All Projects → deeztek → Hermes-Secure-Email-Gateway

deeztek / Hermes-Secure-Email-Gateway

Licence: GPL-3.0 license
Hermes Secure Email Gateway is a Free Open Source Ubuntu 18.04 or 20.04 Server based Email Gateway that provides Spam, Virus and Malware protection, full in-transit and at-rest email encryption as well as email archiving. It features the latest email authentication techniques such as SPF, DKIM and DMARC.

Programming Languages

javascript
184084 projects - #8 most used programming language
c
50402 projects - #5 most used programming language
ColdFusion
112 projects
CSS
56736 projects
SCSS
7915 projects
shell
77523 projects

Projects that are alternatives of or similar to Hermes-Secure-Email-Gateway

mailserver
Simple and full-featured mail server using Docker
Stars: ✭ 88 (+151.43%)
Mutual labels:  letsencrypt, postfix, dkim, dmarc
docker-mail-server
Ansible playbooks to deploy a full featured mail server stack using Docker.
Stars: ✭ 47 (+34.29%)
Mutual labels:  letsencrypt, postfix, dkim, dmarc
postfix-relay
Postfix SMTP relay docker image
Stars: ✭ 76 (+117.14%)
Mutual labels:  postfix, spf, dkim
Maddy
✉️ Composable all-in-one mail server.
Stars: ✭ 2,800 (+7900%)
Mutual labels:  spf, dkim, dmarc
Docker Mailserver
Production-ready fullstack but simple mail server (SMTP, IMAP, LDAP, Antispam, Antivirus, etc.) running inside a container.
Stars: ✭ 8,115 (+23085.71%)
Mutual labels:  letsencrypt, postfix, spamassassin
Vpstoolbox
一键安装Trojan-GFW代理,Hexo博客,Nextcloud等應用程式。
Stars: ✭ 1,080 (+2985.71%)
Mutual labels:  letsencrypt, postfix, mariadb
Mailu
Insular email distribution - mail server as Docker images
Stars: ✭ 3,151 (+8902.86%)
Mutual labels:  letsencrypt, dkim, dmarc
mailauth
Command line utility and a Node.js library for email authentication
Stars: ✭ 57 (+62.86%)
Mutual labels:  spf, dkim, dmarc
mailsec-check
Another utility to analyze state of deployment of security-related email protocols.
Stars: ✭ 37 (+5.71%)
Mutual labels:  spf, dkim, dmarc
toolbox-wiki
Internet.nl toolbox - how-to's for modern mail security standards (DMARC, DKIM, SPF and DANE)
Stars: ✭ 96 (+174.29%)
Mutual labels:  spf, dkim, dmarc
authelia
Instructions and configuration files to deploy Authelia in Unraid OS using Docker + FreeIPA LDAP.
Stars: ✭ 116 (+231.43%)
Mutual labels:  mariadb, authelia
checkdmarc
A parser for SPF and DMARC DNS records
Stars: ✭ 124 (+254.29%)
Mutual labels:  spf, dmarc
smf-spf
It's a lightweight, fast and reliable Sendmail milter that implements the Sender Policy Framework
Stars: ✭ 12 (-65.71%)
Mutual labels:  postfix, spf
Haraka
A fast, highly extensible, and event driven SMTP server
Stars: ✭ 4,069 (+11525.71%)
Mutual labels:  spf, dkim
Postfwd Anti Geoip Spam Plugin
Postfwd plugin for blocking international spam botnets based on geographical location of IP addresses used to login to postfix via sasl.
Stars: ✭ 40 (+14.29%)
Mutual labels:  spam, postfix
Mailserver
⚠️ UNMAINTAINED - Simple and full-featured mail server using Docker
Stars: ✭ 1,267 (+3520%)
Mutual labels:  letsencrypt, postfix
Guacamole Install Rhel 7
Apache Guacamole installation bash script for RHEL 7 and CentOS 7 including options for Nginx, HTTPS, SSL, LDAP, Let's Encrypt certificates and more
Stars: ✭ 174 (+397.14%)
Mutual labels:  letsencrypt, mariadb
docker-nextcloud
Nextcloud Docker image
Stars: ✭ 209 (+497.14%)
Mutual labels:  letsencrypt, mariadb
Dockerweb
A docker-powered bash script for shared web hosting management. The ultimate Docker LAMP/LEMP Stack.
Stars: ✭ 89 (+154.29%)
Mutual labels:  letsencrypt, mariadb
wordpress-ansible-playbook
An ansible playbook for setting up production and staging WordPress site(s). Nginx, php7.3, ssl ready (via letsencrypt), mariadb.
Stars: ✭ 85 (+142.86%)
Mutual labels:  letsencrypt, mariadb

Hermes Secure Email Gateway


Hermes Secure Email Gateway

Open Source Unified Secure Email Gateway

Table of Contents

About

Hermes Secure Email Gateway is a Free Open Source Ubuntu Server based Email Gateway that provides Spam, Virus and Malware protection, full in-transit and at-rest email encryption as well as email archiving. It features the latest email authentication techniques such as SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail) and DMARC (Domain-based Message Authentication, Reporting and Conformance) in order to combat email spoofing, phishing, scams, email compromise attacks and spam.

Hermes Secure Email Gateway combines Open Source technologies such as Postfix, Apache SpamAssassin, ClamAV, Amavisd-new and CipherMail under one unified web based Web GUI for easy administration and management of your incoming and ougoing email for your organization.

It can be deployed to protect your in-house email solution as well as cloud email solutions such as Google Mail and Microsoft Office 365.

Features

  • Malware and Spam Protection
  • In Transit Email Encryption via Encrypted PDF, S/MIME, PGP and SMTP TLS
  • Administrator Console
  • User Console
  • Built-In Email Archiving
  • Active Directory Integration (PRO Feature)
  • Searchable Event Logs
  • Searchable Messages by Date/Time, Subject, Sender, Receiver, Type, Action
  • Train Messages as Spam/Ham, Block/Allow Senders, Release to Recipient, Download Messages
  • Integration with 3rd Party Threat Feeds such as Malware Patrol, Sanesecurity, Securite Info, Yara (Pro Feature)
  • Built-In Firewall (PRO Feature)
  • Multifactor Authentication
  • Lets Encrypt (ACME) Certificate Integration (PRO Feature)
  • haveibeenpwned.com Password Check Integration
  • Custom File Expressions (PRO Feature)
  • Custom File Extensions (PRO Feature)
  • Custom Spam Filter Tests (PRO Feature)
  • Custom Messages Rules (PRO Feature)
  • Antivirus Signature Bypass (PRO Feature)
  • 3rd Party SSL Certificates
  • SPF, DKIM Check, DKIM Sign, DMARC
  • Per-User Spam, Virus and File Policies

Screenshots

Screenshot Screenshot Screenshot Screenshot

Installation

Hermes SEG can be easily installed in your existing Ubuntu 18.04 LTS or Ubuntu 20.04 LTS server machine by utilizing the ubuntu_hermes_install.sh script. The script requires that you have a fully updated Ubuntu server installation and that you have a /mnt/data directory for database and email archive storage. You must have at least 8 GB of RAM and 4 CPUs.

Required Information

The script will prompt you for the following information before it starts installation. Ensure you have that information available before you begin:

  • MySQL(MariaDB) root user password you wish to use
  • MySQL(MariaDB) username you wish to use with the hermes database (Example: hermes)
  • MySQL(MariaDB) password you wish to use with the hermes database user
  • MySQL(MariaDB) username you wish to use with the Syslog database (Example: rsyslog)
  • MySQL(MariaDB) password you wish to use with the Syslog database user
  • MySQL(MariaDB) username you wish to use with the cipermail database (Example: ciphermail)
  • MySQL(MariaDB) password you wish to use with the ciphermail database user
  • MySQL(MariaDB) username you wish to use with the opendmarc database (Example: opendmarc)
  • MySQL(MariaDB) password you wish to use with the opendmarc database user
  • Lucee Server and Web Administrator password you wish to use
  • System Mailname (Example: smtp.domain.tld)

The Configure /mnt/data partition directions below assume you have a 250GB secondary drive which you will partition, format and mount as /mnt/data.

Technically a secondary drive for the /mnt/data directory is not a requirement but it's highly recommended for performance reasons. If you don't wish to use a secondary drive for the /mnt/data directory, simply create a /mnt/data directory in your system and skip to the Quick script install and run instructions section.

Configure /mnt/data partition

sudo mkdir /mnt/data

sudo fdisk -l

Look for 250 GB drive you created earlier device ID, usually /dev/sdb. Ensure you select correct device ID before running the commands below)

Create partititon

sudo fdisk /dev/sdb

  • Hit "n" to add new partition
  • Hit "p" for primary partition
  • Hit "Enter" for partition 1
  • Hit "Enter" for default first sector
  • Hit "Enter" for default last sector
  • Hit "w" to write changes to disk and exit

Format Partition

sudo mkfs.ext4 /dev/sdb1

Mount Partition to /mnt/data

sudo mount /dev/sdb1 /mnt/data

Get disk UUID

ls -l /dev/disk/by-uuid

Edit /etc/fstab

sudo vi /etc/fstab

Add the following in /etc/fstab where DEVICE_ID is the UUID from the command above

UUID=DEVICE_ID /mnt/data ext4 errors=remount-ro 0 1

Verify drive is mounted

sudo df -h

Should yield output similar to below:

Filesystem      Size  Used Avail Use% Mounted on
udev            1.9G     0  1.9G   0% /dev
tmpfs           395M  1.1M  394M   1% /run
/dev/sda2        79G  5.5G   69G   8% /
tmpfs           2.0G     0  2.0G   0% /dev/shm
tmpfs           5.0M     0  5.0M   0% /run/lock
tmpfs           2.0G     0  2.0G   0% /sys/fs/cgroup
/dev/loop0       87M   87M     0 100% /snap/core/4917
/dev/loop1       90M   90M     0 100% /snap/core/8039
tmpfs           395M     0  395M   0% /run/user/1000
/dev/sdb1       246G   61M  233G   1% /mnt/data

Reboot and ensure /mnt/data gets mounted automatically

Quick script install and run instructions

Git clone the Hermes SEG repository:

sudo git clone https://github.com/deeztek/Hermes-Secure-Email-Gateway.git

This will clone the repository and create a Hermes-Secure-Email-Gateway directory in the directory you ran the git clone command from.

Change to the Hermes-Secure-Email-Gateway directory:

cd Hermes-Secure-Email-Gateway/

Make script executable:

sudo chmod +x ubuntu_hermes_install.sh

Run the script as root:

sudo ./ubuntu_hermes_install.sh

Getting Started Guide

Ensure you follow the Getting Started Guide to get your Hermes SEG installation configured quickly and correctly.

Documentation

Check out the Hermes SEG Administrator and Hermes SEG User guides

Support

Post your questions at: https://github.com/deeztek/Hermes-Secure-Email-Gateway/discussions

Chat with us on Matrix: https://matrix.to/#/#hermesseg:matrix.org

Bugs

Bugs can be posted on Github Issues at:

https://github.com/deeztek/Hermes-Secure-Email-Gateway/issues

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].