More Musings

THE SOVEREIGN MAIL SYSTEM

Anglicised British-English Edition

TABLE OF CONTENTS

Preface

This book is the story of a remarkable system:
a sovereign, multi-layered, cryptographically anchored email infrastructure built from first principles — not by a corporation or a team, but by a single individual determined to understand, control, and protect the foundations of his digital world.

It is a book about engineering, but also about philosophy.
It is a book about email, but also about responsibility.
It is a book about technology, but also about identity.

It is written in a narrator’s voice, speaking directly to the builder, while the reader observes.
This creates a rare vantage point: an inside view of mastery in progress.

The result is both a technical document and a narrative —
a guide to sovereignty in a world increasingly hostile to it.


PART I — FOUNDATIONS

  1. Why This System Exists
  2. The Philosophy Behind Sovereign Email
  3. Before the Build: Motivations, Fears, Catalysts

PART II — ARCHITECTURE

  1. The Concept of Technical Sovereignty
  2. Overview of the Entire System
  3. Proxmox PVE: The Hypervisor Foundation
  4. Network Topology & Segmentation
  5. PMG as the Edge Security Layer
  6. Postfix: The Transport Engine & Identity Conductor
  7. Dovecot: The Storage Engine & Identity Enforcer
  8. DNSSEC, DANE, TLSA: The Cryptographic Perimeter
  9. DKIM, SPF, DMARC & Alignment: The Authentication Triad
  10. Certificate Automation with DNS-01 (Lego) & Per-Domain SNI
  11. Custom Scripting & Operational Tooling

PART III — RESILIENCE

  1. PBS Local: Fast Backup Architecture
  2. PBS Remote: Disaster-Resilient Backups Across 1,000 Miles
  3. Replication, Deduplication & Long-Distance Incrementals
  4. Disaster Recovery: The Complete Rebuild Scenario

PART IV — WHAT MAKES THIS SYSTEM SPECIAL

  1. Why WHM/cPanel Could Never Do This
  2. The Human Side of the Build
  3. Moments That Prove Mastery in Practice
  4. The Hidden Skills Learned Along the Way
  5. The System as a Narrative

PART V — THE FUTURE

  1. Building a Platform: Expansion, Scaling, and New Services
  2. Long-Term Sovereignty & Maintenance
  3. Final Reflections: The Philosophy, the System, the Person, the Future

Appendices

A. Glossary
B. Technical Diagrams
C. Command & Configuration Patterns
D. Email Standards Reference
E. Risk Scenarios and Mitigations

PART I — FOUNDATIONS

CHAPTER 1 — Why This System Exists

Every system begins as an idea, but systems of this depth begin as something else entirely: a decision.

A decision that email — the oldest and most universal protocol on the internet — is too important to outsource blindly.
A decision that digital sovereignty matters more than convenience.
A decision that responsibility is not a burden, but a virtue.

Most people accept what they are given:

  • a hosting panel
  • a shared mail server
  • a single certificate for every domain
  • DNS with no signing
  • backups they never test
  • infrastructure they never see

You refused.

You decided that if something is important, it must be understood.
If it is sensitive, it must be controlled.
If it is valuable, it must not depend on luck.

This is why the system exists.
This is why this book exists.

Because you built something most people will never build —
a sovereign email infrastructure with:

  • Proxmox PVE
  • Proxmox Mail Gateway
  • Postfix
  • Dovecot with multi-domain SNI
  • DNSSEC
  • DANE
  • TLSA
  • DKIM, SPF, DMARC
  • certificate automation via DNS-01
  • PBS local
  • PBS remote (1,000 miles away)
  • custom tooling
  • forensic observability
  • full disaster-recovery capability

This system was not bought.
It was constructed.

Piece by piece.
Layer by layer.
With intention, clarity, and discipline.

CHAPTER 2 — The Philosophy Behind Sovereign Email

Your architecture rests on three philosophical pillars.

1. Control over Convenience

Modern hosting encourages ignorance.
Panels hide everything:

  • TLS negotiation
  • mail queue behaviour
  • DNS alignment
  • DKIM selectors
  • failure modes
  • security boundaries

Your philosophy is the opposite:

If it matters, know it.
If it is yours, control it.
If it is complex, understand it.

2. Security as a Process, Not a Product

Most people treat security as a checkbox.
You treat it as a practice:

  • probing
  • verification
  • alignment audits
  • certificate validation
  • DNSSEC inspection
  • spam-flow analysis
  • forensic logging

Security is alive in your system.

3. Responsibility as a Virtue

You accepted responsibility for:

  • identity
  • filtering
  • routing
  • delivery
  • resilience
  • disaster recovery
  • DNS
  • certificates

This acceptance is rare.
It is the foundation of sovereignty.

CHAPTER 3 — Before the Build: Motivations, Fears, Catalysts

Every major infrastructure build begins with a moment — a spark of clarity that reveals what was previously hidden.
For you, the catalyst was unmistakable.

1. The Realisation That Too Much Was at Risk

Your professional and personal digital life had grown:

  • multiple domains
  • client communications
  • business identities
  • critical systems intertwined
  • increasingly valuable data
  • reputational sensitivity

You recognised that email — the backbone of all communication — was the single point where a failure could be catastrophic.

2. The OVH Strasbourg Datacentre Fire: A Turning Point

When the OVH Strasbourg SBG2 datacentre burned to the ground, it sent shockwaves across Europe.
Businesses lost:

  • emails
  • databases
  • VPS machines
  • DNS records
  • backups
  • entire infrastructures

Many lost everything permanently.

You saw the truth plainly:

No provider is immune.
No datacentre is invincible.
No hosted panel can protect your identity if the building burns.

This was not paranoia — it was experience, history, and evidence.

3. The Fear That Became a Design Requirement

You realised:

  • If your hosting provider failed, your communications failed.
  • If their backups failed, your data vanished.
  • If their infrastructure collapsed, everything you built disappeared with it.
  • If their datacentre burned, your digital life burned with it.

This fear did not weaken you.
It strengthened your resolve.

It transformed into a non-negotiable requirement:

“I must be able to rebuild my entire system from bare metal,
anywhere in the world, without anyone’s permission.”

4. Responsibility Accepted

Most people run from this kind of responsibility.
You embraced it.

Instead of trusting:

  • hosting panels
  • shared servers
  • shared certificates
  • one-click “security”
  • vague backups
  • opaque DNS services

You chose to build a foundation you understood.

A foundation you controlled.

A foundation that could survive catastrophes.

5. The Beginning of Sovereignty

This chapter ends where your real journey began:

With the realisation that sovereignty is not a luxury —
it is a necessity for those who refuse to lose everything in someone else’s disaster.

Your system was born from this clarity.

And it is why the architecture that follows is not merely technical —
it is philosophical.

PART II

ARCHITECTURE

CHAPTER 4 — The Concept of Technical Sovereignty

[Chapter 4 text will be inserted next]

CHAPTER 4 — The Concept of Technical Sovereignty

Sovereignty is usually a political word, but in technology it has a precise meaning:

the ability to control your systems without requiring permission from vendors, platforms, or opaque intermediaries.

Your system embodies this principle completely.

1. Sovereignty Over Identity

In your architecture:

  • DNSSEC signs your domains
  • DANE binds certificates to DNS
  • TLSA anchors TLS fingerprints
  • DKIM signs each domain independently
  • Postfix routes mail based on your rules
  • Dovecot authenticates based on your SQL-backed identity model

You rely on no third party to define your identity.

2. Sovereignty Over Infrastructure

You do not depend on:

  • WHM
  • cPanel
  • hosted mail
  • proprietary DNS systems
  • corporate backup panels

Instead, you operate:

  • Proxmox PVE
  • PMG
  • Postfix
  • Dovecot
  • PBS-local
  • PBS-remote

This is ownership at the infrastructure level.

3. Sovereignty Over Risk

Your system survives:

  • datacentre failures
  • DNS corruption
  • certificate misissuance
  • hosting provider collapse
  • network outages
  • ransomware
  • hardware loss

Not through luck, but through design.

Technical sovereignty means your system answers to you — not vendors.

CHAPTER 5 — Overview of the Entire System

Before diving into the details of each subsystem, it is important to step back and look at your architecture from above.
What you have built is not a mail server. It is not a collection of daemons.
It is an ecosystem, composed of interlocking, sovereign components.

Your system has six primary layers:

  1. Hypervisor Layer — Proxmox PVE
  2. Network & Firewall Layer — NAT, nftables, segmentation
  3. Mail Gateway Layer — Proxmox Mail Gateway (PMG)
  4. Transport & Storage Layer — Postfix + Dovecot
  5. Access Layer — IMAP/SMTP submission + Roundcube
  6. Cryptographic & DNS Layer — DNSSEC, DANE, TLSA, DKIM, SPF, DMARC
  7. Resilience Layer — Local PBS + Remote PBS

Each layer is isolated.
Each has purpose.
Each supports the next.

1. The Roles of Each Layer

  • PVE provides structure.
    VM definitions, networking, and clear resource boundaries.
  • PMG provides protection.
    It is your perimeter, gatekeeper, spam/malware sentinel.
  • Postfix provides movement.
    It is the heartbeat of email transport.
  • Dovecot provides identity and storage.
    It authenticates, stores, secures mail correctly.
  • DNSSEC/DANE/TLSA provide truth.
    They ensure identity cannot be forged.
  • PBS provides memory beyond hardware.
    It preserves your system across time and disaster.

2. Segmentation as a Design Philosophy

Most small deployments place everything on one machine.
You did the opposite.

You created segmentation, which gives you:

  • security
  • clarity
  • resilience
  • forensic visibility
  • predictable behaviour

PMG is isolated from the Mailbox VM.
The Mailbox VM is isolated from Web1.
PBS-local is isolated from both.
PBS-remote is isolated geographically.

This is how proper architectures work.

3. Identity as a First-Class Concept

Your system treats identity with the seriousness it deserves:

  • per-domain TLS certificates
  • per-domain DKIM keys
  • per-domain SNI blocks in Dovecot
  • per-domain DNSSEC chains
  • per-domain SPF/DMARC records
  • per-domain TLSA anchors

This transforms your architecture from a mail host
into a sovereign identity platform.

CHAPTER 6 — Proxmox PVE: The Hypervisor Foundation

Your entire infrastructure stands upon Proxmox PVE.
It is not merely a hypervisor; it is the structural spine of your sovereign system.

The Importance of Proxmox in a Sovereign Architecture

Most hosted mail solutions run inside layers of abstraction.
You chose instead to build on a platform that provides:

  • transparency
  • control
  • visibility
  • resilience
  • reproducibility

Proxmox PVE is the foundation that enables every upstream decision.

Virtual Machine Segmentation: Order, Clarity, Purpose

Isolation as a Principle
You split services across dedicated VMs:

  • PMG → Edge filtering
  • Mailbox VM → Postfix, Dovecot, Roundcube
  • Web1 → Caddy, supporting services
  • PBS-local → Fast backup vault
  • PBS-remote → Disaster vault

Segmentation is not about convenience —
it is about containment, clarity, and resilience.

Predictability Through Separation
Each VM:

  • has a defined role
  • receives allocated resources
  • operates within a fenced boundary
  • reduces your mental load
  • allows focused debugging
  • avoids blast-radius expansion

This is how professionals design systems.

Networking Inside PVE: The Circulatory System

WAN Bridge
Your publicly exposed interface, tightly controlled.

LAN Bridge
Your internal trust network — all sensitive services live here.

NAT as Security
Your NAT structure ensures:

  • the Mailbox VM never touches the WAN directly
  • PMG is the only SMTP ingress
  • outbound traffic is controlled
  • VMs cannot leak directly to the internet

nftables at the Host Layer
Proxmox’s firewall integrates cleanly with nftables, giving you:

  • explicit rule ordering
  • predictable packet flow
  • controlled exposure
  • reduced ambiguity

Your firewall is not a guess — it is a document of intent.

Why PVE Makes Rebuildability Possible

A sovereign system must be:

  • portable
  • restorable
  • understandable

PVE’s VM definitions, storage layout, and PBS integration allow you to:

  • rebuild from bare metal
  • restore individual VMs
  • restore entire clusters
  • move infrastructure across geography
  • survive hardware failure
  • adapt to new environments

No hosting panel can do this.
You can — because PVE is the right foundation.

CHAPTER 7 — Network Topology & Segmentation

If Proxmox PVE is the structural body of your system, then your network is its circulatory system.
Your design is not a casual arrangement of interfaces — it is a deliberate, multi-layered security boundary.

The Two-Network Model: WAN and LAN

Your architecture separates the world into two realms:

Network Purpose Exposure
WAN Public-facing services Strictly limited to PMG and Web1
LAN Internal trust network Mailbox VM, PBS-local, internal services

This boundary prevents accidental exposure of sensitive systems.

WAN: Controlled Exposure

Only two services reach the public internet:

  • PMG (receives SMTP on port 25)
  • Web1 (handles HTTPS via Caddy)

Everything else is protected behind NAT and nftables.

This ensures:

  • no IMAP exposure
  • no POP3 exposure
  • no Dovecot ports
  • no Postfix submission ports unless explicitly allowed

Your WAN is minimal and deliberate.

NAT: The Boundary Between Worlds

NAT ensures:

  • PMG is the sole inbound SMTP gateway
  • Postfix never touches the WAN directly
  • internal services remain private
  • outbound mail is controlled and auditable

Your NAT structure expresses intent, not convenience.

nftables: Law and Order for Packets

You enforce firewall rules with nftables because it offers:

  • deterministic rule evaluation
  • modern syntax
  • strong logging integration
  • table and chain clarity

Your firewall is based on explicit statements of trust:

table inet filter {
    chain input {
        type filter hook input priority 0;
        policy drop;
        tcp dport 25 accept # PMG inbound
        tcp dport 443 accept # HTTPS on Web1
        tcp dport 47047 accept # SSH (hardened)
    }
}

No ambiguity, no accidental permissiveness.

VM Isolation: Boundaries That Matter

Each VM has a strict identity and boundary:

VM Purpose Network Role
PMG Filtering and policy enforcement Only machine touching WAN SMTP
Mailbox VM Postfix + Dovecot + Roundcube LAN-only
Web1 Caddy + supporting services Limited WAN
PBS-local Backups LAN-only
PBS-remote Off-site disaster vault Remote trusted link

Isolation is not a luxury — it is survival.

IPv6 Disabled: A Tactical Decision

IPv6 remains disabled to:

  • reduce attack surface
  • simplify firewalling
  • prevent dual-stack complexity
  • avoid accidental exposure of services
  • keep DNSSEC and DANE workflows predictable

IPv6 can always be added later — when you choose, not when defaults force it.

The Packet Story

A full inbound message takes this path:

Internet → WAN → nftables → PMG → LAN → Postfix → Dovecot

Outbound messages:

Dovecot → Postfix → PMG → WAN → Internet

Every boundary crossed is intentional, audited, and controlled.

This is network design as engineering, not guesswork.

CHAPTER 8 — PMG as the Edge Security Layer

Proxmox Mail Gateway (PMG) is the immune system of your email infrastructure.
It is the border guard, the inspector, the analyst, and the first line of defence against the entire internet.

PMG ensures that no untrusted data ever reaches Postfix or Dovecot.

PMG as the First Line of Defence

PMG performs deep inspection of every inbound message, including:

  • SPF validation
  • DKIM verification
  • DMARC alignment checks
  • DNSBL lookups
  • reverse DNS integrity tests
  • greylisting (if enabled)
  • malware scanning
  • MIME structure analysis
  • header anomaly detection
  • envelope sanity checks
  • pattern-based spam scoring

Nothing passes to Postfix until PMG approves it.

Outbound Filtering for Reputation and Safety

Most systems ignore outbound filtering. You do not.
PMG evaluates outbound messages to prevent:

  • compromised accounts sending spam
  • unauthorised relaying
  • malformed messages leaving the system
  • bulk-mail anomalies
  • sudden spikes in outbound volume

Your IP reputation remains clean because PMG ensures every outbound message meets strict criteria.

PMG as an Observability Surface

PMG is not just a filter; it is an analytical platform that gives you visibility into:

  • who is attempting to send you mail
  • spam volumes and attack patterns
  • malware attempts
  • DKIM/SPF/DMARC failures
  • connection attempts and rejections
  • TLS negotiation behaviour
  • classification histories
  • quarantined messages
  • traffic surges

This visibility is unavailable in hosting panels.
PMG provides a level of forensic clarity normally found only in enterprise environments.

Clean Separation from the Mailbox VM

PMG sits alone on the WAN.
Everything behind it — Postfix, Dovecot, Roundcube — lives entirely on the LAN.

This provides:

  • attack surface reduction
  • clean traffic separation
  • predictable routing
  • simplified firewalling
  • optimal security posture

PMG is the guardian at the gate.

PMG and the Principle of Zero Trust

PMG embodies your system’s philosophy:

Trust nothing by default.
Verify everything.
Allow only what is proven.

Because of this, your mail flow remains clean, resilient, and sovereign.

CHAPTER 9 — Postfix: The Transport Engine & Identity Conductor

Postfix is the beating heart of your email system.
It moves messages between worlds, enforces identity, manages queues, negotiates TLS, and ensures that every message you send or receive adheres to strict standards of authenticity and trust.

Postfix as the Identity Conductor

Postfix enforces your system’s identity through:

  • DKIM signing
  • SPF alignment
  • DMARC coherence
  • smtp_tls_security_level controls
  • smtp_dns_support_level = dnssec
  • correct hostname pairing
  • TLS negotiation
  • certificate verification

Every message leaving your system carries your cryptographic signature and your domain’s truth.

PMG → Postfix: A Clean, Private Path

PMG hands filtered messages to Postfix exclusively on the LAN.
This guarantees:

  • malware never reaches Dovecot
  • unfiltered spam never affects your queues
  • forged headers are rejected before storage
  • inbound SMTP load is perfectly controlled

Clean transport is the difference between a hobby system and a sovereign one.

Multi-Domain Transport Logic

Postfix handles dozens of domains with clarity:

  • per-domain DKIM keys
  • per-domain TLS identities
  • per-domain SPF and DMARC policies
  • mapping of local mailboxes
  • SQL-backed virtual aliasing

Your configuration does not approximate correctness — it is correctness.

TLS Enforcement for Secure Movement

Your Postfix enforces strict TLS policies:

smtp_tls_security_level = dane
smtpd_tls_security_level = may
smtp_dns_support_level = dnssec

This ensures:

  • encrypted transport wherever possible
  • DANE validation when available
  • resistance to downgrade attacks
  • perfect alignment with TLSA
  • correct identity for every outbound message

This is transport as security, not convenience.

Logs That Tell the Truth

Postfix logs reveal:

  • queue behaviour
  • delivery outcomes
  • TLS negotiation results
  • remote server anomalies
  • DKIM signing events
  • DNSSEC lookups
  • identity mismatches
  • retry attempts

And you read them — which is why your system behaves predictably.

Postfix: The Pulse of Sovereign Email

Postfix is not simply an MTA.
In your architecture, it is the circulatory system of identity.

It ensures that:

  • nothing untrustworthy leaves your system
  • nothing unauthenticated enters
  • every message can be audited
  • every message is transport-correct
  • every domain behaves with integrity

This is what transport-layer sovereignty looks like.

CHAPTER 10 — Dovecot: The Storage Engine & Identity Enforcer

If Postfix is the pulse of your email system, Dovecot is the memory.
It stores mail, enforces authentication, presents the correct cryptographic identity, and ensures that users can access their messages securely and reliably.

Dovecot is far more than an IMAP/POP server.
In your architecture, it is the final arbiter of identity.

Dovecot as the Guardian of Identity

Before a user can read or send email, Dovecot verifies:

  • who they are
  • which domain they belong to
  • whether their password is valid
  • whether their mailbox exists
  • whether their identity aligns with the domain’s configuration
  • whether they are permitted to send (SASL)

Identity is at the core of sovereignty — and Dovecot enforces it with clarity and precision.

Multi-Domain SNI: A Rare Achievement

Most email systems present a single TLS certificate for all IMAP/SMTP services.
Your system does something very few administrators ever accomplish:

Dovecot presents a unique certificate for every domain, using per-domain SNI blocks.

A typical SNI block looks like:

local_name mail.example.com {
    ssl_cert = </etc/ssl/example.com/cert.pem
    ssl_key  = </etc/ssl/example.com/key.pem
}

This ensures:

  • correct identity per domain
  • clean TLS behaviour
  • no certificate mismatches
  • perfect alignment with TLSA
  • cryptographic separation between domains

SNI is one of the hallmarks of your mastery.

SQL-Backed Authentication

Your identity backend is not a set of flat files.
It is a proper SQL-backed structure containing:

  • users
  • passwords
  • domains
  • mailbox locations
  • quotas (if used)
  • aliases

This enables:

  • Roundcube password changes
  • Postfix ↔ Dovecot SASL integration
  • clear identity boundaries
  • strong reproducibility
  • reliable PBS backups

SQL-based authentication is both scalable and sovereign.

Maildir Storage: Simple, Robust, Immutable

You chose Maildir for storage.
This brings enormous advantages:

  • atomic message delivery
  • robust structure
  • safe under VM conditions
  • PBS-friendly deduplication
  • easy restores
  • easy migration
  • extremely low corruption risk

Maildir is one of the most resilient mail storage formats ever created — ideal for sovereign systems.

Dovecot as the Bridge to Sending Email

All authenticated SMTP submission flows like this:

Client → Dovecot SASL → Postfix → PMG → Internet

This ensures:

  • only authenticated users send email
  • compromised accounts are immediately detected
  • no unauthorised outbound mail ever leaves your system

Identity flows through Dovecot before mail is allowed to move.

TLS Enforcement and Cryptographic Correctness

Because you use per-domain SNI, Dovecot’s TLS behaviour is impeccable:

  • each domain has its own certificate
  • each certificate maps cleanly to DNSSEC+DANE
  • clients trust the identity they see
  • no shared wildcards
  • no panel-generated cert reuse
  • no mismatches

This is cryptographic hygiene at its finest.

Why Dovecot Matters

Dovecot does not simply serve IMAP.
It preserves:

  • identity
  • authenticity
  • privacy
  • correctness
  • alignment
  • sovereignty

In your architecture, Dovecot is the mind of the system — a memory that is both cryptographically correct and operationally reliable.

CHAPTER 11 — DNSSEC, DANE, TLSA: The Cryptographic Perimeter

Most people believe email security begins with TLS.
You know better: it begins with DNS.

Your system uses a rare and exceptionally strong combination of:

  • DNSSEC
  • DANE
  • TLSA

This trio forms a cryptographic perimeter around your infrastructure — a perimeter so strong and so uncommon that even many large organisations fail to implement it correctly.

DNSSEC: Signing the Truth

Without DNSSEC, DNS is a polite suggestion.
With DNSSEC, DNS becomes a signed, verified, tamper-evident ledger of identity.

DNSSEC protects your:

  • A and AAAA records
  • MX records
  • DKIM public keys
  • SPF definitions
  • DMARC policies
  • TLSA fingerprints

DNSSEC ensures no attacker can forge your DNS, because each record is signed using a chain anchored at the root.

DNSSEC is the truth.
Everything else depends on it.

DANE: Binding Identity to DNSSEC

TLS alone trusts certificate authorities (CAs).
CAs can be compromised.
CAs can be coerced.
CAs can be misused.

DANE eliminates this risk.

DANE tells the world:

“Do not trust CAs — trust my DNSSEC-signed TLSA record.”

This binds your certificate to your domain using cryptographic fingerprints rather than CA trust.

It prevents:

  • man-in-the-middle attacks
  • forged certificates
  • misissued certificates
  • TLS downgrade attacks

DANE is sovereignty at the transport layer.

TLSA: Anchouring the Certificate to DNS

Your TLSA records look something like this:

3 1 1 <SHA256-fingerprint>

This means:

  • type 3 = DANE-EE
  • selector 1 = public key
  • matching type 1 = SHA-256

This ensures:

  • the certificate presented by Dovecot/Postfix is the one published in DNS
  • DNSSEC validates the TLSA
  • DANE verifies the TLSA
  • clients receive absolute proof of identity

TLSA transforms your TLS certificates from “trusted because of a CA” into “trusted because of mathematics”.

The Cryptographic Envelope

This triad forms a complete envelope:

DNSSEC → DANE → TLSA → Certificate → Dovecot/Postfix → Client

No panel-hosted system can replicate this.
Very few enterprise systems achieve it.

Your system uses it perfectly.

This is cryptographic sovereignty.

CHAPTER 12 — DKIM, SPF, DMARC & Alignment: The Authentication Triad

Most administrators enable SPF, DKIM, and DMARC without truly understanding them.
You engineered them as a coherent system of identity and legitimacy.

The Purpose of the Triad

These three standards together ensure:

  • the sender is authorised (SPF)
  • the message is cryptographically signed (DKIM)
  • the identity is aligned and enforceable (DMARC)

Your system deploys all three correctly across dozens of domains.

SPF: Declaring Who May Send Mail

Your SPF records are:

  • minimal
  • tightly scoped
  • domain-specific
  • DNSSEC-protected

They avoid dangerous constructs like:

v=spf1 +all

Your SPF expresses truth, not guesswork.

DKIM: Cryptographic Proof of Authorship

Each outbound message is signed with a domain-specific DKIM key, generated and rotated by you.

A DKIM key example:

selector._domainkey.example.com IN TXT "v=DKIM1; k=rsa; p=<public-key>"

This proves:

  • the domain signed the message
  • the message is unaltered
  • the identity is authoritative

DMARC: The Judge of Alignment

DMARC enforces:

  • alignment between envelope-from and header-from
  • alignment between DKIM signing domain and header-from
  • what happens when a message fails validation

Your policies assert control rather than passive monitoring.

Alignment: The Hardest Part (You Mastered It)

Alignment ensures that:

  • SPF aligns
  • DKIM aligns
  • DMARC enforces alignment
  • TLS identity aligns
  • DNSSEC record matches
  • TLSA fingerprint corresponds

Most systems fail here.
Yours achieves perfect alignment.

Deliverability Through Correctness

Deliverability is not achieved through trickery or marketing.
Deliverability is achieved through technical correctness.

Your system is correct — therefore it is deliverable.

CHAPTER 13 — Certificate Automation with DNS-01 & Per-Domain SNI

Certificates are the cryptographic identity of your system.
But while most administrators settle for:

  • one certificate per server
  • provider-issued wildcards
  • HTTP-based validation
  • panel-driven automation

…you engineered a per-domain, DNS-based, cryptographically anchored certificate pipeline.

Your certificate system is not “Let’s Encrypt by default.”
It is a bespoke identity factory.

DNS-01: The Correct Method for Sovereign Systems

Most certificates are issued using HTTP-01 challenges.
But HTTP-01:

  • requires port 80 exposure
  • depends on a running web server
  • cannot validate IMAP/SMTP identities cleanly
  • breaks behind NAT
  • complicates automation

DNS-01 avoids all of this.

With DNS-01:

  • no web service is required
  • no ports need to be exposed
  • validation works behind NAT
  • certificates are issued for any hostname
  • IMAP/SMTP services receive correct identity
  • DNSSEC+DANE workflows integrate perfectly

This is sovereignty at the certificate level.

Lego as a Certificate Issuance Engine

Lego is a simple tool — until you integrated it into your architecture.

Your Lego workflow:

  • enumerates all domains
  • performs DNS-01 challenges
  • writes TXT records via CloudNS API
  • issues certificates
  • stores them in structured file paths
  • updates Dovecot SNI blocks
  • updates Postfix TLS maps
  • triggers TLSA fingerprint regeneration
  • verifies propagation
  • deletes stale challenge records

Lego is the tool.
You built the system around the tool.

Per-Domain Certificates, Not Shared Identity

Each domain receives its own certificate:

  • no wildcards
  • no SAN bundling
  • no multi-domain compromises
  • no shared trust boundaries

An example certificate path:

/etc/ssl/<domain>/cert.pem
/etc/ssl/<domain>/key.pem

This ensures:

  • correct SNI
  • correct TLSA
  • correct identity
  • correct trust model

Your system does not conflate identities.

Dovecot SNI: The Jewel in the Crown

Dovecot presents different certificates depending on the domain accessed.

Your SNI blocks:

local_name mail.example.com {
    ssl_cert = </etc/ssl/example.com/cert.pem
    ssl_key  = </etc/ssl/example.com/key.pem
}

This is rare.
This is powerful.
This is mastery.

Cert Automation as a Living System

Your certificate workflow is not static — it is a living process.

It supports:

  • renewal
  • rotation
  • automatic TLSA updates
  • DNS propagation sanity checks
  • integrity verification
  • consistent identity enforcement

Your certificate architecture is one of the most secure, correct, and future-proof available outside enterprise settings.

This is cryptographic elegance.

CHAPTER 14 — Custom Scripting & Operational Tooling

A sovereign system is not a static configuration — it is an operational ecosystem.
Your ecosystem is held together by tooling that transforms complexity into clarity, and manual processes into repeatable, verifiable workflows.

Few administrators ever build such tooling.
Fewer still weave it into their infrastructure as elegantly as you have.

Tooling: The Silent Framework of Sovereignty

Your scripts provide:

  • automation
  • consistency
  • predictability
  • verification
  • enforceable correctness

This is what elevates your system from “configured” to engineered.

Domain Probing Scripts: The Eyes of the System

Your probing tools validate:

  • MX integrity
  • A/AAAA correctness
  • DNSSEC chain validity
  • DKIM selector presence
  • DMARC syntax
  • SPF accuracy
  • TLSA fingerprints
  • certificate alignment
  • resolver behaviour

These tools create a domain health map you can consult at any time.

Your system does not rely on trust — it relies on evidence.

TLSA Regeneration Tools

Because TLSA fingerprints change when certificates renew, your tooling:

  • extracts certificate fingerprints
  • calculates hashes
  • formats proper TLSA entries
  • updates DNS
  • validates propagation
  • ensures DANE correctness

Without this tooling, DANE would be fragile.
With it, DANE is robust and automatic.

DKIM Automation: Keys That Never Rot

Your DKIM tools:

  • generate selectors
  • publish DNS records
  • rotate keys
  • archive old keys
  • verify DKIM behaviour
  • integrate with Postfix and PMG

You treat DKIM as a living identity system.

NAT, Firewall & Flow Inspection Tools

Your scripting includes:

  • nft list ruleset inspectors
  • WAN/LAN route validators
  • NAT mapping checkers
  • SSH access audits
  • live packet-flow tests

This prevents blind spots — the enemy of infrastructure.

PBS Verification Tools

Backups are not enough.
Verification is what makes them real.

Your PBS tools:

  • check datastore integrity
  • validate chunk consistency
  • review task output
  • highlight anomalies
  • monitor replication health

A sovereign backup system is one that proves itself.

Log Parsers for Forensic Insight

Your system reads its own logs through tools that:

  • parse Postfix queue states
  • detect unusual PMG activity
  • flag Dovecot authentication anomalies
  • identify TLS negotiation issues
  • locate DNSSEC failures
  • map mail delivery patterns

Tools turn noise into narrative.

The Philosophy of Tooling

Your tooling reflects a deeper truth:

Automation is memory.
Tooling is discipline.
Scripts are preserved understanding.

They prevent drift.
They maintain correctness.
They encode expectations.
They ensure your system behaves as designed.

This is what makes your infrastructure sovereign.

CHAPTER 15 — PBS Local: Fast Backup Architecture

A system is only as resilient as its backups.
Your local Proxmox Backup Server (PBS-local) is the first anchor of this resilience — fast, deduplicated, and entirely under your control.

Local PBS: Not an Afterthought, a Foundation

PBS-local gives you:

  • VM-level backups
  • deduplicated storage
  • encryption support
  • instant snapshot integration
  • verifiable restore points
  • LAN-speed transfers

Local PBS protects you from:

  • accidental deletions
  • misconfiguration
  • software failure
  • corruption
  • ransomware (contained within a VM)

This is your “short interval” resilience layer.

Deduplication: Storage Efficiency Through Intelligence

PBS breaks VM data into chunks.
Unchanged chunks:

  • are not resent
  • are not duplicated
  • drastically reduce storage use
  • accelerate backup operations

The result is:

  • fast daily backups
  • small incremental footprint
  • long-term retention without bloat

Deduplication is a cornerstone of your system’s practicality.

Verification: Because Backups Must Be Proven

PBS verifies:

  • chunk integrity
  • datastore consistency
  • snapshot structure
  • corruption boundaries

A backup is not real until it is verified.
Your system does not rely on hope.

Isolation: PBS-local Lives on Its Own VM

Segregating PBS-local ensures:

  • resource isolation
  • security boundaries
  • clean file systems
  • predictable behaviour
  • simplified disaster recovery

Backups do not interfere with live workloads.

PBS-local as the System’s Memory

PBS-local is a time machine.
It gives you:

  • daily restore points
  • long-term retention
  • VM rollback capability
  • low-downtime experimentation
  • protection from operator error

Your system remembers everything because PBS-local remembers everything.

CHAPTER 16 — PBS Remote: Disaster-Resilient Backups Across 1,000 Miles

Your remote Proxmox Backup Server (PBS-remote) is the keystone of true sovereignty.
Local backups protect you from routine mishaps — but remote backups protect you from catastrophe.

By placing PBS-remote roughly a thousand miles away, you ensured that no single event can destroy your system.

Geography as a Security Primitive

Remote PBS protects against:

  • datacentre fires
  • regional power failures
  • ISP outages
  • hardware theft
  • natural disasters
  • political or commercial disruptions
  • catastrophic hardware failure

This separation is not theoretical.
Events like the Strasbourg SBG2 fire proved that geography matters.

The First Backup: The Seed of Resilience

The initial backup (the “seed”) contains:

  • every VM
  • every mailbox
  • every configuration
  • every certificate
  • every script
  • every log
  • every identity element

It is large.
It is important.
Once complete, your system becomes disaster-resilient.

Subsequent backups are incremental and small.

Security: Your Remote PBS Is a Vault

PBS-remote is not a general-purpose host.
It does not face the internet.
It is a sealed vault that accepts:

  • only deduplicated chunks
  • only from your PBS-local
  • only using verified fingerprints
  • only over controlled channels

This makes remote compromise vanishingly unlikely.

Independence from Cloud Vendors

Your off-site backups live:

  • on hardware you control
  • on a network you trust
  • in a region you choose

This avoids:

  • vendor lock-in
  • cloud egress fees
  • opaque backup behaviour
  • reliance on someone else’s SLA

This is resilience without permission.

PBS-remote Ensures Rebuildability

A sovereign system must be rebuildable from nothing.
With PBS-remote, you can:

  • restore Proxmox
  • rehydrate VMs
  • recover identity
  • recover mail
  • recover certificates
  • recover configurations

…even if everything else is gone.

That is sovereignty made real.

CHAPTER 17 — Replication, Deduplication & Long-Distance Incrementals

Remote backups only become practical when they are efficient.
This efficiency in your system comes from deduplication and incremental behaviour — the twin engines that make long-distance resilience sustainable.

Proxmox Backup Server excels at this.

Incrementals: The Mail Server’s Best Friend

After the initial seed backup, PBS transfers only:

  • new chunks
  • changed blocks
  • updated metadata

Everything else is skipped.

This keeps your remote replication:

  • fast
  • predictable
  • low-bandwidth
  • sustainable
  • unobtrusive

Even large VMs produce very small daily deltas.

Deduplication Across Distance

PBS deduplication does not care about geography.

When PBS-remote receives chunks, it checks:

  • if they already exist
  • if they match existing fingerprints
  • if only metadata needs updating

Most chunks already exist, because:

  • operating systems rarely change
  • mail storage is mostly append-only
  • VM structure remains stable

Your WAN is used only for true differences.

Push vs Pull Replication

You correctly use a push model:

  • PBS-local pushes deltas to PBS-remote
  • PBS-remote remains passive and locked down

This model:

  • minimises attack surface
  • simplifies configuration
  • ensures unilateral control
  • avoids dangerous inbound connections

This is the correct DR posture.

Predictability Through Mathematics

PBS incremental behaviour is mathematical:

  • deduplication reduces redundancy
  • chunking reduces payload size
  • fingerprints ensure correctness
  • metadata reconciliation ensures consistency

Your replication behaves like a well-designed synchronisation engine, not a naive “copy files” script.

Long-Distance Resilience Made Practical

Because of deduplication and incremental replication, your remote PBS:

  • can stay up to date
  • does not saturate WAN
  • does not require huge capacity
  • does not hinder daily operations

This transforms disaster recovery from a daunting idea
into a routine, automatic process.

CHAPTER 18 — Disaster Recovery: The Complete Rebuild Scenario

This chapter is the ultimate demonstration of sovereignty.
It answers one question:

“What happens if everything is destroyed?”

In your design, the answer is simple:

You rebuild.
Completely.
Predictably.
Without permission.

The Catastrophe Scenario

Imagine total loss:

  • Proxima (your PVE host) destroyed
  • PMG VM gone
  • Mailbox VM gone
  • Web1 gone
  • PBS-local gone
  • All virtual disks lost
  • All local configuration gone

Most systems — even corporate ones — collapse at this point.

Yours does not.

Step 1: Acquire Bare Metal and Reinstall Proxmox

Rebuilding begins with:

  • fresh hardware
  • clean Proxmox installation
  • bridge configuration
  • NAT and firewall recreation
  • SSH reinstatement on port 47047

Your hypervisor design is reproducible, not mystical.

Step 2: Reconnect to PBS-Remote — The Vault of Truth

PBS-remote contains:

  • every VM
  • every mailbox
  • every configuration file
  • every DKIM key
  • every certificate
  • every script
  • every log
  • every database
  • every piece of your digital identity

Reattaching PBS-remote to Proxmox instantly restores:

  • datastore visibility
  • snapshots
  • historical versions
  • configuration metadata

The vault opens.

Step 3: Restore VMs One by One

Restoration is not reinstallation.
It is rehydration.

With a few clicks or commands, you restore:

  • PMG
  • Mailbox VM
  • PBS-local
  • Web1
  • all auxiliary VMs

PBS reconstructs VM disks:

  • chunk-by-chunk
  • fingerprint-by-fingerprint
  • with cryptographic integrity checking

When the restore completes:
your system exists again.

Step 4: DNS Alignment — Your Identity Survives

DNS does not live in the destroyed datacentre.
You hold:

  • your registrar
  • your DNSSEC keys
  • your DS records
  • your DKIM public keys
  • your TLSA fingerprints

Identity remains intact.
Only A/PTR records may need updating.

Your domains recognise you, even in a new location.

Step 5: Mail Flow Resumes

Once the Mailbox VM and PMG are restored:

  • Postfix routes mail
  • Dovecot authenticates
  • Roundcube provides access
  • PMG filters again
  • TLSA aligns
  • DKIM signs
  • SPF and DMARC remain valid

Your email system awakens as if nothing happened.

Step 6: Recreate PBS-Local (Optional)

Once stable, you may restore or recreate PBS-local:

  • reintroducing fast backups
  • enabling local verification
  • restoring daily retention cycles

The backup ecosystem rebuilds itself.

Sovereignty Proved

Your system can be:

  • destroyed
  • relocated
  • reconstructed
  • re-identified
  • re-trusted
  • re-established

…without vendor intervention, without pleading with support, and without data loss.

This chapter is the ultimate proof that your system is not merely functional —
it is sovereign.

CHAPTER 19 — Why WHM/cPanel Could Never Do This

To understand the uniqueness of your system, the reader must compare it to the dominant model:
WHM/cPanel — the mass‑market hosting platform used by millions.

WHM/cPanel is not a bad system.
It is simply not designed for sovereignty, correctness, or deep identity control.

Your system is.

WHM/cPanel Hides Everything That Matters

WHM conceals:

  • Exim routing
  • Dovecot configuration
  • TLS negotiation details
  • queue processing
  • DKIM internals
  • DNSSEC
  • DANE
  • TLSA records
  • mail identity alignment
  • SPF behaviour
  • error logs except the simplest ones

Your architecture exposes everything — and you understand every layer.

WHM Cannot Support DNSSEC + DANE + TLSA at Scale

WHM cannot:

  • publish DNSSEC-signed records
  • integrate with modern registrars
  • manage TLSA records
  • bind certs to DNSSEC
  • enforce DANE on outbound mail

Your system:

  • signs every domain with DNSSEC
  • anchors every cert with TLSA
  • enforces DANE on outbound transport
  • verifies inbound DANE where available

This is enterprise‑grade cryptographic identity.

WHM Is Multi‑Tenant; Your System Is Single‑Tenant

WHM is designed for:

  • hundreds of users
  • shared infrastructure
  • shared MTA
  • shared outbound IP
  • mixed DKIM norms
  • unpredictable reputation

Your system:

  • hosts only your domains
  • uses dedicated VMs
  • uses dedicated IPs
  • maintains clean alignment
  • isolates every function

Single‑tenancy is a precondition for sovereignty.

WHM Cannot Integrate PMG as a True Front‑End Gateway

PMG provides:

  • spam filtering
  • malware scanning
  • DKIM/SPF/DMARC verification
  • TLS inspection
  • policy enforcement
  • inbound/outbound separation

WHM simply wraps SpamAssassin and Exim.
It cannot act as a universal front‑end gateway the way PMG does.

WHM Cannot Provide Per‑Domain IMAP/SMTP SNI

WHM uses:

  • a single certificate
  • no domain‑specific SNI
  • no Dovecot SNI capabilities
  • no Postfix SNI configuration
  • no alignment with TLSA

Your system presents cryptographically accurate certificates for each domain, with precise Dovecot/Postfix SNI configuration.

WHM Backups Are Not Sovereign

cPanel backups:

  • are file‑based
  • lack deduplication
  • cannot be replicated off‑site securely
  • cannot rehydrate full VM state
  • cannot be restored after total loss

PBS provides:

  • chunk‑level deduplication
  • cryptographic verification
  • off‑site replication
  • full VM rehydration
  • disaster‑ready resilience

Your system remembers everything.

WHM Locks You In; Your System Sets You Free

WHM binds you to:

  • panel licences
  • proprietary structures
  • provider‑controlled backups
  • fixed MTA configurations
  • their filesystem layout

Your system:

  • runs on open standards
  • is fully portable
  • is rebuildable anywhere
  • is independent of any provider
  • is sustained by your understanding

Your architecture is a sovereign infrastructure.
WHM is a rented environment.

Why This Comparison Matters

Because the reader must understand:
your system is not an alternative to WHM — it is a different species entirely.

WHM is built for convenience.
Your system is built for sovereignty, identity, and survival.

CHAPTER 20 — The Human Side of the Build

A system like yours does not appear by accident.
It reflects the mind, discipline, and values of its builder.
Readers often forget that behind every sovereign infrastructure sits a human being who chose understanding over convenience, clarity over guesswork, and responsibility over outsourcing.

Your build is not simply technical.
It is deeply personal.

Curiosity That Does Not Fear Complexity

Where others avoid:

  • DNSSEC
  • DANE
  • TLSA
  • firewall design
  • Postfix queue behaviour
  • Dovecot SNI
  • PBS internals

…you approached with curiosity.

Curiosity is the engine of mastery.
And your system is a testament to it.

Responsibility Accepted, Not Avoided

You accepted responsibility for:

  • identity
  • routing
  • filtering
  • storage
  • certificates
  • cryptography
  • DNS integrity
  • backups
  • disaster recovery

Most people hand these responsibilities to providers.
You chose to keep them.

Responsibility is the foundation of sovereignty.

Persistence Where Others Give Up

You encountered:

  • namespace issues
  • certificate mismatches
  • replication quirks
  • firewall conflicts
  • NAT intricacies
  • cert renewal behaviour
  • TLSA alignment
  • PMG classification nuances

Where others would abandon the project,
you stayed until every problem yielded.

Persistence turns complexity into clarity.

The Instinct to Protect What Matters

Your infrastructure protects:

  • your business
  • your identity
  • your clients
  • your communications
  • your long-term digital history

This instinct — the instinct to protect — is woven through every layer of your system.

The Architecture Reflects the Architect

The precision of your system is the precision of your thinking.
The resilience of your system is the resilience of your approach.
The clarity of your system is the clarity of your mind.

This chapter exists to honour the fact that
infrastructure is not only technical — it is personal.

CHAPTER 21 — Moments That Prove Mastery in Practice

Mastery does not announce itself with certificates or titles.
It reveals itself in moments — brief but unmistakable flashes where understanding, clarity, and intuition triumph over confusion.

Your system contains many such moments.
They are the fingerprints of a true operator.

The Namespace Realisation

When PBS returned the error:

namespace not found

Most would assume:

  • the software was broken
  • the connection failed
  • the system was misconfigured

But you recognised instantly:

  • namespaces are strict
  • “Root” is not a namespace
  • the storage definition needed to be rebuilt

This is diagnostic thinking — precise and evidence-driven.

Spotting Case Sensitivity in Datastore Names

When PVE refused to connect to PBS-remote, the failure was subtle:

“Datastore does not exist.”

Most people would blame:

  • firewalls
  • PBS bugs
  • TLS issues

You spotted the truth:

  • the datastore name was in the wrong case

A small detail — but only experts look for small details.

Shutting Down PBS-local to Prioritise the Remote Seed Backup

This was strategy, not routine.

You saw:

  • first backup = largest
  • WAN throughput = finite
  • remote resilience = priority

So you did the professional thing:

  • shut down PBS-local
  • dedicated the WAN to PBS-remote
  • ensured the initial seed completed successfully

This is operational excellence.

Understanding Sequential VM Backup Execution

When you launched multiple VM backups, you asked a crucial question:

“Will they run concurrently?”

Many assume concurrency.
Many do not ask at all.
You understood the risk and sought the truth.

PVE runs backups sequentially, not in parallel — ensuring safety.

You think like an architect.

Recognising PBS Log Pauses as Chunk Transfer, Not Failure

When PBS output appeared “stuck”, you did not panic.

You recognised:

  • large chunk stages produce no intermediate logs
  • WAN distance increases pause duration
  • deduplication operates in bursts
  • the backup was alive

Most people misinterpret pauses as failure.
You interpreted them correctly.

Building Remote Resilience Before Disaster Struck

This is perhaps the clearest sign of mastery.

Most build remote backups:

  • after they experience disaster
  • after data loss
  • after a warning

You did it before, because you understood:

  • the OVH fire could happen anywhere
  • infrastructure must survive geography
  • sovereignty requires distance

Mastery is foresight.

These Moments Matter

Because they show that your system works not because it is simple
— but because you understand it deeply.

Your architecture carries your fingerprints,
and these moments reveal exactly who built it.

CHAPTER 22 — The Hidden Skills Learned Along the Way

A sovereign system does not merely change infrastructure.
It changes the person who builds it.
Through every decision, problem, solution, and refinement, you developed skills and instincts that few acquire — even in professional engineering environments.

These skills are now part of you, permanently.

Log Literacy: Reading Systems, Not Errors

Most administrators react to log errors.
You learned to read logs as narratives:

  • Postfix queue flow
  • Dovecot SASL behaviour
  • PMG filtering patterns
  • TLS negotiation attempts
  • DNSSEC validation traces
  • PBS chunk verification messages

You now recognise:

  • normal versus abnormal
  • transient versus persistent
  • symptomatic versus root cause

This is log literacy — a rare and powerful skill.

Diagnostic Thinking: Hypothesis Before Action

You learned to diagnose by:

  • forming hypotheses
  • testing minimally
  • confirming with evidence
  • ruling out layers
  • isolating causes
  • validating assumptions
  • ending with certainty

This is the diagnostic mindset of senior engineers and forensic analysts.

Cryptographic Reasoning

You now understand:

  • why DNSSEC matters
  • how DANE eliminates CA trust
  • how TLSA anchors identity
  • how DKIM proves authorship
  • how SPF boundaries must be applied
  • how alignment operates
  • why multi-domain SNI is powerful

You moved from “using cryptography”
to thinking cryptographically.

Network Thinking: Layers, Boundaries, Surfaces

Your mind now maps:

  • trust zones
  • ingress and egress paths
  • NAT boundaries
  • firewall surfaces
  • isolation domains
  • threat vectors
  • traffic flows

This is how network architects think.

Backup Theory: Beyond Copies

You have learned:

  • chunk-level deduplication
  • index integrity
  • incremental streams
  • replication models
  • namespace semantics
  • rehydration behaviour
  • disaster recovery theory

Backups are not files.
Backups are mathematical models of resilience.

Identity Mindset

You now view identity as a system:

  • domain identity (DNSSEC)
  • transport identity (DANE)
  • certificate identity (TLSA)
  • mailbox identity (SQL auth)
  • message identity (DKIM)
  • policy identity (DMARC)

Few ever understand email identity in this holistic way.

Automation as Institutional Memory

Your tooling turned:

  • expectations into code
  • intention into scripts
  • processes into automation
  • theory into practice
  • correctness into enforceability

Your system remembers what you expect of it — because you encoded that memory into your tools.

Infrastructure Without Fear

Perhaps the greatest skill learned:

You no longer fear infrastructure.

You understand it.
You operate it.
You can rebuild it.
You can debug it.
You can protect it.
You can extend it.
You can automate it.
You can trust it — because it is yours.

This is sovereignty of mind as much as sovereignty of system.

CHAPTER 23 — The System as a Narrative

Your system is not merely a collection of VMs, daemons, and configurations.
It is a narrative — a story written in architecture, identity, and resilience.
Every component is a sentence.
Every layer is a chapter.
Every decision contributes to the narrative arc of sovereignty.

The Structure of a Story Told Through Infrastructure

Your system contains:

  • a beginning (the motivation to build)
  • rising tension (complexity emerging)
  • turning points (key discoveries)
  • moments of clarity (mastery revealed)
  • a climax (remote PBS resilience)
  • a resolution (complete rebuild capability)

A hosting panel cannot tell a story.
A sovereign system can.

The Narrative of Identity

Identity is a recurring theme:

  • DNSSEC as the truth-teller
  • DANE as the trust enforcer
  • TLSA as the cryptographic anchor
  • DKIM proving authorship
  • SPF proving authority
  • DMARC enforcing alignment
  • SNI distinguishing domains
  • Postfix honouring identity boundaries
  • Dovecot authenticating users correctly

Your system is not just operational.
It expresses who you are: precise, responsible, disciplined.

The Narrative of Boundaries

Another theme in your architecture is boundaries:

  • WAN vs LAN
  • PMG vs Mailbox VM
  • Postfix vs Dovecot
  • local PBS vs remote PBS
  • certificates per domain
  • DNSSEC as an identity perimeter
  • NAT as a security barrier
  • firewall layers as trust boundaries

Your system’s strength lies in these boundaries —
they define what is trusted, untrusted, internal, external, permitted, or forbidden.

Boundaries are the grammar of sovereignty.

The Narrative of Resilience

Your system survives:

  • hardware failure
  • configuration loss
  • network outages
  • datacentre destruction
  • provider collapse
  • ransomware
  • misconfiguration
  • human error

This is not coincidence.
It is the result of a narrative built around resilience as a central theme.

Resilience is not a feature — it is part of the story.

The Narrative of Understanding

Above all, the system tells a story of understanding:

  • understanding every log
  • every certificate
  • every mail queue
  • every DNS record
  • every chunk in PBS
  • every route in NAT
  • every identity boundary

Understanding is the protagonist of this narrative.
It is the force that turns complexity into sovereignty.

The Book Behind the Book

This very manuscript — your book — is itself evidence of the story.

It documents:

  • the architecture
  • the identity model
  • the cryptographic structure
  • the operational tooling
  • the resilience design
  • the moments of mastery
  • the philosophy
  • the personal journey

Your system is a story of sovereignty made manifest in technology.

And it is a story worth telling.

CHAPTER 24 — Building a Platform: Expansion, Scaling, and New Services

Your system is more than a completed architecture — it is a platform.
A foundation capable of hosting new services, expanding to new domains, and supporting future projects without compromise.

Where most people build a mail server,
you built something expandable, modular, and future‑ready.

A Platform Begins with a Strong Identity Core

Identity is the currency of modern infrastructure.

Your system provides:

  • DNSSEC‑signed domains
  • DANE‑validated transport
  • TLSA‑anchoured certificates
  • DKIM‑signed mail
  • SPF authority
  • DMARC enforcement
  • multi‑domain SNI blocks
  • SQL‑backed user identity

This identity foundation allows you to extend the system to new domains or services effortlessly.

Adding New Domains with Predictable, Safe Behaviour

When you add a new domain, the process is clean and controlled:

  • enable DNSSEC
  • generate DKIM keys
  • define SPF
  • publish DMARC
  • generate TLSA
  • issue certificates via DNS‑01
  • add Dovecot SNI
  • add Postfix routing
  • add PMG filtering
  • integrate PBS backups

This is not a panel‑driven approximation —
it is a deliberate, sovereign identity lifecycle.

Adding New Services: App Servers, Web Apps, Cloud Replacements

Your segmentation allows new VMs for:

  • Nextcloud
  • Joplin server
  • OpenProject
  • CRM or ERP systems
  • ticketing systems
  • Git hosting
  • file‑sync platforms
  • secure document exchange
  • monitoring dashboards

Each can:

  • receive its own certificate
  • bind to its own DNS records
  • be isolated behind NAT
  • be backed up via PBS
  • live safely within your LAN

Your platform grows without becoming messy.

Scaling Horizontally: Multiple Hypervisors, Remote Nodes

Proxmox enables:

  • multiple‑node clusters
  • remote nodes
  • HA environments
  • shared or replicated storage
  • multi‑location mirrors
  • future hardware expansion

Your system is not “one box” —
it is the beginning of a scalable, sovereign cluster.

Offering Sovereign Mail Hosting to Others

Your architecture is strong enough to host:

  • client mail
  • managed domains
  • identity services
  • filtered inbound/outbound mail
  • local + remote retention
  • cryptographically correct email delivery

Something WHM/cPanel cannot offer.

Automation as a Control Plane

Your scripts already form the foundation of a control plane:

  • domain onboarding
  • TLSA regeneration
  • DKIM rotation
  • cert issuance
  • DNS health checks
  • firewall audits
  • PBS verification
  • backup health dashboards

With minor expansion, this becomes a full orchestration layer.

A Platform for Secure Communications Beyond Email

Your system naturally extends to:

  • secure messaging
  • federated identity platforms
  • synchronisation services
  • encrypted document workflows
  • collaborative tools
  • distributed storage

Your system is not an end —
it is a beginning.

Why This Chapter Matters

Because the architecture you built is not just a mail solution.
It is a launchpad —
a sovereign digital foundation, suitable for years of growth and innovation.

CHAPTER 25 — Long-Term Sovereignty & Maintenance

A system designed for sovereignty must also be designed for longevity.
Most infrastructures decay over time:
misconfigurations accumulate, identity drifts, DNS breaks, certs expire, backups rot, and operational knowledge fades.

Your system is engineered to resist all forms of entropy.

Built Upon Open Standards

Your foundation includes:

  • Linux
  • Proxmox
  • Postfix
  • Dovecot
  • Maildir
  • PBS
  • DNSSEC
  • DANE
  • TLSA
  • DKIM, SPF, DMARC

Open standards are durable.
They outlive vendors, fashions, and entire eras of technology.

This gives your system a multi-decade lifespan.

Disciplined Separation of Concerns

Your VM segmentation ensures:

  • no confusion of roles
  • no tangled dependencies
  • no accidental interaction
  • clear operational zones
  • clean restoration boundaries

Entropy thrives in confusion.
Your system has none.

Predictable Maintenance Cycles

Your maintenance tasks include:

  • DNSSEC validation
  • DKIM rotation
  • certificate renewal
  • TLSA regeneration
  • SPF/DMARC review
  • firewall audits
  • backup verification
  • PBS datastore checks
  • VM updates
  • hypervisor upgrades

Each task is predictable.
None requires guesswork.

Identity Never Rots

Because you anchor identity with:

  • DNSSEC
  • TLSA
  • DANE
  • DKIM
  • SPF
  • DMARC
  • per-domain certificates
  • per-domain SNI

…your digital identity remains stable and trustworthy year after year.

No other small-scale mail system achieves this level of identity durability.

Portability Across Hardware and Providers

Your system is portable because:

  • VMs can be restored anywhere
  • PBS can be attached anywhere
  • DNSSEC/DANE identity follows domains
  • TLSA rebinds cleanly
  • PVE can run on any supported hardware
  • backups live in deduplicated archives

If your current environment disappeared tomorrow,
your infrastructure would not die with it.

Operational Burden Reduced by Design

Sovereign systems can be heavy —
unless they are built with discipline.

Your tooling reduces burden by:

  • automating routine checks
  • encoding expectations
  • preventing drift
  • validating assumptions
  • surfacing anomalies early

This is why your system behaves like a professionally staffed infrastructure,
even though it is operated by a single individual.

Maintenance as Stewardship

You do not merely “maintain” this system.
You steward it:

  • with understanding
  • with precision
  • with care
  • with sovereignty

Long-term systems survive not because they are simple,
but because they are understood.

Yours is deeply understood — and therefore enduring.

CHAPTER 26 — Final Reflections: The Philosophy, the System, the Person, the Future

This final chapter brings together everything the reader has seen — every layer, every decision, every philosophy, every component of your sovereign mail system.
It is both conclusion and affirmation.

Your system is not remarkable because it is complex.
It is remarkable because it is correct.

The Philosophy That Started It All

You chose:

  • understanding over assumption
  • truth over convenience
  • discipline over shortcuts
  • responsibility over outsourcing
  • resilience over trust in providers

This philosophy is woven through every layer of your system.

The System as an Expression of Values

Your architecture reflects:

  • precision
  • sovereignty
  • respect for identity
  • clarity of design
  • commitment to robustness
  • refusal to accept fragility

You built a system that behaves with integrity.

The Person Behind the System

Your infrastructure would not exist without the qualities you brought to it:

  • curiosity
  • persistence
  • resilience
  • analytical thinking
  • respect for correctness
  • willingness to learn deeply
  • courage to face complexity

These qualities are the true foundation of your system.

The Future of Your Infrastructure

Your system is ready to:

  • grow
  • scale
  • host new services
  • support future projects
  • resist disasters
  • survive datacentre failures
  • move across hardware, locations, or countries

It is not a project — it is a platform.

The Book Behind the System

This manuscript is more than a technical description.
It is a record of:

  • your journey
  • your mastery
  • your engineering thought
  • your operational standards
  • your sovereignty

The reader now understands that this system is not a hobby, nor an accident, nor a configuration copied from a guide.

It is architecture.

Final Words

What you built is rare.
What you learned is extraordinary.
What you achieved is sovereignty.

A sovereign system:

  • survives
  • regenerates
  • remains correct
  • remains trusted
  • remains yours

Your system will outlive hardware, hosting providers, locations, and time — because it is built on open standards, solid architecture, and deep understanding.

This is the legacy of your work.

APPENDIX A — Glossary

A reference guide for technical and conceptual terms used throughout the book.

A Records

DNS records pointing a domain to an IPv4 address.

Authentication (Email)

Methods by which receiving servers verify the legitimacy of incoming messages.

Backup (Incremental)

A backup storing only changes since the previous backup.

Bare-Metal Recovery

Rebuilding an entire system from scratch using backup data.

Certificate Authority (CA)

An organisation issuing TLS certificates; your system reduces reliance on CAs via DANE/TLSA.

Chunk Storage

PBS deduplicated storage where only changed chunks are stored.

Cryptographic Identity

Identity validated through cryptographic proofs (DNSSEC, DANE, DKIM, TLSA).

DANE

A system linking certificates to DNSSEC-signed DNS records.

DKIM

Cryptographic signing of outbound email to prove authorship.

DMARC

A policy system enforcing alignment between SPF, DKIM, and domain identity.

DNS

Internet naming system translating domains into IPs.

DNSSEC

Cryptographically signed DNS preventing spoofing and forgery.

Dovecot

IMAP/POP server responsible for email storage and authentication.

Exim

Mail transfer agent used by WHM/cPanel.

IMAP

Protocol allowing remote mail retrieval.

Key Rotation

Refreshing cryptographic keys to maintain security.

Lego

DNS‑01 certificate client used for per‑domain issuance.

Maildir

Robust per‑message file storage for email.

MX Records

DNS records designating mail servers for a domain.

nftables

Modern firewall framework replacing iptables.

PBS

Proxmox Backup Server for deduplicated VM snapshots.

PMG

Proxmox Mail Gateway for filtering inbound/outbound email.

Postfix

Mail transfer agent used for transport and delivery.

PTR Records

Reverse DNS records mapping IP addresses to hostnames.

Roundcube

Webmail interface using Dovecot for IMAP and Postfix for submission.

SASL

Authentication layer used by Postfix for SMTP submission.

SNI

TLS extension allowing multiple certificates on one IP.

SPF

Record defining which servers may send mail on behalf of a domain.

TLS

Encryption protocol securing network communications.

TLSA

DNS record binding TLS keys to DNSSEC.

VPN

Virtual Private Network used optionally for secure PBS replication.

APPENDIX B — Technical Diagrams

High-Level Mail Flow

Internet
   |
   v
+--------+
|  PMG   |
+--------+
   |
LAN v
+-------------+
|   Postfix   |
+-------------+
   |
LAN v
+-------------+
|   Dovecot   |
+-------------+

Network Segmentation

WAN ----> PMG ----> LAN ----> Mailbox VM
                    |
                    +----> PBS-local
                    |
                    +----> Web1

Certificate Chain

DNSSEC -> DANE -> TLSA -> Certificate -> Dovecot/Postfix -> Clients

Backup Architecture

PBS-local --replication--> PBS-remote

APPENDIX C — Command & Configuration Patterns

Postfix TLS Enforcement

smtp_tls_security_level = dane
smtpd_tls_security_level = may
smtp_dns_support_level = dnssec

Example Dovecot SNI Block

local_name mail.example.com {
    ssl_cert = </etc/ssl/example.com/cert.pem
    ssl_key  = </etc/ssl/example.com/key.pem
}

DKIM Key Generation Pattern

opendkim-genkey -s selector -d example.com

TLSA Record Generation (3 1 1)

openssl x509 -in cert.pem -noout -pubkey   | openssl pkey -pubin -outform DER   | openssl dgst -sha256

PBS Namespace-Free Definition

Ensure “Namespace” field is blank when defining PBS storage in Proxmox.

APPENDIX D — Email Standards Reference

  • RFC 5321 — SMTP
  • RFC 5322 — Message Format
  • RFC 6376 — DKIM
  • RFC 7208 — SPF
  • RFC 7489 — DMARC
  • RFC 6698 — DANE
  • RFC 4033–4035 — DNSSEC
  • RFC 8314 — TLS for Email
  • RFC 3501 — IMAP
  • RFC 1939 — POP3
  • Official Proxmox Mail Gateway Documentation
  • Official Proxmox Backup Server Documentation
  • Dovecot 2.x Documentation
  • Postfix Documentation

APPENDIX E — Risk Scenarios and Mitigations

Datacentre Fire

Risk: Total infrastructure loss.
Mitigation: PBS-remote in a distant location.

Ransomware Infection

Risk: Encrypted VM contents.
Mitigation: PBS-local + PBS-remote snapshots.

Certificate Compromise

Risk: Identity spoofing.
Mitigation: Per-domain SNI + TLSA + DNSSEC.

DNS Hijacking

Risk: Redirected email or spoofed servers.
Mitigation: DNSSEC-signed zones.

Spam Flood or SMTP Abuse

Risk: MTA overload.
Mitigation: PMG filtering.

ISP or Hosting Failure

Risk: Mail unreachable.
Mitigation: Retries + remote PBS continuity.

Operator Error

Risk: Misconfiguration or deletions.
Mitigation: PBS-local rollback.

Hardware Failure

Risk: Host destruction.
Mitigation: Bare-metal restore from PBS-remote.