From owner-freebsd-questions@freebsd.org Mon Jul 9 08:23:00 2018 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A942D102ECC6 for ; Mon, 9 Jul 2018 08:23:00 +0000 (UTC) (envelope-from 4250.10.freebsd-questions=freebsd.org@email-od.com) Received: from s1-b0c6.socketlabs.email-od.com (s1-b0c6.socketlabs.email-od.com [142.0.176.198]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 265508A5D8 for ; Mon, 9 Jul 2018 08:22:59 +0000 (UTC) (envelope-from 4250.10.freebsd-questions=freebsd.org@email-od.com) DKIM-Signature: v=1; a=rsa-sha256; d=email-od.com;i=@email-od.com;s=dkim; c=relaxed/relaxed; q=dns/txt; t=1531124580; x=1533716580; h=content-transfer-encoding:content-type:mime-version:references:in-reply-to:message-id:subject:cc:to:from:date:x-thread-info; bh=cl6zzd2Mxf0w59e8AycLRZmtkDSKzbuHCBOZ9Rt0JtU=; b=e1anaBG2RExm93tc+ps6kxnBiJALBxMt0RjBkU6IL+uAyG1ubku2UI+qnQLgtFUlGHVqVnbo4RA30dVNadgseZRBvUVH4jUfs3ZiRYCOoHDjBNDdQDHz1Bve+POpnVfIWMsRAFg4ocAQQtlkfeo2pxbmWB6Z2qKmTCzANLKUbdw= X-Thread-Info: NDI1MC4xMi4xOGYwMDAwMDFmZGRlMDUuZnJlZWJzZC1xdWVzdGlvbnM9ZnJlZWJzZC5vcmc= Received: from r3.us-east.aws.in.socketlabs.com (r3.us-east.aws.in.socketlabs.com [54.165.229.15]) by mxsg2.email-od.com with ESMTP(version=Tls12 cipher=Aes256 bits=256); Mon, 9 Jul 2018 03:22:44 -0400 Received: from smtp.lan.sohara.org (EMTPY [89.127.62.20]) by r3.us-east.aws.in.socketlabs.com with ESMTP(version=Tls12 cipher=Aes256 bits=256); Mon, 9 Jul 2018 03:22:43 -0400 Received: from [192.168.63.1] (helo=steve.lan.sohara.org) by smtp.lan.sohara.org with smtp (Exim 4.90_1 (FreeBSD)) (envelope-from ) id 1fcQVO-0008rK-AO; Mon, 09 Jul 2018 07:22:42 +0000 Date: Mon, 9 Jul 2018 08:22:42 +0100 From: Steve O'Hara-Smith To: freebsd-questions@freebsd.org Cc: mayuresh@kathe.in Subject: Re: [commercial] sendmail setup request Message-Id: <20180709082242.bb41ad9ead4419c94e9769e8@sohara.org> In-Reply-To: References: X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd11.1) X-Clacks-Overhead: "GNU Terry Pratchett" Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Jul 2018 08:23:01 -0000 On Mon, 09 Jul 2018 06:32:50 +0000 Mayuresh Kathe wrote: > my needs are indeed limited to what i have described, on reading it, you > would notice that i do not wish to have my mails be stored locally. > i want to have the mails on a server instance so that i can access them > from a machine other than mine via ssh. This is somewhat at odds with wanting to use mailx to read your mail because mailx can only handle mail that is local to the machine running mailx, it reads and writes files rather than talking to a service, it does talk to a local sendmail instance to send mail though. What you could do is get a BSD VPS and use fetchmail on that to collect your mail from kathe.in and do a minimal outgoing only configuration of sendmail to use the kathe.in SMTP server as a smarthost for which you should find plenty of tutorial material. Then you can access your mail by logging into your VPS and *only* by logging in to your VPS, miss a payment and your mail is gone forever. The disadvantage of non-local storage is that you don't own that storage. Setting up a cron job at home to rsync your VPS home directory to your own machine would be a very good thing to do if you go this way. An alternative is to use fetchmail on your local machine and rsync your mail to the VPS for reading, that way you own the master copy. What I would do (and do) is keep my mail locally (I run an imap server but fetchmail works too) and set up a VPN so that I could access my own network remotely[1]. There are a good many tutorials on setting up openvpn to provide a VPN service. Alternatively just expose a listening ssh socket to the world (disable login by password in ssh if you do that) which is what I did before I got round to setting up openvpn. [1] This assumes that you have an always-on system, decent network connectivity, a public IP address (or an IPV6 tunnel) and control over your firewall. -- Steve O'Hara-Smith