:57

And well, when you're dealing with organizational

0:59

communication, you're inherently dealing with compliance.

1:02

I mean, if your business is navigating

1:04

strict requirements around email retention

1:06

or heavy data protection laws,

1:09

safeguarding financial records,

1:11

or maintaining pristine audit trails.

1:13

It gets complicated fast.

1:14

It does.

1:15

Data sovereignty isn't just a corporate buzzword

1:18

in those cases.

1:19

It is a legal necessity.

1:21

You need to know exactly where your data lives,

1:24

who has access to it, and that no third party tech

1:27

giant is scanning it.

1:28

Which is exactly why SafeServer

1:30

is tackling this pain point.

1:31

They help organizations find and implement

1:34

the right open source solutions

1:36

tailored to their specific needs.

1:38

Yeah, and they handle the hard parts.

1:39

Right, everything from the initial consulting phase

1:42

right through to the daily operation of these tools.

1:44

And they do it all on highly secure German servers.

1:47

So you get the cost benefits of open source

1:49

with the enterprise grade reliability

1:51

and data sovereignty your organization actually needs.

1:53

Exactly.

1:54

So if you are ready to stop overpaying

1:56

for proprietary lock-in,

1:57

head over to www.safeserver.de for more information.

2:01

It's a vital service really.

2:03

And it perfectly mirrors the ethos

2:05

of what we are analyzing today.

2:07

It really does.

2:08

Because today, our sources are the official

2:10

GitHub repository, some code breakdowns,

2:13

and the documentation pages

2:15

for a piece of open source software called Chasquid.

2:17

Chasquid.

2:18

Yeah.

2:19

Our mission for you, the listener,

2:21

is to explore how this specific project

2:23

acts as a beginner-friendly, secure alternative.

2:27

It's designed to help individuals and small groups

2:30

take back control of their email.

2:32

Okay, let's unpack this.

2:33

Let's do it.

2:34

Before we get into what makes Chasquid unique,

2:36

we need to establish the baseline.

2:38

We are talking about an MTA, a mail transfer agent.

2:41

Right.

2:41

And since our audience generally understands

2:43

that an MTA is the software responsible

2:45

for routing mail from server to server over the internet,

2:48

my question is, why is configuring an MTA,

2:51

historically, such a fragile, terrifying process?

2:55

Well, you have to look at the history of the internet

2:57

to understand the complexity there.

2:58

Okay.

2:59

The legacy MTAs that run most of the world's

3:01

email-to-day software, like Postfix or...

3:04

They were originally conceived in the 1980s and 90s.

3:07

Wow, that long ago.

3:09

Yeah.

3:10

And back then, the internet was a high-trust environment.

3:13

It was mostly universities and government researchers

3:16

passing text files around.

3:17

There was no spam.

3:18

There were no highly sophisticated phishing syndicates.

3:21

So as those threats evolved over the decades,

3:23

the developers of those legacy MTAs

3:26

had to bolt on security features, spam filters,

3:30

and encryption protocols after the fact.

3:32

So instead of a unified architecture,

3:34

you are looking at decades

3:36

of accumulated patches and work around.

3:38

Exactly.

3:39

You end up with configuration files

3:40

that are hundreds of lines long,

3:42

filled with obscure syntax.

3:44

Which is why that 747 analogy is so apt.

3:48

I mean, Postfix and Exim are incredibly powerful.

3:50

They can route millions of emails

3:52

for massive internet service providers

3:53

and handle every bizarre edge-case routing scenario

3:56

you can imagine.

3:58

But to get that power,

3:59

the administrator has to navigate an absolute minefield

4:02

of configuration options.

4:03

And complex code is where bugs hide

4:05

and complex configuration files

4:07

are where human error thrives.

4:09

Yeah, and the documentation for Chasquid

4:11

makes it clear that they are approaching this

4:13

from a completely different angle.

4:15

It is written almost entirely

4:16

in the Go programming language.

4:18

Yeah, about 86.8% of the code base.

4:21

Right.

4:21

So why does the choice of Go matter for a mail server?

4:25

Well, Go was designed from the ground up by Google

4:28

to build fast, reliable server software.

4:31

Its greatest strength is concurrency.

4:33

Concurrency, like doing multiple things at once.

4:35

Exactly.

4:37

The ability to handle thousands of simultaneous,

4:40

lightweight tasks efficiently.

4:42

An email server might have hundreds of incoming connections

4:45

sitting open at any given moment,

4:47

slowly transmitting data.

4:49

Oh, I see.

4:49

Older languages often struggle with that,

4:51

but Go handles it natively.

4:53

What's fascinating here is the more important shift

4:56

is actually philosophical.

4:58

How so?

4:59

The creators of Chasquid

5:00

looked at that commercial jet cockpit of legacy MTAs

5:03

and said,

5:04

what if we just build a reliable car for a small team?

5:07

But I have to push back on that a bit.

5:08

Sure.

5:09

When we talk about internet infrastructure,

5:10

the landscape is hostile.

5:12

Your server is constantly being probed by automated bots

5:15

looking for weaknesses.

5:16

Oh, constantly.

5:18

Right, so if Chasquid is prioritizing simplicity

5:20

for beginners,

5:21

does that mean we are sacrificing raw power or security?

5:25

Are we just building an underpowered toy?

5:28

That is the core tension, for sure.

5:30

But the reality is quite the opposite.

5:32

Their philosophy is security through simplicity.

5:34

Okay, so blame that.

5:35

By explicitly narrowing the scope,

5:37

saying,

5:38

we are only building this for individuals and small groups,

5:40

not for massive enterprise ISPs,

5:43

they completely eliminated the need

5:45

for those thousands of edge case configuration options.

5:48

So by removing the dials and switches

5:50

a small business will never use anyway,

5:52

you're actually closing off a thousand potential ways

5:55

a beginner could accidentally misconfigure the server.

5:57

You are hitting on the exact mechanism.

5:59

Wow.

6:00

The documentation explicitly states

6:02

that Chasquid is built to be hard to misconfigure

6:05

in ways that are harmful.

6:06

They didn't just write a manual on how to be secure.

6:09

They hard-coded the guardrails

6:11

directly into the software's foundation.

6:13

Let's look at those guardrails

6:15

because the sources highlight a few specific protections

6:18

that usually trip up beginners.

6:20

For instance,

6:21

the server absolutely refuses to operate

6:24

as an open relay.

6:26

Right.

6:27

Now for anyone who hasn't managed a network before

6:29

is an open relay basically like a post office

6:32

that leaves its loading dog wide open at night.

6:34

Yeah.

6:35

Anyone walk in,

6:36

slap the post office's official return address

6:39

on their own junk mail and send it out.

6:42

That captures the spirit perfectly.

6:44

In the 90s, open relays were actually considered polite.

6:47

Polite, really?

6:48

Yeah.

6:49

Servers would happily forward mail

6:50

for other servers to help the network function.

6:53

But today, if your server is an open relay,

6:55

automated spam bots will find it within minutes.

6:57

And then what happens?

6:58

They will use your server

6:59

to blast out millions of spam emails

7:01

and your server's IP address

7:03

will be permanently blacklisted

7:04

by Google, Microsoft, everyone.

7:07

Your legitimate emails will simply vanish.

7:09

That's brutal.

7:10

Legacy MTAs often require you

7:12

to explicitly configure relay access carefully.

7:15

chasquid bypasses the risk entirely

7:18

by hard coding a total block on unauthorized relaying.

7:21

It simply cannot be done.

7:22

It also prevents clear text authentication, right?

7:25

Right.

7:25

It forces encrypted connections

7:27

before it even allows a user to type in their password.

7:30

Which sounds incredibly basic to us now,

7:32

but you would be shocked

7:34

at how many legacy systems will quietly fall back

7:36

to allowing plain text passwords over the open internet

7:39

if a single line in a configuration file

7:42

is missing or mistyped.

7:43

Yikes.

7:44

That brings us to how the software handles

7:46

encryption in transit, specifically TLS.

7:49

Right, TLS.

7:49

The sources know that chasquid tracks

7:51

per-domain TLS support

7:53

to prevent connection downgrading.

7:55

How does a downgrade attack actually work mechanically?

7:57

If we connect this to the bigger picture

8:00

of internet security,

8:01

you have to understand the handshake process

8:03

between two email servers.

8:05

Okay.

8:05

When your server connects to a receiving server,

8:07

it usually starts in plain text

8:09

and then asks,

8:10

hey, do you support TLS encryption?

8:11

This is called the start ls command.

8:13

If the other server says yes,

8:15

they upgrade the connection and encrypt the email.

8:18

So where does the attack happen?

8:20

An attacker performing a man in the middle attack

8:22

sits between the two servers.

8:24

When your server sends that start ls question,

8:27

the attacker intercepts it, blocks it,

8:29

and replies to your server saying,

8:31

nope, I don't support encryption.

8:32

You have to send this in plain text.

8:34

Oh, wow.

8:35

Yeah, and older servers wanting to ensure

8:37

the mail gets delivered no matter what

8:39

will often accept that lie, drop their shields,

8:41

and send the email completely unencrypted.

8:43

Allowing the attacker to read everything.

8:45

Exactly.

8:46

That's wild.

8:47

They tricked the server into volunteering the data,

8:50

but chasquid tracks historical TLS support.

8:53

Yes.

8:54

It maintains an internal database.

8:56

If your server has successfully used encryption

8:58

with a specific domain in the past

9:00

and suddenly that domain claims

9:02

it doesn't support encryption anymore,

9:04

chasquid recognizes the anomaly.

9:06

Oh, that's smart.

9:06

It knows it's likely a downgrade attack.

9:09

So instead of dropping its shields

9:10

and sending the mail in plain text,

9:12

it drops the connection entirely.

9:14

It protects the data.

9:15

That is brilliant.

9:17

And the documentation mentions a whole suite

9:19

of alphabet soup security protocols

9:22

built right in to verify senders.

9:23

Oh, yeah. SPF, MTA STS, checking.

9:27

And DKIM support, right.

9:28

Both for signing and verifying.

9:30

Right. In older software,

9:31

you usually have to manually generate cryptographic keys

9:34

and weave them into the system.

9:36

How does chasquid handle this?

9:38

It handles it natively.

9:39

For those listeners who might be rusty

9:41

on their email protocols,

9:42

think of these as the cryptographic proof of identity.

9:46

Okay.

9:46

SPF is like leaving a guest list at the door.

9:49

It's a DNS record that tells the world

9:51

which IP addresses are allowed to send mail on your behalf.

9:54

And DKIM.

9:55

DKIM is more complex.

9:56

It acts like a cryptographic wax seal on the envelope.

10:00

chasquid automatically uses private keys

10:02

to sign outgoing emails.

10:03

Okay, so it seals it.

10:04

Exactly.

10:05

Yeah.

10:06

When the receiving server gets the email,

10:08

it checks the public key in your DNS records

10:10

to verify that the wax seal hasn't been broken

10:13

and that the email wasn't altered in transit.

10:16

Having DKIM signing built directly into the MTA,

10:19

rather than requiring the admin to install

10:21

and configure a separate piece of software

10:24

just to handle the cryptography

10:26

is a massive usability win.

10:28

It really is.

10:29

It also integrates natively

10:30

with let's encrypt for TLS certificates.

10:34

So instead of buying a security certificate,

10:35

manually installing it

10:37

and inevitably forgetting to renew it a year later

10:39

when it expires and breaks your server.

10:41

We've all been there.

10:42

Right.

10:43

chasquid automates the entire lifecycle.

10:46

Okay, so the foundation is Fort Knox.

10:48

Yeah.

10:48

The doors are locked.

10:49

The downgrade attacks are neutralized

10:51

and the cryptographic wax seals are applied.

10:53

But a secure server is useless

10:55

if it cannot handle a business expanding.

10:57

True.

10:58

What happens when a user wants to run

11:00

three different business websites off this one server?

11:02

Well, security has to be balanced with utility

11:04

and the developers clearly understood

11:06

the daily needs of a sysadmin.

11:08

chasquid supports multiple or virtual domains

11:11

out of the box.

11:12

Oh, nice.

11:13

So you can host the email for your business,

11:14

your personal blog and a local community group

11:17

all on the same single instance.

11:19

It also supports international usernames

11:21

and domain names natively.

11:23

Mechanically, it uses modern protocols

11:25

like SMTP UTF-8 and IDNA.

11:28

What does that mean in practice?

11:29

It means a user in Tokyo can have an email address

11:32

entirely in Japanese characters

11:34

and chasquid routes it flawlessly.

11:37

Legacy MTAs that were built

11:39

when the internet was strictly English only,

11:41

ASCII text, often require a complex workarounds

11:44

to prevent them from crashing

11:45

when they see non-Latin characters.

11:47

Here's where it gets really interesting for me though.

11:49

There is a feature built in called suffix dropping.

11:52

Ah, yeah.

11:53

It sounds incredibly dry,

11:55

but it is deeply practical for the end user.

11:59

The documentation shows this formula user

12:01

plus something at domain

12:03

transforms into just user at domain.

12:05

Right.

12:05

So for you listening,

12:06

here's what that means in the real world.

12:08

Say your email is alexatmybusiness.com.

12:10

You can sign up for a software service

12:12

using Alex plus software name at mybusiness.com.

12:16

chasquid sees the plus sign,

12:17

drops the suffix for the delivery routing

12:19

and drops the email straight into your main inbox.

12:21

But the crucial part is that the tag remains intact

12:24

in the email headers.

12:25

Right.

12:26

So you can easily set up filters in your inbox

12:29

based on those tags.

12:30

Or even better,

12:31

if you suddenly start getting phishing spam sent to Alex

12:35

plus that tone software at mybusiness.com,

12:37

you know definitively which company sold your data

12:40

or suffered a data breach.

12:41

Exactly.

12:42

It is an incredibly empowering way

12:44

to track your digital footprint

12:45

and the server handles the routing logic automatically

12:49

without you having to create a new alias

12:51

for every single signup.

12:52

It is a phenomenal feature.

12:53

But looking at the utility,

12:54

we also need to address the limitations.

12:56

Okay, what's missing?

12:57

What does chasquid not do and how does it compensate?

13:00

Well, it is an MTA.

13:02

Its core job is to transfer mail securely.

13:05

It deliberately does not try

13:07

to be a monolithic antivirus engine

13:09

or an overly complex spam filter all on its own.

13:12

And the documentation highlights how they solve that.

13:14

They use hooks.

13:15

Yes, hooks.

13:16

There are hooks for gray listing, antivirus,

13:19

anti-spam and deep RRC.

13:21

This raises an important question regarding flexibility.

13:24

And major concern with simplified software

13:26

is the fear that you will outgrow it.

13:28

Like it's too basic.

13:30

Right.

13:31

If your small business suddenly gets heavily targeted

13:33

by malware campaigns, you need serious filtering.

13:36

The developers solved this

13:37

using the classic Unix philosophy.

13:39

Which is?

13:40

Do one thing well, transfer mail securely

13:42

but allow easy integration with specialized tools.

13:46

Mechanically, a hook is a clearly defined doorway

13:49

in the code.

13:49

Okay.

13:50

When an email arrives, Jaskwood pauses the delivery,

13:53

hands the message through the hook

13:55

to an external dedicated program like Spam Assassin,

13:58

asks, is this safe?

14:00

And waits for the verdict before proceeding.

14:03

So you aren't walled in.

14:04

You get the simplicity of the core server.

14:06

Right.

14:07

But you have the freedom to plug in

14:08

robust industry standard filtering tools

14:10

as your organization's needs scale up.

14:13

Precisely.

14:13

It keeps the core architecture clean

14:15

while remaining highly extensible.

14:17

So we have a tool that is secure by design

14:19

and highly useful for daily operations.

14:21

But a tool like this is really only as good

14:23

as the visibility you have into its operations.

14:25

Oh, absolutely.

14:26

What happens when the engine sputters?

14:28

If an email you send

14:29

to your most important client doesn't arrive,

14:31

you need to know exactly why immediately.

14:33

Observability is where self-hosting

14:35

usually becomes a nightmare.

14:36

Historically, if you wanted to know

14:38

what an email server was doing,

14:39

you had to remotely log into the terminal

14:42

and continuously monitor massive dense text files

14:46

called server logs.

14:47

Oh, sounds awful.

14:49

It is.

14:49

You are essentially using command line tools

14:51

to hunt for a single line of text

14:54

among thousands of interleaved concurrent processes

14:57

trying to piece together why a specific email bounced.

15:01

But the documentation for ChaskWid

15:03

highlights a built-in mockering HTTP server

15:06

with exported variables and tracing to help debugging.

15:09

So what does this all mean

15:10

for the person actually running this?

15:12

It means they built a modern web dashboard

15:14

directly into the backend of the software.

15:16

Instead of flying blind

15:17

or digging through archaic text files,

15:19

you can point a web browser at the server

15:21

and see a structured, real-time visual representation

15:25

of its internal status.

15:26

And the tracing aspect is what really caught my eye.

15:28

Tracing is vital.

15:30

Mechanically, tracing means the server assigns

15:32

a unique internal ID

15:33

to every single incoming and outgoing message.

15:36

It then logs every solitary step

15:38

of that specific message's journey in isolation.

15:41

Received from sender, encryption checked,

15:43

authentication verified, spam hook triggered,

15:46

DNS lookup performed, delivery attempted.

15:49

Because it is isolated by that unique ID,

15:52

if an email fails,

15:53

the trace shows you the exact millimeter

15:55

where it hit a wall

15:56

without the noise of the 50 other emails

15:59

the server was processing at that exact same second.

16:01

That visibility is a massive paradigm shift.

16:04

It takes the guesswork out

16:05

of being a system administrator.

16:07

It really does.

16:08

If you couple that with their community support,

16:10

I mean, we're looking at nearly a thousand stars

16:12

on GitHub, active contributors, live chat via IRC,

16:15

and a dedicated private channel

16:17

for reporting security vulnerabilities

16:19

directly to the primary developer,

16:22

it becomes a highly sustainable project to rely on.

16:25

By building that observability directly into the tool,

16:28

they make operating an email server long-term

16:31

a realistic proposition for a small team

16:33

without a dedicated IT department.

16:35

It really pulls the curtain back.

16:37

So to recap the takeaways from this deep dive for you,

16:40

what Chaswood proves is that running

16:42

your own custom email infrastructure

16:43

doesn't have to be a terrifying ordeal

16:45

where one typo in a configuration file

16:48

ruins your business's reputation.

16:50

By utilizing a modern Go-based architecture,

16:54

the developers stripped away decades of legacy bloat.

16:57

They hard-coded the strict security guardrails

17:00

directly into the foundation,

17:01

neutralizing threats like downgrade attacks

17:04

and open relays by default.

17:06

And with smart mechanisms like suffix dropping,

17:08

automated let's encrypt certificates

17:10

and clear tracing dashboards,

17:12

it represents a highly accessible, powerful gateway

17:15

into reclaiming your communication infrastructure.

17:18

It redefines the baseline of what is possible

17:20

for a small organization to manage independently

17:23

without compromising on enterprise-grade security.

17:25

And taking back that independence is exactly why

17:28

we are so glad to have SafeService

17:30

supporting this deep dive.

17:31

We've just spent the last section exploring

17:33

how modern open-source software like Chaswood

17:36

can completely replace the need

17:37

for massive opaque third-party systems.

17:41

Organizations, whether you are a scaling business,

17:43

a nonprofit association, or a specialized group stand

17:46

to gain immense value, compliance security

17:49

and massive cost savings

17:50

by making the switch from expensive proprietary software

17:53

to open-source solutions.

17:55

And SafeServer makes that transition seamless.

17:58

They really do.

17:59

They can be commissioned for consulting

18:00

to determine whether Chasquid

18:02

or a comparable open-source alternative

18:04

is the perfect fit for your exact operational needs.

18:08

They help you reclaim your data sovereignty

18:09

and they handle the operation on secure German servers.

18:13

You can learn more and get started at www.safeserver.de.

18:17

It is a critical conversation

18:19

for any organization to have regarding their data.

18:21

And it leaves us with something deeper to consider

18:23

about the tools we rely on every single day.

18:26

If independent open-source developers

18:28

have managed to take something as notoriously complex

18:30

as an SMTP server and re-engineer it

18:33

to be this elegant, simple, and inherently secure,

18:36

what other pieces of our daily digital infrastructure

18:38

are we needlessly outsourcing to massive tech conglomerates

18:41

simply because we falsely assume

18:43

they are too hard to run ourselves?