Self-hosting email like it's 1984
Getting started & software options
- Several commenters recommend turnkey stacks to reduce complexity:
- Mail‑in‑a‑Box, Mailcow, and integrated servers like Stalwart are highlighted as “few‑hours” setups with sane defaults (DKIM/SPF/DMARC, TLS, web UI).
- Others prefer traditional Postfix + Dovecot (sometimes via long‑standing guides like PurpleHat and workaround.org), valuing modularity, maturity, and long‑term support.
- Stalwart gets repeated praise: single binary, minimal dependencies, JMAP support, good defaults and UI; some use it with SES or other relays.
- Some still like Exim/OpenSMTPD, but Exim’s Debian packaging is described as painful.
Deliverability, IP reputation & big providers
- Core pain point: outbound mail reaching Gmail/Outlook/Yahoo.
- Residential IPs are often blocked; people either use VPSes, IP tunnels, or external relays (SES, SendGrid, etc.).
- Even with perfect SPF/DKIM/DMARC and 100/100 mail‑tester scores, some report persistent blocking or spam‑foldering, especially from Microsoft; others claim near‑perfect deliverability.
- There’s disagreement whether “do SPF/DKIM/DMARC right and you’re fine” is realistic; several describe opaque “extra heuristics” (IP reputation, age of IP, ASN, prior spam on the block, DKIM alignment strictness) that periodically break setups.
- Some note that big hosted platforms also misclassify legitimate mail (e.g., Shopify, even Microsoft’s own marketing).
Spam handling, greylisting & filters
- Greylisting is widely used and effective, but causes issues with 2FA and signup emails; some services never retry. Workarounds: whitelisting MFA domains or postwhite‑style whitelists.
- Filtering stacks mentioned: rspamd, SpamAssassin + DNSBLs, reverse‑DNS checks, geo‑IP blocking, content classifiers, and even experimental LLM‑based classifiers.
- Debate over aggressively rejecting missing PTR/reverse‑DNS: great spam reduction vs. potential false rejects from poorly configured sites.
Uptime, reliability & disaster recovery
- Some argue email isn’t truly “critical” thanks to SMTP retries and backup MX, and that it’s easy to achieve months‑long uptime.
- Others quit self‑hosting after:
- Needing near‑100% uptime because some senders (e.g., GitHub historically) disable addresses after a single bounce.
- Lacking robust backup/restore and DR, or fearing ransomware and operator error.
- A common “hybrid” pattern: self‑host incoming mail and use a commercial relay for outgoing.
Home vs VPS & privacy
- Hosting at home is seen as “pure” self‑hosting but runs into port‑25 blocks, dynamic IPs, and blacklist issues; warming a clean static IP is described as slow and fragile.
- Many instead use a cheap VPS (often Hetzner, DO, etc.); some argue that if a company can access your VPS anyway, you might as well buy managed email. Others counter that VPS providers typically don’t mine mail contents, unlike consumer webmail.
Motivations, trade‑offs & community ideas
- Long‑time self‑hosters emphasize:
- Pride, technical learning, independence from “email oligopolies,” and the ability to deeply inspect logs and automate.
- Viewing self‑hosting as a hobby rather than a pure cost saver.
- Critics highlight:
- Time sink, moving‑target configs, constant whack‑a‑mole with blacklists, and reliance on goodwill of large providers that have little incentive to trust small servers.
- Alternative visions:
- Separate “receiving only” self‑hosting from “sending” via relays.
- A gated “community email realm” excluding big providers, with reputation and pay‑per‑abuse models.
Migration strategies & configuration details
- For “testing the waters” while staying on Google Workspace:
- Suggestions include forwarding from Google to the self‑hosted server, replying from the new server, using split‑domain configs, or putting Google as a backup MX.
- Outbound can safely be multi‑homed if SPF is configured to allow multiple senders.
- Technical tips scattered through the thread:
- Use Maildir over mbox; monitor DMARC reports; register with DNS whitelists; use fail2ban; keep configs simple; and treat greylisting and DNSBLs as primary spam defenses.
“Like it’s 1984” title & nostalgia
- Several note that the described stack (Postfix, DKIM, TLS, DMARC) is thoroughly modern; 1984 would have meant UUCP, bang paths, open relays, simple SMTP, and no MX records.
- Some share nostalgic anecdotes about early Unix labs, dial‑up BBSs, and mail taking days to traverse multi‑hop UUCP paths, contrasting sharply with today’s complex, security‑heavy setups.