(In case anyone’s wondering, the lady married in the meantime, but the old login was retained, just added a new alias! - NethServer’s quite flexible, we didn’t want to touch the fine tuned Windows profile!)
My 2 cents
Andy
PS:
This client, a Hotel, had to close doors for the last time end of 2020, not due to Corona, but somewhat greedy Owners who did not want to extend the well paid 20 year lease!
6 years of NethServer, after 4 years SME, before that 4 years a hand configured SuSE…
At least the hotel managment will remain clients for future projects!
Yes, but as they’re closing (closed now!), we didn’t put too much effort when the Hotel-IT “moved out” in April.
We relocated almost the whole IT, as this will remain operational another 3 years (at least). Using TSplus (Terminal Service for a MultiUser Win10 VM), everything was connected via VPN and RDP.
This made the end of year cleanup, and vacating the Hotel, much more easier, as we do not have to worry about any IT stuff, except for a couple (5) ex-Windows10 PCs, now running Linux-Mint and Renmina RDP… We actually activated “Roving Profiles” on NethServer just for this move… (It worked better than expected!).
In a first step, all PCs were converted P2V with VMWare Converter, then converted to Proxmox using Proxmox.
Second Step was migrating the profiles all to the new Windows 10 “Terminal Server”.
One reason for this setting is that the server would move location, and change the FQDN (Client side). The Server, as AD, could not use a different FQDN.
And once set, we didn’t want to fiddle with the working mail settings!
We moved the whole IT while the hotel was open, the move created an outage of only 1 hour (as planned!) for the IT!
Yay to Proxmox, NethServer and OPNsense to make this possible!
My 2 cents
Andy
PS: The used mailserver name IS the FQDN shown in Server Name of the old NethGUI (980).
As said, that server was set up more than 10 yaers ago… And all DNS “grew” to all the newer challenges in correct mail handling needed nowadays… (This was a Hotel with international guests…)
I can’t recall in detail at the moment what we put in, but I can look up a few stuff - the server, as said, is still running and will remain so, also mail etc.
I did those alias but my problem is with Thunderbird that can’t get the certificate of the sending vhost server.
Looking at your reply: ThunderBird - Sieve not working?, I tried it as a partial solution by adding an exception for the certificate and now the DKIM for the mail from the secondary domaine shows the d=secondary-fqdn; which is what I want.
As said, this is a partial solution: but I would still like to have the real certificate from the sending server.
I didn’t take a walk yet… I am going to take it now…
Hi @michelandre,
I don’t have any experience with thunderbird, only using Apple Mail and iOS.
My Procedure was:
0. Creating all needed A-Records, CNAMES and MX-Records for my mymaindomain.tld and myseconddomain.tld, but not DMARC-; TLS-, SPF-, DKIM-Records within my external DNS-Provider.
What I did on my srv01.mymaindomain.tld
Creating user like: firstname_secondname
that automatically creates a blue mailboxfirstname_secondname and orange mail addressfirstname_secondname@mymaindomain.tld point to the userfirstname_secondname
manually creating a blue mail address with firstname.seconadname@mymaindomain.tld
pointing firstname.seconadname@mymaindomain.tld to firstname_secondname
crating a mail domain myseconddomain.tld
creating user myseconddomain_firstname_secondname
that automatically creates a blue mailboxmyseconddomain_firstname_secondname and orange mail addressmyseconddomain_firstname_secondname@mymaindomain.tld point to the usermyseconddomain_firstname_secondname
manually creating a blue mail address with firstname.seconadname@myseconddomain.tld
pointing firstname.seconadname@myseconddomain.tld to myseconddomain_firstname_secondname
Control aliases in Servermanger for all subdomains mymaindomain.tld, myseconddomain.tld and needed subdomains like nextcloud or collabora but not the mail related like mail, imap, smtp, pop.
Creating LE-certificates for all subdomains of mymaindomain.tld
Creating LE-certificates for all subdomains of myseconddomain.tld
creatig DKIM-Keys in mail domains
Transfering DKIM-keys as DNS-Recordx to my external DNS-Provider
creating TLS-Keys and DMARC + SPF-Records
In the mail clients I created accounts for my @mymaindomain.tld using
CAA records allow domain owners to declare which certificate authorities are allowed to issue a certificate for a domain. They also provide a means of indicating notification rules in case someone requests a certificate from an unauthorized certificate authority. If no CAA record is present, any CA is allowed to issue a certificate for the domain. If a CAA record is present, only the CAs listed in the record(s) are allowed to issue certificates for that hostname.
CAA records can set policy for the entire domain or for specific hostnames. CAA records are also inherited by subdomains. For example, a CAA record set on example.com also applies to any subdomain, like subdomain.example.com (unless overridden).
The TLS Authentication record (TLSA) is used to associate a TLS server certificate or public key with the domain name where the record is found. With a TLSA record, you can store the fingerprint of a TLS/SSL certificate in the DNS of your domain.
So this should resolve the problem of Thunderbird not able to get the certificate.
My DNS provider offers an assistant to create it from LE-Certificate.
In the former time, I created it manually. I do not remember exactly how, but I used these sources: