Does my Server Talk to Me?

Eric North
6 min readNov 9, 2021


Courtesy of Alex Bradt on Giphy

Does your server talk to you?

Mine does.

I have to admit: I kind of like it.

Perhaps I need to make more real-life friends?

Jury is still out on this one.

In any event I am happy that my computers now have the ability to e-mail me when problems occur, when things happen in the background that require my attention among other things.

For this tutorial I will help walk you through the steps I took to configure PostFix on my Linux server. There are a large number of existing articles out there that describe how to set up PostFix on Linux. I found most of them helpful; at the same time I felt that I needed my own set of descriptive steps to help walk me through how to configure this service. For this article I am using Postfix as the mailer agent and Gmail for my SMTP mail service, your mileage may vary.

First Steps

Start by updating your system:

sudo apt-get update && sudo apt-get upgrade

Install Postfix and the libsasl2-modules package:

sudo apt-get install libsasl2-modules postfix

During the installation you should see a prompt, hit Enter to go to the next screen.

Hit Enter to select the default ‘Internet Site’.

Leave the default for the system mail name, in my case it is <hostname>.localdomain, hit Enter to proceed with the setup.

If you are not sure about the fully-qualified domain name (FQDN) you can query it once you are back at the prompt via: hostname — fqdn

Generate App Password

If you have 2-factor authentication enabled for your G-mail and other parts of your Google account, you will need to generate an application password for Postfix to be able to send e-mails using your G-mail account. Follow the steps outlined here to generate an app password. Keep your newly-generated app password in a safe place as you will need it when configuring Postfix in subsequent steps. The article also contains additional troubleshooting for “less secure apps” access. I found that I did not require any additional troubleshooting but you may wish to keep this in your back pocket in case you encounter problems.

Edit Hostname

Full-disclosure, I found that working version of the configuration file for Postfix is a bit confusing, with parameters spread across it. There is apparently a more-detailed version available, see the comment at the top of the file for the path to this more-detailed file.

Enter the Postfix configuration to make several changes:

sudo nano /etc/postfix/

Confirm the myhostname parameter is set properly:

myhostname = <hostname>.localdomain


For my setup I only want my server to be able to send e-mails, I do not think my system will care that much if people try sending it stuff. Edit the by commenting out the existing line for inet_interfaces and changing it to loop-back only mode as follows:

# Modified YYYY-MM-DD by <author> to allow outgoing mail only.

#inet_interfaces = all

inet_interfaces = loopback-only


Update the relayhost parameter to the SMTP mail service of your choice, in my case I use Google:

# Modified YYYY-MM-DD by <author>.

#relayhost =

relayhost = []:587


Enable STARTTLS encryption by changing it from may to encrypt:

# Modified YYYY-MM-DD by <author>.

# Enable STARTTLS encryption


smtp_tls_security_level = encrypt

There is a second line in the configuration for the tls security level, you will want to comment-out this line otherwise Postfix will generate a warning when the service is run:

# Modified YYYY-MM-DD by <author>.


Configure additional parameters for encryption and security as follows:

# Modified YYYY-MM-DD by <author>.

# Use TLS, see

# as well as

smtp_use_tls = yes

# Enable SASL authentication

smtp_sasl_auth_enable = yes

# Disallow methods that allow anonymous authentication

smtp_sasl_security_options = noanonymous

# Location of sasl_passwd

smtp_sasl_password_maps = hash:/etc/postfix/sasl/sasl_passwd

# Location of CA certificates

smtp_tls_CAfile = /etc/ssl/certs/ca-certificates.crt

# Limit header size

header_size_limit = 4096000

Prepare Credentials

Create a new file and place your credentials via:

sudo nano /etc/postfix/sasl/sasl_passwd

In this new file, insert the following line:

[]:587 <email_username><app_password>

Use the app password you generated in the previous step.

Hit Cntl-O to save, Cntl-X to close.

Postfix needs your SMTP credentials to be encoded, you can do this via:

sudo postmap /etc/postfix/sasl/sasl_passwd

Both of these new files contain your credentials in plain-text, I highly recommend you change their permissions to help keep these files away from prying eyes, see this post for details:

sudo chown root:root /etc/postfix/sasl/sasl_passwd /etc/postfix/sasl/sasl_passwd.db

sudo chmod 0600 /etc/postfix/sasl/sasl_passwd /etc/postfix/sasl/sasl_passwd.db

Test Postfix

Prior to performing any tests, restart Postfix via:

sudo systemctl restart postfix

Send a test e-mail using sendmail:

sendmail <recipient>@<address>.com

From: <email_username>

Subject: Test

Testing 123!


You will have to write the above lines manually, when you are finished typing your draft e-mail you can send it by placing a period on the last line followed by hitting Enter.

Give it some time for the e-mail to send, you can check your Sent folder in G-mail to ensure it was sent. Check the recipient’s folder for the test e-mail a few moments later.

Congratulations! If all goes well you should have a shiny new e-mail waiting for you in your mailbox.


The above steps are all fine and good but they will not be of much use until we set up some aliases. Most system messages are sent to root, so we need to set up two aliases. See this post for details. One for messages to be sent from root to a <local_user>, and a second alias from <local_user> to <destination_username>@<destination_address>.com.

Enter the aliases file via:

sudo nano /etc/aliases

Once in the file, put the following lines:

root: <local_user>

<local_user>: <email_username>

Hit Cntl-X to save, Cntl-O to exit.

Apply the changes via:

sudo newaliases

With the aliases in place, any messages directed to root should be forwarded to the e-mail you have specified. This is useful in cases such as, oh I don’t know, when a user tries to unsuccessfully log-in to your SuperUser account. It might help to keep yourself in-the-know in these situations!

With the new alises in-place, re-start Postfix prior to sending any new e-mails:

sudo systemctl restart postfix

Send a test e-mail to root to ensure it is forwarded to the address you specified in the aliases file:

sendmail root

Test to see if aliases work


Check the inbox for <email_username> to ensure the message was delivered.

Bonus: Configure Cron to Mail Notifications

I am a huge fan of Cron, it helps me run my scripts in the background. What more could I ask for? How about sending me an e-mail when a task has completed? With all of the above steps completed, this is now possible.

Edit the crontab for your user via the following command:

crontab -e

Once in the file, add the following line close to the top:

# Added 2021–09–30 by Eric.


Hit Cntl-X to save, Cntl-O to exit.

With the above line added to your user’s crontab and provided all of the above steps to configure Postscript were completed properly you should receive an e-mail for each task completed by Cron. Go ahead and schedule a test task within the next minute or two to confirm this works too! That’s a lot of toos…

I found the following helpful article as it provides some additional troubleshooting for automatic mailing by Cron.


That’s it! Your system should now be configured to send e-mails to an address of your choosing. What do you think? Is having your computer talk to you something you’ve always wanted but were not sure how to ask? What are your experiences with these types of e-mail services?



Eric North

Engineer with a small dash of quirkiness, always on the lookout for new things to learn. Avid sailor and adventurer. Publisher of good(?) ideas.