Setting up a chatmail relay¶
This section contains everything needed to setup a ready-to-use chatmail relay. The automated setup is designed and optimized for providing chatmail addresses for immediate permission-free onboarding through chat apps and bots. Chatmail addresses are automatically created at first login, after which the initially specified password is required for sending and receiving messages through them.
Minimal requirements and prerequisites¶
You will need the following:
Control over a domain through a DNS provider of your choice.
A Debian 12 deployment server with reachable SMTP/SUBMISSIONS/IMAPS/HTTPS ports. IPv6 is encouraged if available. Chatmail relay servers only require 1GB RAM, one CPU, and perhaps 10GB storage for a few thousand active chatmail addresses.
A Linux or Unix build machine with key-based SSH access to the root user of the deployment server. You must add a passphrase-protected private key to your local ssh-agent because you can’t type in your passphrase during deployment. (An ed25519 private key is required due to an upstream bug in paramiko)
Setup with scripts/cmdeploy¶
We use chat.example.org as the chatmail domain in the following
steps. Please substitute it with your own domain.
Setup the initial DNS records for your deployment server. The following is an example in the familiar BIND zone file format with a TTL of 1 hour (3600 seconds). Please substitute your domain and IP addresses.
chat.example.org. 3600 IN A 198.51.100.5 chat.example.org. 3600 IN AAAA 2001:db8::5 www.chat.example.org. 3600 IN CNAME chat.example.org. mta-sts.chat.example.org. 3600 IN CNAME chat.example.org.
Note
For experimental deployments using self-signed certificates, use a domain name starting with
_(e.g._chat.example.org). Themta-stsCNAME and_mta-stsTXT records are not needed for such domains.On your local PC, clone the repository and bootstrap the Python virtualenv.
git clone https://github.com/chatmail/relay cd relay scripts/initenv.sh
On your local build machine (PC), create a chatmail configuration file
chatmail.ini:scripts/cmdeploy init chat.example.org # <-- use your domain
To use self-signed TLS certificates instead of Let’s Encrypt, use a domain name starting with
_(e.g.scripts/cmdeploy init _chat.example.org). Domains starting with_cannot obtain WebPKI certificates, so self-signed mode is derived automatically. This is useful for private or test deployments. See the Technical overview for details on certificate provisioning.Verify that SSH root login to the deployment server server works:
ssh root@chat.example.org # <-- use your domain
From your local build machine, setup and configure the remote deployment server:
scripts/cmdeploy run
This script will also check that you have all necessary DNS records. If DNS records are missing, it will recommend which you should configure at your DNS provider (it can take some time until they are public).
Other helpful commands¶
To check the status of your deployment server running the chatmail service:
scripts/cmdeploy status
To display and check all recommended DNS records:
scripts/cmdeploy dns
To test whether your chatmail service is working correctly:
scripts/cmdeploy test
To measure the performance of your chatmail service:
scripts/cmdeploy bench
Modifying the home page¶
cmdeploy run also creates default static web pages and deploys them
to a Nginx web server with:
a default
index.htmlalong with a QR code that users can click to create an address on your chatmail relaya default
info.htmlthat is linked from the home pagea default
policy.htmlthat is linked from the home page
All .html files are generated by the according markdown .md file
in the www/src directory.
Refining the web pages¶
scripts/cmdeploy webdev
This starts a local live development cycle for chatmail web pages:
uses the
www/src/page-layout.htmlfile for producing static HTML pages fromwww/src/*.mdfilescontinously builds the web presence reading files from
www/srcdirectory and generating HTML files and copying assets to thewww/builddirectory.Starts a browser window automatically where you can “refresh” as needed.
Custom web pages¶
You can skip uploading a web page by setting www_folder=disabled in
chatmail.ini.
If you want to manage your web pages outside this git repository, you
can set www_folder in chatmail.ini to a custom directory on your
computer. cmdeploy run will upload it as the server’s home page, and
if it contains a src/index.md file, will build it with hugo.
Disable automatic address creation¶
If you need to stop address creation, e.g. because some script is wildly creating addresses, login with ssh to the deployment machine and run:
touch /etc/chatmail-nocreate
Chatmail address creation will be denied while this file is present.
Running a relay with self-signed certificates¶
Use a domain name starting with _ (e.g. _chat.example.org)
to run a relay with self-signed certificates.
Domains starting with _ cannot obtain WebPKI certificates
so the relay automatically uses self-signed certificates
and all other relays will accept connections from it
without requiring certificate verification.
This is useful for experimental setups and testing.
Running a relay with externally managed certificates¶
If you already have a TLS certificate manager
(e.g. Traefik, certbot, or another ACME client)
running on the deployment server,
you can configure the relay to use those certificates
instead of the built-in acmetool.
Set the following in chatmail.ini:
tls_external_cert_and_key = /path/to/fullchain.pem /path/to/privkey.pem
The paths must point to certificate and key files
on the deployment server.
During cmdeploy run, these paths are written into
the Postfix, Dovecot, and Nginx configurations.
No certificate files are transferred from the build machine —
they must already exist on the server,
managed by your external certificate tool.
The deploy will verify that both files exist on the server.
acmetool is not installed or run in this mode.
Note
You are responsible for certificate renewal. When the certificate file changes on disk, all relay services pick up the new certificate automatically via a systemd path watcher installed during deploy. The watcher uses inotify, which does not cross bind-mount boundaries. If you use such a setup, you must trigger the reload explicitly after renewal:
systemctl start tls-cert-reload.service
Migrating to a new build machine¶
To move or add a build machine,
clone the relay repository on the new build machine, and copy the chatmail.ini file from the old build machine.
Make sure rsync is installed, then initialize the environment:
./scripts/initenv.sh
Run safety checks before a new deployment:
./scripts/cmdeploy dns
./scripts/cmdeploy status
If you keep multiple build machines (ie laptop and desktop), keep chatmail.ini in sync between
them.